Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to integrate post-quantum cryptography into mobile Industrial Internet of Things (IIoT) environments through this 15-minute conference presentation. Explore the implementation of hybrid TLS that combines ECDHE with the ML-KEM-768 key-encapsulation mechanism, standardized in NIST FIPS 203, using Cisco Packet Tracer models of Mobile Manufacturing Trucks and a centralized Security Operations Center. Discover how trucks deploy sensors, routers, and Quantum Shieldz AX200 modules while the SOC utilizes AX300DS and AXMS100DS systems. Examine the use of Node-RED and MQTT to simulate real-time sensor streams over channels secured by SHA-3 integrity checks and quantum random number generator (QRNG) keys. Analyze test results showing a 1.3× handshake-latency increase with under 300 ms responsiveness and anomaly detection under 1.5 seconds, meeting IEC 62443 standards. Review simulated man-in-the-middle attacks, denial-of-service scenarios, and outages that demonstrate seamless failover and state restoration capabilities. Understand the feasibility of post-quantum cryptography in resource-constrained mobile IIoT environments and the critical need for quantum-safe security strategies, with insights into future developments including AI anomaly prediction, lattice signatures, and hardware attestation.