Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks
Abstract
This paper presents a post-quantum–resistant enhancement to the Constrained Join Protocol used in 6TiSCH networks by integrating LightSaber, a lattice-based Key Encapsulation Mechanism (KEM). The proposed approach replaces the PSK-based transport mechanism for distributing the link-layer session key (K2) traditionally used during the device bootstrapping phase with a quantum-resistant alternative, while preserving the existing PSK-based authentication procedure. Specifically, a KEM-established shared secret is combined with a context-bound key derivation process to securely generate the 128-bit K2 required by the IEEE 802.15.4 AES-CCM engine. LightSaber is ported and adapted to the Contiki-NG operating system as a modular cryptographic component and validated on the Mahmote hardware platform, which represents an ARM Cortex-M3 IIoT testbed used in industrial research. The integration is evaluated via Cooja simulations using a 30-node topology that reflects realistic IIoT deployment conditions. Performance metrics, including computational latency and memory usage, are analyzed. The results indicate that while LightSaber introduces notable processing and memory overhead, requiring temporary TSCH slot-duration extension in constrained environments, its adoption provides quantum-resistant distribution of the operational link-layer session key without violating the operational constraints of embedded platforms. These findings highlight both the promise and the practical challenges of implementing post-quantum cryptography in resource-constrained industrial IoT systems.
Keywords
6TiSCH, Post-quantum cryptography, Key distribution, Key encapsulation mechanism, LightSaber
Ethical Statement
Thanks
References
- Abdulgadir, A., Mohajerani, K., Dang, V. B., Kaps, J.-P., & Gaj, K. (2021). A lightweight implementation of Saber resistant against side-channel attacks. Progress in Cryptology—INDOCRYPT 2021. https://par.nsf.gov/biblio/10359185
- Alfriehat, N., Anbar, M., Aladaileh, M., Hasbullah, I., Shurbaji, T. A., Karuppayah, S., & Almomani, A. (2024). RPL-based attack detection approaches in IoT networks: Review and taxonomy. Artificial Intelligence Review, 57(9), 248. https://doi.org/10.1007/s10462-023-10563-9
- Attaran, M. (2023). The impact of 5G on the evolution of intelligent automation and industry digitization. Journal of Ambient Intelligence and Humanized Computing, 14(5), 5977–5993. https://doi.org/10.1007/s12652-022-04244-8
- Aydin, H., Aydin, B., & Gormus, S. (2024). Lightweight three-factor sensor and user authentication for RPL-based 6TiSCH networks. IEEE Sensors Journal, 24(17), 28196-28209. https://doi.org/10.1109/JSEN.2024.3430515
- Aydin, H., Aydin, B., & Gormus, S. (2025). HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks. Computers and Electrical Engineering, 124, 110362. https://doi.org/10.1016/j.compeleceng.2025.110362
- Bandaru, M., Mathe, S. E., & Wattanapanich, C. (2024). Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs. Computers and Electrical Engineering, 120, 109826. https://doi.org/10.1016/j.compeleceng.2024.109826
- Beirendonck, M. V., D’Anvers, J.-P., Karmakar, A., Balasch, J., & Verbauwhede, I. (2021). A side-channel-resistant implementation of SABER. Journal of Emerging Technologies in Computing Systems, 17(2), https://doi.org/10.1145/3429983
- Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188–194. https://doi.org/10.1038/nature23461
- Beullens, W., D’Anvers, J.-P., Hülsing, A. T., Lange, T., Panny, L., de Saint Guilhem, C., & Smart, N. P. (2021). Post-quantum cryptography: Current state and quantum mitigation. ENISA.
- Castiglione, A., Esposito, J. G., Loia, V., Nappi, C., Pero, C., & Polsinelli, M. (2024). Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices. IEEE Transactions on Industrial Informatics, 1–10. https://doi.org/10.1109/TII.2024.3485796