Smart City Gnosys

Smart city article details

Title A Comparative Study Of Post-Quantum Cryptographic Algorithm Implementations For Secure And Efficient Energy Systems Monitoring
ID_Doc 803
Authors Satrya G.B.; Agus Y.M.; Mnaouer A.B.
Year 2023
Published Electronics (Switzerland), 12, 18
DOI http://dx.doi.org/10.3390/electronics12183824
Abstract The Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable to cybercrimes. Exploits may arise from sensor data interception en route to the intended consumer within an IoT system. The increasing integration of electronic devices interconnected via the internet has galvanized the acceptance of this technology. Nonetheless, as the number of users of this technology surges, there must be an aligned concern to ensure that security measures are diligently enforced within IoT communication systems, such as in smart homes, smart cities, smart factories, smart hospitals, and smart grids. This research addresses security lacunae in the topology and configuration of IoT energy monitoring systems using post-quantum cryptographic techniques. We propose tailored implementations of the Rivest–Shamir–Adleman (RSA), N-th degree Truncated Polynomial Ring Units (NTRU), and a suite of cryptographic primitives based on Module Learning With Rounding (Saber) as post-quantum cryptographic candidate algorithms for IoT devices. These aim to secure publisher–subscriber end-to-end communication in energy system monitoring. Additionally, we offer a comparative analysis of these tailored implementations on low-resource devices, such as the Raspberry Pi, during data transmission using the Message Queuing Telemetry Transport (MQTT) protocol. Results indicate that the customized implementation of NTRU outperforms both SABER and RSA in terms of CPU and memory usage, while Light SABER emerges as the front-runner when considering encryption and decryption delays. © 2023 by the authors.
Author Keywords Internet of Things; NTRU; post-quantum encryption; RSA; SABER; system monitoring


Similar Articles


Id Similarity Authors Title Published
7854 View0.911Agus Y.M.; Murti M.A.; Kurniawan F.; Cahyani N.D.W.; Satrya G.B.An Efficient Implementation Of Ntru Encryption In Post-Quantum Internet Of ThingsProceedings of the 2020 27th International Conference on Telecommunications, ICT 2020 (2020)
47756 View0.894Khan M.A.; Khan M.A.Securing Iot In The Post-Quantum Era: Implementation, Challenges And Future DirectionsIEEE Communications Standards Magazine (2025)
44005 View0.887Mujlid H.M.; Alshahrani R.Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly DetectionJournal of Supercomputing, 81, 9 (2025)
4323 View0.881Chawla D.; Mehra P.S.A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And SolutionsInternet of Things (Netherlands), 24 (2023)
57480 View0.879Kumari S.; Singh M.; Singh R.; Tewari H.To Secure The Communication In Powerful Internet Of Things Using Innovative Post-Quantum Cryptographic MethodArabian Journal for Science and Engineering, 47, 2 (2022)
35232 View0.877Ebrahimi S.; Bayat-Sarmadi S.Lightweight And Dpa-Resistant Post-Quantum Cryptoprocessor Based On Binary Ring-LweProceedings - 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020 (2020)
21837 View0.87Minhas N.N.; Mansoor K.Edge-Computing-Based Scheme For Post-Quantum Iot Security For E-HealthIEEE Internet of Things Journal, 11, 19 (2024)
1173 View0.87Mustafa R.; Sarkar N.I.; Mohaghegh M.; Pervez S.A Cross-Layer Secure And Energy-Efficient Framework For The Internet Of Things: A Comprehensive SurveySensors, 24, 22 (2024)
23929 View0.868Desai L.R.; Malathi P.; Patil D.M.; Sonone S.T.; Kalokhe S.G.; Jawalkar A.Enhancing Security In Iot Devices With A Comprehensive Analysis Of Lightweight Cryptographic AlgorithmsAdvances in Nonlinear Variational Inequalities, 27, 4 (2024)
5322 View0.867Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)