Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems

The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/r...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of information security Vol. 24; no. 5; p. 219
Main Authors Safdar, Umair, Qadir, Sana, Nazir, M. Saqib
Format Journal Article
LanguageEnglish
Published Heidelberg Springer Nature B.V 01.10.2025
Subjects
Online AccessGet full text
ISSN1615-5262
1615-5270
DOI10.1007/s10207-025-01133-w

Cover

Abstract The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/robotics applications that run on constrained IoT devices. This work aims to fill this gap by fully integrating the communication middleware Data Distribution Service (DDS) of Robot Operating System (ROS) 2 with the recently standardized National Institute of Standards and Technology (NIST) PQ cryptographic algorithms. It also evaluates the performance of this PQ enhanced DDS on constrained devices (Raspberry Pi 5) using time-based and size-based metrics. The findings highlight the feasibility of using PQ algorithms, especially module lattice-based algorithms, by showing their competitive results with 128- and 256-bit classical cryptographic algorithms. Overall, this work represents a significant step towards future-proofing ROS 2 systems against quantum threats and offering insights into the impact of post-quantum cryptography on performance of resource constrained setups. In the long run, this could ease the transition to post-quantum cryptography and play a vital role in securing safety-critical systems such as energy, communications, transport, and power.
AbstractList The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional applications. However, relatively limited work has been done on adapting and assessing the utilization of Post Quantum (PQ) algorithms in industrial/robotics applications that run on constrained IoT devices. This work aims to fill this gap by fully integrating the communication middleware Data Distribution Service (DDS) of Robot Operating System (ROS) 2 with the recently standardized National Institute of Standards and Technology (NIST) PQ cryptographic algorithms. It also evaluates the performance of this PQ enhanced DDS on constrained devices (Raspberry Pi 5) using time-based and size-based metrics. The findings highlight the feasibility of using PQ algorithms, especially module lattice-based algorithms, by showing their competitive results with 128- and 256-bit classical cryptographic algorithms. Overall, this work represents a significant step towards future-proofing ROS 2 systems against quantum threats and offering insights into the impact of post-quantum cryptography on performance of resource constrained setups. In the long run, this could ease the transition to post-quantum cryptography and play a vital role in securing safety-critical systems such as energy, communications, transport, and power.
ArticleNumber 219
Author Safdar, Umair
Qadir, Sana
Nazir, M. Saqib
Author_xml – sequence: 1
  givenname: Umair
  surname: Safdar
  fullname: Safdar, Umair
– sequence: 2
  givenname: Sana
  surname: Qadir
  fullname: Qadir, Sana
– sequence: 3
  givenname: M. Saqib
  surname: Nazir
  fullname: Nazir, M. Saqib
BookMark eNo9kEtLAzEUhYNUsK3-AVcBN7qIJjeTeSyl1AcUCj7WMZPJ2Ck2mSYZhvHX2zri6hwO59wL3wxNrLMGoUtGbxml2V1gFGhGKAhCGeOc9CdoylImiICMTv59CmdoFsKWUmC0YFP0sbQbZXVjP_HL-hUDvvaudBG71ngVj3EYQjQ7DDc4GN35Jg64b-IGh6hspXzVfJsKty5Esu-Ujd0Oaz-00Y27cI5Oa_UVzMWfztH7w_Jt8URW68fnxf2KaIA8kiwvmGEc8hqqIkkyIYwqyyopcl5zLpKUm1JzWhiamSRXginIjc4TIeo606ngc3Q13m2923cmRLl1nbeHl5KDEAUILvihBWNLexeCN7VsfbNTfpCMyiNJOZKUB5Lyl6Ts-Q92NGjP
Cites_doi 10.1109/IRC.2020.00012
10.6028/NIST.SP.800-56Br2
10.1007/978-3-031-33386-6_10
10.1007/978-3-030-78375-4_17.
10.48550/arXiv.2401.17538.
10.1145/3450268.3453528.
10.1109/JIOT.2019.2958788
10.3390/robotics14050063
10.3390/iot2010005
10.1109/TC.2021.3122997
10.1007/s10586-024-04799-4
10.1007/s10586-021-03380-7
10.1145/3603170
10.1145/3320269.3384725.
10.3390/cryptography8020021
10.1145/3587037
10.6028/nist.ir.8547.ipd
10.6028/NIST.FIPS.205
10.1109/ICICCS53718.2022.9787987
10.6028/nist.fips.204
10.1109/dac18074.2021.9586131
10.6028/NIST.FIPS.203
10.1145/3498361.3538766
10.1016/j.iot.2022.100508
10.1016/j.iot.2024.101331
10.1145/1568318.1568324
10.3233/JCS-210037
10.1126/scirobotics.abm6074
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2025.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2025.
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1007/s10207-025-01133-w
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1615-5270
ExternalDocumentID 10_1007_s10207_025_01133_w
GroupedDBID -Y2
-~C
.4S
.86
.DC
.VR
0-V
06D
0R~
0VY
1N0
1SB
203
29J
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6KP
6NX
7WY
8AO
8FE
8FG
8FL
8FW
8TC
8VB
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYXX
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDBF
ABDZT
ABECU
ABFSG
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABRTQ
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACSTC
ACUHS
ACZOJ
ADHHG
ADHIR
ADHKG
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEKMD
AEMOZ
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AEZWR
AFBBN
AFDZB
AFGCZ
AFHIU
AFKRA
AFLOW
AFOHR
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGQPQ
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHPBZ
AHQJS
AHSBF
AHWEU
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AIXLP
AJBLW
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARALO
ARAPS
ARCSS
ARMRJ
ASPBG
ATHPR
AVWKF
AXYYD
AYFIA
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BGRYB
BPHCQ
BSONS
CAG
CCPQU
CITATION
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EAD
EAP
EBA
EBLON
EBR
EBS
EBU
ECS
EDO
EIOEI
EIS
EJD
EMK
EPL
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FIL
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K1G
K60
K6V
K6~
K7-
KDC
KOV
LAS
LLZTM
M0C
M0O
M1Q
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P2P
P62
P9O
PF0
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PRQQA
PT4
Q2X
QOS
QWB
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TH9
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZL0
ZMTXR
~8M
~A9
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c228t-7891e1328f2d944755eabbd4983f335463ebc309e07e48a51a28ec8455ff7c653
ISSN 1615-5262
IngestDate Sun Oct 19 01:20:02 EDT 2025
Sat Oct 25 05:31:59 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c228t-7891e1328f2d944755eabbd4983f335463ebc309e07e48a51a28ec8455ff7c653
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3255925353
PQPubID 43999
ParticipantIDs proquest_journals_3255925353
crossref_primary_10_1007_s10207_025_01133_w
PublicationCentury 2000
PublicationDate 2025-10-01
PublicationDateYYYYMMDD 2025-10-01
PublicationDate_xml – month: 10
  year: 2025
  text: 2025-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Heidelberg
PublicationPlace_xml – name: Heidelberg
PublicationTitle International journal of information security
PublicationYear 2025
Publisher Springer Nature B.V
Publisher_xml – name: Springer Nature B.V
References 1133_CR37
1133_CR35
1133_CR36
ML Gambo (1133_CR22) 2025; 14
1133_CR39
1133_CR30
1133_CR33
S Macenski (1133_CR48) 2022; 7
1133_CR32
1133_CR26
1133_CR27
S Paul (1133_CR38) 2022; 30
1133_CR28
1133_CR29
K Seyhan (1133_CR19) 2022; 25
R Asif (1133_CR24) 2021; 2
1133_CR23
1133_CR20
G Fitzgibbon (1133_CR45) 2024; 8
1133_CR21
1133_CR59
1133_CR16
K Mansoorm (1133_CR31) 2025; 28
1133_CR57
1133_CR14
1133_CR58
1133_CR6
1133_CR7
1133_CR8
1133_CR17
1133_CR9
1133_CR18
1133_CR2
1133_CR3
1133_CR5
Z Xu (1133_CR50) 2021; 71
1133_CR1
L Gasser (1133_CR4) 2023
1133_CR11
Z Huang (1133_CR52) 2024; 27
1133_CR55
1133_CR12
1133_CR56
1133_CR53
1133_CR10
1133_CR49
1133_CR46
1133_CR47
O Regev (1133_CR25) 2009; 56
A Regenscheid (1133_CR34) 2024
P Ravi (1133_CR51) 2024; 23
S El Jaouhari (1133_CR15) 2022; 18
A Jati (1133_CR54) 2024; 23
TM Fernandez-Carames (1133_CR13) 2020; 7
1133_CR40
1133_CR41
1133_CR44
1133_CR42
1133_CR43
References_xml – ident: 1133_CR47
– ident: 1133_CR43
  doi: 10.1109/IRC.2020.00012
– ident: 1133_CR28
– ident: 1133_CR20
– ident: 1133_CR11
– ident: 1133_CR33
  doi: 10.6028/NIST.SP.800-56Br2
– ident: 1133_CR1
– ident: 1133_CR57
– ident: 1133_CR30
– start-page: 47
  volume-title: Trends in Data Protection and Encryption Technologies
  year: 2023
  ident: 1133_CR4
  doi: 10.1007/978-3-031-33386-6_10
– ident: 1133_CR36
  doi: 10.1007/978-3-030-78375-4_17.
– ident: 1133_CR12
  doi: 10.48550/arXiv.2401.17538.
– ident: 1133_CR17
  doi: 10.1145/3450268.3453528.
– volume: 7
  start-page: 6457
  issue: 7
  year: 2020
  ident: 1133_CR13
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2958788
– ident: 1133_CR46
– ident: 1133_CR29
– ident: 1133_CR42
– volume: 14
  start-page: 63
  year: 2025
  ident: 1133_CR22
  publication-title: Robotics
  doi: 10.3390/robotics14050063
– ident: 1133_CR21
– ident: 1133_CR56
– ident: 1133_CR2
– ident: 1133_CR39
– volume: 2
  start-page: 71
  issue: 1
  year: 2021
  ident: 1133_CR24
  publication-title: IoT
  doi: 10.3390/iot2010005
– volume: 71
  start-page: 2163
  issue: 9
  year: 2021
  ident: 1133_CR50
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2021.3122997
– ident: 1133_CR14
– ident: 1133_CR10
– volume: 28
  start-page: 93
  year: 2025
  ident: 1133_CR31
  publication-title: Cluster Computing
  doi: 10.1007/s10586-024-04799-4
– ident: 1133_CR26
– volume: 25
  start-page: 1729
  year: 2022
  ident: 1133_CR19
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-021-03380-7
– ident: 1133_CR49
– volume: 23
  start-page: 1
  issue: 2
  year: 2024
  ident: 1133_CR51
  publication-title: ACM Transactions on Embedded Computing Systems
  doi: 10.1145/3603170
– ident: 1133_CR35
  doi: 10.1145/3320269.3384725.
– ident: 1133_CR41
– volume: 8
  start-page: 21
  issue: 2
  year: 2024
  ident: 1133_CR45
  publication-title: Cryptography.
  doi: 10.3390/cryptography8020021
– volume: 23
  start-page: 1
  issue: 2
  year: 2024
  ident: 1133_CR54
  publication-title: ACM transactions on embedded computing systems
  doi: 10.1145/3587037
– year: 2024
  ident: 1133_CR34
  publication-title: Transition to Post-Quantum Cryptography Standards.
  doi: 10.6028/nist.ir.8547.ipd
– ident: 1133_CR59
– ident: 1133_CR3
– ident: 1133_CR55
– ident: 1133_CR6
  doi: 10.6028/NIST.FIPS.205
– ident: 1133_CR37
  doi: 10.1109/ICICCS53718.2022.9787987
– ident: 1133_CR32
– ident: 1133_CR23
– ident: 1133_CR9
– ident: 1133_CR5
  doi: 10.6028/nist.fips.204
– ident: 1133_CR53
  doi: 10.1109/dac18074.2021.9586131
– ident: 1133_CR44
– ident: 1133_CR7
  doi: 10.6028/NIST.FIPS.203
– ident: 1133_CR18
  doi: 10.1145/3498361.3538766
– ident: 1133_CR27
– ident: 1133_CR40
– volume: 18
  year: 2022
  ident: 1133_CR15
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2022.100508
– volume: 27
  year: 2024
  ident: 1133_CR52
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2024.101331
– volume: 56
  start-page: 1
  issue: 6
  year: 2009
  ident: 1133_CR25
  publication-title: Journal of the ACM (JACM)
  doi: 10.1145/1568318.1568324
– ident: 1133_CR58
– ident: 1133_CR16
– ident: 1133_CR8
– volume: 30
  start-page: 623
  issue: 4
  year: 2022
  ident: 1133_CR38
  publication-title: J. Comput. Secur.
