TY - JOUR
T1 - Edge-Fog Enhanced Post-Quantum Network Security
T2 - Applications, Challenges and Solutions
AU - Moon, Seo Yeon
AU - Jo, Byung Hyun
AU - El Azzaoui, Abir
AU - Singh, Sushil Kumar
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
Copyright © 2025 The Authors.
PY - 2025
Y1 - 2025
N2 - With the rapid advancement of ICT and IoT technologies, the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency. However, these technologies face critical security challenges, exacerbated by the emergence of quantum computing, which threatens traditional encryption methods. The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust, quantum-resistant security solutions. To address these challenges, researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography, which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity. This paper reviews the current security practices in IoT and Edge/Fog environments, explores the latest advancements in QKD and PQC technologies, and discusses their integration into distributed computing systems. Additionally, this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations. Finally, we highlight future research directions aimed at improving the scalability, efficiency, and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats.
AB - With the rapid advancement of ICT and IoT technologies, the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency. However, these technologies face critical security challenges, exacerbated by the emergence of quantum computing, which threatens traditional encryption methods. The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust, quantum-resistant security solutions. To address these challenges, researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography, which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity. This paper reviews the current security practices in IoT and Edge/Fog environments, explores the latest advancements in QKD and PQC technologies, and discusses their integration into distributed computing systems. Additionally, this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations. Finally, we highlight future research directions aimed at improving the scalability, efficiency, and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats.
KW - Edge computing
KW - cascade protocol
KW - fog computing
KW - post-quantum cryptography
KW - quantum key distribution
KW - security
UR - https://www.scopus.com/pages/publications/105007793975
U2 - 10.32604/cmc.2025.062966
DO - 10.32604/cmc.2025.062966
M3 - Review article
AN - SCOPUS:105007793975
SN - 1546-2218
VL - 84
SP - 25
EP - 55
JO - Computers, Materials and Continua
JF - Computers, Materials and Continua
IS - 1
ER -