Open Access iconOpen Access

REVIEW

Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions

Seo Yeon Moon1, Byung Hyun Jo1, Abir El Azzaoui1, Sushil Kumar Singh2, Jong Hyuk Park1,*

1 Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, 01811, Republic of Korea
2 Department of Computer Science and Engineering, Marwadi University, Rajkot, 360005, India

* Corresponding Author: Jong Hyuk Park. Email: email

(This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)

Computers, Materials & Continua 2025, 84(1), 25-55. https://doi.org/10.32604/cmc.2025.062966

Abstract

With the rapid advancement of ICT and IoT technologies, the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency. However, these technologies face critical security challenges, exacerbated by the emergence of quantum computing, which threatens traditional encryption methods. The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust, quantum-resistant security solutions. To address these challenges, researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography, which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity. This paper reviews the current security practices in IoT and Edge/Fog environments, explores the latest advancements in QKD and PQC technologies, and discusses their integration into distributed computing systems. Additionally, this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations. Finally, we highlight future research directions aimed at improving the scalability, efficiency, and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats.

Keywords

Edge computing; fog computing; quantum key distribution; security; post-quantum cryptography; cascade protocol

Cite This Article

APA Style
Moon, S.Y., Jo, B.H., Azzaoui, A.E., Singh, S.K., Park, J.H. (2025). Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions. Computers, Materials & Continua, 84(1), 25–55. https://doi.org/10.32604/cmc.2025.062966
Vancouver Style
Moon SY, Jo BH, Azzaoui AE, Singh SK, Park JH. Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions. Comput Mater Contin. 2025;84(1):25–55. https://doi.org/10.32604/cmc.2025.062966
IEEE Style
S. Y. Moon, B. H. Jo, A. E. Azzaoui, S. K. Singh, and J. H. Park, “Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions,” Comput. Mater. Contin., vol. 84, no. 1, pp. 25–55, 2025. https://doi.org/10.32604/cmc.2025.062966



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 704

    View

  • 295

    Download

  • 0

    Like

Share Link