Smart City Gnosys

Smart city article details

Title An Efficient Implementation Of Ntru Encryption In Post-Quantum Internet Of Things
ID_Doc 7854
Authors Agus Y.M.; Murti M.A.; Kurniawan F.; Cahyani N.D.W.; Satrya G.B.
Year 2020
Published Proceedings of the 2020 27th International Conference on Telecommunications, ICT 2020
DOI http://dx.doi.org/10.1109/ICT49546.2020.9239560
Abstract The Internet of Things (IoT) or the Internet of Everything (IoE) goes even further beyond, not only it affects the way of exchanging data but also touches the physical lives. On the other side, security challenges of end-to-end device communication need to be addressed i.e., compliance & regulation, protocols, remediation, impacts & risks, threat diversities, and new applications. This research demonstrates impacts, risks, and threat diversities on IoT devices that use either conventional cryptography or post-quantum cryptography. This research also provides proof of concepts of security infrastructure for end-to-end communication among the IoT devices. Moreover, this research proposes and implements lightweight post-quantum cryptography for communication between the publisher to the subscriber in Raspberry Pi3 B+ e.g., Nth degree Truncated Polynomial Ring (NTRU) lattice-based cryptography. The experimentation compares NTRU with AES, Fernet, and RSA respectively on encryption time analysis, decryption time analysis, and network layer analysis. The results suggest some critical points that should be considered for the future development of smart homes, smart factories, smart cities, smart health, etc. © 2020 IEEE
Author Keywords IoT; Post-quantum cryptography; Protocol; Secured communication; Sensor nodes; Vulnerability


Similar Articles


Id Similarity Authors Title Published
803 View0.911Satrya G.B.; Agus Y.M.; Mnaouer A.B.A Comparative Study Of Post-Quantum Cryptographic Algorithm Implementations For Secure And Efficient Energy Systems MonitoringElectronics (Switzerland), 12, 18 (2023)
47756 View0.89Khan M.A.; Khan M.A.Securing Iot In The Post-Quantum Era: Implementation, Challenges And Future DirectionsIEEE Communications Standards Magazine (2025)
21837 View0.883Minhas N.N.; Mansoor K.Edge-Computing-Based Scheme For Post-Quantum Iot Security For E-HealthIEEE Internet of Things Journal, 11, 19 (2024)
57480 View0.88Kumari S.; Singh M.; Singh R.; Tewari H.To Secure The Communication In Powerful Internet Of Things Using Innovative Post-Quantum Cryptographic MethodArabian Journal for Science and Engineering, 47, 2 (2022)
4323 View0.875Chawla D.; Mehra P.S.A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And SolutionsInternet of Things (Netherlands), 24 (2023)
42432 View0.865Obaid A.H.; Al-Husseini K.A.O.; Al-Shareeda M.A.; Almaiah M.A.; Shehab R.Post-Quantum Secure Anonymous Authentication For Smart CitiesInternational Journal of Innovative Research and Scientific Studies, 8, 3 (2025)
35232 View0.862Ebrahimi S.; Bayat-Sarmadi S.Lightweight And Dpa-Resistant Post-Quantum Cryptoprocessor Based On Binary Ring-LweProceedings - 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020 (2020)
44005 View0.854Mujlid H.M.; Alshahrani R.Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly DetectionJournal of Supercomputing, 81, 9 (2025)
5322 View0.851Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)