  doi: 10.3233/JCS-210037
– volume: 7
  start-page: eabm6074
  issue: 66
  year: 2022
  ident: 1133_CR48
  publication-title: Science robotics
  doi: 10.1126/scirobotics.abm6074
SSID ssj0021091
Score 2.373187
Snippet The global race for quantum computers has sparked significant interest in the integration of quantum-secure cryptographic algorithms into traditional...
SourceID proquest
crossref
SourceType Aggregation Database
Index Database
StartPage 219
SubjectTerms Access control
Algorithms
Communication
Computer systems
Confidentiality
Constraints
Cryptography
Cybersecurity
Digital signatures
Energy consumption
Internet of Things
Medical equipment
Middleware
Performance evaluation
Protocol
Quantum computers
Quantum computing
Quantum cryptography
Robotics
Robots
Safety critical
Title Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems
URI https://www.proquest.com/docview/3255925353
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1615-5270
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021091
  issn: 1615-5262
  databaseCode: AFBBN
  dateStart: 20010801
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1615-5270
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021091
  issn: 1615-5262
  databaseCode: AGYKE
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1615-5270
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0021091
  issn: 1615-5262
  databaseCode: U2A
  dateStart: 20010825
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLZK98ILd8RgID8gBIoypXacJo8drCqXFdBWaW_BcWxRpCVpm2paf8R-Mz6J4yQMIeAlqlypUc_5dG4-5zsIvYwkSxI_ki5NKXV9Tj03lF7oqpEvgsBT_rgaHzuZB7OF_-GcnQ8G152upW2ZHIrdb-dK_ker-kzrFaZk_0Gz9kf1gf6s9aufWsP6-Vc6Ps6-A10GNNB9PnUIRIvrPMlLJy-AK7kqFVRMzQ6B7H9jdtWZvnRTRFjudMxZ5JvSXW21mLcXjlhfFWW-6XCZ_2j73dvyYY90wg5B2rfY2g1Xad3FvbjgS9sL_JVrb1rXpDPrGuZ8Vx-eHOrz1TLpFiUIs-1t_aIkdFzDPYgdmqlsrA6idP5rjLDsntU7RBrDXA9XGwCym1b2hvX3mmloAvVXAl2JOgV3L1tf19zvzyan8Zd30_jT-_nHV8XKhS1kcFtvVrLcQntEewlviPYm06OjuU3hgUYVUvjmL5gxLDOM-ctr-6FO39NX4cvZPXTH5B14UoPoPhrI7AG62-z0wMbEP0TfLKawxhQm-HWFKGwRhWtcYPIGN5rGgCfcxRPu4gn38PQILabHZ29nrtnC4QpCwtIdh9FIjigJFUkjoIdkkidJ6kchVZTCNgWZCOpF0htLP-RsxEkoRegzptRYBIw-RsMsz-QThJlKBdDQCg6lRzUKA19RLhQnKY8EZfvIaQQWFzXZStzSaoN4Yy3euBJvfLmPDhqZxgbxm5hCikwYZfTpn79-hm63wD1Aw3K9lc91fFkmL4zSfwIo-H5w
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+ROS+2+%28robot+operating+system+2%29+security+with+standardized+post-quantum+cryptosystems&rft.jtitle=International+journal+of+information+security&rft.au=Safdar%2C+Umair&rft.au=Qadir%2C+Sana&rft.au=Nazir%2C+M.+Saqib&rft.date=2025-10-01&rft.pub=Springer+Nature+B.V&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=24&rft.issue=5&rft.spage=219&rft_id=info:doi/10.1007%2Fs10207-025-01133-w&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon