Skip to main content
Erschienen in: Cluster Computing 3/2022

13.08.2021

Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey

verfasst von: Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz

Erschienen in: Cluster Computing | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The concept of the Internet of Things (IoT) arises due to the change in the characteristics and numbers of smart devices. Communication of things makes it important to ensure security in this interactive architecture. One of the developments that are subject to change in IoT environments is post-quantum cryptography. This evolution, which includes the change of asymmetric cryptosystems, affects the security of IoT devices. In this paper, fundamental characteristics and layered architecture of IoT environments are examined. Basic security requirements and solution technologies for IoT architecture are remembered. Some important open problems in the literature for IoT device security are recalled. From these open problems, the post-quantum security of IoT devices with limited resources is focused. The main purpose of this paper is to improve the constrained resource classification and give a point of view for post-quantum IoT security. In this context, a sensitive classification is proposed by improving the limited resource classification of IETF. The cryptosystem efficiency definition is made for the analysis of resource-constrained device security. Using the proposed classification and efficiency definition, the usage of lattice-based cryptosystems in resource-constrained IoT device security is analyzed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)CrossRef Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)CrossRef
3.
Zurück zum Zitat Nguyen, T.G., Phan, T.V., Hoang, D.T., Nguyen, T.N., So-In, C.: Efficient SDN-based traffic monitoring in het-IoT networks with double deep Q-network. In: International Conference on Computational Data and Social Networks (CSoNet20) (2020) Nguyen, T.G., Phan, T.V., Hoang, D.T., Nguyen, T.N., So-In, C.: Efficient SDN-based traffic monitoring in het-IoT networks with double deep Q-network. In: International Conference on Computational Data and Social Networks (CSoNet20) (2020)
5.
Zurück zum Zitat Do, D., Nguyen, M.V., Nguyen, T.N., Li, X., Choi, K.: Enabling multiple power beacons for uplink of NOMA-enabled mobile edge computing in wirelessly powered IoT. IEEE Access 8, 148892–148905 (2020)CrossRef Do, D., Nguyen, M.V., Nguyen, T.N., Li, X., Choi, K.: Enabling multiple power beacons for uplink of NOMA-enabled mobile edge computing in wirelessly powered IoT. IEEE Access 8, 148892–148905 (2020)CrossRef
6.
Zurück zum Zitat Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef
7.
Zurück zum Zitat HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet of Things 100129 (2019) HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet of Things 100129 (2019)
8.
Zurück zum Zitat Abdmeziem, M.R., Tandjaoui, D.: An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44, 184–197 (2015)CrossRef Abdmeziem, M.R., Tandjaoui, D.: An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44, 184–197 (2015)CrossRef
9.
Zurück zum Zitat Cheng, C., Lu, R., Petzoldt, A., Takagi, T.: Securing the Internet of Things in a quantum world. IEEE Commun. Mag. 55(2), 116–120 (2017)CrossRef Cheng, C., Lu, R., Petzoldt, A., Takagi, T.: Securing the Internet of Things in a quantum world. IEEE Commun. Mag. 55(2), 116–120 (2017)CrossRef
10.
Zurück zum Zitat Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proc. 35th Annu. Symp. Foundations of Computer Science, pp. 124–134. IEEE (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proc. 35th Annu. Symp. Foundations of Computer Science, pp. 124–134. IEEE (1994)
11.
Zurück zum Zitat Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Elliptic curve lightweight cryptography: a survey. IEEE Access 6, 72514–72550 (2018)CrossRef Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Elliptic curve lightweight cryptography: a survey. IEEE Access 6, 72514–72550 (2018)CrossRef
15.
Zurück zum Zitat Malina, L., Hajny, J., Fujdiak, R., Hosek, J.: On perspective of security and privacy-preserving solutions in the internet of things. Comput. Netw. 102, 83–95 (2016)CrossRef Malina, L., Hajny, J., Fujdiak, R., Hosek, J.: On perspective of security and privacy-preserving solutions in the internet of things. Comput. Netw. 102, 83–95 (2016)CrossRef
16.
