Post-Quantum Secure Design Principles for Detection and Mitigation in Critical Infrastructure Information Systems
DOI:
https://doi.org/10.32628/IJSRST2613132Keywords:
Post-quantum security, System resilience, Isolation domains, Fault tolerance, Secure architecture, Distributed executionAbstract
The advent of quantum computing poses a significant threat to the cryptographic foundations that secure critical infrastructure information systems, including energy grids, transportation networks, healthcare systems, and financial services. Conventional public-key cryptographic schemes such as RSA and elliptic curve cryptography are vulnerable to quantum attacks, necessitating a paradigm shift toward post-quantum secure design principles. This review paper examines emerging post-quantum cryptographic frameworks and their role in strengthening detection and mitigation mechanisms within critical infrastructure environments. It systematically analyzes post-quantum algorithms, hybrid cryptographic models, and quantum-resilient authentication schemes, emphasizing their integration into intrusion detection systems, anomaly detection frameworks, and secure communication protocols. Additionally, the paper explores quantum-aware threat models, resilience-oriented system architectures, and adaptive mitigation strategies that enhance system survivability against both classical and quantum-enabled cyber threats. Key challenges including computational overhead, legacy system compatibility, scalability, and regulatory compliance are critically discussed, alongside ongoing standardization efforts and implementation case studies. By synthesizing current research and industry practices, this review provides a comprehensive roadmap for designing, deploying, and managing post-quantum secure detection and mitigation frameworks that ensure the long-term resilience, reliability, and trustworthiness of critical infrastructure information systems in the quantum era.
Downloads
References
Ahmadi-Assalemi, G., Al-Khateeb, H., Epiphaniou, G., & Maple, C. (2020). Cyber resilience and incident response in smart cities: A systematic literature review. Smart Cities, 3(3), 894-927. DOI: https://doi.org/10.3390/smartcities3030046
Aigbogun, M. E., Ali, O. E., Nwobi, C. C., Ijiga, A. C., & Idoko, I. P. (2025). Exploring the role of demographics in shaping omni-channel retailing strategies through customer behavior and preferences. International Journal of Innovative Science and Research Technology (IJISRT), 10(1). https://doi.org/10.5281/zenodo.14730645
Aigbogun, M. E., Ali, O. E., Nwobi, C. C., Ijiga, A. C., & Idoko, I. P. (2025). Exploring the role of demographics in shaping omni-channel retailing strategies through customer behavior and preferences. International Journal of Innovative Science and Research Technology (IJISRT), 10(1). https://doi.org/10.5281/zenodo.14730645
Ajayi, A. A., Igba, E., Soyele, A. D., & Enyejo, J. O. (2024). Quantum cryptography and blockchain-based social media platforms as a dual approach to securing financial transactions in CBDCs and combating misinformation in U.S. elections. International Journal of Innovative Science and Research Technology, 9(10). https://doi.org/10.38124/ijisrt/IJISRT24OCT1697
Ajayi, A. A., Igba, E., Soyele, A. D., & Enyejo, J. O. (2024). Quantum cryptography and blockchain-based social media platforms as a dual approach to securing financial transactions in CBDCs and combating misinformation in U.S. elections. International Journal of Innovative Science and Research Technology, 9(10). https://doi.org/10.38124/ijisrt/IJISRT24OCT1697 DOI: https://doi.org/10.38124/ijisrt/IJISRT24OCT1697
Ajayi-Kaffi, O., Igba, E., Azonuche, T. I., & Ijiga, O. M. (2025). Agile-driven digital transformation frameworks for optimizing cloud-based healthcare supply chain management systems. International Journal of Scientific Research and Modern Technology, 4(5), 138–156. https://doi.org/10.38124/ijsrmt.v4i5.1002 DOI: https://doi.org/10.38124/ijsrmt.v4i5.1002
Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. IEEE Security & Privacy, 18(5), 28–36. https://doi.org/10.1109/MSEC.2020.3012088 DOI: https://doi.org/10.6028/NIST.IR.8240
