Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

被引:2
作者
Khan, Muhammad Asghar [1 ]
Javaid, Shumaila [2 ]
Mohsan, Syed Agha Hassnain [3 ,4 ]
Tanveer, Muhammad [5 ]
Ullah, Insaf [6 ]
机构
[1] Prince Mohammad bin Fahd Univ, Dept Elect Engn, Al Khobar 31952, Saudi Arabia
[2] Tongji Univ, Coll Elect Informat Engn, Dept Control Sci Engn, Shanghai 201804, Peoples R China
[3] Ilma Univ, Fac Comp Sci, Dept Comp Sci, Karachi 75190, Pakistan
[4] Eastern Inst Adv Studies, Coll Informat Sci & Technol, Ningbo 315200, Peoples R China
[5] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[6] Univ Essex, Inst Analyt & Data Sci, Colchester CO4 3SQ, England
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Cryptography; Security; Autonomous aerial vehicles; Reviews; Quantum computing; Computer security; NIST; Quantum cryptography; Privacy; Surveys; Post-quantum cryptography; privacy; quantum attacks; security; UAVs; INTERNET; STATE; THREATS; SCHEME; DRONES; THINGS;
D O I
10.1109/OJCOMS.2024.3486649
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes. However, as UAVs become more integrated into everyday life, security and privacy concerns are similarly escalating due to vulnerabilities arising from operating on open wireless channels and having limited onboard computational resources. Moreover, with the emergence of quantum computers, conventional cryptographic methods that ensure the security and privacy of UAV communications are at severe risk. These risks encompass the possibility of unauthorized access, breaches of data, and cyber-physical attacks that jeopardize the integrity, confidentiality, and availability of UAV operations. Quantum computers are expected to break the conventional cryptography methods, such as symmetric and asymmetric schemes, with the support of Grover's and Shor's algorithms, respectively. Consequently, traditional cryptographic algorithms must give way to quantum-resistant algorithms, referred to as Post-Quantum Cryptography (PQC) algorithms. Although researchers actively develop, test, and standardize new PQC algorithms, the threat persists despite the progress made through these consistent efforts. This review article first examines the security and privacy landscape, including threats and requirements of UAVs. This article also discusses PQC and various PQC families and the status of the NIST's implementation and standardization process. Lastly, we explore challenges and future directions in implementing PQC for UAVs.
引用
收藏
页码:6849 / 6871
页数:23
相关论文
共 119 条
  • [1] Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
    Ahilan, A.
    Jeyam, A.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (01) : 549 - 567
  • [2] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [3] Alagic G., 2022, Rep. 8413
  • [4] Alagic G., 2019, Status report on the first round of the nist post-quantum cryptography standardization process
  • [5] Albrecht M. R., 2019, IEEE Trans. Comput., V68, P45
  • [6] A Privacy-Preserved Internet-of-Medical-Things Scheme for Eradication and Control of Dengue Using UAV
    Ali, Amir
    Nisar, Shibli
    Khan, Muhammad Asghar
    Mohsan, Syed Agha Hassnain
    Noor, Fazal
    Mostafa, Hala
    Marey, Mohamed
    [J]. MICROMACHINES, 2022, 13 (10)
  • [7] Alkim E., 2016, P POSTQ CRYPT C PQCR, P146
  • [8] Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities
    Alsamhi, Saeed H.
    Ma, Ou
    Ansari, Mohammad Samar
    Almalki, Faris A.
    [J]. IEEE ACCESS, 2019, 7 : 128125 - 128152
  • [9] GPS Spoofing Attacks in FANETs: A Systematic Literature Review
    Altaweel, Ala
    Mukkath, Hena
    Kamel, Ibrahim
    [J]. IEEE ACCESS, 2023, 11 : 55233 - 55280
  • [10] Altawy R, 2017, ACM TRANS CYBER-PHYS, V1, DOI 10.1145/3001836