IoT & OT Security

PQC for constrained devices — algorithm selection, firmware signing, protocol impacts, and SCADA migration.

Why IoT/OT Is Different

Internet of Things (IoT) and Operational Technology (OT) devices face unique post-quantum migration challenges that don't apply to servers or desktops. These devices operate under severe resource constraints — limited RAM, slow processors, narrow bandwidth — while having deployment lifetimes of 15–30 years.

Memory Constraints

Many IoT devices have 10–256 KB of RAM. PQC algorithms like ML-KEM-768 require ~6 KB of stack RAM just for one key exchange — a significant fraction of a Class 1 device’s total memory.

Bandwidth Limits

NB-IoT offers only 62.5 kbps uplink. A single ML-KEM-768 ciphertext (1,088 bytes) takes ~0.14 seconds to transmit — manageable alone, but a full PQC DTLS handshake could take several seconds.

Long Lifetimes

SCADA systems in power grids run for 20–30 years. Devices deployed today will still be operational when cryptographically relevant quantum computers (CRQCs) arrive. This makes them prime HNDL targets.

Update Difficulty

Many OT devices are air-gapped, physically inaccessible, or lack OTA update capability. Crypto-agility must be designed in from the start — it cannot be retrofitted.

Energy Budget

PQC operations consume significantly more energy than classical crypto. For battery-powered devices with multi-year targets, this overhead must be budgeted — favoring session resumption (PSK) over repeated PQC handshakes.

RFC 7228 Constrained Device Classes
ClassRAMFlashExamples
Class 02 KB25 KBSensor tags, RFID sensors, Asset trackers
Class 110 KB100 KBSmart meters, Environmental sensors, Actuators
Class 250 KB250 KBIndustrial gateways, PLCs, Camera nodes
Class 3+256 KB1024 KBEdge gateways, RTUs, Vehicle ECUs
Lightweight Symmetric Crypto: Ascon

NIST selected as the lightweight authenticated encryption standard (2023), specifically designed for constrained IoT environments. While Ascon addresses symmetric-key AEAD, PQC algorithms address the asymmetric-key challenge — both are needed for comprehensive IoT security.

Algorithm Selection for Constrained Devices

Not all PQC algorithms are suitable for constrained devices. The key trade-off is between security level, resource consumption, and output sizes. fits in ~3 KB of stack RAM, while needs ~180 KB — impossible for Class 0/1 devices.

KEM Algorithms — RAM Requirements
X25519 (classical)0.3 KB
ML-KEM-5123 KB
ML-KEM-7686 KB
ML-KEM-102410 KB
FrodoKEM-640180 KB

FrodoKEM's conservative design (no ring/module structure) comes at a massive RAM cost, making it infeasible for any IoT deployment.

Signature Algorithms — Output Sizes
ECDSA P-256 (classical)64 B sig / 64 B key
LMS (H10/W4)2,512 B sig / 56 B key
XMSS (H10)2,500 B sig / 68 B key
FN-DSA-512690 B sig / 897 B key
ML-DSA-442,420 B sig / 1312 B key
ML-DSA-653,309 B sig / 1952 B key

(FIPS 206, draft) produces the most compact PQC signature (~666 bytes average, 690 max) — ideal for bandwidth-constrained IoT. has the smallest verifier (0.5 KB RAM, 56-byte public key) but requires stateful key management.

Certificate Chain Bloat

A classical ECDSA P-256 certificate chain (root + intermediate + leaf) is roughly 3 KB. A PQC chain using balloons to ~22 KB — a 7x increase. For a Class 1 device with 10 KB of RAM, this chain alone exceeds total memory.

Certificate Chain Size (3-cert chain)
ECDSA P-256~3 KB
RSA-2048~4.5 KB
ML-DSA-44~16 KB
ML-DSA-65~22 KB
ML-DSA-87~25 KB
Merkle Tree Certificates

Replace per-cert PQC signatures with compact Merkle inclusion proofs (~300 bytes vs ~3 KB). Reduces chain overhead by up to 85%. See the Merkle Tree Certificates module.

Other Mitigations

Certificate compression (RFC 8879) saves 25–35%. Session resumption (PSK) eliminates certs on reconnection. Raw public keys (RFC 7250) remove signatures and metadata entirely.

