Optimizing packet size in post-quantum NB-IoT systems: Signature aggregation and Merkle tree pruning approaches
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/23150Keywords:
Post-quantum digital signatures, signature aggregation, Merkle tree pruning, packet size optimization, NB-IoT security, ChaCha20-Poly1305, offloading verification, selective signing policy, lightweight IoT security, hybrid authentication mechanisms.Abstract
With the increasing adoption of post-quantum cryptographic schemes such as SPHINCS+ in Narrowband IoT (NB-IoT) systems, a major challenge arises from large packet size overhead - often reaching approximate 34 KB per transmission due to stateless hash-based signature metadata. This paper investigates practical techniques for reducing this overhead while maintaining quantum resilience, including signature aggregation across multiple devices, Merkle tree pruning within SPHINCS+, and selective signing policies based on session frequency. We implement these strategies on an ESP32-WROOM-32 microcontroller interfaced with a SIM7080 NB-IoT module, demonstrating that packet size can be reduced by up to 60% through intelligent session management and optimized scheduling. Our results provide actionable insights for system architects aiming to deploy post-quantum security within strict bandwidth constraints typical of LPWAN environments.
Downloads
Published
How to Cite
Issue
Section
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.