Alaka, E., Abiodun, K., Jinadu, S. O., Igba, E., & Ezeh, V. N. (2025). Data integrity in decentralized financial systems: A model for auditable, automated reconciliation using blockchain and AI. International Journal of Management and Commerce Innovations, 13(1), 136–158. https://doi.org/10.5281/zenodo.15753099
Ali, S., Nawar, I., Lee, I. H., Sajjad, M., Alotaibi, A., De Albuquerque, V. H. C., & Muhammad, K. (2025). NeuroShield-IoE: A Cognitive, Quantum-Resilient, and Self-Evolving Cybersecurity Framework for the Internet of Energy. IEEE Network. DOI: https://doi.org/10.1109/MNET.2025.3620641
Aluso, L. (2021). Forecasting marketing ROI through cross-platform data integration between HubSpot CRM and Power BI. International Journal of Scientific Research in Science, Engineering and Technology, 8(6), 356–378. https://doi.org/10.32628/IJSRSET214420 DOI: https://doi.org/10.32628/IJSRSET214420
Aluso, L., Enyejo, J. O., Amebleh, J., & Balogun, S. A. (2024). A comparative analysis of SQL-based and cloud-native data warehousing architectures for real-time financial reporting. International Journal of Scientific Research and Modern Technology, 3(12), 78–90. https://doi.org/10.38124/ijsrmt.v3i12.1179 DOI: https://doi.org/10.38124/ijsrmt.v3i12.1179
Amebleh, J., Igba, E., & Ijiga, O. M. (2021). Graph-based fraud detection in open-loop gift cards: Heterogeneous GNNs, streaming feature stores, and near-zero-lag anomaly alerts. International Journal of Scientific Research in Science, Engineering and Technology, 8(6). https://doi.org/10.32628/IJSRSET214418 DOI: https://doi.org/10.32628/IJSRSET214418
Anokwuru, E. A., & Enyejo, J. O. (2025). Predictive modeling for portfolio risk assessment in multi-therapeutic pharmaceutical enterprises. International Journal of Innovative Science and Research Technology (IJISRT), 10(11), 2354–2370. https://doi.org/10.38124/ijisrt/25nov1475 DOI: https://doi.org/10.38124/ijisrt/25nov1475
Anokwuru, E. A., & Igba, E. (2025). AI-driven field enablement systems for oncology commercial strategy: A framework for enhancing decision-making and market execution. International Journal of Scientific Research and Modern Technology, 4(2), 118–135. https://doi.org/10.38124/ijsrmt.v4i2.1011 DOI: https://doi.org/10.38124/ijsrmt.v4i2.1011
Anokwuru, E. A., & Okoh, O. F. (2023). Sustainable product development models in healthcare technology: Quantifying the environmental and operational impact of green design integration. International Journal of Scientific Research in Science and Technology, 10(6), 919–939. https://ijsrst.com/IJSRST2291346
Anokwuru, E. A., Mends, K. Y. O., & Okoh, O. F. (2023). AI-integrated market access strategies in oncology: Using predictive analytics to navigate pricing, reimbursement and competitive landscapes. International Journal of Scientific Research and Modern Technology, 2(12), 49–63. https://doi.org/10.38124/ijsrmt.v2i12.1037 DOI: https://doi.org/10.38124/ijsrmt.v2i12.1037
Aramide, O. O. (2022). Post-Quantum Cryptography (PQC) for Identity Management. Adhyayan: A Journal of Management Sciences, 12(02), 59-67. DOI: https://doi.org/10.21567/adhyayan.v12i2.11
Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., ... & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574, 505–510. https://doi.org/10.1038/s41586-019-1666-5 DOI: https://doi.org/10.1038/s41586-019-1666-5
Atalor, S. I., & Enyejo, J. O. (2025). Integration of extended reality (XR) for oncology pharmacist training in chemotherapeutic compounding and risk mitigation. International Medical Science Research Journal, 5(4). https://doi.org/10.51594/imsrj.v5i4.1931 DOI: https://doi.org/10.51594/imsrj.v5i4.1931
Atalor, S. I., & Omachi, A. (2025). Transformer-based natural language processing models for mining unstructured oncology clinical notes to improve drug matching. International Journal of Scientific Research in Science, Engineering and Technology, 12(2). https://doi.org/10.32628/IJSRSET25122197 DOI: https://doi.org/10.32628/IJSRSET25122197
Baseri, Y., Chouhan, V., & Ghorbani, A. (2024). Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure. arXiv preprint arXiv:2404.10659.
Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12(2), 273-280.
