It can be said that the Next-Generation Internet of Things (NG-IoT), powered by the flexibility, wide range of data-rates, support of heterogeneity, ultralow latency, intelligence and massive user capacities delivered by 5G and 6G networks, will be the main driver for economic growth and human development for the next decades. Among others, an important impact of 5G/6G and the NG-IoT is that these technologies will allow the user to use sensors and mobile devices more effectively and efficiently, according to their needs and the characteristics of the operating environment. To elaborate, while today most connected services are accessed from an APP or website running a smartphone, with the NG-IoT connected services will be provided by a multitude of devices embedded in the environment itself. Under such a scenario, however, security and in particular, light-weight, embedded, intelligent and ubiquitous security becomes an absolute necessity, or better enabler, without which the NG-IoT is unfeasible as sensitive information from users such as personal, health-related and financial data would be exposed.
In an environment such as the one described, secure access to information requires user's continuous authentication and the proliferation of services means that password-based authentication degrades the user's experience and causes bad practices in the generation and custody of such paswords. Add to the later the notion that with the NG-IoT users will interact daily with countless devices, many of which will behave autonomously, and the potential disaster in terms of vulnerabilities of private and sensitive information is clear.
Fortunately, the source of the problem is also its solution, as Information and Communications Technologies (ICT), and in particular information security and wireless communications technologies have within them all the features from which to derive the necessary measures to counteract security vulnerabilities. For example, one of the most fundamental emerging problems in data security is the raise of quantum computing and machine learning, which may soon result in such an increase in computational and inference capabilities that even the most complex encryption techniques might be exposed, because encryption keys are essentially pseudo-random numbers, where the word pseudo indicates that no computer can generate truly random numbers, but only numbers whose generation is hard to reengineer today, and which sophisticated machine learning algorithms running on powerful quantum computers might soon easily break.
Fortunately, the wireless channel has the physical property of being reciprocal and particular to a pair of transmitter-receiver, such that truly random secret keys can be generated taking advantage of the characteristics of such a channel. Indeed, according to the theoretical principles of information, secret messages can be exchanged between a source and a receiver taking advantage of the physical characteristics of the medium to build confidential channels. Project ORACLE will focus on these and other emerging techniques, aiming to resolve the security vulnerabilities of NG-IoT.
Publicaciones
GiCSI | A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope V Gayoso Martínez, L Hernández Encinas, A Martín MuñozLogic Journal of the IGPL, 2022;, jzac011https://doi.org/10.1093/jigpal/jzac011 |
GiCSI | Analysis of the FO Transformation in the Lattice-Based Post-Quantum AlgorithmsGonzález de la Torre MÁ, Hernández Encinas L, Queiruga-Dios AMathematics 2022, 10, 2967.https://doi.org/10.3390/math10162967 |
GiCSI | About the FrodoKEM lattice-based algorithmM. A. González de la Torre, L. Hernández Encinas and A. Queiruga DiosProc. VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 253-256, J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, June 27-29, 2022ISBN: 978-84-88734-13-6 |
GiCSI | About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum CallGonzález de la Torre, M.Á., Hernández Encinas, L.P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 75-85, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022https://doi.org/10.1007/978-3-031-18409-3_8 |
GiCSI | Comparative analysis of lattice-based post-quantum cryptosystemsM.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez GarcíaXVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121-126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria, Santander, Octubre 19-21, 2022ISBN: 978-84-19024-14-5 |
GiCSI | State of the Art of Cybersecurity in Cooperative, Connected and Automated MobilityCastillo Campo, Ó., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A., Álvarez Fernández, R.P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 104–113, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022https://doi.org/10.1007/978-3-031-18409-3_11 |
GiCSI | Biometrics and Artificial Intelligence: Attacks and ChallengesL. Hernández-Álvarez, L. González-Manzano, J.M. Fuentes and L. Hernández Encinaspp. 213–240 in the book “Breakthroughs in Digital Biometrics and Forensics”, Springer, 2022https://doi.org/10.1007/978-3-031-10706-1_10 |
Congresos y reuniones, conferencias
GiCSI | Comparative analysis of lattice-based post-quantum cryptosystemsPresentación oral M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García |
GiCSI | Cibersecurity in Future Connected SocietiesOrganización de congresos Special Session organized by Víctor Gayoso Martínez (Institute of Physical and Information Technologies, Spanish National Research Council, CSIC) and Professor Koji Ishibashi (University of Electrocommunications, Japan) as part of the 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS) that will be held in Salamanca (Spain) in September 2022. For more information, visit http://www.2022.cisisconference.eu/accepted-special-sessions/ |