A Comprehensive Review of Post-Quantum Cryptography Protocols for Secure Communications in Heterogeneous Network Environments
Volume 2, Issue 2, Article Number: 252006 (2025)
Home >> Radius >> Volume 2, Issue 2
Manju Singh1,* | Fakhrun Jamal1
1Shobhit Institute of Engineering & Technology, Meerut – 250110, Uttar Pradesh (India)
*Corresponding Author: manju9761@gmail.com
Received: 04 November 2024 | Revised: 20 November 2025
Accepted: 21 November 2025 | Published Online: 02 December 2025
DOI: https://doi.org/10.5281/zenodo.17664126
© 2025 The Authors, under a Creative Commons license, Published by Scholarly Publication
Abstract
The advent of quantum computing has precipitated an estimated attack resistant cryptography system necessitating quantum attacks. The classical asymmetric algorithms, i.e., RSA and ECC are susceptible to Shor algorithm and a transition should be made to Post-Quantum Cryptography (PQC) anymore. The novelty of this work lies in providing a unified comparative framework that analyzes PQC families through security assumptions, concrete key/ciphertext sizes, and implementation complexity an aspect not addressed collectively in prior surveys. This survey gives a general picture of the status of the design process and general evaluation of PQC accounting its application within the paradigm of the diversified networks including the IoT and 5G/6G and in the cyber-physical environment. Furthermore, this review uniquely synthesizes practical hybrid deployment strategies, including protocol layering, coexistence models, and backward compatibility mechanisms, offering actionable guidance for real world migration. Additionally, the manuscript contributes a prioritized list of open problems across IoT, 5G/6G, blockchain, and cyber physical systems, highlighting domains facing the most urgent quantum resilience challenges. In this paper, the authors will evaluate the most popular PQC schemes, including schemes based on lattice, code, hash, and isogeny, depending on their performance, scalability, and interoperability (with reference to the recent research). It also examines the problems of integration as implemented with respect to the computational overhead, latency and adoption of hybrid with classical cryptography. This is expounded more to the standardization of PQC by NISTs and with a focus on such algorithms as CRYSTALS-Kyber and Dilithium. The findings suggest that, hybrid PQC protocols are able to control quantum resistance and actual performance in numerous infrastructures in computing systems.
Keywords
Post-Quantum Cryptography, Quantum-Resilient Security, 6G Networks, IoT Security, Lattice-Based Encryption
References
- Abbasi, M., Cardoso, F., Váz, P., Silva, J., & Martins, P. (2025). A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. Cryptography, 9, 32.
[View Article] [Google Scholar]
- Abbood, A. A., AL-Shammri, F. K., Alzamili, Z. M., Al-Shareeda, M. A., Almaiah, M. A., & AlAli, R. (2025). Investigating quantum-resilient security mechanisms for flying ad-hoc networks (fanets). Journal of Robotics and Control (JRC), 6, 456-469.
[View Article] [Google Scholar]
- Abdallah, W. (2024). A physical layer security scheme for 6G wireless networks using post-quantum cryptography. Computer Communications, 218, 176-187.
[View Article] [Google Scholar]
- Ahmad, T., Hadi, M. U., Vassiliou, V., Nigar, N., Jhaveri, R. H., Abaker, M., & Gadekallu, T. R. (2025). Post-Quantum Weighted Anonymous Authentication for Hybrid VANET MAC Protocol. IEEE Transactions on Intelligent Transportation Systems. 1-13.
[View Article] [Google Scholar]
- Akkal, M., Cherbal, S., Annane, B., Lakhlef, H., & Kharoubi, K. (2025). Quantum, post-quantum, and blockchain approaches for securing the internet of medical things: a systematic review. Cluster Computing, 28, 655.
[View Article] [Google Scholar]
- Al-Samhouri, M., Novas Castellano, N., Abur-rous, M., & Gázquez Parra, J. A. (2024). Post-Quantum Cryptography for Wireless Sensor Network Using Key Agreement Super Singular on Hyperelliptic Curve. In Key Issues in Network Protocols and Security.
[View Article] [Google Scholar]
- Aramide, O. O. (2022). Post-Quantum Cryptography (PQC) for Identity Management. Adhyayan: A Journal of Management Sciences, 12, 59-67.
[View Article] [Google Scholar]
- Bedi, P., Das, S., Goyal, S. B., Rajawat, A. S., & Islam, S. M. (2025). Cybersecurity in the Quantum Era: Advancements and Challenges in Quantum Cryptography and Post-Quantum Solutions. In Quantum Computing, Cyber Security and Cryptography: Issues, Technologies, Algorithms, Programming and Strategies, 239-266. Springer Nature, Singapore.
[View Article] [Google Scholar]
- Biswas, S., Goswami, R. S., & Reddy, K. H. K. (2024). Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities. Cluster Computing, 27, 9395-9414.
[View Article] [Google Scholar]
- Cherbal, S., Zier, A., Hebal, S., Louail, L., & Annane, B. (2024). Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. The Journal of Supercomputing, 80, 3738-3816.
[View Article] [Google Scholar]
- Choudhury, B., Hota, A., Karmakar, M., Saha, S., Nag, A., & Nandi, S. (2025). A comprehensive survey on pre vs post Quantum security schemes for 5G-enabled IoT Applications. IEEE Access, 13, 159305-159333.
[View Article] [Google Scholar]
- del Moral, J. O., deMartiiOlius, A., Vidal, G., Crespo, P. M., & Martinez, J. E. (2024). Cybersecurity in critical infrastructures: A post-quantum cryptography perspective. IEEE Internet of Things Journal, 11, 30217-30244.
[View Article] [Google Scholar]
- Eren, H., Karaduman, Ö., & Gençoğlu, M. T. (2025). Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions. Applied Sciences, 15, 8704.
[View Article] [Google Scholar]
- Fathalla, E., & Azab, M. (2024). Beyond classical cryptography: A systematic review of post-quantum hash-based signature schemes, security, and optimizations. IEEE Access, 12, 175969-175987.
[View Article] [Google Scholar]
- Goyal, R., Pawar, A., Ravikumar, R., & Bitragunta, S. (2024). A novel hybrid communication policy using network coding based post-quantum cryptography and adaptive neuro fuzzy inference system. Wireless Personal Communications, 1-27.
[View Article] [Google Scholar]
- Hakeem, S. A. A., & Kim, H. (2025). PQ-V2X: A Novel Post-Quantum Cryptographic Dataset for Secure Vehicular Communications. IEEE Internet of Things Journal. 1-1.
[View Article] [Google Scholar]
- Hayouni, H. (2025). Adaptive post-quantum security framework for wireless sensor networks using lightweight cryptography and context-aware key management. The Journal of Supercomputing, 81, 1426.
[View Article] [Google Scholar]
- Imran, M., Altamimi, A. B., Khan, W., Hussain, S., & Alsaffar, M. (2024). Quantum cryptography for future networks security: A systematic review. IEEE Access, 12, 180048-180078.
[View Article] [Google Scholar]
- Irshad, R. R., Hussain, S., Hussain, I., Nasir, J. A., Zeb, A., Alalayah, K. M., … & Alwayle, I. M. (2023). IoT-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain-based approach toward a trustworthy cloud computing. IEEE Access, 11, 105479-105498.
[View Article] [Google Scholar]
- Jain, K., & Singh, A. (2025). IHKEM: A Post-Quantum Ready Hierarchical Key Establishment and Management Scheme for Wireless Sensor Networks. Microprocessors and Microsystems, 105205.
[View Article] [Google Scholar]
- Joarder, Y. A., & Fung, C. (2024). Exploring quic security and privacy: A comprehensive survey on quic security and privacy vulnerabilities, threats, attacks and future research directions. IEEE Transactions on Network and Service Management, 21, 6953-6973.
[View Article] [Google Scholar]
- Kamil, B. M. (2025). Advanced 6G Network Protection Using Quantum Key Distribution: A Systematic Review. Babylonian Journal of Networking, 2025, 80-96.
[View Article] [Google Scholar]
- Kamil, B. M. (2025). Enhancing 6G Network Security with Quantum Key Distribution: A Comprehensive Review. Al-Esraa University College Journal for Engineering Sciences, 7, 28-49.
