Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions

Seo Yeon Moon, Byung Hyun Jo, Abir El Azzaoui, Sushil Kumar Singh, Jong Hyuk Park

Research output: Contribution to journalReview articlepeer-review

Abstract

With the rapid advancement of ICT and IoT technologies, the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency. However, these technologies face critical security challenges, exacerbated by the emergence of quantum computing, which threatens traditional encryption methods. The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust, quantum-resistant security solutions. To address these challenges, researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography, which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity. This paper reviews the current security practices in IoT and Edge/Fog environments, explores the latest advancements in QKD and PQC technologies, and discusses their integration into distributed computing systems. Additionally, this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations. Finally, we highlight future research directions aimed at improving the scalability, efficiency, and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats.

Original languageEnglish
Pages (from-to)25-55
Number of pages31
JournalComputers, Materials and Continua
Volume84
Issue number1
DOIs
StatePublished - 2025

Keywords

  • Edge computing
  • cascade protocol
  • fog computing
  • post-quantum cryptography
  • quantum key distribution
  • security

Fingerprint

Dive into the research topics of 'Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions'. Together they form a unique fingerprint.

Cite this