Zurück zum Zitat Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J. 4(1), 1–20 (2016)CrossRef Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J. 4(1), 1–20 (2016)CrossRef
17.
Zurück zum Zitat Li, S.: IoT node authentication. In Securing the internet of things, Syngress Boston, pp. 69–95 (2017) Li, S.: IoT node authentication. In Securing the internet of things, Syngress Boston, pp. 69–95 (2017)
18.
Zurück zum Zitat Chaudhary, R., Aujla, G.S., Kumar, N., Zeadally, S.: Lattice-based public key cryptosystem for Internet of Things environment: challenges and solutions. IEEE Internet Things J 6(3), 4897–4909 (2019)CrossRef Chaudhary, R., Aujla, G.S., Kumar, N., Zeadally, S.: Lattice-based public key cryptosystem for Internet of Things environment: challenges and solutions. IEEE Internet Things J 6(3), 4897–4909 (2019)CrossRef
19.
Zurück zum Zitat Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef
20.
Zurück zum Zitat Yousefnezhad, N., Malhi, A., Främling, K.: Security in product lifecycle of IoT devices: a survey. J. Netw. Comput. Appl. pp. 102779 (2020) Yousefnezhad, N., Malhi, A., Främling, K.: Security in product lifecycle of IoT devices: a survey. J. Netw. Comput. Appl. pp. 102779 (2020)
21.
Zurück zum Zitat Yugha, R., Chithra, S.: survey on technologies and security protocols: reference for future generation IoT. J. Netw. Comput. Appl. pp. 102763 (2020) Yugha, R., Chithra, S.: survey on technologies and security protocols: reference for future generation IoT. J. Netw. Comput. Appl. pp. 102763 (2020)
22.
Zurück zum Zitat Khan, M.N., Rao, A., Camtepe, S.: Lightweight cryptographic protocols for IoT constrained devices: a survey. In: IEEE Internet of Things Journal (2020) Khan, M.N., Rao, A., Camtepe, S.: Lightweight cryptographic protocols for IoT constrained devices: a survey. In: IEEE Internet of Things Journal (2020)
23.
Zurück zum Zitat Lohachab, A., Lohachab, A., Jangra, A.: A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet Things 9, 100174 (2020)CrossRef Lohachab, A., Lohachab, A., Jangra, A.: A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet Things 9, 100174 (2020)CrossRef
24.
Zurück zum Zitat Fernández-Caramés, T.M.: From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet Things J 7(7), 6457–6480 (2020)CrossRef Fernández-Caramés, T.M.: From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet Things J 7(7), 6457–6480 (2020)CrossRef
25.
Zurück zum Zitat Hamad, S.A., Sheng, Q.Z., Zhang, W.E., Nepal, S.: Realizing an internet of secure things: a survey on issues and enabling technologies. IEEE Commun. Surv. Tutor. 22(2), 1372–1391 (2020)CrossRef Hamad, S.A., Sheng, Q.Z., Zhang, W.E., Nepal, S.: Realizing an internet of secure things: a survey on issues and enabling technologies. IEEE Commun. Surv. Tutor. 22(2), 1372–1391 (2020)CrossRef
26.
Zurück zum Zitat Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. In: Computer Communications, ISSN 0140-3664 (2021) Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. In: Computer Communications, ISSN 0140-3664 (2021)
27.
Zurück zum Zitat Asif, R.: Post-quantum cryptosystems for Internet-of-Things: a survey on lattice-based algorithms. IoT 2(1), 71–91 (2021)CrossRef Asif, R.: Post-quantum cryptosystems for Internet-of-Things: a survey on lattice-based algorithms. IoT 2(1), 71–91 (2021)CrossRef
28.
Zurück zum Zitat Malina, L., et al.: Post-quantum era privacy protection for intelligent infrastructures. IEEE Access 9, 36038–36077 (2021)CrossRef Malina, L., et al.: Post-quantum era privacy protection for intelligent infrastructures. IEEE Access 9, 36038–36077 (2021)CrossRef
29.