Firmware Signing for IoT

Over-the-air (OTA) firmware updates are a critical attack surface for IoT devices. The signing algorithm must produce compact signatures (to minimize bandwidth), have fast verification (constrained CPUs), and resist quantum attacks for the device's entire operational lifetime.

is the leading choice for firmware signing: 56-byte public key, 2.5 KB signature, and the fastest PQC verifier on constrained MCUs (~4× faster than XMSS on Cortex-M4). Its stateful nature (monotonic counter in TPM) is acceptable for firmware signing servers that sign infrequently. The (RFC 9019) wraps the firmware image with metadata, conditions, and signatures for secure OTA delivery.

CNSA 2.0 Firmware Signing Timeline
2025New firmware/software should prefer LMS/XMSS (CNSA 2.0 algorithms)
2030All NSS firmware must use CNSA 2.0 signatures
2033–35Full quantum-resistant enforcement across NSS

For deep dives on LMS/XMSS state management and secure boot chains, see the Stateful Hash Signatures and Code Signing modules.

Protocol Considerations

IoT devices communicate over constrained protocols with strict payload limits. PQC key exchanges and signatures must fit within these constraints — or fragment across multiple messages, adding latency and failure risk.

ProtocolTransportMax PayloadPQC Feasibility
CoAP + DTLS 1.3UDP1,024 BChallenging
MQTT 5.0 + TLS 1.3TCP65,535 BGood
LoRaWAN 1.1LoRa PHY222 BProblematic
Matter / ThreadUDP/IPv61,280 BChallenging
LwM2M + DTLS 1.2/1.3UDP1,024 BChallenging
BLE MeshBLE384 BProblematic
OPC UATCP65,535 BGood
1.3 Fragmentation Challenge

A classical 1.3 handshake is ~5 KB. With PQC (ML-KEM-768 + ML-DSA-44), this grows to ~22 KB — requiring 15+ DTLS fragments over a 1,280-byte IPv6 minimum MTU. Each fragment is a potential point of failure on lossy wireless networks.

SCADA/ICS Security

and Industrial Control Systems (ICS) manage critical infrastructure — power grids, water treatment, manufacturing. These systems have the longest asset lifecycles (15–30 years) and the highest consequences of compromise.

Purdue Model — PQC Migration Priority
Level 0: Physical Process
LOW

Sensors, actuators, field instruments

|
Level 1: Basic Control
MEDIUM

PLCs, RTUs, IEDs

|
Level 2: Area Supervisory
HIGH

HMIs, SCADA servers, historians

|
Level 3: Site Operations
HIGH

Domain controllers, file servers, engineering workstations

|
Level 3.5: DMZ
CRITICAL

Data diodes, jump servers, patch management, remote access

|
Level 4: Enterprise IT
CRITICAL

ERP, email servers, corporate network

|
Level 5: Enterprise Network
CRITICAL

Cloud services, remote access, VPN gateways

“Internet-facing layers (DMZ, enterprise boundary) must migrate to PQC first — they are the primary target. Air-gapped Level 0–1 devices may rely on gateway-mediated PQC protection.”

Hybrid Approaches on Constrained Hardware

Running both classical and PQC algorithms doubles the resource cost. For Class 2+ devices, native hybrid (e.g., X25519 + ML-KEM-768) is feasible. For Class 0/1 devices, a gateway-mediated approach is more practical.

Gateway-Mediated PQC (Class 0/1)

Constrained devices use classical crypto (ECDSA/X25519) to communicate with a nearby gateway. The gateway terminates classical connections and re-encrypts with PQC for the IT/cloud side. This protects data in transit without modifying field devices.

Native Hybrid (Class 2+)

Devices with 50+ KB RAM can run hybrid key exchanges natively. The KEM shared secret is derived from both classical and PQC components — security holds as long as both algorithms remain unbroken.

Hardware Acceleration

Secure elements (ARM TrustZone-M, Infineon OPTIGA TPM, Microchip ATECC608) can offload PQC operations from the main MCU, enabling PQC on devices that otherwise lack sufficient RAM or processing power. Industry leaders including Samsung and Thales are developing ML-KEM support for embedded secure elements, enabling quantum-safe security for smart cards and constrained IoT devices.

For details on hybrid key exchange and composite signatures, see the Hybrid Cryptography and Crypto Agility modules.

Related Resources

Compare algorithm resource footprints, simulate firmware signing, visualize DTLS handshake overhead, and plan SCADA migration.