Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: a comprehensive survey

Swati Kumari*, Maninder Singh, Raman Singh, Hitesh Tewari

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

As the number and characteristics of smart devices change, the concept of the Internet of Things (IoT) emerges. The IoT provides the connected devices with a variety of resources that enable effective communication. At this point, several security issues arise to get the sensitive information behind every communication in the IoT. To provide users with security and privacy, cryptographic schemes are adopted, the most popular being public key cryptographic systems (PKC). However, with the advent of quantum computing, the level of security that can be provided by the PKC schemes is a big question. Another important issue is that the IoT environment is resource-constrained, which necessitates the implementation of lightweight cryptographic algorithms for better security. In response to these issues, the post-quantum cryptographic (PQC) schemes are one of the significant developments contributing to IoT security in the post-quantum world. This article examines the key security issues in the IoT environment and examines the effective solutions found in the literature. The problems in IoT in the quantum era are discussed and appropriate solutions by PKC schemes under limited resources in IoT are focused. As the lattice-based cryptosystems are more effective, the importance of these schemes in the resource-constrained IoT is highlighted. This survey also leads to feasible future directions that can support developers and researchers in this field.
Original languageEnglish
Pages (from-to)2047-2076
Number of pages30
JournalSoftware - Practice and Experience
Volume52
Issue number10
Early online date11 Jul 2022
DOIs
Publication statusE-pub ahead of print - 11 Jul 2022

Keywords

  • post-quantum cryptography
  • public key cryptography
  • internet of things
  • cyber security
  • key distribution

Fingerprint

Dive into the research topics of 'Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: a comprehensive survey'. Together they form a unique fingerprint.

Cite this