Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System

09/16/2020
by   Richa Varma, et al.
0

The secure command and control (C C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance. The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm. Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C C of mobile agents, in general. We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present day security schemes such as the widely used RSA algorithm.

READ FULL TEXT
research
02/11/2023

Powerful Primitives in the Bounded Quantum Storage Model

The bounded quantum storage model aims to achieve security against compu...
research
12/13/2021

Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation

Along with the potential emergence of quantum computing, safety and secu...
research
08/29/2018

On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors

Large-scale quantum computing is a significant threat to classical publi...
research
06/22/2019

Comparative study of Joint Image Encryption and Compression Schemes: A Review

With the development of imaging methods in wireless communications, enha...
research
11/18/2019

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...
research
12/30/2022

FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad

Quantum computing has entered fast development track since Shor's algori...
research
05/25/2023

Composing Bridges

The present work builds on previous investigations of the authors (and t...

Please sign up or login with your details

Forgot password? Click here to reset