{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T05:21:50Z","timestamp":1732080110910,"version":"3.28.0"},"reference-count":33,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Blockchain"],"published-print":{"date-parts":[[2024,9]]},"abstract":"Abstract<\/jats:title>The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision\u2010making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post\u2010quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum\u2010IoT\u2010based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the\u00a0future.<\/jats:p>","DOI":"10.1049\/blc2.12059","type":"journal-article","created":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T08:51:52Z","timestamp":1700211112000},"page":"252-262","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["QIoTChain: Quantum IoT\u2010blockchain fusion for advanced data protection in Industry 4.0"],"prefix":"10.1049","volume":"4","author":[{"given":"Aditya Kumar","family":"Sharma","sequence":"first","affiliation":[{"name":"SWE Atlassian India LLP Bengaluru Karnataka India"}]},{"given":"Mritunjay Shall","family":"Peelam","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering BITS Pilani Pilani India"}]},{"given":"Brijesh Kumar","family":"Chauasia","sequence":"additional","affiliation":[{"name":"Department of CSE Pranveer Singh Institute of Technology Kanpur India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6730-3060","authenticated-orcid":false,"given":"Vinay","family":"Chamola","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering BITS Pilani Pilani India"}]}],"member":"265","published-online":{"date-parts":[[2023,11,17]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862219500192"},{"key":"e_1_2_12_3_1","doi-asserted-by":"crossref","unstructured":"Peelam M.S. Johari R.:Enhancing security using quantum computing (ESUQC). In:Machine Learning Advances in Computing Renewable Energy and Communication: Proceedings of MARC 2020 pp.227\u2013235.Springer Cham(2022)","DOI":"10.1007\/978-981-16-2354-7_21"},{"first-page":"21","volume-title":"Quantum Computing and Other Transformative Technologies","year":"2022","author":"Banafa A.","key":"e_1_2_12_4_1"},{"key":"e_1_2_12_5_1","unstructured":"Check Point Software Technologies Ltd.IoT security solutions by check point.https:\/\/www.checkpoint.com\/solutions\/iot\u2010security\/. Accessed: 15 May 2023"},{"key":"e_1_2_12_6_1","doi-asserted-by":"crossref","unstructured":"Guillen O.M. P\u00f6ppelmann T. Mera J.M.B. Bongenaar E.F. Sigl G. Sepulveda J.:Towards post\u2010quantum security for IoT endpoints with NTRU. In:Design Automation & Test in Europe Conference & Exhibition (DATE) pp.698\u2013703.IEEE Piscataway NJ(2017)","DOI":"10.23919\/DATE.2017.7927079"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600522CM"},{"key":"e_1_2_12_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3063538"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1092-50"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700330"},{"volume-title":"Where Will Quantum Computers Create Value\u2014and When?","year":"2019","author":"Langione M.","key":"e_1_2_12_11_1"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"e_1_2_12_13_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v14i15.15893"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-022-00938-7"},{"key":"e_1_2_12_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-323-96146-2.00020-6"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFM-10-2020-0077"},{"volume-title":"Industry 4.0: The Future of Productivity and Growth in Manufacturing Industries","year":"2015","author":"R\u00fc\u00dfmann M.","key":"e_1_2_12_17_1"},{"key":"e_1_2_12_18_1","doi-asserted-by":"crossref","unstructured":"Krishnamoorthy R. Aswini S. Guna C. et\u00a0al.:Design and implementation of IoT based energy management system with data acquisition. In:2020 7th International Conference on Smart Structures and Systems (ICSSS) pp.1\u20135.IEEE Piscataway NJ(2020)","DOI":"10.1109\/ICSSS49621.2020.9201997"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100292"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3138160"},{"key":"e_1_2_12_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3230937"},{"key":"e_1_2_12_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18010162"},{"key":"e_1_2_12_23_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5617903"},{"key":"e_1_2_12_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.04.006"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"e_1_2_12_26_1","doi-asserted-by":"crossref","unstructured":"Shen X. Xu C. Zhu L. Lu R. Guan Y. Zhang X.:Blockchain\u2010based lightweight and privacy\u2010preserving quality assurance framework in crowdsensing systems.IEEE Internet Things J. (2023)https:\/\/doi.org\/10.1109\/JIOT.2023.3288349","DOI":"10.1109\/JIOT.2023.3288349"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15080271"},{"key":"e_1_2_12_28_1","doi-asserted-by":"crossref","unstructured":"Monroy S.S. Li P. Fang Y. Loparo K.A.:Blockchain\u2010empowered distributed additive manufacturing\u2010as\u2010a\u2010service: an architectural perspective.IEEE Network(2023)https:\/\/doi.org\/10.1109\/MNET.129.2200459","DOI":"10.1109\/MNET.129.2200459"},{"key":"e_1_2_12_29_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-020-00247-5"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep07658"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETS50041.2021.9465397"},{"key":"e_1_2_12_32_1","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6455\/ab69a8"},{"key":"e_1_2_12_33_1","unstructured":"Emergen Research:Quantum computing market size share trends analysis report 2028. Accessed 27 July 2023https:\/\/www.emergenresearch.com\/industry\u2010report\/quantum\u2010computing\u2010market(2022)"},{"key":"e_1_2_12_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0528-2"}],"container-title":["IET Blockchain"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T09:30:15Z","timestamp":1732008615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/blc2.12059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10.1049\/blc2.12059"],"URL":"https:\/\/doi.org\/10.1049\/blc2.12059","archive":["Portico"],"relation":{},"ISSN":["2634-1573","2634-1573"],"issn-type":[{"type":"print","value":"2634-1573"},{"type":"electronic","value":"2634-1573"}],"subject":[],"published":{"date-parts":[[2023,11,17]]},"assertion":[{"value":"2023-08-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}