17
v1v2 (latest)

Post-Quantum Cryptography for Intelligent Transportation Systems: An Implementation-Focused Review

Abdullah Al Mamun
Akid Abrar
Mizanur Rahman
M Sabbir Salek
Mashrur Chowdhury
Main:56 Pages
5 Figures
Abstract

As quantum computing advances, the cryptographic algorithms that underpin confidentiality, integrity, and authentication in Intelligent Transportation Systems (ITS) face increasing vulnerability to quantum-enabled attacks. To address these risks, governments and industry stakeholders are turning toward post-quantum cryptography (PQC), a class of algorithms designed to resist adversaries equipped with quantum computing capabilities. However, existing studies provide limited insight into the implementation-focused aspects of PQC in the ITS domain. This review addresses that gap by evaluating the readiness of vehicular communication and security standards for adopting PQC. It examines in-vehicle networks and vehicle-to-everything (V2X) interfaces, and investigates vulnerabilities at the physical implementation layer of cryptographic hardware and embedded platforms, primarily exposure to side-channel and fault injection attacks. The review identifies thirteen research gaps: non-PQC-ready standards; constraints in embedded implementation and hybrid cryptography; interoperability and certificate-management barriers; a lack of real-world PQC deployment data in ITS; and physical-attack vulnerabilities in PQC-enabled vehicular communication. We present several future research directions, including updating vehicular communication and security standards, optimizing PQC for low-power devices, enhancing interoperability and certificate-management frameworks for PQC integration, conducting real-world evaluations of PQC-enabled communication and control functions across ITS deployments, and strengthening defenses against AI-assisted physical attacks. A phased roadmap is presented that aligns PQC deployment with regulatory, performance, and safety requirements, thereby guiding the secure evolution of ITS in the quantum computing era.

View on arXiv
Comments on this paper