Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-security for Critical Infrastructures

Version 1 : Received: 7 February 2024 / Approved: 8 February 2024 / Online: 8 February 2024 (14:17:14 CET)

A peer-reviewed article of this Preprint also exists.

Szymanski, T.H. A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-Security for Critical Infrastructures. Information 2024, 15, 173. Szymanski, T.H. A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-Security for Critical Infrastructures. Information 2024, 15, 173.

Abstract

The next-generation "Industrial Internet of Things" (IIoT) will support "Machine-to-Machine" (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-security for critical infrastructures. It examines a Quantum-Safe "Software-Defined Deterministic IIoT" (SDD-IIoT), with a new forwarding-plane (sub-layer-3a) for deterministic M2M traffic flows. A "Software-Defined-Networking" (SDN) control-plane controls many "SDD Wide Area Networks" (SDD-WANs), realized with FPGAs. The SDN control-plane provides an "Admission-Control/Access-Control" system for network-bandwidth, using collaborating Artificial Intelligence (AI) rule-based "Zero Trust Architectures" (ZTAs). Hardware-enforced access-control eliminates all congestion, BufferBloat, and DoS/DDoS attacks in the forwarding-plane, reduces buffer-sizes by 100,000+ times, and supports ultra-reliable and uItra-low-latency communications in the SDD-WANs. The SDD-WANs can: (i) Encrypt/Authenticate M2M flows using Quantum-Safe ciphers, to withstand attacks by Quantum Computers; (ii) Implement "Guaranteed Intrusion Detection Systems" in FPGAs, to detect cyber-attacks embedded within billions of IIoT packets/second; (iii) Provide guaranteed immunity to external cyber-attacks against critical infrastructure, and exceptionally-strong immunity to internal cyber-attacks; (iv) Save $US100s of billions annually by exploiting FPGAs; and (v) Enable "Quantum Key Distribution" (QKD) Networks by providing a programmable forwarding-plane with "authenticated classical channels" and full-immunity to DoS/DDoS attacks. Extensive experimental results for an SDD-WAN over the European Union are reported.

Keywords

Cyber-security; Deterministic; Industrial/Tactile Internet of Things (IoT); Industry 4.0; Quantum Computers; Artificial Intelligence (AI); Zero Trust Architecture (ZTA); QKD Networks; Software-Defined-Networking (SDN); FPGAs

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.