A New Approach: Cognitive Multi-Level Authentication (CMLA) in Nuclear Command and Control

11/11/2019
by   Aysha Shabbir, et al.
0

Nuclear monitoring must considered as high precedence against national security. Now with the increasing nuclear threats it is crucial to ensure that malicious entity never procure nuclear warheads. Which comprises the prevention of illegal or terrorist access to nuclear weapons. The disastrous damage that could be the consequence of unauthorized unapproved utilization of nuclear weapon and from the expansion of nuclear technologies to unacceptable states has driven the nuclear forces to spend epic measures of securing nuclear warheads as well as the supporting materials infrastructure and industries. The procedure of ratifying users credentials is known as authentication. Cognitive based authentication is a type of authentication that is actually the amalgamation of neuron biological and psychological techniques. This research is intended to provide human inspired Cognitive Multi-level Authentication utilizing the extensive quantum processing capabilities. Simulation is being done on online Q U V I S quantum simulator using quantum cryptography B B 8 4 algorithm where the intended person is successfully authenticated while considering different scenarios. So the proposed scheme will come up with self learning intellect based secure speedy and reliable authentication systems against nuclear command and control.

READ FULL TEXT

page 5

page 6

page 7

page 10

page 11

page 12

research
06/02/2022

Authentication of quantum key distribution with post-quantum cryptography and replay attacks

With the development of quantum computers, traditional cryptographic sys...
research
10/11/2021

Quantum multi-factor authentication

We present a quantum multi-factor authentication mechanism based on the ...
research
03/25/2019

Lightweight authentication for quantum key distribution

Quantum key distribution (QKD) enables unconditionally secure communicat...
research
08/02/2018

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Implicit authentication (IA) is gaining popularity over recent years due...
research
07/18/2020

Quantum-Secure Authentication via Abstract Multi-Agent Interaction

Current methods for authentication based on public-key cryptography are ...
research
03/14/2019

Nuclear Environments Inspection with Micro Aerial Vehicles: Algorithms and Experiments

In this work, we address the estimation, planning, control and mapping p...

Please sign up or login with your details

Forgot password? Click here to reset