Zurück zum Zitat Guillen, O.M., Pöppelmann, T., Bermudo Mera, J.M., Bongenaar, E.F., Sigl, G., Sepulveda, J.: Towards post-quantum security for IoT endpoints with NTRU. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 698–703 (2017) Guillen, O.M., Pöppelmann, T., Bermudo Mera, J.M., Bongenaar, E.F., Sigl, G., Sepulveda, J.: Towards post-quantum security for IoT endpoints with NTRU. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 698–703 (2017)
30.
Zurück zum Zitat Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice based cryptographic primitives and schemes on smart cards. Cryptology ePrint Archive, Report 2014/514 (2014) Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice based cryptographic primitives and schemes on smart cards. Cryptology ePrint Archive, Report 2014/514 (2014)
31.
Zurück zum Zitat Pöppelmann, T., Oder, T., Güneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: International conference on cryptology and information security in Latin America, pp. 346–365 (2015) Pöppelmann, T., Oder, T., Güneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: International conference on cryptology and information security in Latin America, pp. 346–365 (2015)
32.
Zurück zum Zitat Liu, Z., Seo, H., Sinha Roy, S., Großschädl, J., Kim, H., Verbauwhede, I.: Efficient ring-LWE encryption on 8-bit AVR processors. Cryptology ePrint Archive, Report 2015/410 (2014) Liu, Z., Seo, H., Sinha Roy, S., Großschädl, J., Kim, H., Verbauwhede, I.: Efficient ring-LWE encryption on 8-bit AVR processors. Cryptology ePrint Archive, Report 2015/410 (2014)
33.
Zurück zum Zitat Cheng, H., Dinu, D., Großschädl, J., Rønne, P.B., Ryan, P.Y.A.: A lightweight implementation of NTRU prime for the post-quantum Internet of Things. In: Laurent M., Giannetsos T. (eds) Information Security Theory and Practice, WISTP 2019. Lecture Notes in Computer Science, vol. 12024 (2020) Cheng, H., Dinu, D., Großschädl, J., Rønne, P.B., Ryan, P.Y.A.: A lightweight implementation of NTRU prime for the post-quantum Internet of Things. In: Laurent M., Giannetsos T. (eds) Information Security Theory and Practice, WISTP 2019. Lecture Notes in Computer Science, vol. 12024 (2020)
34.
Zurück zum Zitat De Clercq, R., Roy, S.S., Vercauteren, F., Verbauwhede, I.: Efficient software implementation of ring-LWE encryption. Cryptology ePrint Archive, Report 2014/725 (2014) De Clercq, R., Roy, S.S., Vercauteren, F., Verbauwhede, I.: Efficient software implementation of ring-LWE encryption. Cryptology ePrint Archive, Report 2014/725 (2014)
35.
Zurück zum Zitat Ebrahimi, S., Bayat-Sarmadi, S., Mosanaei-Boorani, H.: Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE Internet Things J. 6(3), 5500–5507 (2019)CrossRef Ebrahimi, S., Bayat-Sarmadi, S., Mosanaei-Boorani, H.: Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE Internet Things J. 6(3), 5500–5507 (2019)CrossRef
36.
Zurück zum Zitat Zhao, K., Ge, L.: A survey on the Internet of Things security. In: Proceedings of the 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 663–667 (2013) Zhao, K., Ge, L.: A survey on the Internet of Things security. In: Proceedings of the 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 663–667 (2013)
37.
Zurück zum Zitat Chatterjee, B., Sen, S., Cao, N., Raychowdhury, A.: Context-aware intelligence in resource-constrained IoT nodes: opportunities and challenges. IEEE Des. Test 36(2), 7–40 (2019)CrossRef Chatterjee, B., Sen, S., Cao, N., Raychowdhury, A.: Context-aware intelligence in resource-constrained IoT nodes: opportunities and challenges. IEEE Des. Test 36(2), 7–40 (2019)CrossRef
38.
Zurück zum Zitat Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRef Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRef
39.
Zurück zum Zitat Khanam, S., Ahmedy, I.B., Idna Idris, M.Y., Jaward, M.H., Bin Md Sabri, A.Q.: A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things. IEEE Access 8, 219709–219743 (2020)CrossRef Khanam, S., Ahmedy, I.B., Idna Idris, M.Y., Jaward, M.H., Bin Md Sabri, A.Q.: A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things. IEEE Access 8, 219709–219743 (2020)CrossRef
40.
