Syed Faizan Haider,
Syed Afzal Murtaza Rizvi,
- Research Scholar, Department of Computer Science, Jamia Millia Islamia, New Delhi, India
- Professor, Department of Computer Science, Jamia Millia Islamia, New Delhi, India
Abstract
Security remains a critical concern in the landscape of smart computing for IoT devices, necessitating robust measures to safeguard sensitive data and user privacy. In this context, the utilization of quantum-based encryption presents a promising avenue to enhance security in unified software architecture. This study proposes a model aimed at fortifying the security of IoT devices by integrating mobile app authentication with quantum-based encryption techniques. The model leverages Quantum Key Distribution (QKD) protocols and quantum encryption algorithms to establish secure communication channels between mobile applications and IoT devices. Additionally, quantum-resistant cryptography is employed to mitigate potential threats from quantum computing advancements. By incorporating quantum-based authentication mechanisms and continuous monitoring, the proposed model aims to ensure the integrity, confidentiality, and long-term security of smart computing systems in the face of evolving cyber threats.
Keywords: Quantum encryption, IoT security, quantum key distribution (QKD), mobile app authentication, quantum-resistant cryptography
[This article belongs to Recent Trends in Parallel Computing ]
Syed Faizan Haider, Syed Afzal Murtaza Rizvi. Enhancing Security in Unified Software Architecture for Smart Computing IoT Devices via Mobile App Authentication Using Quantum-Based Encryption. Recent Trends in Parallel Computing. 2025; 12(03):41-48.
Syed Faizan Haider, Syed Afzal Murtaza Rizvi. Enhancing Security in Unified Software Architecture for Smart Computing IoT Devices via Mobile App Authentication Using Quantum-Based Encryption. Recent Trends in Parallel Computing. 2025; 12(03):41-48. Available from: https://journals.stmjournals.com/rtpc/article=2025/view=232647
References
- Bohé I, Willocx M, Naessens V. SMIoT: a software architecture for maintainable internet-of-things applications. Int J Cloud Comput. 2020; 9(1): 75–94.
- Atzori L, Iera A, Morabito G. The internet of things: A survey. Comput Netw. 2010 Oct 28; 54(15): 2787–805.
- Roman R, Lopez J, Mambo M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener Comput Syst. 2018 Jan 1; 78: 680–98.
- Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 2015 Jun 15; 17(4): 2347–76.
- Kovatsch M, Duquennoy S, Dunkels A. A low-power CoAP for Contiki. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. 2011 Oct 17; 855–860.
- Merenda M, Porcaro C, Iero D. Edge machine learning for ai-enabled IoT devices: A review. Sensors. 2020 Apr 29; 20(9): 2533.
- Lee C, Jung D, Lee K. A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services. Int J Secur Appl. 2013 Nov; 7(6): 21–30.
- Daniel A, Ahmad A, Paul A. Machine-to-Machine Communication. J Platf Technol. 2014 Jun; 2(2): 3–15.
- Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sens Netw. 2013 Aug 22; 9(8): 794326.
- Kirubakaramoorthi R, Arivazhagan D, Helen D. Analysis of cloud computing technology. Indian J Sci Technol. 2015 Sep; 8(21): 1–3.

Recent Trends in Parallel Computing
| Volume | 12 |
| Issue | 03 |
| Received | 18/07/2025 |
| Accepted | 01/09/2025 |
| Published | 30/10/2025 |
| Publication Time | 104 Days |
Login
PlumX Metrics