Securing the future internet of things with post-quantum cryptography

被引:0
|
作者
Kumar, Adarsh [1 ]
Ottaviani, Carlo [2 ,3 ]
Gill, Sukhpal Singh [4 ]
Buyya, Rajkumar [5 ]
机构
[1] Univ Petr & Energy Studies, Sch Comp Sci, Dept Syst, Dehra Dun, Uttarakhand, India
[2] Univ York, Dept Comp Sci, York, N Yorkshire, England
[3] Univ York, York Ctr Quantum Technol, York, N Yorkshire, England
[4] Queen Mary Univ London, Sch Elect Engn & Comp Sci, Mile End Rd, London E1 4NS, England
[5] Univ Melbourne, Sch Comp & Informat Syst, Cloud Comp & Distributed Syst CLOUDS Lab, Parkville, Vic, Australia
来源
SECURITY AND PRIVACY | 2022年 / 5卷 / 02期
关键词
cryptography; interne of things; post-quantum cryptography; quantum computing; security;
D O I
10.1002/spy2.200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ensure full-proof security. Post-quantum cryptography is important for the Internet of things (IoT) due to its security against quantum attacks. This paper offers a broad literature analysis of post-quantum cryptography for IoT networks, including the challenges and research directions to adopt in real-time applications. The work draws focus towards post-quantum cryptosystems that are useful for resource-constraint devices. Further, those quantum attacks are surveyed, which may occur over traditional and lightweight cryptographic primitives.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    Grossschadl, Johann
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 158 - 162
  • [2] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    [J]. PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [3] Post-quantum distributed ledger for internet of things
    Shahid, Furqan
    Khan, Abid
    Jeon, Gwanggil
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 83
  • [4] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. NATURE, 2017, 549 (7671) : 188 - 194
  • [5] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    [J]. Nature, 2017, 549 : 188 - 194
  • [6] Post-Quantum Cryptography
    Monroe, Don
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [7] On the Suitability of Post-Quantum Signature Schemes for Internet of Things
    Shim, Kyung-Ah
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10648 - 10665
  • [8] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [9] Securing the Internet of Medical Things (IoMT) with K3S and Hybrid Cryptography: Integrating Post-Quantum Approaches for Enhanced Embedded System Security
    El-Hadedy, Mohamed
    Ankunda, Patricia V.
    Ung, James
    Hwu, Wen-Mei
    [J]. 17TH IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE, DCAS 2024, 2024,
  • [10] Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (10): : 2047 - 2076