Cardenas, A. A., Amin, S., & Sastry, S. (2021). Research challenges for the security of control systems. IEEE Control Systems Magazine, 41(1), 12–29. https://doi.org/10.1109/MCS.2020.3049284
Cherukupalle, N. S., & Cherukupalle, N. (2025). Quantum-Resilient Cloud Systems: Preemptive Shielding Against Post-Quantum Cryptographic Threats. Journal of Information Systems Engineering and Management, 10(38s), 1234-1246. DOI: https://doi.org/10.52783/jisem.v10i38s.8781
Donkor, F., Okafor, M. N., & Enyejo, J. O. (2025). Investigating nanotechnology-based smart packaging for extending dairy product shelf life and improving food quality assurance. International Journal of Healthcare Sciences: Research Publish Journals, 13(2), 17–34. https://doi.org/10.5281/zenodo.17381311
Fedorov, A. K. (2023). Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together. Frontiers in Quantum Science and Technology, 2, 1164428. DOI: https://doi.org/10.3389/frqst.2023.1164428
Gabla, E. S., Peter-Anyebe, A. C., & Ijiga, O. M. (2025). Assessing machine learning enabled anomaly detection models for real time cyberattack mitigation in optical fiber communication systems. World Journal of Advanced Engineering Technology and Sciences, 17(2), 001–017. https://doi.org/10.30574/wjaets.2025.17.2.1454 DOI: https://doi.org/10.30574/wjaets.2025.17.2.1454
Idika, C. N., & Ijiga, O. M. (2025). Blockchain-based intrusion detection techniques for securing decentralized healthcare information exchange networks. Information Management and Computer Science, 8(2), 25–36. http://doi.org/10.26480/imcs.02.2025.25.36
Idika, C. N., Salami, E. O., Ijiga, O. M., & Enyejo, L. A. (2021). Deep learning driven malware classification for cloud-native microservices in edge computing architectures. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(4). https://doi.org/10.32628/CSEIT182551 DOI: https://doi.org/10.32628/CSEIT182551
Igba, E., Abiodun, K., & Ali, E. O. (2025). Building the backbone of the digital economy and financial innovation through strategic investments in data centers. International Journal of Innovative Science and Research Technology. https://doi.org/10.5281/zenodo.14651210
Igba, E., Olarinoye, H. S., Ezeh, N. V., Sehemba, D. B., Oluhaiyero, Y. S., & Okika, N. (2025). Synthetic data generation using generative AI to combat identity fraud and enhance global financial cybersecurity frameworks. International Journal of Scientific Research and Modern Technology (IJSRMT), 4(2). https://doi.org/10.5281/zenodo.14928919
Igba, E., Olarinoye, H. S., Nwakaego, V. E., Sehemba, D. B., Oluhaiyero, Y. S., & Okika, N. (2025). Synthetic data generation using generative AI to combat identity fraud and enhance global financial cybersecurity frameworks. International Journal of Scientific Research and Modern Technology (IJSRMT), 4(2). https://doi.org/10.5281/zenodo.14928919
Ilesanmi, M. O., Okoh, O. F., & Ijiga, O. M. (2025). Financial risk modeling for hybrid renewable energy portfolios under evolving U.S. regulatory and tax equity structures. International Journal of Innovative Science and Research Technology, 10(10). https://doi.org/10.38124/ijisrt/25oct1443 DOI: https://doi.org/10.38124/ijisrt/25oct1443
Ilesanmi, M. O., Okoh, O. F., Balogun, S. A., & Ijiga, O. M. (2024). Data-driven portfolio optimization for utility-scale solar, wind, and battery energy storage systems (BESS): Integrating performance analytics with investor EBITDA targets. International Journal of Scientific Research and Modern Technology, 3(11), 141–155. https://doi.org/10.38124/ijsrmt.v3i11.943 DOI: https://doi.org/10.38124/ijsrmt.v3i11.943
James, U. U. (2022). Machine learning-driven anomaly detection for supply chain integrity in 5G industrial automation systems. International Journal of Scientific Research in Science, Engineering and Technology, 9(2). https://doi.org/10.32628/IJSRSET22549 DOI: https://doi.org/10.32628/IJSRSET22549
Kazadi, J. M., & Jazri, H. (2015, May). Using digital forensic readiness model to increase the forensic readiness of a computer system. In 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 131-137). IEEE. DOI: https://doi.org/10.1109/ETNCC.2015.7184822
Maglaras, L., Kantzavelou, I., & Ferrag, M. A. (2021). Digital transformation and cybersecurity of critical infrastructures. Applied Sciences, 11(18), 8357. DOI: https://doi.org/10.3390/app11188357
Malik, M. I., Ibrahim, A., Hannay, P., & Sikos, L. F. (2023). Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions. Computers, 12(4), 79. DOI: https://doi.org/10.3390/computers12040079
Mosca, M. (2021). Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy, 19(5), 38–41. https://doi.org/10.1109/MSEC.2021.3097275 DOI: https://doi.org/10.1109/MSP.2018.3761723
Neetesh (2021) https://www.researchgate.net/figure/Hybrid-Cryptography-Overview_fig2_353858211
Ocharo, D. O., & Omachi, A. (2022). Optimization of microgrid-controlled chiller plants for data center cooling in the Northeastern United States. International Journal of Scientific Research in Science and Technology (IJSRST), 9(3), 865–880. https://doi.org/10.32628/IJSRST229345 DOI: https://doi.org/10.32628/IJSRST229345
Ocharo, D. O., Omachi, A., Aikins, S. A., & Adaudu, I. I. (2024). SCADA-enabled predictive maintenance framework for cogeneration systems in American manufacturing facilities. International Journal of Scientific Research and Modern Technology, 3(7), 30–44. https://doi.org/10.38124/ijsrmt.v3i7.947 DOI: https://doi.org/10.38124/ijsrmt.v3i7.947
Okpanachi, A. T., Adeniyi, M., Igba, E., & Dzakpasu, N. H. (2025). Enhancing blood supply chain management with blockchain technology to improve diagnostic precision and strengthen health information security. International Journal of Innovative Science and Research Technology, 10(4). https://doi.org/10.38124/ijisrt/25apr214 DOI: https://doi.org/10.38124/ijisrt/25apr214
Onwuzurike, M. A., & Kpogli, S. A. (2025). Predictive modeling of student engagement and behavioral outcomes using machine learning techniques in technology-enhanced classrooms. International Journal of Scientific Research in Humanities and Social Sciences, 2(6), 58–79. https://doi.org/10.32628/IJSRHSS2525135 DOI: https://doi.org/10.32628/IJSRHSS2525135
Onyekaonwu, C. B., Igba, E., & Peter-Anyebe, A. C. (2024). Agentic AI for regulatory intelligence: Designing scalable compliance lifecycle systems in multinational tech enterprises. International Journal of Scientific Research and Modern Technology, 3(12), 205–222. https://doi.org/10.38124/ijsrmt.v3i12.934 DOI: https://doi.org/10.38124/ijsrmt.v3i12.934
Oyekan, M., Igba, E., & Jinadu, S. O. (2024). Building resilient renewable infrastructure in an era of climate and market volatility. International Journal of Scientific Research in Humanities and Social Sciences, 1(1). https://doi.org/10.32628/IJSRSSH243563 DOI: https://doi.org/10.32628/IJSRSSH243563
Saeed, M. M. (2025). An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption. IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2025.3576506
Singh, M., Sood, S. K., & Bhatia, M. (2025). Post-quantum cryptography: a review on cryptographic solutions for the era of quantum computing. Archives of Computational Methods in Engineering, 1-42. DOI: https://doi.org/10.1007/s11831-025-10412-7
Sommer, R., & Paxson, V. (2021). Enhancing intrusion detection systems for emerging cyber threats in critical infrastructures. ACM Computing Surveys, 54(4), 1–36. https://doi.org/10.1145/3458723 DOI: https://doi.org/10.1145/3458723
Ussher-Eke, D., Igba, E. O., Ijiga, O. M., & Enyejo, J. O. (2025). Improving employee engagement and safety through the use of IoT-enabled monitoring tools in human resource practices. Journal of Technology & Innovation, 5(2), 48–55. http://doi.org/10.26480/jtin.02.2025.48.55 DOI: https://doi.org/10.26480/jtin.02.2025.53.60
Uwabor, H. S., Igba, E., & Ijiga, O. M. (2025). AI-powered predictive frameworks for risk modeling and regulatory compliance in decentralized finance investment systems. International Journal of Scientific Research and Modern Technology, 4(11), 95–112. https://doi.org/10.38124/ijsrmt.v4i11.1028 DOI: https://doi.org/10.38124/ijsrmt.v4i11.1028
Uzoma, E., Ijiga, O. M., Terver, S., & Peverga, J. (2025). Blockchain-enabled nanocatalyst monitoring system for real-time dye degradation in industrial wastewater. American Journal of Innovation in Science and Engineering, 4(3), 78–94. https://doi.org/10.54536/ajise.v4i3.5836 DOI: https://doi.org/10.54536/ajise.v4i3.5836
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0