Quantum Countdown: Protecting the Internet of Things Before It’s Too Late
Published in Physics and Computational Sciences
Quantum countdown
Billions of new devices from smart thermostats to industrial sensors join the Internet of Things (IoT) in every day practices. They make our cities smarter and our healthcare more responsive as our lives are also more convenient in general. But silently a countdown has begun. The encryption that guards these devices and a digital lock we’ve trusted for decades is on the verge of being picked by a new kind of technology: the quantum computer.
Our recent systematic review, “Systematic Review on Securing IoT Systems with Post Quantum Cryptography Emerging Threats, Countermeasures, and Future Research Needs,” published in Discover Internet of Things, was not only an academic study. It was a race to map the vulnerabilities of our connected world and to find the next generation of shields before time runs out.
Emerging threat
Modern cryptography, the complex math that secures our online bank transfers and smart home cameras mainly relies on problems that are incredibly hard for classical computers to solve. However, quantum computers do not play by the same rules rather qubits (quantum bits) applied with exponentially faster in computations. Algorithms like Shor’s algorithm could break these “hard” problems in minutes and rendering much of today’s security obsolete. This isn’t just a data privacy issue for IoT; it leads to a massive application crisis. A compromised smart grid, medical device, or autonomous vehicle network could have catastrophic real-world consequences.
We began our work with a systematic approach that guided by the rigorous PRISMA 2020 framework where it is spanned nine major databases including IEEE Xplore, Scopus, ACM, MDPI, Springer, ScienceDirect, Wiley, Google Scholar, and Nature yielding over 5,151 studies from the last five years. After meticulously distilled this vast corpus down to 161 studies, foundation of our analysis established by allowing us to paint a detailed picture of emerging vulnerabilities, evaluate proposed countermeasures, and identify the most urgent actions needed to secure our connected future.
The search for a quantum-resistant shield
The core of our work was evaluating the proposed solutions: Post-Quantum Cryptography (PQC). These are new cryptographic systems built on mathematical problems believed to be hard even for quantum computers. But for IoT, security isn’t the only requirement. These devices are often tiny, with limited processing power and battery life. We can’t install a supercomputer’s security software on a temperature sensor.
We analyzed both in descriptive statistics and thematic aspects. We analyzed the major PQC families namely lattice-based, code-based, multivariate, and hash-based signatures through the lens of an IoT engineer. Our analysis revealed that lattice-based cryptography, particularly schemes such as Kyber for key exchange and Dilithium for digital signatures recently standardized by NIST, shows the most promise. It offers a strong balance of security and relative efficiency. However, even these require careful optimization to be truly “lightweight” for the most constrained IoT endpoints with regard to scalability, interoperability and implementation complexity
A transition roadmap: not just a temporary diagnosis
Identifying the problem and the potential solutions is only the first step. The path to implementation is riddled with challenges we cataloged in detail: the overhead of key management, the vulnerability to side-channel attacks, the sheer complexity of upgrading global IoT infrastructure, and the looming threat of “store-now-decrypt-later” attacks where data is harvested today to be broken later.
Therefore, a significant part of our paper is dedicated to a strategic roadmap with the provided a case study on smart grid. We propose a framework centered on hybrid cryptography a transitional approach where classical and PQC algorithms work together. This provides a transmission phase while the new systems are thoroughly tested and optimized. We also emphasize that future research must aggressively tackle lightweight PQC design, robust key management for distributed devices, and above all, global standardization to avoid a fragmented and weak security ecosystem.
Why this work matters now
This research was driven by a sense of urgency. The quantum threat may seem futuristic, but the IoT devices we deploy today have lifespans of 10-20 years. They will absolutely be operating in a world where quantum attacks are a reality. We must act now because quantum advancements are accelerating, while development, standardization, improvement, confidence‑building, and usability of PQC all take significant time. With NIST’s official release of its first finalized PQC standards in 2024, the transition must begin immediately.
Writing this review reinforced that securing the IoT is a monumental and interdisciplinary challenge. It requires cryptographers, hardware engineers, software developers, policymakers, and industry leaders to collaborate as never before. Our paper is a call to start that work in earnest. Through mapping the threats, evaluating the tools, and charting a path forward, we hope to provide a foundational roadmap for building a connected future that is not just smart but also secure for the decades to come.
