A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring

dc.contributor.authorSatrya, Gandeva Bayu
dc.contributor.authorAgus, Yosafat Marselino
dc.contributor.authorMnaouer, Adel Ben
dc.date.accessioned2023-12-26T08:36:51Z
dc.date.available2023-12-26T08:36:51Z
dc.date.copyright© 2023
dc.date.issued2023-09
dc.description.abstractThe Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable to cybercrimes. Exploits may arise from sensor data interception en route to the intended consumer within an IoT system. The increasing integration of electronic devices interconnected via the internet has galvanized the acceptance of this technology. Nonetheless, as the number of users of this technology surges, there must be an aligned concern to ensure that security measures are diligently enforced within IoT communication systems, such as in smart homes, smart cities, smart factories, smart hospitals, and smart grids. This research addresses security lacunae in the topology and configuration of IoT energy monitoring systems using post-quantum cryptographic techniques. We propose tailored implementations of the Rivest–Shamir–Adleman (RSA), N-th degree Truncated Polynomial Ring Units (NTRU), and a suite of cryptographic primitives based on Module Learning With Rounding (Saber) as post-quantum cryptographic candidate algorithms for IoT devices. These aim to secure publisher–subscriber end-to-end communication in energy system monitoring. Additionally, we offer a comparative analysis of these tailored implementations on low-resource devices, such as the Raspberry Pi, during data transmission using the Message Queuing Telemetry Transport (MQTT) protocol. Results indicate that the customized implementation of NTRU outperforms both SABER and RSA in terms of CPU and memory usage, while Light SABER emerges as the front-runner when considering encryption and decryption delays. © 2023 by the authors.
dc.identifier.citationSatrya, G. B., Agus, Y. M., & Mnaouer, A. B. (2023). A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring. Electronics, 12(18), 3824. https://doi.org/10.3390/electronics12183824
dc.identifier.issn20799292
dc.identifier.urihttps://doi.org/10.3390/electronics12183824
dc.identifier.urihttps://hdl.handle.net/20.500.12519/973
dc.publisherMultidisciplinary Digital Publishing Institute (MDPI)
dc.relationAuthors Affiliations : Satrya, G.B., Faculty of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, 117781, United Arab Emirates; Agus, Y.M., Telecom Infra Project Community Lab, Bandung, 40257, Indonesia; Mnaouer, A.B., Faculty of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, 117781, United Arab Emirates, College of Computer and Information Systems, Prince Sultan University, 66833 Rafha Street, Riyadh, 11586, Saudi Arabia
dc.relation.ispartofseriesElectronics (Switzerland); Volume 12, Issue 18
dc.rightsThis article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license
dc.rights.holderCopyright : © 2023 by the authors.
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subjectInternet of Things
dc.subjectNTRU
dc.subjectpost-quantum encryption
dc.subjectRSA
dc.subjectSABER
dc.subjectsystem monitoring
dc.titleA Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring
dc.typeArticle

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
973.pdf
Size:
1.76 MB
Format:
Adobe Portable Document Format
Description: