dc.contributor.author | Bozhko, Jessica | |
dc.contributor.author | Hanna, Yacoub | |
dc.contributor.author | Harrilal-Parchment, R (Harrilal-Parchment, Ricardo | |
dc.contributor.author | Tonyali, Samet | |
dc.contributor.author | Akkaya, Kemal | |
dc.date.accessioned | 2023-06-12T08:52:30Z | |
dc.date.available | 2023-06-12T08:52:30Z | |
dc.date.issued | 2023 | en_US |
dc.identifier.citation | J. Bozhko, Y. Hanna, R. Harrilal-Parchment, S. Tonyali and K. Akkaya, "Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices," 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2023, pp. 230-235, doi: 10.1109/CCNC51644.2023.10060762. | en_US |
dc.identifier.uri | https://ieeexplore.ieee.org/document/10060762 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12440/5958 | |
dc.description.abstract | Post-quantum (PQ) cryptographic algorithms are currently being developed to be able to resist attacks by quantum computers. The practical use of these algorithms for securing networks will depend on their computational and communication efficiency. In particular, this is critical for the security of wireless communications within the context of consumer IoT devices that may have limited computational power and depend on a constrained wireless bandwidth. To this end, there is a need to evaluate the performance of widely used application layer security standards such as transport layer security (TLS) to understand the use of the existing PQ algorithms that are being evaluated by NIST as a replacement to the current cryptographic algorithms. This paper focuses on two widely used IoT standards Bluetooth Low Energy (BLE) and WiFi to find out the optimal performing PQ algorithm for their security when used in end-to-end connections over the Internet. By implementing the capability for IP over BLE and all options of TLS connection establishment, we developed a client-server IoT testbed to measure the efficiency of PQ key encapsulation mechanisms (KEMs) and PQ digital signature algorithms. The test results showed that Kyber512 is the ideal KEM while Falcon-512 and Dilithium2 are the best signatures for BLE and WiFi devices. Based on this outcome, we developed a mechanism for IoT devices with multiple communication interfaces, that dynamically chooses a PQ KEM algorithm based on the MAC layer protocol being used at the time. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2023 IEEE 20. TÜKETİCİ İLETİŞİMLERİ VE AĞ KONFERANSI, CCNC | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Post-Quantum Cryptography | en_US |
dc.subject | Key Encapsulation Mechanism | en_US |
dc.subject | TLS | en_US |
dc.subject | IoT | en_US |
dc.subject | IP Over Bluetooth | en_US |
dc.title | Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices | en_US |
dc.type | article | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.description.wospublicationid | WOS:000982339100046 | en_US |
dc.department | Fakülteler, Mühendislik ve Doğa Bilimleri Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.authorid | 0000-0001-7799-2771 | en_US |
dc.contributor.institutionauthor | Tonyali, Samet | |
dc.identifier.doi | 10.1109/CCNC51644.2023.10060762 | en_US |
dc.authorwosid | AAH-5922-2019 | en_US |
dc.authorscopusid | 56499412600 | en_US |