Abbasi, M., Cardoso, F., Váz, P., Silva, J., & Martins, P. (2025). A practical performance benchmark of post‑quantum cryptography across heterogeneous computing environments.
Cryptography, 9(2), 32.
https://doi.org/10.3390/cryptography9020032
Alharbi, S., Attiah, A., & Alghazzawi, D. (2022). Integrating blockchain with artificial intelligence to secure IoT networks: Future trends.
Sustainability, 14(23), 16002.
https://doi.org/10.3390/su142316002
Almutairi, M., & Sheldon, F. T. (2025). Resilience of post‑quantum cryptography in lightweight IoT protocols: A systematic review.
Eng, 6(12), 346.
https://doi.org/10.3390/eng6120346
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., ... & Zhao, Y. (2017). Understanding the Mirai botnet.
USENIX Security Symposium (pp. 1092–1110).
https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
Barros, P., & Lopes, S. I. (2026). Roadmapping cybersecurity for IoT-enabled smart environments. Lecture Notes in Networks and Systems (pp. 332–347). 1753 LNNS. https://doi.org/10.1007/978‑3‑032‑12888‑1_29
Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., ... & Smith-Tone, D. (2022). Report on post-quantum cryptography. National Institute of Standards and Technology.
https://doi.org/10.6028/NIST.IR.8105
Cruz‑Piris, L., Marín‑López, A., Álvarez‑Campana, M., Sanz, M., Moreno, J. I., & Arroyo, D. (2025). Measuring the impact of post‑quantum cryptography in Industrial IoT scenarios.
Internet of Things, Article 101793.
https://doi.org/10.1016/j.iot.2025.101793
Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In
2017 IEEE International Conference on Pervasive Computing and Communications Workshops (pp. 618–623).
https://doi.org/10.1109/PERCOMW.2017.7917634
Ehsan, M. A., Alayed, W., Rehman, A. U., Hassan, W. U., & Zeeshan, A. (2025).
Post‑Quantum KEMs for IoT: A study of kyber and NTRU. Symmetry, 17(6), 881.
https://doi.org/10.3390/sym17060881
Hameed, H. A., Swadi Alhamedi, H. J., Abbas, W. F., Alsayednoor, H. M., Al‑Shareeda, M. A., Almaayah, M., & Shehab, R. (2025). PQ‑Lattice: A lattice‑based post‑quantum authentication protocol for decentralized IoT systems.
Informatica, 49(35), 259–272.
https://doi.org/10.31449/inf.v49i35.12156
Khan, I. U., Khan, F. M., Haider, Z. A., & Alturise, F. (2025). Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A comprehensive review of advanced cybersecurity framework.
Interactions,
8, 9.
https://doi.org/10.32604/cmc.2025.070189
Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022).
To secure the communication in powerful Internet of Things using innovative post‑quantum cryptographic method. Arabian Journal for Science and Engineering, 47(2), 2419‑2434.
https://doi.org/10.1007/s13369-021-06166-6
Mahdi, L. H., & Abdullah, A. A. (2025). Fortifying future IoT security: A comprehensive review on lightweight post‑quantum cryptography.
Engineering, Technology & Applied Science Research, 15(2), 21812–21821.
https://doi.org/10.48084/etasr.10141
Pote, P., & Bansode, R. (2025). Performance evaluation of post‑quantum cryptography: A comprehensive framework for experimental analysis. Journal of Information Systems Engineering and Management, 10(9s).
Rassekhnia, J. (2026b). Quantum Encryption Resilience Score (QERS) for MQTT, HTTP, and HTTPS under post‑quantum cryptography in computer, IoT, and IIoT systems.
arXiv.
https://arxiv.org/abs/2601.13423
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.
https://doi.org/10.6028/NIST.SP.800-207
Rubia, J. J., Lincy, R. B., Nithila, E. E., Shibi, C. S., & Rosi, A. (2024).
A survey about post quantum cryptography methods. EAI Endorsed Transactions on Internet of Things,
10, 1‑9.
https://doi.org/10.4108/eetiot.5099
Seedorf, J., Rawal, D., Möwes, J., Abdulaziz, O. H., Alhasan, A., & Santhanavanich, T. (2025). A prototype for evaluating post‑quantum cryptography on resource‑constrained hardware with real‑world smart city sensor data.
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLVIII‑4/W16‑2025, 113–120.
https://doi.org/10.5194/isprs-archives-XLVIII-4-W16-2025-113-2025 (
isprs-archives.copernicus.org)
Senor, J., Portilla, J., & Mujica, G. (2022).
Analysis of the NTRU post‑quantum cryptographic scheme in constrained IoT edge devices. IEEE Internet of Things Journal, 9(19), 18778‑18790.
https://doi.org/10.1109/JIOT.2022.3162254
Seyhan, K., Nguyen, T. N., Akleylek, S., & Cengiz, K. (2022).
Lattice‑based cryptosystems for the security of resource‑constrained IoT devices in post‑quantum world: A survey. Cluster Computing, 25(3), 1729‑1748.
https://doi.org/10.1007/s10586-021-03380-7
Sharma, D., Kumar, R., & Jung, K. H. (2023). A bibliometric analysis of convergence of artificial intelligence and blockchain for edge of things. Journal of Grid Computing, 21(4), 79. https://doi.org/10.1007/s10723-023-09716-4
Siddharth. (2025).
Post‑Quantum cryptographic algorithm performance on IoT devices. International Journal of Advanced Research in Computer Science and Engineering(IJARCSE), 1(2).
https://doi.org/10.63345/ijarcse.v1.i2.304
Singh, T., & Nisha, T. N. (2025, July). Enhancing IoT Security with Zero-Trust Architecture: A model leveraging blockchain and AI capabilities. In
2025 International Conference on Emerging Information Technology and Engineering Solutions (EITES) (pp. 173-179).
https://doi.org/10.1109/EITES66543.2025.00038
Statista. (2023). Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030.
https://www.statista.com
Usama, M., Aziz, A., Alasbali, N., Alturki, N., & Rehman, M. (2026). Blockchain-enabled identity management for IoT: A multi-layered defense against adversarial AI. Scientific Reports, 16, 4371. https://doi.org/10.1038/s41598‑026‑35208‑y
Ye, Z., Song, R., Zhang, H., Chen, D., Cheung, R. C.‑C., & Huang, K. (2024).
A highly‑efficient lattice‑based post‑quantum cryptography processor for IoT applications. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(2), 130‑153.
https://doi.org/10.46586/tches.v2024.i2.130-153
Zakaria, A. A., Amr, T., & Ragheb, A. A. (2025). IoT in smart urban planning: A comprehensive review of applications, developments and engineering perspectives. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3594019