Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems
The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/r...
Saved in:
| Published in | International journal of information security Vol. 24; no. 5; p. 219 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Heidelberg
Springer Nature B.V
01.10.2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1615-5262 1615-5270 |
| DOI | 10.1007/s10207-025-01133-w |
Cover
| Abstract | The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/robotics applications that run on constrained IoT devices. This work aims to fill this gap by fully integrating the communication middleware Data Distribution Service (DDS) of Robot Operating System (ROS) 2 with the recently standardized National Institute of Standards and Technology (NIST) PQ cryptographic algorithms. It also evaluates the performance of this PQ enhanced DDS on constrained devices (Raspberry Pi 5) using time-based and size-based metrics. The findings highlight the feasibility of using PQ algorithms, especially module lattice-based algorithms, by showing their competitive results with 128- and 256-bit classical cryptographic algorithms. Overall, this work represents a significant step towards future-proofing ROS 2 systems against quantum threats and offering insights into the impact of post-quantum cryptography on performance of resource constrained setups. In the long run, this could ease the transition to post-quantum cryptography and play a vital role in securing safety-critical systems such as energy, communications, transport, and power. |
|---|---|
| AbstractList | The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/robotics applications that run on constrained IoT devices. This work aims to fill this gap by fully integrating the communication middleware Data Distribution Service (DDS) of Robot Operating System (ROS) 2 with the recently standardized National Institute of Standards and Technology (NIST) PQ cryptographic algorithms. It also evaluates the performance of this PQ enhanced DDS on constrained devices (Raspberry Pi 5) using time-based and size-based metrics. The findings highlight the feasibility of using PQ algorithms, especially module lattice-based algorithms, by showing their competitive results with 128- and 256-bit classical cryptographic algorithms. Overall, this work represents a significant step towards future-proofing ROS 2 systems against quantum threats and offering insights into the impact of post-quantum cryptography on performance of resource constrained setups. In the long run, this could ease the transition to post-quantum cryptography and play a vital role in securing safety-critical systems such as energy, communications, transport, and power. |
| ArticleNumber | 219 |
| Author | Safdar, Umair Qadir, Sana Nazir, M. Saqib |
| Author_xml | – sequence: 1 givenname: Umair surname: Safdar fullname: Safdar, Umair – sequence: 2 givenname: Sana surname: Qadir fullname: Qadir, Sana – sequence: 3 givenname: M. Saqib surname: Nazir fullname: Nazir, M. Saqib |
| BookMark | eNo9kEtLAzEUhYNUsK3-AVcBN7qIJjeTeSyl1AcUCj7WMZPJ2Ck2mSYZhvHX2zri6hwO59wL3wxNrLMGoUtGbxml2V1gFGhGKAhCGeOc9CdoylImiICMTv59CmdoFsKWUmC0YFP0sbQbZXVjP_HL-hUDvvaudBG71ngVj3EYQjQ7DDc4GN35Jg64b-IGh6hspXzVfJsKty5Esu-Ujd0Oaz-00Y27cI5Oa_UVzMWfztH7w_Jt8URW68fnxf2KaIA8kiwvmGEc8hqqIkkyIYwqyyopcl5zLpKUm1JzWhiamSRXginIjc4TIeo606ngc3Q13m2923cmRLl1nbeHl5KDEAUILvihBWNLexeCN7VsfbNTfpCMyiNJOZKUB5Lyl6Ts-Q92NGjP |
| Cites_doi | 10.1109/IRC.2020.00012 10.6028/NIST.SP.800-56Br2 10.1007/978-3-031-33386-6_10 10.1007/978-3-030-78375-4_17. 10.48550/arXiv.2401.17538. 10.1145/3450268.3453528. 10.1109/JIOT.2019.2958788 10.3390/robotics14050063 10.3390/iot2010005 10.1109/TC.2021.3122997 10.1007/s10586-024-04799-4 10.1007/s10586-021-03380-7 10.1145/3603170 10.1145/3320269.3384725. 10.3390/cryptography8020021 10.1145/3587037 10.6028/nist.ir.8547.ipd 10.6028/NIST.FIPS.205 10.1109/ICICCS53718.2022.9787987 10.6028/nist.fips.204 10.1109/dac18074.2021.9586131 10.6028/NIST.FIPS.203 10.1145/3498361.3538766 10.1016/j.iot.2022.100508 10.1016/j.iot.2024.101331 10.1145/1568318.1568324 10.3233/JCS-210037 10.1126/scirobotics.abm6074 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2025. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2025. |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
| DOI | 10.1007/s10207-025-01133-w |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1615-5270 |
| ExternalDocumentID | 10_1007_s10207_025_01133_w |
| GroupedDBID | -Y2 -~C .4S .86 .DC .VR 0-V 06D 0R~ 0VY 1N0 1SB 203 29J 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6KP 6NX 7WY 8AO 8FE 8FG 8FL 8FW 8TC 8VB 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYXX ABAKF ABBBX ABBRH ABBXA ABDBE ABDBF ABDZT ABECU ABFSG ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABRTQ ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACSTC ACUHS ACZOJ ADHHG ADHIR ADHKG ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEKMD AEMOZ AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AEZWR AFBBN AFDZB AFGCZ AFHIU AFKRA AFLOW AFOHR AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGQPQ AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHPBZ AHQJS AHSBF AHWEU AHYZX AIAKS AIGIU AIIXL AILAN AITGF AIXLP AJBLW AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARALO ARAPS ARCSS ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AYJHY AZFZN AZQEC B-. B0M BA0 BDATZ BENPR BEZIV BGLVJ BGNMA BGRYB BPHCQ BSONS CAG CCPQU CITATION COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EAD EAP EBA EBLON EBR EBS EBU ECS EDO EIOEI EIS EJD EMK EPL ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FIL FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K1G K60 K6V K6~ K7- KDC KOV LAS LLZTM M0C M0O M1Q M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J P2P P62 P9O PF0 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PRQQA PT4 Q2X QOS QWB R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TH9 TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZL0 ZMTXR ~8M ~A9 7SC 8FD JQ2 K7. L7M L~C L~D |
| ID | FETCH-LOGICAL-c228t-7891e1328f2d944755eabbd4983f335463ebc309e07e48a51a28ec8455ff7c653 |
| ISSN | 1615-5262 |
| IngestDate | Sun Oct 19 01:20:02 EDT 2025 Sat Oct 25 05:31:59 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c228t-7891e1328f2d944755eabbd4983f335463ebc309e07e48a51a28ec8455ff7c653 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3255925353 |
| PQPubID | 43999 |
| ParticipantIDs | proquest_journals_3255925353 crossref_primary_10_1007_s10207_025_01133_w |
| PublicationCentury | 2000 |
| PublicationDate | 2025-10-01 |
| PublicationDateYYYYMMDD | 2025-10-01 |
| PublicationDate_xml | – month: 10 year: 2025 text: 2025-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Heidelberg |
| PublicationPlace_xml | – name: Heidelberg |