Zurück zum Zitat Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of Internet of Things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)CrossRef Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of Internet of Things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020)CrossRef
41.
Zurück zum Zitat Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182–8201 (2019)CrossRef Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182–8201 (2019)CrossRef
42.
Zurück zum Zitat Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1636–1675 (2019)CrossRef Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1636–1675 (2019)CrossRef
43.
Zurück zum Zitat Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018)CrossRef Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018)CrossRef
44.
Zurück zum Zitat Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutor. 22(3), 1686–1721 (2020)CrossRef Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutor. 22(3), 1686–1721 (2020)CrossRef
45.
Zurück zum Zitat Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195–202 (2020)CrossRef Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195–202 (2020)CrossRef
46.
Zurück zum Zitat Mohanta, B.K., Jena, D., Satapathy, U., Patnaik, S.: Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet Things 100227 (2020) Mohanta, B.K., Jena, D., Satapathy, U., Patnaik, S.: Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet Things 100227 (2020)
47.
Zurück zum Zitat Koshy, P., Babu, S., Manoj, B.S.: Sliding window blockchain architecture for Internet of Things. IEEE Internet Things J. 7(4), 3338–3348 (2020)CrossRef Koshy, P., Babu, S., Manoj, B.S.: Sliding window blockchain architecture for Internet of Things. IEEE Internet Things J. 7(4), 3338–3348 (2020)CrossRef
48.
Zurück zum Zitat Li, G., Dong, M., Yang, L.T., Ota, K., Wu, J., Li, J.: Preserving edge knowledge sharing among IoT services: a blockchain-based approach. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 653–665 (2020)CrossRef Li, G., Dong, M., Yang, L.T., Ota, K., Wu, J., Li, J.: Preserving edge knowledge sharing among IoT services: a blockchain-based approach. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 653–665 (2020)CrossRef
49.
Zurück zum Zitat Viriyasitavat, W., Xu, L.D., Bi, Z., Hoonsopon, D.: Blockchain technology for applications in Internet of Things-mapping from system design perspective. IEEE Internet Things J. 6(5), 8155–8168 (2019)CrossRef Viriyasitavat, W., Xu, L.D., Bi, Z., Hoonsopon, D.: Blockchain technology for applications in Internet of Things-mapping from system design perspective. IEEE Internet Things J. 6(5), 8155–8168 (2019)CrossRef
50.
Zurück zum Zitat Solutions, C.F.C.: Unleash the power of the Internet of Things. Cisco Systems Inc (2015) Solutions, C.F.C.: Unleash the power of the Internet of Things. Cisco Systems Inc (2015)
51.
Zurück zum Zitat Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of Workshop Mobile Big Data, pp. 37–42 (2015) Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of Workshop Mobile Big Data, pp. 37–42 (2015)
52.
Zurück zum Zitat Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning: how Do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning: how Do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef
53.
Zurück zum Zitat Amiri-Zarandi, M., Dara, R.A., Fraser, E.: A survey of machine learning-based solutions to protect privacy in the Internet of Things. Comput. Secur. 101921 (2020) Amiri-Zarandi, M., Dara, R.A., Fraser, E.: A survey of machine learning-based solutions to protect privacy in the Internet of Things. Comput. Secur. 101921 (2020)
54.
Zurück zum Zitat Hsu, R., Lee, J., Quek, T.Q.S., Chen, J.: Reconfigurable security: edge-computing-based framework for IoT. IEEE Netw. 32(5), 92–99 (2018)CrossRef Hsu, R., Lee, J., Quek, T.Q.S., Chen, J.: Reconfigurable security: edge-computing-based framework for IoT. IEEE Netw. 32(5), 92–99 (2018)CrossRef
55.
Zurück zum Zitat Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7 (2016) Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7 (2016)
56.
Zurück zum Zitat Krämer, J.: Post-quantum cryptography and its application to the IoT. Informatik Spektrum 42, 343–344 (2019)CrossRef Krämer, J.: Post-quantum cryptography and its application to the IoT. Informatik Spektrum 42, 343–344 (2019)CrossRef
57.
