Post-Quantum Security Measures for the Internet of Things

Post-Quantum Security Measures for the Internet of Things

Ilgın Şafak, Fatih Alagöz, Emin Anarim
ISBN13: 9781668473665|ISBN10: 1668473666|EISBN13: 9781668473672
DOI: 10.4018/978-1-6684-7366-5.ch075
Cite Chapter Cite Chapter

MLA

Şafak, Ilgın, et al. "Post-Quantum Security Measures for the Internet of Things." Encyclopedia of Information Science and Technology, Sixth Edition, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2 Apr 2024. IGI Global, https://doi.org/10.4018/978-1-6684-7366-5.ch075.

APA

Şafak, I., Alagöz, F., & Anarim, E. (2025). Post-Quantum Security Measures for the Internet of Things. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, Sixth Edition. Advance online publication. https://doi.org/10.4018/978-1-6684-7366-5.ch075

Chicago

Şafak, Ilgın, Fatih Alagöz, and Emin Anarim. "Post-Quantum Security Measures for the Internet of Things." In Encyclopedia of Information Science and Technology, Sixth Edition, edited by Mehdi Khosrow-Pour, D.B.A. Published ahead of print, 4/2/2024. https://doi.org/10.4018/978-1-6684-7366-5.ch075

Export Reference

Mendeley
Favorite

Abstract

The internet of things (IoT) has been used in a wide range of applications since its emergence, including smart cities, intelligent systems, smart homes, smart agriculture, and healthcare. IoT systems rely on information processing and sharing, where data leakages may jeopardize their security and privacy. On the other hand, quantum computers are poised to solve complex problems that traditional computers cannot. However, due to the fact that the majority of cyber algorithms are based on significant computational complexity, quantum computing poses a substantial threat to the cyber security of global digital infrastructure, including IoT networks, smart cities, banking, and intelligent infrastructure. This chapter discusses potential security and privacy measures for a post-quantum world against threats posed by quantum computing, including post-quantum cryptography, quantum software testing, post-quantum blockchain technology, and architectural considerations for creating post-quantum secure IoT systems.