Szczegóły publikacji

Opis bibliograficzny

Application of post-quantum cryptography in IoT networks / Tomasz Styn, Michał Pitera, Mateusz Okoń, Patryk Harasik, Marcin NIEMIEC // W: MILCOM 2025 [Dokument elektroniczny] : IEEE Military Communications Conference : 6-10 October 2025, Los Angeles, USA. — Wersja do Windows. — Dane tekstowe. — Piscataway : IEEE, 2025. — ( MILCOM IEEE Military Communications Conference ; ISSN  2155-7578 ). — Dod. ISBN: 979-8-3315-0293-5 (print on demand). — e-ISBN: 979-8-3315-0292-8. — S. [1–6]. — Wymagania systemowe: Adobe Reader. — Bibliogr. s. [6], Abstr. — Publikacja dostępna online od: 2026-01-01

Autorzy (5)

Słowa kluczowe

Internet of Thingscybersecuritypost quantum cryptographyZigBee

Dane bibliometryczne

ID BaDAP165847
Data dodania do BaDAP2026-03-06
Tekst źródłowyURL
DOI10.1109/MILCOM64451.2025.11310348
Rok publikacji2025
Typ publikacjimateriały konferencyjne (aut.)
Otwarty dostęptak
WydawcaInstitute of Electrical and Electronics Engineers (IEEE)
Czasopismo/seriaMILCOM IEEE Military Communications Conference

Abstract

The advent of powerful quantum computing poses significant risks to the security of cryptographic systems, as we know them today. At the same time, the continuous expansion of the already widespread IoT ecosystem highlights the need to secure both the devices it comprises and the communication between them. This paper describes the process of implementing ML-KEM-512 (Kyber) – a post-quantum key encapsulation mechanism – in the ZigBee protocol. Furthermore, an encryption layer utilizing AES with a 256-bit key is introduced in a way that is compatible with existing infrastructure, as that is the key to rapid and widespread adoption among consumers and businesses. Through the use of a demonstrative IoT network based on ZigBee, efficiency measurements were taken before and after implementing the proposed solution, and were analyzed in order to judge its viability. Transmission time fluctuations were found likely to be connected with hardware functionality, rather than network retransmissions, as was initially theorized. The security level of the paper’s proposed solution was evaluated in the context of the existing standard.

Publikacje, które mogą Cię zainteresować

fragment książki
#165893Data dodania: 6.3.2026
Zastosowanie kryptografii postkwantowej w sieciach IoT — Applying post-quantum cryptography in IoT networks / Tomasz Styn, Michał Pitera, Mateusz Okoń, Patryk Harasik // W: Nauka – technika – technologia [Dokument elektroniczny] : seria wydawnicza AGH , T. 11 . — Wersja do Windows. — Dane tekstowe. — Kraków : Wydawnictwa AGH, 2025. — e-ISBN: 978-83-68219-80-7. — S. 161–178. — Wymagania systemowe: Adobe Reader. — Bibliogr. s. 177–178, Streszcz., Abstr.
fragment książki
#150546Data dodania: 8.1.2024
Secure synchronization of artificial neural networks used to correct errors in quantum cryptography / Marcin NIEMIEC, Tymoteusz Widlarz, Miralem Mehic // W: IEEE ICC 2023 [Dokument elektroniczny] : IEEE International Conference on Communications : 28 May–1 June 2023, Rome, Italy / ed. by Michele Zorzi, Meixia Tao, Walid Saad. — Wersja do Windows. — Dane tekstowe. — [Piscataway] : IEEE, 2023. — (IEEE International Conference on Communications ; ISSN 1938-1883). — Dod. ISBN: 978-1-5386-7463-5. — e-ISBN: 978-1-5386-7462-8. — S. 3491–3496. — Wymagania systemowe: Adobe Reader. — Bibliogr. s. 3496, Abstr. — Publikacja dostępna online od: 2023-10-23