Zurück zum Zitat De Touzalin, A., Marcus, C., Heijman, F., Cirac, I., Murray, R., Calarco, T.: Quantum Manifesto. A New Era of Technology. European Comission, pp. 1–20 (2016) De Touzalin, A., Marcus, C., Heijman, F., Cirac, I., Murray, R., Calarco, T.: Quantum Manifesto. A New Era of Technology. European Comission, pp. 1–20 (2016)
58.
Zurück zum Zitat Akleylek, S., Seyhan, K.: A probably secure Bi-GISIS based modified AKE scheme with reusable keys. IEEE Access 8, 26210–26222 (2020)CrossRef Akleylek, S., Seyhan, K.: A probably secure Bi-GISIS based modified AKE scheme with reusable keys. IEEE Access 8, 26210–26222 (2020)CrossRef
59.
Zurück zum Zitat Seyhan, K., Nguyen, T.N., Akleylek, S., Cengiz, K., Islam, S.H.: Bi-GISIS KE: modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58, 102788 (2021) Seyhan, K., Nguyen, T.N., Akleylek, S., Cengiz, K., Islam, S.H.: Bi-GISIS KE: modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58, 102788 (2021)
61.
62.
Zurück zum Zitat Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. In: Internet Engineering Task Force (IETF), pp. 2070–1721 (2014) Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. In: Internet Engineering Task Force (IETF), pp. 2070–1721 (2014)
63.
Zurück zum Zitat Suárez-Albela, M., Fernández-Caramés, T.M., Fraga-Lamas, P., Castedo, L.: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17(9), 1978 (2017)CrossRef Suárez-Albela, M., Fernández-Caramés, T.M., Fraga-Lamas, P., Castedo, L.: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17(9), 1978 (2017)CrossRef
64.
Zurück zum Zitat Suárez-Albela, M., Fernández-Caramés, T.M., Fraga-Lamas, P., Castedo, L.: A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: 2018 Global Internet of Things Summit (GIoTS), pp. 1–6 (2018) Suárez-Albela, M., Fernández-Caramés, T.M., Fraga-Lamas, P., Castedo, L.: A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: 2018 Global Internet of Things Summit (GIoTS), pp. 1–6 (2018)
69.
Zurück zum Zitat Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embedded Comput. Syst. 14(3), 42 (2015)CrossRef Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embedded Comput. Syst. 14(3), 42 (2015)CrossRef
70.
Zurück zum Zitat Buchmann, J., Göpfert, F., Güneysu, T., Oder, T., Pöppelmann, T.: High-performance and lightweight lattice-based public-key encryption. In: Proc. ACM Int. Workshop IoT Privacy Trust Security, pp. 2–9 (2016) Buchmann, J., Göpfert, F., Güneysu, T., Oder, T., Pöppelmann, T.: High-performance and lightweight lattice-based public-key encryption. In: Proc. ACM Int. Workshop IoT Privacy Trust Security, pp. 2–9 (2016)
74.
Zurück zum Zitat Singh, K.J., Kapoor, D.S.: Create your own Internet of Things: a survey of IoT platforms. IEEE Consum. Electron. Mag. 6(2), 57–68 (2017)CrossRef Singh, K.J., Kapoor, D.S.: Create your own Internet of Things: a survey of IoT platforms. IEEE Consum. Electron. Mag. 6(2), 57–68 (2017)CrossRef
75.
Zurück zum Zitat Velasco, J., et al.: Internet of things-based (IoT) inventory monitoring refrigerator using arduino sensor network. arXiv:1911.11265 (2019) Velasco, J., et al.: Internet of things-based (IoT) inventory monitoring refrigerator using arduino sensor network. arXiv:​1911.​11265 (2019)
76.
Zurück zum Zitat Guillen, O.M., Pöppelmann, T., Bermudo Mera, J.M., Bongenaar, E.F., Sigl, G., Sepulveda, J.: Towards post-quantum security for IoT endpoints with NTRU. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 698–703 (2017) Guillen, O.M., Pöppelmann, T., Bermudo Mera, J.M., Bongenaar, E.F., Sigl, G., Sepulveda, J.: Towards post-quantum security for IoT endpoints with NTRU. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 698–703 (2017)
77.
