Research Article

Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks

Volume: 16 Number: 2 March 26, 2026
TR EN

Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks

Abstract

This paper presents a post-quantum–resistant enhancement to the Constrained Join Protocol used in 6TiSCH networks by integrating LightSaber, a lattice-based Key Encapsulation Mechanism (KEM). The proposed approach replaces the PSK-based transport mechanism for distributing the link-layer session key (K2) traditionally used during the device bootstrapping phase with a quantum-resistant alternative, while preserving the existing PSK-based authentication procedure. Specifically, a KEM-established shared secret is combined with a context-bound key derivation process to securely generate the 128-bit K2 required by the IEEE 802.15.4 AES-CCM engine. LightSaber is ported and adapted to the Contiki-NG operating system as a modular cryptographic component and validated on the Mahmote hardware platform, which represents an ARM Cortex-M3 IIoT testbed used in industrial research. The integration is evaluated via Cooja simulations using a 30-node topology that reflects realistic IIoT deployment conditions. Performance metrics, including computational latency and memory usage, are analyzed. The results indicate that while LightSaber introduces notable processing and memory overhead, requiring temporary TSCH slot-duration extension in constrained environments, its adoption provides quantum-resistant distribution of the operational link-layer session key without violating the operational constraints of embedded platforms. These findings highlight both the promise and the practical challenges of implementing post-quantum cryptography in resource-constrained industrial IoT systems.

Keywords

6TiSCH, Post-quantum cryptography, Key distribution, Key encapsulation mechanism, LightSaber

Ethical Statement

The author declares that this study complies with Research and Publication Ethics.

Thanks

The authors extend their sincere gratitude to Mavi Alp Information Technologies for their continued support throughout this work. Their expertise in Industrial IoT hardware design and contributions to protocol development provided valuable insights that greatly facilitated the experimental evaluation of post-quantum mechanisms in constrained 6TiSCH networks. The authors also express their deep appreciation to Assoc. Prof. Sedat GÖRMÜŞ for his guidance, constructive feedback, and invaluable academic support, which significantly strengthened the quality and rigor of this study. The authors further thank Deniz TUNÇ for his technical assistance and valuable contributions during the implementation and testing phases of the LightSaber–CoJP integration.

References

  1. Abdulgadir, A., Mohajerani, K., Dang, V. B., Kaps, J.-P., & Gaj, K. (2021). A lightweight implementation of Saber resistant against side-channel attacks. Progress in Cryptology—INDOCRYPT 2021. https://par.nsf.gov/biblio/10359185
  2. Alfriehat, N., Anbar, M., Aladaileh, M., Hasbullah, I., Shurbaji, T. A., Karuppayah, S., & Almomani, A. (2024). RPL-based attack detection approaches in IoT networks: Review and taxonomy. Artificial Intelligence Review, 57(9), 248. https://doi.org/10.1007/s10462-023-10563-9
  3. Attaran, M. (2023). The impact of 5G on the evolution of intelligent automation and industry digitization. Journal of Ambient Intelligence and Humanized Computing, 14(5), 5977–5993. https://doi.org/10.1007/s12652-022-04244-8
  4. Aydin, H., Aydin, B., & Gormus, S. (2024). Lightweight three-factor sensor and user authentication for RPL-based 6TiSCH networks. IEEE Sensors Journal, 24(17), 28196-28209. https://doi.org/10.1109/JSEN.2024.3430515
  5. Aydin, H., Aydin, B., & Gormus, S. (2025). HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks. Computers and Electrical Engineering, 124, 110362. https://doi.org/10.1016/j.compeleceng.2025.110362
  6. Bandaru, M., Mathe, S. E., & Wattanapanich, C. (2024). Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs. Computers and Electrical Engineering, 120, 109826. https://doi.org/10.1016/j.compeleceng.2024.109826
  7. Beirendonck, M. V., D’Anvers, J.-P., Karmakar, A., Balasch, J., & Verbauwhede, I. (2021). A side-channel-resistant implementation of SABER. Journal of Emerging Technologies in Computing Systems, 17(2), https://doi.org/10.1145/3429983
  8. Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188–194. https://doi.org/10.1038/nature23461
  9. Beullens, W., D’Anvers, J.-P., Hülsing, A. T., Lange, T., Panny, L., de Saint Guilhem, C., & Smart, N. P. (2021). Post-quantum cryptography: Current state and quantum mitigation. ENISA.
  10. Castiglione, A., Esposito, J. G., Loia, V., Nappi, C., Pero, C., & Polsinelli, M. (2024). Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices. IEEE Transactions on Industrial Informatics, 1–10. https://doi.org/10.1109/TII.2024.3485796
APA
Aydın, H. (2026). Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks. Karadeniz Fen Bilimleri Dergisi, 16(2), 527-557. https://doi.org/10.31466/kfbd.1832635
AMA
1.Aydın H. Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks. KFBD. 2026;16(2):527-557. doi:10.31466/kfbd.1832635
Chicago
Aydın, Hakan. 2026. “Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks”. Karadeniz Fen Bilimleri Dergisi 16 (2): 527-57. https://doi.org/10.31466/kfbd.1832635.
EndNote
Aydın H (March 1, 2026) Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks. Karadeniz Fen Bilimleri Dergisi 16 2 527–557.
IEEE
[1]H. Aydın, “Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks”, KFBD, vol. 16, no. 2, pp. 527–557, Mar. 2026, doi: 10.31466/kfbd.1832635.
ISNAD
Aydın, Hakan. “Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks”. Karadeniz Fen Bilimleri Dergisi 16/2 (March 1, 2026): 527-557. https://doi.org/10.31466/kfbd.1832635.
JAMA
1.Aydın H. Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks. KFBD. 2026;16:527–557.
MLA
Aydın, Hakan. “Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks”. Karadeniz Fen Bilimleri Dergisi, vol. 16, no. 2, Mar. 2026, pp. 527-5, doi:10.31466/kfbd.1832635.
Vancouver
1.Hakan Aydın. Integrating LightSaber KEM into CoJP for Quantum-Resistant Key Distribution in 6TiSCH Networks. KFBD. 2026 Mar. 1;16(2):527-5. doi:10.31466/kfbd.1832635