A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography

dc.contributor.authorГетьман, І. А.
dc.contributor.authorLaktionov, I.
dc.contributor.authorDiachenko, G.
dc.contributor.authorMoroz, D.
dc.contributor.authorGetman, I. A.
dc.date.accessioned2026-02-11T10:27:33Z
dc.date.issued2025
dc.description.abstractThe dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article addresses a relevant scientific and applied issue, which is to formulate prospective directions for improving the effectiveness of cybersecurity approaches for infocommunication networks through a comparative analysis and logical synthesis of the state-of-the-art of applied research on cyber threats to the information security of mobile and satellite networks, including those related to the rapid development of quantum computing technologies. The article presents results on the systematisation of cyberattacks at the physical, signalling and cryptographic levels, as well as threats to cryptographic protocols and authentication systems. Particular attention is given to the prospects for implementing post-quantum cryptography, hybrid cryptographic models and the integration of threat detection mechanisms based on machine learning and artificial intelligence algorithms. The article proposes a classification of current threats according to architectural levels, analyses typical protocol vulnerabilities in next-generation mobile networks and satellite communications, and identifies key research gaps in existing cybersecurity approaches. Based on a critical analysis of scientific and applied literature, this article identifies key areas for future research. These include developing lightweight cryptographic algorithms, standardising post-quantum cryptographic models, creating adaptive cybersecurity frameworks and optimising protection mechanisms for resource-constrained devices within information and digital networks.
dc.identifier.citationLaktionov, I.; Diachenko, G.; Moroz, D.; Getman, I. (2025). A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography, IoT, 6, 61. https://doi.org/10.3390/iot6040061
dc.identifier.citation Laktionov I., Diachenko G., Moroz D., Getman I. A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography. IoT. 2025. Volume 6, Issue 4. № 61. DIO: https://doi.org/10.3390/iot6040061
dc.identifier.issn2624-831X
dc.identifier.orcidhttps://doi.org/10.3390/ iot6040061
dc.identifier.urihttps://dspace.mipolytech.education/handle/mip/3359
dc.language.isoen
dc.publisherMDPI
dc.subjectinfocommunication
dc.subjectmobile networks
dc.subjectsatellite communications
dc.subjectpost-quantum cryptography
dc.subjectcybersecurity
dc.subjecthybrid cryptographic algorithms
dc.titleA Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography
dc.typeArticle

Файли

Контейнер файлів

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography.pdf
Розмір:
1.79 MB
Формат:
Adobe Portable Document Format

Ліцензійна угода

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
license.txt
Розмір:
10.29 KB
Формат:
Item-specific license agreed to upon submission
Опис: