Post-Quantum Secure Design Principles for Detection and Mitigation in Critical Infrastructure Information Systems

Authors

  • Desire Emeka Department of computer management and Information systems, Southern illinois university, Edwardsville, IL, USA Author
  • Igba Emmauel Department of Human Resource, Secretary to the Commission, National Broadcasting Commission Headquarters, Aso-Villa, Abuja, Nigeria Author
  • Joy Onma Enyejo Department of Business Management, Nasarawa State University Keffi, Nasarawa State, Nigeria Author

DOI:

https://doi.org/10.32628/IJSRST2613132

Keywords:

Post-quantum security, System resilience, Isolation domains, Fault tolerance, Secure architecture, Distributed execution

Abstract

The advent of quantum computing poses a significant threat to the cryptographic foundations that secure critical infrastructure information systems, including energy grids, transportation networks, healthcare systems, and financial services. Conventional public-key cryptographic schemes such as RSA and elliptic curve cryptography are vulnerable to quantum attacks, necessitating a paradigm shift toward post-quantum secure design principles. This review paper examines emerging post-quantum cryptographic frameworks and their role in strengthening detection and mitigation mechanisms within critical infrastructure environments. It systematically analyzes post-quantum algorithms, hybrid cryptographic models, and quantum-resilient authentication schemes, emphasizing their integration into intrusion detection systems, anomaly detection frameworks, and secure communication protocols. Additionally, the paper explores quantum-aware threat models, resilience-oriented system architectures, and adaptive mitigation strategies that enhance system survivability against both classical and quantum-enabled cyber threats. Key challenges including computational overhead, legacy system compatibility, scalability, and regulatory compliance are critically discussed, alongside ongoing standardization efforts and implementation case studies. By synthesizing current research and industry practices, this review provides a comprehensive roadmap for designing, deploying, and managing post-quantum secure detection and mitigation frameworks that ensure the long-term resilience, reliability, and trustworthiness of critical infrastructure information systems in the quantum era.

Downloads

Download data is not yet available.

References

Ahmadi-Assalemi, G., Al-Khateeb, H., Epiphaniou, G., & Maple, C. (2020). Cyber resilience and incident response in smart cities: A systematic literature review. Smart Cities, 3(3), 894-927. DOI: https://doi.org/10.3390/smartcities3030046

Aigbogun, M. E., Ali, O. E., Nwobi, C. C., Ijiga, A. C., & Idoko, I. P. (2025). Exploring the role of demographics in shaping omni-channel retailing strategies through customer behavior and preferences. International Journal of Innovative Science and Research Technology (IJISRT), 10(1). https://doi.org/10.5281/zenodo.14730645

Aigbogun, M. E., Ali, O. E., Nwobi, C. C., Ijiga, A. C., & Idoko, I. P. (2025). Exploring the role of demographics in shaping omni-channel retailing strategies through customer behavior and preferences. International Journal of Innovative Science and Research Technology (IJISRT), 10(1). https://doi.org/10.5281/zenodo.14730645

Ajayi, A. A., Igba, E., Soyele, A. D., & Enyejo, J. O. (2024). Quantum cryptography and blockchain-based social media platforms as a dual approach to securing financial transactions in CBDCs and combating misinformation in U.S. elections. International Journal of Innovative Science and Research Technology, 9(10). https://doi.org/10.38124/ijisrt/IJISRT24OCT1697

Ajayi, A. A., Igba, E., Soyele, A. D., & Enyejo, J. O. (2024). Quantum cryptography and blockchain-based social media platforms as a dual approach to securing financial transactions in CBDCs and combating misinformation in U.S. elections. International Journal of Innovative Science and Research Technology, 9(10). https://doi.org/10.38124/ijisrt/IJISRT24OCT1697 DOI: https://doi.org/10.38124/ijisrt/IJISRT24OCT1697

Ajayi-Kaffi, O., Igba, E., Azonuche, T. I., & Ijiga, O. M. (2025). Agile-driven digital transformation frameworks for optimizing cloud-based healthcare supply chain management systems. International Journal of Scientific Research and Modern Technology, 4(5), 138–156. https://doi.org/10.38124/ijsrmt.v4i5.1002 DOI: https://doi.org/10.38124/ijsrmt.v4i5.1002

Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. IEEE Security & Privacy, 18(5), 28–36. https://doi.org/10.1109/MSEC.2020.3012088 DOI: https://doi.org/10.6028/NIST.IR.8240

Alaka, E., Abiodun, K., Jinadu, S. O., Igba, E., & Ezeh, V. N. (2025). Data integrity in decentralized financial systems: A model for auditable, automated reconciliation using blockchain and AI. International Journal of Management and Commerce Innovations, 13(1), 136–158. https://doi.org/10.5281/zenodo.15753099

Ali, S., Nawar, I., Lee, I. H., Sajjad, M., Alotaibi, A., De Albuquerque, V. H. C., & Muhammad, K. (2025). NeuroShield-IoE: A Cognitive, Quantum-Resilient, and Self-Evolving Cybersecurity Framework for the Internet of Energy. IEEE Network. DOI: https://doi.org/10.1109/MNET.2025.3620641

Aluso, L. (2021). Forecasting marketing ROI through cross-platform data integration between HubSpot CRM and Power BI. International Journal of Scientific Research in Science, Engineering and Technology, 8(6), 356–378. https://doi.org/10.32628/IJSRSET214420 DOI: https://doi.org/10.32628/IJSRSET214420

Aluso, L., Enyejo, J. O., Amebleh, J., & Balogun, S. A. (2024). A comparative analysis of SQL-based and cloud-native data warehousing architectures for real-time financial reporting. International Journal of Scientific Research and Modern Technology, 3(12), 78–90. https://doi.org/10.38124/ijsrmt.v3i12.1179 DOI: https://doi.org/10.38124/ijsrmt.v3i12.1179

Amebleh, J., Igba, E., & Ijiga, O. M. (2021). Graph-based fraud detection in open-loop gift cards: Heterogeneous GNNs, streaming feature stores, and near-zero-lag anomaly alerts. International Journal of Scientific Research in Science, Engineering and Technology, 8(6). https://doi.org/10.32628/IJSRSET214418 DOI: https://doi.org/10.32628/IJSRSET214418

Anokwuru, E. A., & Enyejo, J. O. (2025). Predictive modeling for portfolio risk assessment in multi-therapeutic pharmaceutical enterprises. International Journal of Innovative Science and Research Technology (IJISRT), 10(11), 2354–2370. https://doi.org/10.38124/ijisrt/25nov1475 DOI: https://doi.org/10.38124/ijisrt/25nov1475

Anokwuru, E. A., & Igba, E. (2025). AI-driven field enablement systems for oncology commercial strategy: A framework for enhancing decision-making and market execution. International Journal of Scientific Research and Modern Technology, 4(2), 118–135. https://doi.org/10.38124/ijsrmt.v4i2.1011 DOI: https://doi.org/10.38124/ijsrmt.v4i2.1011

Anokwuru, E. A., & Okoh, O. F. (2023). Sustainable product development models in healthcare technology: Quantifying the environmental and operational impact of green design integration. International Journal of Scientific Research in Science and Technology, 10(6), 919–939. https://ijsrst.com/IJSRST2291346

Anokwuru, E. A., Mends, K. Y. O., & Okoh, O. F. (2023). AI-integrated market access strategies in oncology: Using predictive analytics to navigate pricing, reimbursement and competitive landscapes. International Journal of Scientific Research and Modern Technology, 2(12), 49–63. https://doi.org/10.38124/ijsrmt.v2i12.1037 DOI: https://doi.org/10.38124/ijsrmt.v2i12.1037

Aramide, O. O. (2022). Post-Quantum Cryptography (PQC) for Identity Management. Adhyayan: A Journal of Management Sciences, 12(02), 59-67. DOI: https://doi.org/10.21567/adhyayan.v12i2.11

Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., ... & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574, 505–510. https://doi.org/10.1038/s41586-019-1666-5 DOI: https://doi.org/10.1038/s41586-019-1666-5

Atalor, S. I., & Enyejo, J. O. (2025). Integration of extended reality (XR) for oncology pharmacist training in chemotherapeutic compounding and risk mitigation. International Medical Science Research Journal, 5(4). https://doi.org/10.51594/imsrj.v5i4.1931 DOI: https://doi.org/10.51594/imsrj.v5i4.1931

Atalor, S. I., & Omachi, A. (2025). Transformer-based natural language processing models for mining unstructured oncology clinical notes to improve drug matching. International Journal of Scientific Research in Science, Engineering and Technology, 12(2). https://doi.org/10.32628/IJSRSET25122197 DOI: https://doi.org/10.32628/IJSRSET25122197

Baseri, Y., Chouhan, V., & Ghorbani, A. (2024). Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure. arXiv preprint arXiv:2404.10659.

Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12(2), 273-280.

Cardenas, A. A., Amin, S., & Sastry, S. (2021). Research challenges for the security of control systems. IEEE Control Systems Magazine, 41(1), 12–29. https://doi.org/10.1109/MCS.2020.3049284

Cherukupalle, N. S., & Cherukupalle, N. (2025). Quantum-Resilient Cloud Systems: Preemptive Shielding Against Post-Quantum Cryptographic Threats. Journal of Information Systems Engineering and Management, 10(38s), 1234-1246. DOI: https://doi.org/10.52783/jisem.v10i38s.8781

Donkor, F., Okafor, M. N., & Enyejo, J. O. (2025). Investigating nanotechnology-based smart packaging for extending dairy product shelf life and improving food quality assurance. International Journal of Healthcare Sciences: Research Publish Journals, 13(2), 17–34. https://doi.org/10.5281/zenodo.17381311

Fedorov, A. K. (2023). Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together. Frontiers in Quantum Science and Technology, 2, 1164428. DOI: https://doi.org/10.3389/frqst.2023.1164428

Gabla, E. S., Peter-Anyebe, A. C., & Ijiga, O. M. (2025). Assessing machine learning enabled anomaly detection models for real time cyberattack mitigation in optical fiber communication systems. World Journal of Advanced Engineering Technology and Sciences, 17(2), 001–017. https://doi.org/10.30574/wjaets.2025.17.2.1454 DOI: https://doi.org/10.30574/wjaets.2025.17.2.1454

Idika, C. N., & Ijiga, O. M. (2025). Blockchain-based intrusion detection techniques for securing decentralized healthcare information exchange networks. Information Management and Computer Science, 8(2), 25–36. http://doi.org/10.26480/imcs.02.2025.25.36

Idika, C. N., Salami, E. O., Ijiga, O. M., & Enyejo, L. A. (2021). Deep learning driven malware classification for cloud-native microservices in edge computing architectures. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(4). https://doi.org/10.32628/CSEIT182551 DOI: https://doi.org/10.32628/CSEIT182551

Igba, E., Abiodun, K., & Ali, E. O. (2025). Building the backbone of the digital economy and financial innovation through strategic investments in data centers. International Journal of Innovative Science and Research Technology. https://doi.org/10.5281/zenodo.14651210

Igba, E., Olarinoye, H. S., Ezeh, N. V., Sehemba, D. B., Oluhaiyero, Y. S., & Okika, N. (2025). Synthetic data generation using generative AI to combat identity fraud and enhance global financial cybersecurity frameworks. International Journal of Scientific Research and Modern Technology (IJSRMT), 4(2). https://doi.org/10.5281/zenodo.14928919

Igba, E., Olarinoye, H. S., Nwakaego, V. E., Sehemba, D. B., Oluhaiyero, Y. S., & Okika, N. (2025). Synthetic data generation using generative AI to combat identity fraud and enhance global financial cybersecurity frameworks. International Journal of Scientific Research and Modern Technology (IJSRMT), 4(2). https://doi.org/10.5281/zenodo.14928919

Ilesanmi, M. O., Okoh, O. F., & Ijiga, O. M. (2025). Financial risk modeling for hybrid renewable energy portfolios under evolving U.S. regulatory and tax equity structures. International Journal of Innovative Science and Research Technology, 10(10). https://doi.org/10.38124/ijisrt/25oct1443 DOI: https://doi.org/10.38124/ijisrt/25oct1443

Ilesanmi, M. O., Okoh, O. F., Balogun, S. A., & Ijiga, O. M. (2024). Data-driven portfolio optimization for utility-scale solar, wind, and battery energy storage systems (BESS): Integrating performance analytics with investor EBITDA targets. International Journal of Scientific Research and Modern Technology, 3(11), 141–155. https://doi.org/10.38124/ijsrmt.v3i11.943 DOI: https://doi.org/10.38124/ijsrmt.v3i11.943

James, U. U. (2022). Machine learning-driven anomaly detection for supply chain integrity in 5G industrial automation systems. International Journal of Scientific Research in Science, Engineering and Technology, 9(2). https://doi.org/10.32628/IJSRSET22549 DOI: https://doi.org/10.32628/IJSRSET22549

Kazadi, J. M., & Jazri, H. (2015, May). Using digital forensic readiness model to increase the forensic readiness of a computer system. In 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 131-137). IEEE. DOI: https://doi.org/10.1109/ETNCC.2015.7184822

Maglaras, L., Kantzavelou, I., & Ferrag, M. A. (2021). Digital transformation and cybersecurity of critical infrastructures. Applied Sciences, 11(18), 8357. DOI: https://doi.org/10.3390/app11188357

Malik, M. I., Ibrahim, A., Hannay, P., & Sikos, L. F. (2023). Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions. Computers, 12(4), 79. DOI: https://doi.org/10.3390/computers12040079

Mosca, M. (2021). Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy, 19(5), 38–41. https://doi.org/10.1109/MSEC.2021.3097275 DOI: https://doi.org/10.1109/MSP.2018.3761723

