Toward Quantum-Resistant Fog-IoT Security: A Dual-Phase Framework with Chaotic Elliptic-Curve Diffie-Hellman and Post-Quantum Encryption

Authors

  • Ali-Alridha Khalil Department of Information Networks, College of Information Technology, University of Babylon, Babil, Iraq
  • Mahdi Ebady Manaa Intelligent Medical Systems Department, College of Sciences, Al-Mustaqbal University, Iraq | Department of Information Networks, College of Information Technology, University of Babylon, Iraq
Volume: 15 | Issue: 4 | Pages: 25597-25604 | August 2025 | https://doi.org/10.48084/etasr.11600

Abstract

The spread of Internet of Things (IoT) devices along with the distributed nature of fog computing has amplified the necessity for secure, efficient, and quantum-resistant communication protocols, especially in light of emerging quantum threats. This paper presents a two-phase security framework tailored for fog-IoT systems to enhance both data encryption and authentication. In the first phase, a novel lightweight authentication protocol is introduced by integrating the Elliptic-Curve Diffie-Hellman (ECDH) with the Lorenz chaotic system, resulting in highly unpredictable keys and increased resistance to cryptanalytic attacks. In the second phase, quantum-resilient data confidentiality is ensured using the CRYSTALS-Kyber algorithm. Extensive simulations were carried out to evaluate the effectiveness of the framework. Key randomness was statistically validated using the NIST SP 800-22 suite, yielding high -values (0.9414, 0.7659, and 0.9024), confirming strong entropy and cryptographic suitability. The CRYSTALS-Kyber component demonstrated practical performance with a key generation time of 35.64 ms, encryption time of 52.67 ms, and decryption time of 17.62 ms, surpassing comparable schemes in speed. Furthermore, the system maintained a low memory footprint of 71.13 KB and minimal CPU utilization at 7.5%, underscoring its lightweight design. These results confirm the feasibility, scalability, and efficiency of the proposed framework, making it a strong candidate for real-time and secure fog-IoT deployments under classical and quantum threat models.

Keywords:

fog computing, IoT, chaotic ECDH, CRYSTALS-Kyber, post-quantum cryptography, secure communication

Downloads

Download data is not yet available.

References

A. K. Jumani, J. Shi, A. A. Laghari, Z. Hu, A. ul Nabi, and H. Qian, "Fog computing security: A review," Security and Privacy, vol. 6, no. 6, 2023, Art. no. e313. DOI: https://doi.org/10.1002/spy2.313

S. Singh and V. K. Chaurasiya, "Mutual authentication scheme of IoT devices in fog computing environment," Cluster Computing, vol. 24, no. 3, pp. 1643–1657, Sep. 2021. DOI: https://doi.org/10.1007/s10586-020-03211-1

A. M. Ghalwah and G. A. Al-Sultany, "Leveraging Community-based Approaches for Enhancing Resource Allocation in Fog Computing Environment," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20372–20378, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9206

V. Tanksale, "Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices," Electronics, vol. 13, no. 18, Sep. 2024, Art. no. 3631. DOI: https://doi.org/10.3390/electronics13183631

M. A. Shaaban, A. S. Alsharkawy, M. T. AbouKreisha, and M. A. Razek, "Efficient ECC-based authentication scheme for fog-based IoT environment." arXiv, 2024.

T. Tripathi, A. Awasthi, S. P. Singh, and A. Chaturvedi, "Post Quantum Cryptography and its Comparison with Classical Cryptography." arXiv, 2024.

N. Alnahawi et al., "Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents." Cryptology ePrint Archive, 2025, [Online]. Available: https://eprint.iacr.org/2025/812.

R. H. Joudah and M. E. Manaa, "A New Approach to Improving the Security of the 5G-AKA Using Crystals-Kyber Post-Quantum Technologies and ASCON Algorithm," International Journal of Safety and Security Engineering, vol. 14, no. 6, pp. 1729–1742, Dec. 2024. DOI: https://doi.org/10.18280/ijsse.140608

A. H. Khaleel and I. Q. Abduljaleel, "Chaotic Image Cryptography Systems: A Review," Samarra Journal of Pure and Applied Science, vol. 3, no. 2, pp. 129–143, Sep. 2021. DOI: https://doi.org/10.54153/sjpas.2021.v3i2.244

A. Aljaedi, A. R. Alharbi, A. Aljuhni, M. K. Alghuson, S. Alassmi, and A. Shafique, "A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization," Scientific Reports, vol. 15, no. 1, Apr. 2025, Art. no. 14050. DOI: https://doi.org/10.1038/s41598-025-97822-6

L. H. Mahdi and A. A. Abdullah, "Fortifying Future IoT Security: A Comprehensive Review on Lightweight Post-Quantum Cryptography," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21812–21821, Apr. 2025. DOI: https://doi.org/10.48084/etasr.10141

J. Choi and J. Lee, "Secure and Scalable Internet of Things Model Using Post-Quantum MACsec," Applied Sciences, vol. 14, no. 10, May 2024, Art. no. 4215. DOI: https://doi.org/10.3390/app14104215

J. Xiong, L. Shen, Y. Liu, and X. Fang, "Enhancing IoT security in smart grids with quantum-resistant hybrid encryption," Scientific Reports, vol. 15, no. 1, Jan. 2025, Art. no. 3. DOI: https://doi.org/10.1038/s41598-024-84427-8

L. Malina, P. Dobias, P. Dzurenda, and G. Srivastava, "Quantum-Resistant and Secure MQTT Communication," in Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna, Austria, Jul. 2024, pp. 1–8. DOI: https://doi.org/10.1145/3664476.3670463

R. Ristov and S. Koceski, "Quantum Resilient Public Key Cryptography in Internet of Things," in 2023 12th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, Jun. 2023, pp. 1–4. DOI: https://doi.org/10.1109/MECO58584.2023.10154994

C. M. Chen, Y. Huang, K. H. Wang, S. Kumari, and M. E. Wu, "A secure authenticated and key exchange scheme for fog computing," Enterprise Information Systems, vol. 15, no. 9, pp. 1200–1215, Oct. 2021. DOI: https://doi.org/10.1080/17517575.2020.1712746

M. Hamada, S. A. Salem, and F. M. Salem, "LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments," Ain Shams Engineering Journal, vol. 13, no. 6, Nov. 2022, Art. no. 101752. DOI: https://doi.org/10.1016/j.asej.2022.101752

M. A. Shaaban, A. S. Alsharkawy, M. T. AbouKreisha, and M. A. Razek, "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment," International journal of Computer Networks & Communications, vol. 15, no. 04, pp. 55–71, Jul. 2023. DOI: https://doi.org/10.5121/ijcnc.2023.15404

P. B. Corthis, G. P. Ramesh, M. García-Torres, and R. Ruíz, "Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm," Symmetry, vol. 16, no. 6, Jun. 2024, Art. no. 726. DOI: https://doi.org/10.3390/sym16060726

S. P. Satpathy, S. Mohanty, and M. Pradhan, "A sustainable mutual authentication protocol for IoT-Fog-Cloud environment," Peer-to-Peer Networking and Applications, vol. 18, no. 1, Jan. 2025, Art. no. 35. DOI: https://doi.org/10.1007/s12083-024-01843-3

E. N. Lorenz, "Deterministic Nonperiodic Flow," in The Theory of Chaotic Attractors, B. R. Hunt, T. Y. Li, J. A. Kennedy, and H. E. Nusse, Eds. New York, NY: Springer New York, 2004, pp. 25–36. DOI: https://doi.org/10.1007/978-0-387-21830-4_2

A. Rukhin et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institure of standards and Technology, 2010.

P. Sanal, E. Karagoz, H. Seo, R. Azarderakhsh, and M. Mozaffari-Kermani, "Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors," in Security and Privacy in Communication Networks, vol. 399, J. Garcia-Alfaro, S. Li, R. Poovendran, H. Debar, and M. Yung, Eds. Springer International Publishing, 2021, pp. 424–440. DOI: https://doi.org/10.1007/978-3-030-90022-9_23

"Kyber." https://pq-crystals.org/kyber/index.shtml.

Y. Xing and S. Li, "A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 328–356, Feb. 2021. DOI: https://doi.org/10.46586/tches.v2021.i2.328-356

Downloads

How to Cite

[1]
A.-A. Khalil and M. Ebady Manaa, “Toward Quantum-Resistant Fog-IoT Security: A Dual-Phase Framework with Chaotic Elliptic-Curve Diffie-Hellman and Post-Quantum Encryption”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25597–25604, Aug. 2025.

Metrics

Abstract Views: 443
PDF Downloads: 438

Metrics Information