A survey on post-quantum based approaches for edge computing security

被引:6
作者
Karakaya, Aykut [1 ]
Ulu, Ahmet [2 ]
机构
[1] Bulent Ecevit Univ, Dept Comp Technol, Zonguldak, Turkiye
[2] Artvin Coruh Univ, Dept Comp Engn, Artvin, Turkiye
关键词
edge computing; internet of things; lightweight; post-quantum; security; EFFICIENT; PROTOCOL; INTERNET; SERVICE; STATE;
D O I
10.1002/wics.1644
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high-speed processing is that its existing systems cause security vulnerabilities. Therefore, in order to take advantage of quantum systems, existing systems that are already secure must also be secure in the post-quantum scenario. One of these systems is edge computing. There are challenges in terms of computational power for the implementation of pre- and post-quantum methods in structures with resource-constrained devices. This article reviews the post-quantum security threats of edge devices and systems and the secure methods developed for them. Although there is relatively little research in this field, it remains relevant. In the studies reviewed, lattice-based approaches are often highlighted for making edge systems quantum-resistant. Additionally, these studies indicate that there has been an increasing trend in this field in recent years. This article is categorized under: Applications of Computational Statistics > Defense and National Security Algorithms and Computational Methods > Networks and Security
引用
收藏
页数:36
相关论文
共 61 条
  • [1] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    [J]. IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [2] Secure Quantum Steganography Protocol for Fog Cloud Internet of Things
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Elmougy, Samir
    Ghoneim, Ahmed
    [J]. IEEE ACCESS, 2018, 6 : 10332 - 10340
  • [3] Ajtai M., 1997, Publickey cryptosystem with worstcase/averagecase equivalence. In: Proceedings of the Annual ACM Symposium on Theory of Computing, DOI [10.1145/258533.258604, DOI 10.1145/258533.258604]
  • [4] Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation
    Akleylek, Sedat
    Soysaldi, Meryem
    Lee, Wai-Kong
    Hwang, Seong Oun
    Wong, Denis Chee-Keong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08): : 6983 - 6994
  • [5] A new method for vulnerability and risk assessment of IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. COMPUTER NETWORKS, 2023, 237
  • [6] Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited
    Arat, Ferhat
    Akleylek, Sedat
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [7] Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms
    Asif, Rameez
    [J]. IOT, 2021, 2 (01): : 71 - 91
  • [8] Front-End Intelligence for Large-Scale Application-Oriented Internet-of-Things
    Bader, Ahmed
    Ghazzai, Hakim
    Kadri, Abdullah
    Alouini, Mohamed-Slim
    [J]. IEEE ACCESS, 2016, 4 : 3257 - 3272
  • [9] Balasubramanian K., 2018, Algorithmic strategies for solving complex problems in cryptography, P1, DOI DOI 10.4018/978-1-5225-2915-6.CH001
  • [10] Bernstein DJ., 2009, Post-quantum cryptography, DOI DOI 10.1007/978-3-540-88702-7