{"id":"https://openalex.org/W7123767256","doi":"https://doi.org/10.1109/ojcoms.2026.3654010","title":"A Post-Quantum Secure Solution for SECS/GEM Communications in Industrial Internet of Things (IIoT) Application","display_name":"A Post-Quantum Secure Solution for SECS/GEM Communications in Industrial Internet of Things (IIoT) Application","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123767256","doi":"https://doi.org/10.1109/ojcoms.2026.3654010"},"language":null,"primary_location":{"id":"doi:10.1109/ojcoms.2026.3654010","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3654010","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2026.3654010","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077882166","display_name":"Zeyad Ghaleb Al-Mekhlafi","orcid":"https://orcid.org/0000-0001-6367-0309"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zeyad Ghaleb Al-Mekhlafi","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6367-0309","affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121431396","display_name":"Jalal M. H. Altmemi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Jalal M. H. Altmemi","raw_affiliation_strings":["Information Technology Management Department, Southern Technical University, Basrah, Iraq"],"raw_orcid":"https://orcid.org/0009-0001-0126-5866","affiliations":[{"raw_affiliation_string":"Information Technology Management Department, Southern Technical University, Basrah, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120890191","display_name":"Mahmood A. Al-Shareeda","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mahmood A. Al-Shareeda","raw_affiliation_strings":["Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-2358-3785","affiliations":[{"raw_affiliation_string":"Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122959261","display_name":"Ahmed Abbas Jasim Al-Al-Hchaimi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Ahmed Abbas Jasim Al-Al-Hchaimi","raw_affiliation_strings":["Department of Electromechanical Systems Engineering, Thi-Qar Technical College, Southern Technical University, Basra, Iraq"],"raw_orcid":"https://orcid.org/0000-0001-7525-2518","affiliations":[{"raw_affiliation_string":"Department of Electromechanical Systems Engineering, Thi-Qar Technical College, Southern Technical University, Basra, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016711703","display_name":"Tarek Gaber","orcid":"https://orcid.org/0000-0003-4065-4191"},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tarek Gaber","raw_affiliation_strings":["School of Science, Engineering and Environment, University of Salford, Manchester, Salford, U.K"],"raw_orcid":"https://orcid.org/0000-0003-4065-4191","affiliations":[{"raw_affiliation_string":"School of Science, Engineering and Environment, University of Salford, Manchester, Salford, U.K","institution_ids":["https://openalex.org/I54459138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072179330","display_name":"Raad Z. Homod","orcid":"https://orcid.org/0000-0002-4161-7539"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Raad Z. Homod","raw_affiliation_strings":["Department of Oil and Gas Engineering, Basrah University for Oil and Gas, Basra, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Oil and Gas Engineering, Basrah University for Oil and Gas, Basra, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113290764","display_name":"Badiea Abdulkarem Mohammed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Badiea Abdulkarem Mohammed","raw_affiliation_strings":["Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3539-4161","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023143842","display_name":"Gharbi Alshammari","orcid":"https://orcid.org/0000-0001-8851-6180"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gharbi Alshammari","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-8851-6180","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022237437","display_name":"Kawther A. Al\u2010Dhlan","orcid":"https://orcid.org/0000-0003-4526-6892"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kawther A. Al-Dhlan","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-4526-6892","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122949889","display_name":"Reem alrashdi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reem Alrashdi","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0009-0002-7168-1168","affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5119053497","display_name":"Yasser A. Alkhabra","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Yaser Abdullah Alkhabra","raw_affiliation_strings":["Department of Education Technology, College of Education, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-9453-8829","affiliations":[{"raw_affiliation_string":"Department of Education Technology, College of Education, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5077882166"],"corresponding_institution_ids":[],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08000516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"670","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.36399999260902405,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.36399999260902405,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.08780000358819962,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.08479999750852585,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5730999708175659},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5264000296592712},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.45329999923706055},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4480000138282776},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44530001282691956},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4212000072002411},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.3903000056743622},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.3702000081539154},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.3659999966621399},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.3596999943256378}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7186999917030334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6628999710083008},