EconPapers    
Economics at your fingertips  
 

Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network

Bassfar Zaid, Ashar Sayeed, Priti Bala, Ali Alshehri, Abdulaziz Mohammed Alanazi and Swaleha Zubair ()
Additional contact information
Bassfar Zaid: Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
Ashar Sayeed: Department of Computer Science, Aligarh Muslim University, Aligarh 202002, India
Priti Bala: Department of Computer Science, Aligarh Muslim University, Aligarh 202002, India
Ali Alshehri: Department of Computer Science, University of Tabuk, Tabuk 71491, Saudi Arabia
Abdulaziz Mohammed Alanazi: Department of Mathematics, University of Tabuk, Tabuk 71491, Saudi Arabia
Swaleha Zubair: Department of Computer Science, Aligarh Muslim University, Aligarh 202002, India

Mathematics, 2023, vol. 11, issue 12, 1-22

Abstract: The importance of network security has increased with the emergence of networked systems in contemporary computing, making it an essential aspect of protecting digital assets and safeguarding against cyber threats. The current security mechanisms, which rely on cryptographic keys, may be susceptible to a number of attacks, such as media access control (MAC) spoofing, which might provide unauthorized users access to network resources. This study introduces a new approach, namely a zero-trust security framework with quantum fingerprinting for devices accessing a network, that utilizes quantum technology to protect networks from security threats and intruders. The proposed architecture relies on quantum fingerprinting to authenticate devices trying to access the network, and it is built on the zero-trust security concept. The framework is intended to offer a thorough, multi-layered approach to network security that may change in response to evolving security risks and specifications. By protecting against MAC spoofing and other types of device impersonation, the adoption of quantum fingerprinting adds another degree of protection. The proposed framework may be used to construct a reliable and scalable network security solution in different network environments.

Keywords: network evolutionary mechanisms; MAC spoofing; information networks; network security; network access; quantum fingerprinting; zero-trust security (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/11/12/2653/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/12/2653/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:12:p:2653-:d:1168305

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:11:y:2023:i:12:p:2653-:d:1168305