Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

被引:13
作者
Althobaiti, Ohood Saud [1 ]
Dohler, Mischa [1 ]
机构
[1] Kings Coll London, Dept Engn, London WC2R 2LS, England
关键词
Cryptography; Security; Internet of Things; Quantum computing; Protocols; Lattices; Computers; Cryptosystem; quantum-resistant cryptography; lattices; localization; location; Narrow-Band Internet of Things; POSITION; VERIFICATION; LOCALIZATION;
D O I
10.1109/ACCESS.2021.3115087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things (NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum computing, another emerging technological paradigm, promises novel compute opportunities but is also able to compromise cybersecurity ciphers. Therefore, improved methods to mitigate such security threats are needed. In this research, we propose a location-aware cryptographic system that guarantees post-quantum IoT security. The ultimate value of a location-driven cryptosystem is to use the geographic location as a player's identity and credential. Position-driven cryptography using lattices is efficient and lightweight, and it can be used to protect sensitive and confidential data in many critical situations that rely heavily on exchanging confidential data. At the best of our knowledge, this research starts the study of unconditional-quantum-resistant-location-driven cryptography by using the Lattice problem for the IoT in a pre-and post-quantum world. Unlike existing schemes, the proposed cryptosystem is the first secure and unrestricted position-based protocol that guards against any number of collusion attackers and against quantum attacks. It has a guaranteed authentication process, solves the problems of distributing public keys by removing a public key infrastructure (PKI), offers secure NB-IoT without SIM cards, and resists location spoofing attacks. Furthermore, it can be generalized to any network - not just NB-IoT.
引用
收藏
页码:133185 / 133203
页数:19
相关论文
共 96 条
[1]  
Abood May H., 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P86, DOI 10.1109/NTICT.2017.7976154
[2]  
Aderohunmu F. A., 2010, THESIS U OTAGO DUNED
[3]  
Ahmad Khaleel., 2019, Emerging Security Algorithms and Techniques
[4]  
Akand M. M. R., 2016, P ACM SIGSAC C COMP, P1793
[5]  
Almas MS, 2018, IEEE T SMART GRID, V9, P4601, DOI [10.1109/TSG.2017.2665461, 10.1109/PESGM.2018.8586667]
[6]   Narrowband-Internet of Things Device-to-Device Simulation: An Open-Sourced Framework [J].
Althobaiti, Ohood Saud ;
Dohler, Mischa .
SENSORS, 2021, 21 (05) :1-31
[7]   Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World [J].
Althobaiti, Ohood Saud ;
Dohler, Mischa .
IEEE ACCESS, 2020, 8 :157356-157381
[8]  
[Anonymous], 2017, NARROWBAND IOT PUSHI
[9]  
[Anonymous], 2010, ARXIV10082147
[10]  
[Anonymous], 2014, INT J COMPUTER SCI T