Abstract
۱٫ Introduction
۲٫ Background, statistics, and motivation
۳٫ IOT architectural challenges, security attacks, and countermeasures
۴٫ Conventional cryptograhphic mechanisms for IOT security
۵٫ Quantum cryptography
۶٫ Open challenges and future research directions
۷٫ Conclusion
Declaration of Competing Interest
References
Abstract
Internet of Things (IoT) ideates smart and inter-connected things capable of sharing their perceptions through the Internet. These devices are different from conventional Internetconnected devices in the sense that these are able to perform skill-full things on their own with minimal or no human interaction. Unfortunately, with the advent of amalgamate technologies, security has become a major concern for IoT networks. Recent efforts include re-inventing cryptographic solutions through the use of light-weight operations. However, after witnessing the growth of quantum computers, it can be inferred that the cryptographic techniques based on mathematical problems are not reliable enough. Therefore, there is need to develop solutions that can easily resist the adversarial effects and are suitable for the post-quantum world. In this paper, we perform in-depth analysis over the role of post-quantum cryptographic techniques for securing IoT networks and also explore ongoing research efforts in the field. In addition, we discuss the open research challenges and future research directions in the field.
Introduction
Internet of Things (IoT) is a cluster of technologies that requires different set of protocols, infrastructures, data storage mechanisms, and ways of communication associated with Information Technology (IT). Resource allocation in a smart manner is one of the key requirements while dealing with IoT devices as they are constrained in terms of energy, storage and computational resources. Communication technology for actuating and managing the data is also of great concern [1–۳]. As a matter of fact, IoT ecosystem faces a lot of challenges associated with a number of aspects as shown in Fig. 1. This new paradigm of connected objects needs an assimilation of next generation technologies. In order to simultaneously provide ultra-reliability of communication, following technologies can be integrated – • Software Defined Networks (SDN) for managing haptic communications, • ۵G technology for providing tactile Internet, and • The new era of distributed Cloud computing, i.e., edge computing for managing the resources. Significant increase in the use of IoT devices is bringing numerous business opportunities. However, manufacturers are still unable to ensure their customers that these devices are secure. Hence, despite all of the advantages, the security issues of these devices are acting as a huge rock in the way of letting this paradigm making a colossal impact on our lives.