You can explore our complete analysis, detailed findings, and the full proposed a strategic roadmap for implementation as a path to future-secured IoT application in the open-access paper:
https://link.springer.com/article/10.1007/s43926-025-00275-6
DOI
https://doi.org/10.1007/s43926-025-00275-6
Follow the Topic
-
Discover Internet of Things
This is an open access, community-focussed journal publishing research from across all fields relevant to the Internet of Things (IoT), providing cutting-edge and state-of-art research findings to researchers, academicians, students, and engineers.
-
Cybersecurity
Related Collections
With Collections, you can get published faster and increase your visibility.
AI-Enabled Research Automation in Cybersecurity
Artificial Intelligence (AI) is rapidly reshaping cybersecurity research, where evolving threats demand rapid innovation. This special issue seeks high-quality contributions on AI-enabled automation of the scientific process—including research topic selection and generation, literature review, methodology formulation, implementation generation, paper composition, review evaluation and workflow curation—to advance authentic, innovative approaches in cybersecurity.
We invite submissions including, but not limited to:
1. Research Process Automation: AI-enabled automation in topic selection, hypothesis proposal, literature review, solution design, experiment implementation, data analysis, result evaluation, and paper writing. A submission does not need to cover every stage of the entire research progress.
2. Collaborative Research with AI: Human-AI/AI-AI collaboration models, including multi-agent platforms simulating team research.
3. Methodology and Tool Development: Development of AI-driven methodologies and tools that specifically support the automation of cybersecurity research workflows (e.g., experiment orchestration, reproducible evaluation, systematic literature analysis), rather than directly applying AI to solve security attack/defense tasks.
4. Sub-fields of Cybersecurity: Applications in system, network, software, and web security, malware analysis, and AI security where AI-enabled research automation plays a role.
5. Cross-disciplinary Value: Studies connecting cybersecurity with other domains (e.g., data science, social science, policy) through AI-enabled automation.
This Collection supports and amplifies research related to- SDG 9: Industry, Innovation & Infrastructure
Publishing Model: Open Access
Deadline: Mar 31, 2026
Secure and Resilient Internet of Medical Things (IoMT): Bridging Theory and Practice
The Internet of Medical Things (IoMT) is revolutionising the healthcare industry by interconnecting medical devices, sensors, and systems to enable efficient diagnostics, enhance treatments, and improve patient care. However, with the exponential growth and expansion of cyber-connected and autonomous medical IoT, there are emerging threat landscapes that could affect systems’ resilience and put patients and their data at risk. These technologies acquire, store, process, and communicate sensitive patient data, necessitating robust security and privacy protection measures, strict healthcare regulatory compliance, and resilience against rapidly evolving cyber threats.
This collection aims to collect the original contributions from researchers, academics, industry experts, policymakers, and medical professionals on innovative applications, groundbreaking ideas, underexplored challenges, and emerging trends in IoMT resilience engineering. It serves as a platform to share their findings, experiences, use cases, interdisciplinary perspectives, strategies, and solutions for safeguarding IoMT devices, systems, platforms, protocols, data, applications, and networks, ensuring compliance with healthcare regulations, and advancing secure healthcare technology.
The topics of interest include, but are not limited to, the following:
• AI-enabled IoMT security solutions
• Cyber threats susceptibility and risk remediation approaches in IoMT
• detection and prevention in healthcare IoT
• Requirements engineering for medical cyber-enabled assets
• Identity management and authentication in medical IoT
• Secure IoMT design and architecture
• Agentic AI for securing IoMT
• Cybersecure IoMT-enabled edge and cloud solutions and applications
• Human-centric risk modelling for medical IoT
• AI-driven detection of human-error-induced threats in IoMT
• Resilience-by-design IoMT frameworks
• Risk-based resilience planning in critical IoMT settings
• Ethical, legal and regulatory ramifications in IoMT
• Future policy and standardisation efforts around human factors in IoMT resilience
• Privacy-enhancing technologies (PET) and trusted execution environments in IoMT
• Case studies and real-world implementations of secure IoMT systems
• Human-machine teaming in IoMT
• Analysis and mitigation of disruptions that arise from human errors, interfacing issues, and cyber-physical breaches in clinical settings
Keywords: Internet of Medical Things (IoMT); Cyber Resilience; Privacy Enhancing Technologies; Threats and Risks; Cyber Attacks; Healthcare Regulations; Ethical Considerations
Publishing Model: Open Access
Deadline: Aug 15, 2026
Please sign in or register for FREE
If you are a registered user on Research Communities by Springer Nature, please sign in