| PublicationTitle | International journal of information security |
| PublicationYear | 2025 |
| Publisher | Springer Nature B.V |
| Publisher_xml | – name: Springer Nature B.V |
| References | 1133_CR37 1133_CR35 1133_CR36 ML Gambo (1133_CR22) 2025; 14 1133_CR39 1133_CR30 1133_CR33 S Macenski (1133_CR48) 2022; 7 1133_CR32 1133_CR26 1133_CR27 S Paul (1133_CR38) 2022; 30 1133_CR28 1133_CR29 K Seyhan (1133_CR19) 2022; 25 R Asif (1133_CR24) 2021; 2 1133_CR23 1133_CR20 G Fitzgibbon (1133_CR45) 2024; 8 1133_CR21 1133_CR59 1133_CR16 K Mansoorm (1133_CR31) 2025; 28 1133_CR57 1133_CR14 1133_CR58 1133_CR6 1133_CR7 1133_CR8 1133_CR17 1133_CR9 1133_CR18 1133_CR2 1133_CR3 1133_CR5 Z Xu (1133_CR50) 2021; 71 1133_CR1 L Gasser (1133_CR4) 2023 1133_CR11 Z Huang (1133_CR52) 2024; 27 1133_CR55 1133_CR12 1133_CR56 1133_CR53 1133_CR10 1133_CR49 1133_CR46 1133_CR47 O Regev (1133_CR25) 2009; 56 A Regenscheid (1133_CR34) 2024 P Ravi (1133_CR51) 2024; 23 S El Jaouhari (1133_CR15) 2022; 18 A Jati (1133_CR54) 2024; 23 TM Fernandez-Carames (1133_CR13) 2020; 7 1133_CR40 1133_CR41 1133_CR44 1133_CR42 1133_CR43 |
| References_xml | – ident: 1133_CR47 – ident: 1133_CR43 doi: 10.1109/IRC.2020.00012 – ident: 1133_CR28 – ident: 1133_CR20 – ident: 1133_CR11 – ident: 1133_CR33 doi: 10.6028/NIST.SP.800-56Br2 – ident: 1133_CR1 – ident: 1133_CR57 – ident: 1133_CR30 – start-page: 47 volume-title: Trends in Data Protection and Encryption Technologies year: 2023 ident: 1133_CR4 doi: 10.1007/978-3-031-33386-6_10 – ident: 1133_CR36 doi: 10.1007/978-3-030-78375-4_17. – ident: 1133_CR12 doi: 10.48550/arXiv.2401.17538. – ident: 1133_CR17 doi: 10.1145/3450268.3453528. – volume: 7 start-page: 6457 issue: 7 year: 2020 ident: 1133_CR13 publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2958788 – ident: 1133_CR46 – ident: 1133_CR29 – ident: 1133_CR42 – volume: 14 start-page: 63 year: 2025 ident: 1133_CR22 publication-title: Robotics doi: 10.3390/robotics14050063 – ident: 1133_CR21 – ident: 1133_CR56 – ident: 1133_CR2 – ident: 1133_CR39 – volume: 2 start-page: 71 issue: 1 year: 2021 ident: 1133_CR24 publication-title: IoT doi: 10.3390/iot2010005 – volume: 71 start-page: 2163 issue: 9 year: 2021 ident: 1133_CR50 publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2021.3122997 – ident: 1133_CR14 – ident: 1133_CR10 – volume: 28 start-page: 93 year: 2025 ident: 1133_CR31 publication-title: Cluster Computing doi: 10.1007/s10586-024-04799-4 – ident: 1133_CR26 – volume: 25 start-page: 1729 year: 2022 ident: 1133_CR19 publication-title: Clust. Comput. doi: 10.1007/s10586-021-03380-7 – ident: 1133_CR49 – volume: 23 start-page: 1 issue: 2 year: 2024 ident: 1133_CR51 publication-title: ACM Transactions on Embedded Computing Systems doi: 10.1145/3603170 – ident: 1133_CR35 doi: 10.1145/3320269.3384725. – ident: 1133_CR41 – volume: 8 start-page: 21 issue: 2 year: 2024 ident: 1133_CR45 publication-title: Cryptography. doi: 10.3390/cryptography8020021 – volume: 23 start-page: 1 issue: 2 year: 2024 ident: 1133_CR54 publication-title: ACM transactions on embedded computing systems doi: 10.1145/3587037 – year: 2024 ident: 1133_CR34 publication-title: Transition to Post-Quantum Cryptography Standards. doi: 10.6028/nist.ir.8547.ipd – ident: 1133_CR59 – ident: 1133_CR3 – ident: 1133_CR55 – ident: 1133_CR6 doi: 10.6028/NIST.FIPS.205 – ident: 1133_CR37 doi: 10.1109/ICICCS53718.2022.9787987 – ident: 1133_CR32 – ident: 1133_CR23 – ident: 1133_CR9 – ident: 