{"id":"https://openalex.org/W4414856589","doi":"https://doi.org/10.1109/tnsm.2025.3617510","title":"Utilization of Quantum Random Numbers in Crystal-Kyber Based Post Quantum Virtual Private Network for Vehicular Communication","display_name":"Utilization of Quantum Random Numbers in Crystal-Kyber Based Post Quantum Virtual Private Network for Vehicular Communication","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414856589","doi":"https://doi.org/10.1109/tnsm.2025.3617510"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3617510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3617510","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021388945","display_name":"Sarvesh V. Sawant","orcid":"https://orcid.org/0000-0002-6183-4653"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]},{"id":"https://openalex.org/I42014448","display_name":"Sardar Vallabhbhai National Institute of Technology Surat","ror":"https://ror.org/02y394t43","country_code":"IN","type":"education","lineage":["https://openalex.org/I42014448"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sarvesh V. Sawant","raw_affiliation_strings":["Department of Information Technology, National Institute of Technology, Surathkal, India","Department of Information Technology in National Institute of Technology, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, National Institute of Technology, Surathkal, India","institution_ids":["https://openalex.org/I11880225","https://openalex.org/I42014448"]},{"raw_affiliation_string":"Department of Information Technology in National Institute of Technology, Karnataka, India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030471572","display_name":"Bhawana Rudra","orcid":"https://orcid.org/0000-0001-7651-3820"},"institutions":[{"id":"https://openalex.org/I42014448","display_name":"Sardar Vallabhbhai National Institute of Technology Surat","ror":"https://ror.org/02y394t43","country_code":"IN","type":"education","lineage":["https://openalex.org/I42014448"]},{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhawana Rudra","raw_affiliation_strings":["Department of Information Technology, National Institute of Technology, Surathkal, India","Department of Information Technology in National Institute of Technology, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, National Institute of Technology, Surathkal, India","institution_ids":["https://openalex.org/I11880225","https://openalex.org/I42014448"]},{"raw_affiliation_string":"Department of Information Technology in National Institute of Technology, Karnataka, India","institution_ids":["https://openalex.org/I11880225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021388945"],"corresponding_institution_ids":["https://openalex.org/I11880225","https://openalex.org/I42014448"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15135746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"997","last_page":"1013"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9334999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9334999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.8004000186920166},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5781000256538391},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5103999972343445},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.4900999963283539},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4620000123977661},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.45249998569488525},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.3716000020503998},{"id":"https://openalex.org/keywords/quantum-network","display_name":"Quantum network","score":0.35100001096725464},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.33480000495910645}],"concepts":[{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.8004000186920166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864000201225281},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6541000008583069},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5781000256538391},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5103999972343445},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.4900999963283539},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4620000123977661},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.45249998569488525},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40220001339912415},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.35100001096725464},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.334199994802475},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31850001215934753},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.3093000054359436},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.29919999837875366},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2806999981403351},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.266400009393692},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.2540999948978424}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3617510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3617510","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1669517233","https://openalex.org/W1977829657","https://openalex.org/W2007466965","https://openalex.org/W2081666008","https://openalex.org/W2085952595","https://openalex.org/W2091124630","https://openalex.org/W2117654928","https://openalex.org/W2121413804","https://openalex.org/W2121619914","https://openalex.org/W2140471436","https://openalex.org/W2247946197","https://openalex.org/W2491848852","https://openalex.org/W2514893051","https://openalex.org/W2612102454","https://openalex.org/W2769183777","https://openalex.org/W2782624605","https://openalex.org/W2782836202","https://openalex.org/W2791664942","https://openalex.org/W2796162349","https://openalex.org/W2796314191","https://openalex.org/W2866028610","https://openalex.org/W2891547713","https://openalex.org/W2895724390","https://openalex.org/W2908951866","https://openalex.org/W2914654142","https://openalex.org/W2930810498","https://openalex.org/W2946755327","https://openalex.org/W2949775670","https://openalex.org/W2954569853","https://openalex.org/W2983324967","https://openalex.org/W3010284032","https://openalex.org/W3016323191","https://openalex.org/W3019640463","https://openalex.org/W3023890793","https://openalex.org/W3102392897","https://openalex.org/W3156196052","https://openalex.org/W4220877750","https://openalex.org/W4229048288","https://openalex.org/W4241940282","https://openalex.org/W4245936502","https://openalex.org/W4308501583","https://openalex.org/W4386284539","https://openalex.org/W4389681520","https://openalex.org/W4406524058","https://openalex.org/W4407938357","https://openalex.org/W4411948743"],"related_works":[],"abstract_inverted_index":{"Virtual":[0,86],"Private":[1,87],"Networks":[2],"(VPN)":[3],"have":[4],"greatly":[5],"contributed":[6],"towards":[7],"enhancing":[8],"the":[9,15,31,46],"data":[10],"security":[11],"of":[12,19],"users":[13],"over":[14],"Internet.":[16],"Even":[17],"extension":[18],"office":[20],"environment":[21],"and":[22,90,98,110],"remote":[23],"access":[24],"is":[25],"possible":[26],"due":[27],"to":[28,54,64,96],"VPNs.":[29],"However,":[30],"current":[32],"VPN":[33,53],"technologies":[34],"pose":[35],"a":[36,77],"threat":[37],"from":[38],"Quantum-Powered":[39],"Adversaries":[40],"as":[41],"these":[42,59],"systems":[43,60],"can":[44],"break":[45],"Public":[47],"Key":[48],"Encryption":[49],"Schemes":[50],"used":[51],"by":[52],"share":[55],"session":[56],"keys.":[57],"Moreover,":[58],"are":[61],"also":[62,102],"capable":[63],"guess":[65],"random":[66],"numbers":[67],"generated":[68],"using":[69],"Pseudo-random":[70],"generators.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75],"propose":[76],"True":[78],"Random":[79],"Number":[80],"based":[81],"Crystal":[82],"Kyber":[83],"Post":[84],"Quantum":[85],"Network":[88],"(PQVPN)":[89],"analyse":[91],"its":[92,112],"strength":[93],"with":[94],"respect":[95],"classical":[97],"quantum":[99],"adversaries.":[100],"We":[101],"present":[103],"our":[104],"comparison":[105],"against":[106],"other":[107],"PQVPN":[108],"solutions":[109],"discuss":[111],"viability":[113],"in":[114],"Vehicular":[115],"Network.":[116]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
