Post-Quantum Cryptography for Intelligent Transportation Systems: An Implementation-Focused Review
- URL: http://arxiv.org/abs/2601.01068v1
- Date: Sat, 03 Jan 2026 04:39:06 GMT
- Title: Post-Quantum Cryptography for Intelligent Transportation Systems: An Implementation-Focused Review
- Authors: Abdullah Al Mamun, Akid Abrar, Mizanur Rahman, M Sabbir Salek, Mashrur Chowdhury,
- Abstract summary: Governments and industry stakeholders are turning toward post-quantum cryptography (PQC)<n>PQC algorithms are designed to resist adversaries equipped with quantum computing capabilities.<n>This review fills that gap by evaluating the readiness of vehicular communication and security standards for PQC adoption.
- Score: 8.030140777380444
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: As quantum computing advances, the cryptographic algorithms that underpin confidentiality, integrity, and authentication in Intelligent Transportation Systems (ITS) face increasing vulnerability to quantum-enabled attacks. To address these risks, governments and industry stakeholders are turning toward post-quantum cryptography (PQC), a class of algorithms designed to resist adversaries equipped with quantum computing capabilities. However, existing studies provide limited insight into the implementation-focused aspects of PQC in the ITS domain. This review fills that gap by evaluating the readiness of vehicular communication and security standards for PQC adoption. It examines in-vehicle networks and vehicle-to-everything (V2X) interfaces, while also investigating vulnerabilities at the physical layer, primarily exposure to side-channel and fault injection attacks. The review identifies thirteen research gaps reflecting non-PQC-ready standards, constraints in embedded implementation and hybrid cryptography, interoperability and certificate-management barriers, lack of real-world PQC deployment data in ITS, and physical-attack vulnerabilities in PQC-enabled vehicular communication. Future research directions include updating vehicular communication and security standards, optimizing PQC for low-power devices, enhancing interoperability and certificate-management frameworks for PQC integration, conducting real-world evaluations of PQC-enabled communication and control functions across ITS deployments, and strengthening defenses against AI-assisted physical attacks. A phased roadmap is presented, aligning PQC deployment with regulatory, performance, and safety requirements, thereby guiding the secure evolution of ITS in the quantum computing era.
Related papers
- Towards Quantum-Resistant Trusted Computing: Architectures for Post-Quantum Integrity Verification Techniques [0.0]
The transition of firmware protection to Post-Quantum Cryptography (PQC) is urgent.<n>This paper offers an analysis of the most common trust techniques and their roadmap towards a Post-Quantum (PQ) world.
arXiv Detail & Related papers (2026-01-16T08:52:09Z) - Cybersecurity of High-Altitude Platform Stations: Threat Taxonomy, Attacks and Defenses with Standards Mapping - DDoS Attack Use Case [46.15641504748965]
High-Altitude Platform Stations (HAPS) are emerging stratospheric nodes within non-terrestrial networks.<n>We provide a structured overview of HAPS subsystems and principal communication links, map cybersecurity and privacy exposure across communication, control, and power subsystems, and propose a stratosphere-aware threat taxonomy.<n>We report a simulation-based case study using OMNeT++/INET to characterize distributed-denial-of-service (DDoS) impact on service and control-plane availability.
arXiv Detail & Related papers (2025-11-16T20:28:58Z) - Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks [83.84711311344918]
Integrated sensing, communications, and computing (I SCC) is one of the core parts of Low-Altitude Wireless Networks (LAWNs)<n>This paper studies joint performance optimization of I SCC while considering secrecyness of the communications.<n>We propose a deep Q-network (DQN)-based multi-objective evolutionary algorithm, which adaptively selects evolutionary operators according to the evolving optimization objectives.
arXiv Detail & Related papers (2025-11-03T11:06:41Z) - AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems [5.944786264024814]
Transportation Cyber-Physical Systems ( TCPS) integrate physical elements, such as transportation infrastructure and vehicles, with cyber elements via advanced communication technologies.<n>Traditional cryptographic methods have been employed to secure TCPS communications, but the advent of quantum computing presents a significant threat to these existing security measures.<n>This chapter introduces TCPS communication protocols, discusses the vulnerabilities of corresponding communications to cyber-attacks, and explores the limitations of existing cryptographic methods in the quantum era.
arXiv Detail & Related papers (2025-10-09T17:37:00Z) - PQ-CAN: A Framework for Simulating Post-Quantum Cryptography in Embedded Systems [14.132452840081784]
We introduce PQ-CAN, a framework for simulating the performance and overhead of Post-Quantum Cryptography (PQC) algorithms in embedded systems.<n>We consider the automotive domain as our case study, testing a variety of PQC schemes under different scenarios.
arXiv Detail & Related papers (2025-04-14T21:50:26Z) - Performance Analysis and Industry Deployment of Post-Quantum Cryptography Algorithms [0.8602553195689513]
The National Institute of Standards and Technology (NIST) has selected CRYSTALS-Kyber and CRYSTALS-Dilithium as standardized PQC algorithms for secure key exchange and digital signatures.<n>This study conducts a comprehensive performance analysis of these algorithms by benchmarking execution times across cryptographic operations.<n>Our findings demonstrate that Kyber and Dilithium achieve efficient execution times, outperforming classical cryptographic schemes such as RSA and ECDSA at equivalent security levels.
arXiv Detail & Related papers (2025-03-17T09:06:03Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Enhancing Transportation Cyber-Physical Systems Security: A Shift to Post-Quantum Cryptography [6.676253819673155]
The rise of quantum computing threatens traditional cryptographic algorithms that secure Transportation Cyber-Physical Systems ( TCPS)
The objective of this paper is to underscore the urgency of transitioning to post-quantum cryptography (PQC) to mitigate these risks.
We analyzed vulnerabilities in traditional cryptography against quantum attacks and reviewed the applicability of NIST-standardized PQC schemes in TCPS.
arXiv Detail & Related papers (2024-11-20T04:11:33Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.