Zurück zum Zitat Güneysu, T., Oder, T.: Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In: 2017 18th International Symposium on Quality Electronic Design, pp. 319–324. IEEE (2017) Güneysu, T., Oder, T.: Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In: 2017 18th International Symposium on Quality Electronic Design, pp. 319–324. IEEE (2017)
78.
Zurück zum Zitat Pöppelmann, T., Oder, T., Güneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: Proc. 4th Int. Conf. Cryptol. Inf. Security Latin America, pp. 346–365 (2015) Pöppelmann, T., Oder, T., Güneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: Proc. 4th Int. Conf. Cryptol. Inf. Security Latin America, pp. 346–365 (2015)
85.
Zurück zum Zitat De Luca, G.E., Carnuccio, E.A., Garcia, G.G., Barillaro, S.: IoT fall detection system for the elderly using Intel Galileo development boards generation I. In: IEEE CACIDI 2016-IEEE Conference on Computer Sciences, pp. 1–6 (2016) De Luca, G.E., Carnuccio, E.A., Garcia, G.G., Barillaro, S.: IoT fall detection system for the elderly using Intel Galileo development boards generation I. In: IEEE CACIDI 2016-IEEE Conference on Computer Sciences, pp. 1–6 (2016)
86.
Zurück zum Zitat Gupta, P., Agrawal, D., Chhabra, J., Dhir, P.K.: IoT based smart healthcare kit. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies, pp. 237–242. IEEE (2016) Gupta, P., Agrawal, D., Chhabra, J., Dhir, P.K.: IoT based smart healthcare kit. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies, pp. 237–242. IEEE (2016)
87.
Zurück zum Zitat Azariadi, D., Tsoutsouras, V., Xydis, S., Soudris, D.: ECG signal analysis and arrhythmia detection on IoT wearable medical devices. In: 2016 5th International Conference on Modern Circuits and Systems Technologies, pp. 1–4. IEEE (2016) Azariadi, D., Tsoutsouras, V., Xydis, S., Soudris, D.: ECG signal analysis and arrhythmia detection on IoT wearable medical devices. In: 2016 5th International Conference on Modern Circuits and Systems Technologies, pp. 1–4. IEEE (2016)
88.
Zurück zum Zitat Carlos Ramon, M.: Intel galileo and intel galileo gen 2. Springer, New York (2014)CrossRef Carlos Ramon, M.: Intel galileo and intel galileo gen 2. Springer, New York (2014)CrossRef
89.
Zurück zum Zitat Yadav, V., Borate, S., Devar, S., Gaikwad, R., Gavali, A.B.: Smart home automation using virtue of IoT. In: 2017 2nd International Conference for Convergence in Technology (I2CT), pp. 313–317 (2017) Yadav, V., Borate, S., Devar, S., Gaikwad, R., Gavali, A.B.: Smart home automation using virtue of IoT. In: 2017 2nd International Conference for Convergence in Technology (I2CT), pp. 313–317 (2017)
91.
Zurück zum Zitat Gutiérrez-Madroñal, L., La Blunda, L., Wagner, M.F., Medina-Bulo, I.: Test event generation for a fall-detection IoT system. IEEE Internet Things J. 6(4), 6642–6651 (2019)CrossRef Gutiérrez-Madroñal, L., La Blunda, L., Wagner, M.F., Medina-Bulo, I.: Test event generation for a fall-detection IoT system. IEEE Internet Things J. 6(4), 6642–6651 (2019)CrossRef
93.
Zurück zum Zitat Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round (2017) Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round (2017)
Metadaten
Titel
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
verfasst von
Kübra Seyhan
Tu N. Nguyen
Sedat Akleylek
Korhan Cengiz
Publikationsdatum
13.08.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03380-7

Weitere Artikel der Ausgabe 3/2022

Cluster Computing 3/2022 Zur Ausgabe

Premium Partner