Skip to main content
Top

2024 | OriginalPaper | Chapter

Quantum-Secure Communication for Trusted Edge Computing with IoT Devices

Authors : George Kornaros, Georgia Berki, Miltos Grammatikakis

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet-of-Things(IoT)-based edge computing in smart factories, smart grid, agriculture, constructions and autonomous vehicles include service-oriented gateways that connect with the cloud, perform machine-to-machine communication, often transmiting large amount data up and down the network, performing time-sensitive processing and involving intelligent local decision-making. In view of a sharp increase in cyberattacks today targeting edge computing, these gateways need to provide digital signing and key negotiation for ensuring reliable data sources, trusted applications and authentic devices and connections. In contrast to common perception, we show that post-quantum cryptography methods do not necessitate extensive modification to adopt in such environments; further, the cryptography algorithm’s hardness is preserved while fulfilling the IoT device’s resource limitations. In particular, we demonstrate an efficient method and an implementation on a 32-bit ARMCortex-M4, 64KB memory microcontroller, based on post-quantum key encapsulation mechanisms (KEMs), for secure communication and authentication in an industrial IoT environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Barton., J., Buchanan., W., Pitropakis., N., Sayeed., S., Abramson., W.: Post quantum cryptography analysis of TLS tunneling on a constrained device. In: Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, pp. 551–561. INSTICC, SciTePress (2022).https://doi.org/10.5220/0010903000003120 Barton., J., Buchanan., W., Pitropakis., N., Sayeed., S., Abramson., W.: Post quantum cryptography analysis of TLS tunneling on a constrained device. In: Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, pp. 551–561. INSTICC, SciTePress (2022).https://​doi.​org/​10.​5220/​0010903000003120​
17.
18.
21.
go back to reference Sepúlveda, J., Gross, M., Zankl, A., Sigl, G.: Beyond cache attacks: exploiting the bus-based communication structure for powerful on-chip microarchitectural attacks. ACM Trans. Embed. Comput. Syst. 20(2) (2021). https://doi.org/10.1145/3433653 Sepúlveda, J., Gross, M., Zankl, A., Sigl, G.: Beyond cache attacks: exploiting the bus-based communication structure for powerful on-chip microarchitectural attacks. ACM Trans. Embed. Comput. Syst. 20(2) (2021). https://​doi.​org/​10.​1145/​3433653
23.
go back to reference Zhang, X., Xiao, Y., Zhang, Y.: Return-oriented flush-reload side channels on arm and their implications for android devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 858–870. CCS ’16 (2016). https://doi.org/10.1145/2976749.2978360 Zhang, X., Xiao, Y., Zhang, Y.: Return-oriented flush-reload side channels on arm and their implications for android devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 858–870. CCS ’16 (2016). https://​doi.​org/​10.​1145/​2976749.​2978360
Metadata
Title
Quantum-Secure Communication for Trusted Edge Computing with IoT Devices
Authors
George Kornaros
Georgia Berki
Miltos Grammatikakis
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_12

Premium Partner