1133_CR5 doi: 10.6028/nist.fips.204 – ident: 1133_CR53 doi: 10.1109/dac18074.2021.9586131 – ident: 1133_CR44 – ident: 1133_CR7 doi: 10.6028/NIST.FIPS.203 – ident: 1133_CR18 doi: 10.1145/3498361.3538766 – ident: 1133_CR27 – ident: 1133_CR40 – volume: 18 year: 2022 ident: 1133_CR15 publication-title: Internet of Things doi: 10.1016/j.iot.2022.100508 – volume: 27 year: 2024 ident: 1133_CR52 publication-title: Internet of Things doi: 10.1016/j.iot.2024.101331 – volume: 56 start-page: 1 issue: 6 year: 2009 ident: 1133_CR25 publication-title: Journal of the ACM (JACM) doi: 10.1145/1568318.1568324 – ident: 1133_CR58 – ident: 1133_CR16 – ident: 1133_CR8 – volume: 30 start-page: 623 issue: 4 year: 2022 ident: 1133_CR38 publication-title: J. Comput. Secur. doi: 10.3233/JCS-210037 – volume: 7 start-page: eabm6074 issue: 66 year: 2022 ident: 1133_CR48 publication-title: Science robotics doi: 10.1126/scirobotics.abm6074 |
| SSID | ssj0021091 |
| Score | 2.373187 |
| Snippet | The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Index Database |
| StartPage | 219 |
| SubjectTerms | Access control Algorithms Communication Computer systems Confidentiality Constraints Cryptography Cybersecurity Digital signatures Energy consumption Internet of Things Medical equipment Middleware Performance evaluation Protocol Quantum computers Quantum computing Quantum cryptography Robotics Robots Safety critical |
| Title | Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems |
| URI | https://www.proquest.com/docview/3255925353 |
| Volume | 24 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1615-5270 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021091 issn: 1615-5262 databaseCode: AFBBN dateStart: 20010801 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1615-5270 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021091 issn: 1615-5262 databaseCode: AGYKE dateStart: 20010101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1615-5270 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0021091 issn: 1615-5262 databaseCode: U2A dateStart: 20010825 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLZK98ILd8RgID8gBIoypXacJo8drCqXFdBWaW_BcWxRpCVpm2paf8R-Mz6J4yQMIeAlqlypUc_5dG4-5zsIvYwkSxI_ki5NKXV9Tj03lF7oqpEvgsBT_rgaHzuZB7OF_-GcnQ8G152upW2ZHIrdb-dK_ker-kzrFaZk_0Gz9kf1gf6s9aufWsP6-Vc6Ps6-A10GNNB9PnUIRIvrPMlLJy-AK7kqFVRMzQ6B7H9jdtWZvnRTRFjudMxZ5JvSXW21mLcXjlhfFWW-6XCZ_2j73dvyYY90wg5B2rfY2g1Xad3FvbjgS9sL_JVrb1rXpDPrGuZ8Vx-eHOrz1TLpFiUIs-1t_aIkdFzDPYgdmqlsrA6idP5rjLDsntU7RBrDXA9XGwCym1b2hvX3mmloAvVXAl2JOgV3L1tf19zvzyan8Zd30_jT-_nHV8XKhS1kcFtvVrLcQntEewlviPYm06OjuU3hgUYVUvjmL5gxLDOM-ctr-6FO39NX4cvZPXTH5B14UoPoPhrI7AG62-z0wMbEP0TfLKawxhQm-HWFKGwRhWtcYPIGN5rGgCfcxRPu4gn38PQILabHZ29nrtnC4QpCwtIdh9FIjigJFUkjoIdkkidJ6kchVZTCNgWZCOpF0htLP-RsxEkoRegzptRYBIw-RsMsz-QThJlKBdDQCg6lRzUKA19RLhQnKY8EZfvIaQQWFzXZStzSaoN4Yy3euBJvfLmPDhqZxgbxm5hCikwYZfTpn79-hm63wD1Aw3K9lc91fFkmL4zSfwIo-H5w |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+ROS+2+%28robot+operating+system+2%29+security+with+standardized+post-quantum+cryptosystems&rft.jtitle=International+journal+of+information+security&rft.au=Safdar%2C+Umair&rft.au=Qadir%2C+Sana&rft.au=Nazir%2C+M.+Saqib&rft.date=2025-10-01&rft.pub=Springer+Nature+B.V&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=24&rft.issue=5&rft.spage=219&rft_id=info:doi/10.1007%2Fs10207-025-01133-w&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon |