Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey

dc.authoridCengiz, Korhan/0000-0001-6594-8861
dc.authoridSEYHAN, KUBRA/0000-0002-0902-1903
dc.authoridAkleylek, Sedat/0000-0001-7005-6489
dc.authorwosidCengiz, Korhan/HTN-8060-2023
dc.authorwosidSeyhan, Kübra/IYJ-3199-2023
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorSeyhan, Kubra
dc.contributor.authorNguyen, Tu N.
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorCengiz, Korhan
dc.date.accessioned2024-06-12T11:04:01Z
dc.date.available2024-06-12T11:04:01Z
dc.date.issued2022
dc.departmentTrakya Üniversitesien_US
dc.description.abstractThe concept of the Internet of Things (IoT) arises due to the change in the characteristics and numbers of smart devices. Communication of things makes it important to ensure security in this interactive architecture. One of the developments that are subject to change in IoT environments is post-quantum cryptography. This evolution, which includes the change of asymmetric cryptosystems, affects the security of IoT devices. In this paper, fundamental characteristics and layered architecture of IoT environments are examined. Basic security requirements and solution technologies for IoT architecture are remembered. Some important open problems in the literature for IoT device security are recalled. From these open problems, the post-quantum security of IoT devices with limited resources is focused. The main purpose of this paper is to improve the constrained resource classification and give a point of view for post-quantum IoT security. In this context, a sensitive classification is proposed by improving the limited resource classification of IETF. The cryptosystem efficiency definition is made for the analysis of resource-constrained device security. Using the proposed classification and efficiency definition, the usage of lattice-based cryptosystems in resource-constrained IoT device security is analyzed.en_US
dc.description.sponsorshipTuBTAK [121R006]en_US
dc.description.sponsorshipThe authors would like to express their gratitude to the anonymous reviewers for their invaluable suggestions in putting the present study into its final form. Sedat Akleylek and Kubra Seyhan are partially supported by TuBTAK under Grant No. 121R006.en_US
dc.identifier.doi10.1007/s10586-021-03380-7
dc.identifier.endpage1748en_US
dc.identifier.issn1386-7857
dc.identifier.issn1573-7543
dc.identifier.issue3en_US
dc.identifier.scopus2-s2.0-85112468306en_US
dc.identifier.scopusqualityQ2en_US
dc.identifier.startpage1729en_US
dc.identifier.urihttps://doi.org/10.1007/s10586-021-03380-7
dc.identifier.urihttps://hdl.handle.net/20.500.14551/21879
dc.identifier.volume25en_US
dc.identifier.wosWOS:000684806500002en_US
dc.identifier.wosqualityQ2en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.ispartofCluster Computing-The Journal Of Networks Software Tools And Applicationsen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectIoten_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectResource-Constrained Deviceen_US
dc.subjectInterneten_US
dc.subjectThingsen_US
dc.subjectThreatsen_US
dc.subjectEdgeen_US
dc.subjectChallengesen_US
dc.subjectProtocolen_US
dc.subjectIssuesen_US
dc.titleLattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a surveyen_US
dc.typeArticleen_US

Dosyalar