Neetesh (2021) https://www.researchgate.net/figure/Hybrid-Cryptography-Overview_fig2_353858211

Ocharo, D. O., & Omachi, A. (2022). Optimization of microgrid-controlled chiller plants for data center cooling in the Northeastern United States. International Journal of Scientific Research in Science and Technology (IJSRST), 9(3), 865–880. https://doi.org/10.32628/IJSRST229345 DOI: https://doi.org/10.32628/IJSRST229345

Ocharo, D. O., Omachi, A., Aikins, S. A., & Adaudu, I. I. (2024). SCADA-enabled predictive maintenance framework for cogeneration systems in American manufacturing facilities. International Journal of Scientific Research and Modern Technology, 3(7), 30–44. https://doi.org/10.38124/ijsrmt.v3i7.947 DOI: https://doi.org/10.38124/ijsrmt.v3i7.947

Okpanachi, A. T., Adeniyi, M., Igba, E., & Dzakpasu, N. H. (2025). Enhancing blood supply chain management with blockchain technology to improve diagnostic precision and strengthen health information security. International Journal of Innovative Science and Research Technology, 10(4). https://doi.org/10.38124/ijisrt/25apr214 DOI: https://doi.org/10.38124/ijisrt/25apr214

Onwuzurike, M. A., & Kpogli, S. A. (2025). Predictive modeling of student engagement and behavioral outcomes using machine learning techniques in technology-enhanced classrooms. International Journal of Scientific Research in Humanities and Social Sciences, 2(6), 58–79. https://doi.org/10.32628/IJSRHSS2525135 DOI: https://doi.org/10.32628/IJSRHSS2525135

Onyekaonwu, C. B., Igba, E., & Peter-Anyebe, A. C. (2024). Agentic AI for regulatory intelligence: Designing scalable compliance lifecycle systems in multinational tech enterprises. International Journal of Scientific Research and Modern Technology, 3(12), 205–222. https://doi.org/10.38124/ijsrmt.v3i12.934 DOI: https://doi.org/10.38124/ijsrmt.v3i12.934

Oyekan, M., Igba, E., & Jinadu, S. O. (2024). Building resilient renewable infrastructure in an era of climate and market volatility. International Journal of Scientific Research in Humanities and Social Sciences, 1(1). https://doi.org/10.32628/IJSRSSH243563 DOI: https://doi.org/10.32628/IJSRSSH243563

Saeed, M. M. (2025). An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption. IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2025.3576506

Singh, M., Sood, S. K., & Bhatia, M. (2025). Post-quantum cryptography: a review on cryptographic solutions for the era of quantum computing. Archives of Computational Methods in Engineering, 1-42. DOI: https://doi.org/10.1007/s11831-025-10412-7

Sommer, R., & Paxson, V. (2021). Enhancing intrusion detection systems for emerging cyber threats in critical infrastructures. ACM Computing Surveys, 54(4), 1–36. https://doi.org/10.1145/3458723 DOI: https://doi.org/10.1145/3458723

Ussher-Eke, D., Igba, E. O., Ijiga, O. M., & Enyejo, J. O. (2025). Improving employee engagement and safety through the use of IoT-enabled monitoring tools in human resource practices. Journal of Technology & Innovation, 5(2), 48–55. http://doi.org/10.26480/jtin.02.2025.48.55 DOI: https://doi.org/10.26480/jtin.02.2025.53.60

Uwabor, H. S., Igba, E., & Ijiga, O. M. (2025). AI-powered predictive frameworks for risk modeling and regulatory compliance in decentralized finance investment systems. International Journal of Scientific Research and Modern Technology, 4(11), 95–112. https://doi.org/10.38124/ijsrmt.v4i11.1028 DOI: https://doi.org/10.38124/ijsrmt.v4i11.1028

Uzoma, E., Ijiga, O. M., Terver, S., & Peverga, J. (2025). Blockchain-enabled nanocatalyst monitoring system for real-time dye degradation in industrial wastewater. American Journal of Innovation in Science and Engineering, 4(3), 78–94. https://doi.org/10.54536/ajise.v4i3.5836 DOI: https://doi.org/10.54536/ajise.v4i3.5836

Downloads

Published

05-02-2026

Issue

Section

Research Articles

How to Cite

[1]
Desire Emeka, Igba Emmauel, and Joy Onma Enyejo, Trans., “Post-Quantum Secure Design Principles for Detection and Mitigation in Critical Infrastructure Information Systems”, Int J Sci Res Sci & Technol, vol. 13, no. 1, pp. 208–233, Feb. 2026, doi: 10.32628/IJSRST2613132.