Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022 - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

Post-quantum authentication in TLS 1.3: A performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

[PDF][PDF] Revolutionizing modern networks: advances in AI, machine learning, and blockchain for quantum satellites and UAV-based communication

A Kumar, AI Awad, G Sharma… - arxiv preprint arxiv …, 2023 - academia.edu
Quantum communication is the most secure technique of transmitting data available today.
Fiber communication lines and satellite-to-ground links have served as the basis for the …

Full post-quantum datagram tls handshake in the internet of things

C McLoughlin, C Gritti, J Samandari - International Conference on Codes …, 2023 - Springer
Quantum computers are a threat to the current standards for secure communication. The
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …

Post-quantum cryptography for automotive systems

T Fritzmann, J Vith, D Flórez, J Sepúlveda - Microprocessors and …, 2021 - Elsevier
Automotive systems have become powerful computing platforms with an increasing demand
for secure communication. The hyperconnectivity of the Vehicle-to-Everything (V2X) …

[HTML][HTML] Research on secure communication on in-vehicle Ethernet based on post-quantum algorithm NTRUEncrypt

Y Zhu, Y Liu, M Wu, J Li, S Liu, J Zhao - Electronics, 2022 - mdpi.com
In the context of the evolution of in-vehicle electronic and electrical architecture as well as
the rapid development of quantum computers, post-quantum algorithms, such as …

Efficient post-quantum TLS handshakes using identity-based key exchange from lattices

U Banerjee, AP Chandrakasan - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based
public key cryptography to reduce communication overheads in wireless sensor networks. In …

Hybrid OPC UA: enabling post-quantum security for the industrial internet of things

S Paul, E Guerin - 2020 25th IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered a crucial part for providing connectivity in
industrial environments. However, the recent increase in connectivity has led to an extended …

Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications

SJ Parmar, VR Parmar, J Verma, S Roy… - … on Security of …, 2023 - ieeexplore.ieee.org
The paper examines the complex structure of quan-tum computing and outlines its key
elements, including qubits, quantum gates, superposition, and entanglement. Our inves …