Workshops Smart City Pqc For Smart City Iot...
Smart City Full Day Workshop

PQC for Smart City IoT Infrastructure and Sensor Networks

Post-quantum cryptography on a Cortex-M4 with 64 KB RAM is a different problem from PQC on a server. This workshop addresses the specific constraints of city-scale IoT: enlarged key exchanges over LoRaWAN, DTLS 1.3 handshake overhead on NB-IoT, and firmware update authentication for sensors that cannot be physically accessed.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Technical workshop for smart city IoT architects and municipal security teams. Covers PQC migration for constrained sensor networks: ML-KEM key exchange over DTLS 1.3 and CoAP, LoRaWAN and NB-IoT gateway upgrades, FIPS 203/204/205 algorithm selection for Cortex-M4 microcontrollers, and phased rollout strategies aligned with ETSI EN 303 645.

Smart city sensor networks present a PQC migration challenge that enterprise IT does not. Traffic sensors, smart meters, and environmental monitors run on Class 1 and Class 2 constrained devices (RFC 7228) with limited RAM, intermittent connectivity, and battery power budgets measured in years. ML-KEM-768 ciphertexts are roughly 1,088 bytes, which is manageable for a server but significant when multiplied across thousands of LoRaWAN uplinks per hour through a single gateway. The DTLS 1.3 handshake with ML-KEM adds round trips that can exceed NB-IoT uplink windows. SLH-DSA signatures for firmware authentication are 7,856 bytes at the 128-bit security level, requiring fragmented delivery to devices with 64 KB RAM. This workshop works through these constraints with real measurements on Cortex-M4 hardware, maps the ETSI EN 303 645 baseline security requirements to PQC readiness, and builds a phased migration plan that starts at gateways (where compute is less constrained) and sequences endpoint upgrades by data sensitivity and device capability.

What participants cover

  • Protocol-level exposure mapping: DTLS 1.3, CoAP, LoRaWAN 1.1, NB-IoT, MQTT-SN, and LwM2M cryptographic dependencies across city sensor fleets
  • FIPS 203/204/205 on constrained hardware: ML-KEM and ML-DSA performance benchmarks (RAM, cycles, power) on ARM Cortex-M4 and RISC-V platforms
  • LoRaWAN and NB-IoT gateway migration: deploying PQC at network server and base station level before endpoint firmware reaches constrained devices
  • Hybrid key exchange: X25519+ML-KEM in DTLS 1.3 for backward compatibility during phased rollout across mixed-generation sensor networks
  • ETSI EN 303 645 quantum readiness: mapping IoT baseline security compliance to post-quantum requirements for municipal procurement
  • Fleet segmentation and prioritisation: scheduling migration by data sensitivity (ANPR, metering, environmental) and device OTA capability

Preliminary Agenda

Full Day Workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Quantum Threat Landscape for Constrained IoT Why smart city sensor networks face a distinct cryptographic challenge
2 Protocol-Level Cryptographic Exposure Where quantum attacks hit IoT communication stacks
  • DTLS 1.3 and CoAP security: how ML-KEM key exchange affects handshake sizes on constrained Class 1 and Class 2 devices (RFC 7228)
  • LoRaWAN 1.1 and NB-IoT key management: AES-128 root key derivation, join server authentication, and PQC upgrade paths for LPWAN gateways
  • MQTT-SN and LwM2M: TLS/DTLS dependency mapping for smart metering, environmental monitoring, and traffic sensor telemetry channels
Break, after 50 min
3 PQC Algorithm Selection for Resource-Constrained Devices FIPS 203/204/205 performance on microcontrollers and embedded platforms
  • ML-KEM-512 versus ML-KEM-768: ciphertext sizes, decapsulation cycles, and RAM footprint on ARM Cortex-M4 and RISC-V microcontrollers
  • ML-DSA versus SLH-DSA: signature verification latency for firmware update authentication on battery-powered sensors with 64 KB RAM
  • Hybrid key exchange: X25519+ML-KEM in DTLS 1.3 for backward compatibility during phased migration across mixed-generation sensor fleets
4 Interactive Demonstration PQC handshake simulation on constrained IoT hardware
  • Facilitator-led demonstration of ML-KEM key exchange over CoAP/DTLS on a Cortex-M4 development board with power and latency measurement
  • Comparing handshake completion times and packet sizes: classical ECDH versus ML-KEM-512 versus hybrid X25519+ML-KEM on LoRaWAN uplink
  • Identifying the failure threshold: at what sensor density and gateway load do enlarged PQC handshakes cause channel congestion on NB-IoT
Break, after 45 min
5 Migration Planning for City-Scale Sensor Networks Phased rollout across heterogeneous IoT deployments
  • ETSI EN 303 645 baseline security and quantum readiness: mapping current compliance to PQC migration requirements for municipal IoT
  • Fleet segmentation: prioritising migration by data sensitivity (ANPR, smart metering, environmental) and device capability (OTA-upgradable versus replace-only)
  • Gateway-first strategy: deploying PQC at LoRaWAN network servers and NB-IoT base stations before endpoint firmware updates reach constrained devices
6 Q&A and Migration Roadmap Review

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and smart city systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

SM

Smart City Partners

Domain expertise and operational validation

Smart City workshops are co-delivered with sector specialists who bring direct operational experience in smart city organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us