Post-Quantum Era Privacy Protection for Intelligent Infrastructures

dc.contributor.authorMalina, Lukášcs
dc.contributor.authorDzurenda, Petrcs
dc.contributor.authorRicci, Saracs
dc.contributor.authorHajný, Jancs
dc.contributor.authorSrivastava, Gautamcs
dc.contributor.authorMatulevicius, Raimundascs
dc.contributor.authorAffia, Abasi-amefon O.cs
dc.contributor.authorLaurent, Marylinecs
dc.contributor.authorHaque Sultan, Nazatulcs
dc.contributor.authorTang, Qiangcs
dc.coverage.issue1cs
dc.coverage.volume9cs
dc.date.accessioned2021-04-14T14:55:35Z
dc.date.available2021-04-14T14:55:35Z
dc.date.issued2021-02-24cs
dc.description.abstractAs we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements. With billions of connected devices spanning continents through interconnected networks, security and privacy protection techniques for the emerging II services become a paramount concern. In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services. Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects. The topics presented in this paper are of utmost importance as (1) several recent regulations such as Europe's General Data Protection Regulation (GDPR) have given privacy a significant place in digital society, and (2) the increase of IoT/II applications and digital services with growing data collection capabilities are introducing new threats and risks on citizens' privacy. This in-depth survey begins with an overview of security and privacy threats in IoT/IIs. Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are capable of withstanding quantum computing attacks. This paper also overviews how PETs can be deployed in practical use cases in the scope of IoT/IIs, and maps some current projects, pilots, and products that deal with PETs. A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality. Finally, we discuss the main challenges with respect to current PETs and highlight some future directions for developing their post-quantum counterparts.en
dc.formattextcs
dc.format.extent36038 -36077cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationIEEE Access. 2021, vol. 9, issue 1, p. 36038 -36077.en
dc.identifier.doi10.1109/ACCESS.2021.3062201cs
dc.identifier.issn2169-3536cs
dc.identifier.other170514cs
dc.identifier.urihttp://hdl.handle.net/11012/196503
dc.language.isoencs
dc.publisherIEEEcs
dc.relation.ispartofIEEE Accesscs
dc.relation.urihttps://ieeexplore.ieee.org/abstract/document/9363165cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.sherpahttp://www.sherpa.ac.uk/romeo/issn/2169-3536/cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectAuthenticationen
dc.subjectCryptographyen
dc.subjectInternet of Thingsen
dc.subjectIntelligent Infrastructuresen
dc.subjectPost-Quantum Cryptographyen
dc.subjectPrivacyen
dc.subjectPrivacy-Enhancing Technologiesen
dc.subjectSecurityen
dc.subjectThreatsen
dc.titlePost-Quantum Era Privacy Protection for Intelligent Infrastructuresen
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
sync.item.dbidVAV-170514en
sync.item.dbtypeVAVen
sync.item.insts2021.04.14 16:55:34en
sync.item.modts2021.04.14 16:14:34en
thesis.grantorVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikacícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
09363165.pdf
Size:
6.96 MB
Format:
Adobe Portable Document Format
Description:
09363165.pdf