[View Article] [Google Scholar]
- Karakaya, A., & Ulu, A. (2024). A survey on post‐quantum based approaches for edge computing security. Wiley Interdisciplinary Reviews: Computational Statistics, 16, e1644.
[View Article] [Google Scholar]
- Khalid, H., Hashim, S. J., Hashim, F., Al-Jawher, W. A. M., Chaudhary, M. A., & Altarturi, H. H. (2024). Raven: Robust anonymous vehicular end-to-end encryption and efficient mutual authentication for post-quantum intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 25, 17574-17586.
[View Article] [Google Scholar]
- Khan, M. A., Javaid, S., Mohsan, S. A. H., Tanveer, M., & Ullah, I. (2024). Future-proofing security for UAVs with post-quantum cryptography: A review. IEEE Open Journal of the Communications Society, 5, 6849-6871.
[View Article] [Google Scholar]
- Khan, M. N. (2024). Lightweight and post-quantum safe security solutions for IoT systems, Doctoral dissertation, RMIT University.
[View Article] [Google Scholar]
- Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey. Software: Practice and Experience, 52, 2047-2076.
[View Article] [Google Scholar]
- Lohmiller, N., Kaniewski, S., Menth, M., & Heer, T. (2025). A Survey of Post-Quantum Cryptography Migration in Vehicles. IEEE Access, 13, 10160-1017.
[View Article] [Google Scholar]
- Mahmud, I., & Abdelhadi, A. (2025). Artificial intelligence in quantum communications: a comprehensive Survey. IEEE Access, 13, 121174-121205.
[View Article] [Google Scholar]
- Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R.,…& Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9, 36038-36077.
[View Article] [Google Scholar]
- Mansoor, K., Afzal, M., Iqbal, W., & Abbas, Y. (2025). Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. Cluster Computing, 28, 93.
[View Article] [Google Scholar]
- Mehic, M., Michalek, L., Dervisevic, E., Burdiak, P., Plakalovic, M., Rozhon, J., … & Voznak, M. (2023). Quantum cryptography in 5g networks: A comprehensive overview. IEEE Communications Surveys & Tutorials, 26, 302-346.
[View Article] [Google Scholar]
- Mohammed, B. A., Al-Shareeda, M. A., Homod, R. Z., Alkhabra, Y. A., Al-Mekhlafi, Z. G., Alshammari, G., & Alanazi, A. (2025). Taxonomy-Based Lightweight Cryptographic Frameworks for Secure Industrial IoT: A Survey. IEEE Internet of Things Journal, 12, 43296-43316.
[View Article] [Google Scholar]
- Nguyen, H., Huda, S., Nogami, Y., & Nguyen, T. T. (2025). Security in post-quantum era: A comprehensive survey on lattice-based algorithms. IEEE Access, 13, 89003-89024.
[View Article] [Google Scholar]
- Othman, S. B. (2025). Privacy-preserving data aggregation in WBNAs using neuro-evolutionary algorithms and post-quantum homomorphic encryption. Evolutionary Intelligence, 18, 113.
[View Article] [Google Scholar]
- Oudah, A. Y., Alubady, R., & Shaker, L. M. (2025). Recent Trends in Network Technologies: A Comprehensive Review. AUIQ Technical Engineering Science, 2, 5.
[View Article] [Google Scholar]
- Park, J. H., & Kim, M. (2025). Quantum-resilient security for 6G networks: A comprehensive survey on challenges, solutions, and research opportunities. The Journal of Supercomputing, 81, 1086.
[View Article] [Google Scholar]
- Rajesh, K., & Vetrivelan, P. (2025). Comprehensive analysis on 5G and 6G wireless network security and privacy. Telecommunication Systems, 88, 52.
[View Article] [Google Scholar]
- Sabrina, F., Sohail, S., & Tariq, U. U. (2024). A review of post-quantum privacy preservation for IoMT using blockchain. Electronics, 15, 1-18.
[View Article] [Google Scholar]
- Saeed, M. M., Saeed, R. A., Hasan, M. K., Ali, E. S., Mazha, T., Shahzad, T.,…& Hamam, H. (2025). A comprehensive survey on 6G-security: Physical connection and service layers. Discover Internet of Things, 5, 28.
[View Article] [Google Scholar]
- Sarkar, S., Shafaei, S., Jones, T. S., & Totaro, M. W. (2025). Secure Communication in Drone Networks: A Comprehensive Survey of Lightweight Encryption and Key Management Techniques. Drones, 9, 583.
[View Article] [Google Scholar]
- Sedghighadikolaei, K., & Yavuz, A. A. (2025). A Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications. ACM Computing Surveys.
[View Article] [Google Scholar]
- Sharath, H. A., Vrindavanam, J., Dana, S., & Prasad, S. N. (2025). Quantum-Resilient Cryptography: A Survey on Classical and Quantum Algorithms. IEEE Access, 13, 172854-172877.
[View Article] [Google Scholar]
- Sharma, A., & Rani, S. (2025). QCS-6G: A Standards-Aligned Quantum-Resilient Cryptographic Stack for Next-Generation Wireless Networks. IEEE Communications Standards Magazine. 1-7.
[View Article] [Google Scholar]
- Shekhawat, H., & Gupta, D. S. (2024). A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era. Concurrency and Computation: Practice and Experience, 36, e8080.
[View Article] [Google Scholar]
- Singh, J., Singh, P., Kaur, A., & Hedabou, M. (2025). Post-quantum secure fog-edge computing using federated learning with blockchain. The Journal of Supercomputing, 81, 1249.
[View Article] [Google Scholar]
- Singh, M., Sood, S. K., & Bhatia, M. (2025). Post-quantum Cryptography: A Review on Cryptographic Solutions for the Era of Quantum Computing. Archives of Computational Methods in Engineering, 1-42.
[View Article] [Google Scholar]
- Turnip, T. N., Andersen, B., & Vargas-Rosales, C. (2025). Towards 6G Authentication and Key Agreement Protocol: A Survey on Hybrid Post Quantum Cryptography. IEEE Communications Surveys & Tutorials, 1-1.
[View Article] [Google Scholar]
- Vaigandla, K. K. (2025). Quantum-Secure IoT Networks for the 6G Era: Post-Quantum Cryptography, Blockchain Integration, and Trust Architectures-A Comprehensive Review. Journal of Sensors, IoT & Health Sciences (JSIHS, ISSN: 2584-2560), 3, 44-75.
[View Article] [Google Scholar]
- Venkatesan, S., Poonguzhali, M., Ramesh, V., Revathi, S. T., & Karthikeyan, M. (2025). Quantum-Resilient Cryptographic Protocols for Secure Multi-Party Computation in Post-Quantum Networks. Lex localis-Journal of Local Self-Government, 23, 1990-2003.
[View Article] [Google Scholar]
- Wang, Y., & Ismail, E. S. (2025). A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain, IoT. IEEE Access, 13, 112962-112977.
[View Article] [Google Scholar]
- Yang, Z., Alfauri, H., Farkiani, B., Jain, R., Di Pietro, R., & Erbad, A. (2023). A survey and comparison of post-quantum and quantum blockchains. IEEE Communications Surveys & Tutorials, 26, 967-1002.
[View Article] [Google Scholar]
- Yavuz, A. A., Darzi, S., & Nouma, S. E. (2025). LiteQSign: Lightweight and Quantum-Safe Signatures for Heterogeneous IoT Applications. IEEE Access, 13, 171442-171456.
[View Article] [Google Scholar]
- Zafar, A., & Iqbal, S. S. (2025). Integrating code-based post-quantum cryptography into SSL TLS protocols through an interoperable hybrid framework. Discover Computing, 28, 202.
[View Article] [Google Scholar]
- Zeydan, E., Turk, Y., Aksoy, B., & Ozturk, S. B. (2022, February). Recent advances in post-quantum cryptography for networks: A survey. In 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ), 1-8. IEEE.
Cite This Article
M. Singh and F. Jamal, “A Comprehensive Review of Post-Quantum Cryptography Protocols for Secure Communications in Heterogeneous Network Environments,” Radius: Journal of Science and Technology 2(2) (2025) 252006. https://doi.org/10.5281/zenodo.17664126
Rights & Permission
This is an open access article published under the Creative Commons Attribution (CC BY) International License, which allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. No permission is needed to reuse this content under the terms of the license.
For uses not covered above, please contact the Scholarly Publication Rights Department.
