Post-Quantum Authentication at the Edges of Complex and Highly Dynamic IoT Systems (E20a)
We discuss the theoretical model underlying a realtime fully distributed post-quantum secure authenication protocol, a practical and newly available alternative to conventional authentication and authorisation of entities at the edge, sensor level, in complex dynamic IoT systems. In essence this involves assembling a virtual map of assets in the network based on real physical properties, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated autonomously and in realtime. Further, we propose unlike conventional PKI or PKI-like centralised asymmetric certificate based authentication, a new model of post-quantum cryptography integrated at asset level without a software layer or special hardware, is wholly possible. This new model of post-quantum authentication can be deployed universally on existing infrastructure, on any systems architecture using any operating system with any combination of wireless or wired communication protocols.