Version 1
: Received: 11 August 2024 / Approved: 12 August 2024 / Online: 12 August 2024 (13:30:00 CEST)
How to cite:
Alwashahi, M.; Jassim, H.; Abdelfattah, F. Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography. Preprints2024, 2024080816. https://doi.org/10.20944/preprints202408.0816.v1
Alwashahi, M.; Jassim, H.; Abdelfattah, F. Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography. Preprints 2024, 2024080816. https://doi.org/10.20944/preprints202408.0816.v1
Alwashahi, M.; Jassim, H.; Abdelfattah, F. Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography. Preprints2024, 2024080816. https://doi.org/10.20944/preprints202408.0816.v1
APA Style
Alwashahi, M., Jassim, H., & Abdelfattah, F. (2024). Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography. Preprints. https://doi.org/10.20944/preprints202408.0816.v1
Chicago/Turabian Style
Alwashahi, M., Hothefa Jassim and fadi Abdelfattah. 2024 "Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography" Preprints. https://doi.org/10.20944/preprints202408.0816.v1
Abstract
Internet of thing (IoT) has been used in different aspect of life as industry, and daily life. Aligned with IoT, Quantum computers have been generated with high features that can accomplish complicated tasks with high speed. IoT and Quantum computers don’t match in resources and due to this collaboration between the two terms, it was found there are many challenges with quantum computers brought some security concerns. This paper will examine all challenges and future direction that face the use of IoT through using different quantum cryptograph methods. The first part on the paper discussed the vulnerabilities of existing cryptographic methods like RSA and ECC. these two methods were used as basic level for IoT security protocols. These cryptographic algorithms could be easily attacked by quantum computers so to ensure that IoT devices are secure must develop quantum resistant cryptographic algorithms. Next this paper will examine the challenges in implementing quantum resistant cryptographic algorithm in any IoT device through quantum resistant cryptographic algorithms such as lattice-based cryptography, code-based cryptography, multivariate cryptography, and hash-based signatures. Then, the paper discussed the future direction of securing IoT in quantum computing. In conclusion, securing IoT devices in quantum presents many challenges that require to be addressed where quantum resistant algorithms can be a solution that mitigate threats.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.