Publication:
Lattice-Based Cryptosystems for the Security of Resource-Constrained IoT Devices in Post-Quantum World: A Survey

dc.authorscopusid57212212152
dc.authorscopusid57218449471
dc.authorscopusid15833929800
dc.authorscopusid56522820200
dc.authorwosidThi Nguyen, Tu-Trinh/Abg-9587-2021
dc.authorwosidSeyhan, Kübra/Iyj-3199-2023
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.authorwosidCengiz, Korhan/Htn-8060-2023
dc.contributor.authorSeyhan, Kubra
dc.contributor.authorNguyen, Tu N.
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorCengiz, Korhan
dc.contributor.authorIDCengiz, Korhan/0000-0001-6594-8861
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.contributor.authorIDSeyhan, Kübra/0000-0002-0902-1903
dc.date.accessioned2025-12-11T01:29:58Z
dc.date.issued2022
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Seyhan, Kubra; Akleylek, Sedat] Ondokuz Mayis Univ, Dept Comp Engn, TR-55139 Samsun, Turkey; [Nguyen, Tu N.] Kennesaw State Univ, Dept Comp Sci, Marietta, GA 30060 USA; [Cengiz, Korhan] Trakya Univ, Dept Elect Elect Engn, TR-22030 Edirne, Turkeyen_US
dc.descriptionCengiz, Korhan/0000-0001-6594-8861; Akleylek, Sedat/0000-0001-7005-6489; Seyhan, Kübra/0000-0002-0902-1903en_US
dc.description.abstractThe concept of the Internet of Things (IoT) arises due to the change in the characteristics and numbers of smart devices. Communication of things makes it important to ensure security in this interactive architecture. One of the developments that are subject to change in IoT environments is post-quantum cryptography. This evolution, which includes the change of asymmetric cryptosystems, affects the security of IoT devices. In this paper, fundamental characteristics and layered architecture of IoT environments are examined. Basic security requirements and solution technologies for IoT architecture are remembered. Some important open problems in the literature for IoT device security are recalled. From these open problems, the post-quantum security of IoT devices with limited resources is focused. The main purpose of this paper is to improve the constrained resource classification and give a point of view for post-quantum IoT security. In this context, a sensitive classification is proposed by improving the limited resource classification of IETF. The cryptosystem efficiency definition is made for the analysis of resource-constrained device security. Using the proposed classification and efficiency definition, the usage of lattice-based cryptosystems in resource-constrained IoT device security is analyzed.en_US
dc.description.sponsorshipTuBTAK [121R006]en_US
dc.description.sponsorshipThe authors would like to express their gratitude to the anonymous reviewers for their invaluable suggestions in putting the present study into its final form. Sedat Akleylek and Kubra Seyhan are partially supported by TuBTAK under Grant No. 121R006.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.1007/s10586-021-03380-7
dc.identifier.endpage1748en_US
dc.identifier.issn1386-7857
dc.identifier.issn1573-7543
dc.identifier.issue3en_US
dc.identifier.scopus2-s2.0-85112468306
dc.identifier.scopusqualityQ1
dc.identifier.startpage1729en_US
dc.identifier.urihttps://doi.org/10.1007/s10586-021-03380-7
dc.identifier.urihttps://hdl.handle.net/20.500.12712/44099
dc.identifier.volume25en_US
dc.identifier.wosWOS:000684806500002
dc.identifier.wosqualityQ1
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.ispartofCluster Computing-The Journal of Networks Software Tools and Applicationsen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectIoTen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectResource-Constrained Deviceen_US
dc.titleLattice-Based Cryptosystems for the Security of Resource-Constrained IoT Devices in Post-Quantum World: A Surveyen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files