A survey on post-quantum based approaches for edge computing security

被引:1
|
作者
Karakaya, Aykut [1 ]
Ulu, Ahmet [2 ]
机构
[1] Bulent Ecevit Univ, Dept Comp Technol, Zonguldak, Turkiye
[2] Artvin Coruh Univ, Dept Comp Engn, Artvin, Turkiye
关键词
edge computing; internet of things; lightweight; post-quantum; security; EFFICIENT; PROTOCOL; INTERNET; SERVICE; STATE;
D O I
10.1002/wics.1644
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high-speed processing is that its existing systems cause security vulnerabilities. Therefore, in order to take advantage of quantum systems, existing systems that are already secure must also be secure in the post-quantum scenario. One of these systems is edge computing. There are challenges in terms of computational power for the implementation of pre- and post-quantum methods in structures with resource-constrained devices. This article reviews the post-quantum security threats of edge devices and systems and the secure methods developed for them. Although there is relatively little research in this field, it remains relevant. In the studies reviewed, lattice-based approaches are often highlighted for making edge systems quantum-resistant. Additionally, these studies indicate that there has been an increasing trend in this field in recent years. This article is categorized under: Applications of Computational Statistics > Defense and National Security Algorithms and Computational Methods > Networks and Security
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Edge Computing-Based Scheme for Post-Quantum IoT Security for e-Health
    Minhas N.N.
    Mansoor K.
    IEEE Internet of Things Journal, 2024, 11 (19) : 1 - 1
  • [2] A Trusted Inference Mechanism for Edge Computing Based on Post-Quantum Encryption
    Huang, Yukang
    Mai, Junyi
    Jiang, Wanling
    Yao, Enyi
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [3] Post-quantum cryptography-driven security framework for cloud computing
    Ukwuoma, Henry Chima
    Arome, Gabriel
    Thompson, Aderonke
    Alese, Boniface Kayode
    OPEN COMPUTER SCIENCE, 2022, 12 (01) : 142 - 153
  • [4] Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions
    Gharavi, Hadi
    Granjal, Jorge
    Monteiro, Edmundo
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1748 - 1774
  • [5] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [6] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [7] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [8] Confidential Computing in the Post-Quantum Era
    Puckett, Steven C.
    Crabtree, John D.
    SOUTHEASTCON 2023, 2023, : 518 - 523
  • [9] Post-Quantum Security: Opportunities and Challenges
    Li, Silong
    Chen, Yuxiang
    Chen, Lin
    Liao, Jing
    Kuang, Chanchan
    Li, Kuanching
    Liang, Wei
    Xiong, Naixue
    SENSORS, 2023, 23 (21)
  • [10] Post-quantum Security of the Sponge Construction
    Czajkowski, Jan
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Schaffner, Christian
    Unruh, Dominique
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 185 - 204