AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems
- URL: http://arxiv.org/abs/2510.08496v1
- Date: Thu, 09 Oct 2025 17:37:00 GMT
- Title: AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems
- Authors: Akid Abrar, Sagar Dasgupta, Mizanur Rahman, Ahmad Alsharif,
- Abstract summary: Transportation Cyber-Physical Systems ( TCPS) integrate physical elements, such as transportation infrastructure and vehicles, with cyber elements via advanced communication technologies.<n>Traditional cryptographic methods have been employed to secure TCPS communications, but the advent of quantum computing presents a significant threat to these existing security measures.<n>This chapter introduces TCPS communication protocols, discusses the vulnerabilities of corresponding communications to cyber-attacks, and explores the limitations of existing cryptographic methods in the quantum era.
- Score: 5.944786264024814
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Transportation Cyber-Physical Systems (TCPS) integrate physical elements, such as transportation infrastructure and vehicles, with cyber elements via advanced communication technologies, allowing them to interact seamlessly. This integration enhances the efficiency, safety, and sustainability of transportation systems. TCPS rely heavily on cryptographic security to protect sensitive information transmitted between vehicles, transportation infrastructure, and other entities within the transportation ecosystem, ensuring data integrity, confidentiality, and authenticity. Traditional cryptographic methods have been employed to secure TCPS communications, but the advent of quantum computing presents a significant threat to these existing security measures. Therefore, integrating Post-Quantum Cryptography (PQC) into TCPS is essential to maintain secure and resilient communications. While PQC offers a promising approach to developing cryptographic algorithms resistant to quantum attacks, artificial intelligence (AI) can enhance PQC by optimizing algorithm selection, resource allocation, and adapting to evolving threats in real-time. AI-driven PQC approaches can improve the efficiency and effectiveness of PQC implementations, ensuring robust security without compromising system performance. This chapter introduces TCPS communication protocols, discusses the vulnerabilities of corresponding communications to cyber-attacks, and explores the limitations of existing cryptographic methods in the quantum era. By examining how AI can strengthen PQC solutions, the chapter presents cyber-resilient communication strategies for TCPS.
Related papers
- Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Post-Quantum Cryptography for Intelligent Transportation Systems: An Implementation-Focused Review [8.030140777380444]
Governments and industry stakeholders are turning toward post-quantum cryptography (PQC)<n>PQC algorithms are designed to resist adversaries equipped with quantum computing capabilities.<n>This review fills that gap by evaluating the readiness of vehicular communication and security standards for PQC adoption.
arXiv Detail & Related papers (2026-01-03T04:39:06Z) - Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework [0.0]
Real-world networks cannot be fully Quantum Key Distribution-enabled due to infrastructure constraints.<n>This paper presents an adaptive security framework that enables quantum-safe communications across real-world heterogeneous networks.<n>Results highlight its potential to support the gradual integration of quantum-safe technologies into existing infrastructures.
arXiv Detail & Related papers (2025-11-27T12:51:10Z) - Secure Physical Layer Communications for Low-Altitude Economy Networking: A Survey [76.36166980302478]
The Low-Altitude Economy Networking (LAENet) is emerging as a transformative paradigm.<n>Physical layer communications in the LAENet face growing security threats due to inherent characteristics of aerial communication environments.<n>This survey comprehensively reviews existing secure countermeasures for physical layer communication in the LAENet.
arXiv Detail & Related papers (2025-04-12T09:36:53Z) - Power Networks SCADA Communication Cybersecurity, A Qiskit Implementation [0.0]
The cyber-physical system of electricity power networks utilizes supervisory control and data acquisition systems (SCADA)<n>In the plausible quantum world (Q-world), conventional approaches will likely face new challenges.<n>This paper highlights the opportunities and challenges in securing SCADA communication in the plausible quantum computing and communication regime.
arXiv Detail & Related papers (2025-03-26T09:40:31Z) - Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study [62.5909195375364]
Cross-layer covert communication mechanism emerges as an effective strategy to mitigate regulatory challenges.<n>We propose an end-to-end cross-layer covert communication scheme driven by Generative Artificial Intelligence (GenAI)<n>Case study is conducted using diffusion reinforcement learning to sovle cloud edge internet of things cross-layer secure communication.
arXiv Detail & Related papers (2025-01-19T15:05:03Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Enhancing Transportation Cyber-Physical Systems Security: A Shift to Post-Quantum Cryptography [6.676253819673155]
The rise of quantum computing threatens traditional cryptographic algorithms that secure Transportation Cyber-Physical Systems ( TCPS)
The objective of this paper is to underscore the urgency of transitioning to post-quantum cryptography (PQC) to mitigate these risks.
We analyzed vulnerabilities in traditional cryptography against quantum attacks and reviewed the applicability of NIST-standardized PQC schemes in TCPS.
arXiv Detail & Related papers (2024-11-20T04:11:33Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Post-Quantum Secure UE-to-UE Communications [1.0230631028817565]
This demo paper proposes the integration of Post-Quantum Cryptography (PQC) in TLS for UE Communication to mitigate the risks of quantum attacks.
By addressing the implementation of PQC within a 5G network to secure UE-to-UE communication, this research aims to pave the way for developing quantum-resistant mobile devices.
arXiv Detail & Related papers (2024-08-20T18:19:39Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective [0.0]
Implementing cryptosystems in industrial communication networks faces a trade-off between the security of the communications and the amortization of the industrial infrastructure.
New threat to cybersecurity has arisen with the theoretical proposal of quantum computers.
Many global agents have become aware that transitioning their secure communications to a quantum secure paradigm is a priority that should be established before the arrival of fault-tolerance.
arXiv Detail & Related papers (2024-01-08T10:02:48Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.