2021
DOI: 10.1002/spy2.200
|View full text |Cite
|
Sign up to set email alerts
|

Securing the future internet of things with post‐quantum cryptography

Abstract: Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ensure full-proof security. Post-quantum cryptography is important for the internet of things (IoT) due to its security against quantum attacks. This paper offers a broad literature analysis of post-quantum cryptography for IoT networks, including the challenges and research directions to adopt in re… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Although several approaches are available for secure quantum algorithms, these cannot be suitable for resource-constrained IoMT devices. These aspects need to be evaluated and researched further on [ 75 ].…”
Section: Future Research Workmentioning
confidence: 99%
“…Although several approaches are available for secure quantum algorithms, these cannot be suitable for resource-constrained IoMT devices. These aspects need to be evaluated and researched further on [ 75 ].…”
Section: Future Research Workmentioning
confidence: 99%
“…The symmetric cryptosystems are considered to be authentic and more reliable even in the post‐quantum era. These algorithms can be furnished by just increasing the key size to deal with the quantum attacks 37,38 . Other the other hand, the asymmetric cryptosystems rely on key‐pair to protect the messages.…”
Section: The Security Issues In Iot Systemsmentioning
confidence: 99%
“…These algorithms can be furnished by just increasing the key size to deal with the quantum attacks. 37,38 Other the other hand, the asymmetric cryptosystems rely on key-pair to protect the messages. These cryptosystems are completely based on the mathematical formulation and it is required for the algorithm to follow a computationally complex formulation to restrict brute force search attack from successively selecting the key pair.…”
Section: Prequantum Cryptosystems For Security In Iotmentioning
confidence: 99%
“…In addition, extremely sensitive EMRs are vulnerable to tampering and abuse, creating privacy and security risks. From a philosophical city standpoint, the latest advancements of Healthcare 4.0, which uses IoT elements [21] and cloud services to access medical procedures remotely, have piqued the researcher's interest. Frequent medical data monitoring, consolidation, data transfer, information sharing, and data management were the core components of Healthcare 4.0.…”
Section: Importance Of Quantum Blockchain For Healthcarementioning
confidence: 99%