{"id":"https://openalex.org/W4327767800","doi":"https://doi.org/10.1109/ccnc51644.2023.10060762","title":"Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices","display_name":"Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices","publication_year":2023,"publication_date":"2023-01-08","ids":{"openalex":"https://openalex.org/W4327767800","doi":"https://doi.org/10.1109/ccnc51644.2023.10060762"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51644.2023.10060762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10060762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013811989","display_name":"Jessica Bozhko","orcid":null},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jessica Bozhko","raw_affiliation_strings":["Auburn University,Dept. of Computer Science,Auburn,USA","Dept. of Computer Science, Auburn University, Auburn, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University,Dept. of Computer Science,Auburn,USA","institution_ids":["https://openalex.org/I82497590"]},{"raw_affiliation_string":"Dept. of Computer Science, Auburn University, Auburn, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003005487","display_name":"Yacoub Hanna","orcid":"https://orcid.org/0000-0002-8954-9336"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yacoub Hanna","raw_affiliation_strings":["Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081566037","display_name":"Ricardo Harrilal-Parchment","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ricardo Harrilal-Parchment","raw_affiliation_strings":["Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079714623","display_name":"Samet Tonyal\u0131","orcid":"https://orcid.org/0000-0001-7799-2771"},"institutions":[{"id":"https://openalex.org/I143914637","display_name":"G\u00fcm\u00fc\u015fhane University","ror":"https://ror.org/00r9t7n55","country_code":"TR","type":"education","lineage":["https://openalex.org/I143914637"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Samet Tonyali","raw_affiliation_strings":["Gumushane University,Dept. of Software Engineering,Gumushane,Turkey","Dept. of Software Engineering, Gumushane University, Gumushane, Turkey"],"affiliations":[{"raw_affiliation_string":"Gumushane University,Dept. of Software Engineering,Gumushane,Turkey","institution_ids":["https://openalex.org/I143914637"]},{"raw_affiliation_string":"Dept. of Software Engineering, Gumushane University, Gumushane, Turkey","institution_ids":["https://openalex.org/I143914637"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078029373","display_name":"Kemal Akkaya","orcid":"https://orcid.org/0000-0002-7103-4545"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kemal Akkaya","raw_affiliation_strings":["Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Dept. of Electrical and Computer Engineering,Miami,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Florida International University, Miami, USA","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013811989"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":2.8009,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.90759865,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"230","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8089815378189087},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.6533191800117493},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5826364755630493},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5699970722198486},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5359365344047546},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4632260799407959},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32790008187294006},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2806466221809387},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.277530312538147},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.102068692445755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8089815378189087},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.6533191800117493},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5826364755630493},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5699970722198486},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5359365344047546},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4632260799407959},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32790008187294006},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2806466221809387},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.277530312538147},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.102068692445755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51644.2023.10060762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10060762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.550000011920929,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1910751411","https://openalex.org/W1979260239","https://openalex.org/W1981260643","https://openalex.org/W2913195105","https://openalex.org/W2953766007","https://openalex.org/W3091959406","https://openalex.org/W3208048271","https://openalex.org/W4206114297","https://openalex.org/W4226106055","https://openalex.org/W4283014613","https://openalex.org/W4389255154","https://openalex.org/W6746242683"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W3048672182","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W2065450024"],"abstract_inverted_index":{"Post-quantum":[0],"(PQ)":[1],"cryptographic":[2,110],"algorithms":[3,22,97],"are":[4,99,196],"currently":[5],"being":[6,100,233],"developed":[7,162,210],"to":[8,11,72,89,107,127,167],"be":[9],"able":[10],"resist":[12],"attacks":[13],"by":[14,102],"quantum":[15],"computers.":[16],"The":[17,182],"practical":[18],"use":[19,92],"of":[20,42,48,76,93,157,171],"these":[21],"for":[23,39,135,150,200,213],"securing":[24],"networks":[25],"will":[26],"depend":[27,59],"on":[28,60,115,206,228],"their":[29,136],"computational":[30,56],"and":[31,58,125,154,177,194,202],"communication":[32,218],"efficiency.":[33],"In":[34],"particular,":[35],"this":[36,66,207],"is":[37,69,188],"critical":[38],"the":[40,46,74,91,94,108,130,144,148,169,189,197,229,236],"security":[41,81,87,137],"wireless":[43,63],"communications":[44],"within":[45],"context":[47],"consumer":[49],"IoT":[50,119,165,214],"devices":[51,215],"that":[52,98,186,220],"may":[53],"have":[54],"limited":[55],"power":[57],"a":[61,70,105,163,211,223],"constrained":[62],"bandwidth.":[64],"To":[65],"end,":[67],"there":[68],"need":[71],"evaluate":[73],"performance":[75],"widely":[77,117],"used":[78,118,139,234],"application":[79],"layer":[80,86,231],"standards":[82,120],"such":[83],"as":[84,104],"transport":[85],"(TLS)":[88],"understand":[90],"existing":[95],"PQ":[96,133,172,178,224],"evaluated":[101],"NIST":[103],"replacement":[106],"current":[109],"algorithms.":[111,181],"This":[112],"paper":[113],"focuses":[114],"two":[116],"Bluetooth":[121],"Low":[122],"Energy":[123],"(BLE)":[124],"WiFi":[126,203],"find":[128],"out":[129],"optimal":[131],"performing":[132],"algorithm":[134,226],"when":[138],"in":[140],"end-to-end":[141],"connections":[142],"over":[143,152],"Internet.":[145],"By":[146],"implementing":[147],"capability":[149],"IP":[151],"BLE":[153,201],"all":[155],"options":[156],"TLS":[158],"connection":[159],"establishment,":[160],"we":[161,209],"client-server":[164],"testbed":[166],"measure":[168],"efficiency":[170],"key":[173],"encapsulation":[174],"mechanisms":[175],"(KEMs)":[176],"digital":[179],"signature":[180],"test":[183],"results":[184],"showed":[185],"Kyber512":[187],"ideal":[190],"KEM":[191,225],"while":[192],"Falcon-512":[193],"Dilithium2":[195],"best":[198],"signatures":[199],"devices.":[204],"Based":[205],"outcome,":[208],"mechanism":[212],"with":[216],"multiple":[217],"interfaces,":[219],"dynamically":[221],"chooses":[222],"based":[227],"MAC":[230],"protocol":[232],"at":[235],"time.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
