Securing the Internet of Things in a Quantum World

被引:128
|
作者
Cheng, Chi [1 ,2 ]
Lu, Rongxing [3 ]
Petzoldt, Albrecht [4 ,5 ]
Takagi, Tsuyoshi
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
[2] Kyushu Univ, Fukuoka, Japan
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
[4] Kyushu Univ, Fukuoka, Japan
[5] Kyushu Univ, Inst Math Ind, Fukuoka, Japan
基金
中国国家自然科学基金;
关键词
D O I
10.1109/MCOM.2017.1600522CM
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs) as basic building blocks to secure the communication in the loT. However, public key schemes like ECC can easily be broken by the upcoming quantum computers. Due to recent advances in quantum computing, we should act now to prepare the loT for the quantum world. In this article, we focus on the current state of the art and recent developments in the area of quantum-resistant cryptosystems for securing the loT. We first demonstrate the impacts of quantum computers on the security of the cryptographic schemes used today, and then give an overview of the recommendations for cryptographic schemes that can be secure under the attacks of both classical and quantum computers. After that, we present the existing implementations of quantum-resistant cryptographic schemes on constrained devices suitable for the loT. Finally, we give an introduction to ongoing projects for quantum-resistant schemes that will help develop future security solutions for the loT.
引用
收藏
页码:116 / 120
页数:5
相关论文
共 50 条
  • [1] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [2] Securing Things in the Healthcare Internet of Things
    MacDermott, Aine
    Kendrick, Phillip
    Idowu, Ibrahim
    Ashall, Mal
    Shi, Qi
    [J]. 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [3] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    [J]. SECURITY AND PRIVACY, 2022, 5 (02):
  • [4] Challenges to Securing the Internet of Things
    Stout, William M. S.
    Urias, Vincent E.
    [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 1 - 8
  • [5] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [6] Securing Internet-of-Things
    Gong, Guang
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 3 - 16
  • [7] The embedded framework for securing the Internet of Things
    Khan, Feroz A. B.
    Anandharaj, G.
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2021, 9 (02): : 139 - 148
  • [8] Securing the Internet of things using Blockchain
    Showkat, Sadia
    Qureshi, Shaima
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 540 - 545
  • [9] Securing the Internet of Things: A Standardization Perspective
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Tschofenig, Hannes
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03): : 265 - 275
  • [10] Securing the Internet of Things: An Ongoing Challenge
    Smith, Sean W.
    [J]. COMPUTER, 2020, 53 (06) : 62 - 66