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5730999708175659},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5264000296592712},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.45329999923706055},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4480000138282776},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44530001282691956},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4212000072002411},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3702000081539154},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3659999966621399},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3596999943256378},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.350600004196167},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.32109999656677246},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.31790000200271606},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.31520000100135803},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3116999864578247},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.2955000102519989},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.29010000824928284},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.28459998965263367},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2759999930858612},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2718000113964081},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.26420000195503235},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.26109999418258667},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ojcoms.2026.3654010","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3654010","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2026.3654010","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3654010","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6805571913719177,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2989540564","https://openalex.org/W3164664760","https://openalex.org/W3196763110","https://openalex.org/W3202603325","https://openalex.org/W3214696341","https://openalex.org/W3215571357","https://openalex.org/W3217227009","https://openalex.org/W4310999136","https://openalex.org/W4318952637","https://openalex.org/W4327893913","https://openalex.org/W4360995388","https://openalex.org/W4364295445","https://openalex.org/W4391092662","https://openalex.org/W4391560030","https://openalex.org/W4392680865","https://openalex.org/W4394569003","https://openalex.org/W4394862859","https://openalex.org/W4401023138","https://openalex.org/W4402265012","https://openalex.org/W4402830068","https://openalex.org/W4404090270","https://openalex.org/W4413061307","https://openalex.org/W4413364460"],"related_works":[],"abstract_inverted_index":{"The":[0,136],"Semiconductor":[1],"Equipment":[2,5],"Communication":[3],"Standard/Generic":[4],"Model":[6],"(SECS/GEM)":[7],"protocol":[8],"is":[9,38,248],"an":[10,171,249],"international":[11],"standard":[12],"for":[13,30,118,123,254],"machine-to-machine":[14],"(M2M)":[15],"data":[16,85],"interchange":[17],"which":[18],"has":[19],"been":[20],"widely":[21],"accepted":[22],"in":[23,183,237,259],"the":[24,84,90,146,165,214,260],"semiconductor":[25],"and":[26,34,53,66,97,121,156,160,223,234],"industrial":[27,241,257],"automation":[28],"industries":[29],"real-time":[31,255],"equipment":[32],"control":[33],"monitoring.":[35],"But":[36],"there":[37],"currently":[39],"no":[40,180],"security":[41,82,143,151,217],"model":[42],"that":[43,125,206,246],"offers":[44],"both":[45],"full-spectrum":[46],"protection,":[47],"as":[48,50,211,229,231],"well":[49,230],"light-weight":[51],"performance":[52],"total":[54],"resilience":[55],"to":[56,76,94,170,185,213],"quantum":[57,181],"era":[58],"cyber-threats.":[59],"Existing":[60],"improvements,":[61],"e.g.,":[62],"SECS/GEMsec,":[63],"Secured":[64],"SECS/GEM,":[65],"ES-SECS/GEM":[67],"either":[68],"depend":[69],"on":[70,113,200],"traditional":[71],"cryptographic":[72],"building":[73],"blocks":[74],"susceptible":[75],"Shor-,":[77],"Grover-based":[78],"attacks":[79],"or":[80,192,196],"ensure":[81],"of":[83,116,148,162],"only":[86],"partially,":[87],"thereby":[88],"exposing":[89],"critical":[91],"IIoT":[92,203,262],"infrastructure":[93],"replaying,":[95],"DoS,":[96],"post-quantum":[98,109,251],"cryptanalysis":[99],"vulnerabilities.":[100],"To":[101],"close":[102],"this":[103],"gap,":[104],"we":[105],"introduce":[106],"Post-SECS/GEM,":[107],"a":[108,114,140,201],"secure":[110,252],"solution":[111],"based":[112],"combination":[115],"CRYSTALS-Kyber":[117],"key":[119,221],"exchange":[120],"CRYSTALS-Dilithium":[122],"authentication":[124,224],"maintains":[126],"seamless":[127],"compatibility":[128],"with":[129,168,219,239],"current":[130,215],"message":[131],"formats":[132],"utilized":[133],"within":[134],"SECS/GEM.":[135],"suggested":[137],"architecture":[138],"embeds":[139],"lightweight,":[141],"lattice-based":[142],"construction":[144],"ensuring":[145],"fulfillment":[147],"fundamental":[149],"SECS/GEM":[150,216],"functionalities":[152],"(e.g.,":[153],"mutual":[154],"authentication,":[155],"preserving":[157],"authenticity,":[158],"secrecy":[159],"integrity":[161],"messages":[163],"over":[164],"same":[166],"channel),":[167],"respect":[169],"adversary":[172],"who":[173],"could":[174],"have":[175],"unlimited":[176],"computation":[177],"power":[178],"but":[179],"capability":[182],"order":[184],"attack":[186],"communication":[187,258],"between":[188],"devices":[189],"without":[190],"modifying":[191],"upgrading":[193],"existing":[194],"protocols":[195],"hardware.":[197],"Performance":[198],"evaluation":[199],"typical":[202],"testbed":[204],"indicates":[205],"Post-SECS/GEM":[207,247],"achieves":[208],"better":[209],"efficiency":[210],"compared":[212],"extensions,":[218],"decreased":[220],"establishment":[222],"latency,":[225],"predictable":[226],"encryption/decryption":[227],"performance,":[228],"acceptable":[232],"computing":[233],"memory":[235],"overheads":[236],"line":[238],"edge-class":[240],"devices.":[242],"These":[243],"findings":[244],"demonstrate":[245],"efficient":[250],"approach":[253],"SECS/GEM-based":[256],"present":[261],"scenarios.":[263]},"counts_by_year":[],"updated_date":"2026-01-29T23:13:10.619473","created_date":"2026-01-14T00:00:00"}
