Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = quantum-protected control-based key distribution

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
39 pages, 1642 KB  
Article
A Post-Quantum Secure Architecture for 6G-Enabled Smart Hospitals: A Multi-Layered Cryptographic Framework
by Poojitha Devaraj, Syed Abrar Chaman Basha, Nithesh Nair Panarkuzhiyil Santhosh and Niharika Panda
Future Internet 2026, 18(3), 165; https://doi.org/10.3390/fi18030165 - 20 Mar 2026
Viewed by 408
Abstract
Future 6G-enabled smart hospital infrastructures will support latency-critical medical operations such as robotic surgery, autonomous monitoring, and real-time clinical decision systems, which require communication mechanisms that ensure both ultra-low latency and long-term cryptographic security. Existing security solutions either rely on classical cryptographic protocols [...] Read more.
Future 6G-enabled smart hospital infrastructures will support latency-critical medical operations such as robotic surgery, autonomous monitoring, and real-time clinical decision systems, which require communication mechanisms that ensure both ultra-low latency and long-term cryptographic security. Existing security solutions either rely on classical cryptographic protocols that are vulnerable to quantum attacks or deploy isolated post-quantum primitives without providing a unified framework for secure real-time medical command transmission. This research presents a latency-aware, multi-layered post-quantum security architecture for 6G-enabled smart hospital environments. The proposed framework establishes an end-to-end secure command transmission pipeline that integrates hardware-rooted device authentication, post-quantum key establishment, hybrid payload protection, dynamic access enforcement, and tamper-evident auditing within a coherent system design. In contrast to existing approaches that focus on individual security mechanisms, the architecture introduces a structured integration of Kyber-based key encapsulation and Dilithium digital signatures with hybrid AES-based encryption and legacy-compatible key transport, while Physical Unclonable Function authentication provides hardware-bound device identity verification. Zero Trust access control, metadata-driven anomaly detection, and blockchain-style audit logging provide continuous verification and traceability, while threshold cryptography distributes cryptographic authority to eliminate single points of compromise. The proposed architecture is evaluated using a discrete-event simulation framework representing adversarial conditions in realistic 6G medical communication scenarios, including replay attacks, payload manipulation, and key corruption attempts. Experimental results demonstrate improved security and operational efficiency, achieving a 48% reduction in detection latency, a 68% reduction in false-positive anomaly detection rate, and a 39% improvement in end-to-end round-trip latency compared to conventional RSA-AES-based architectures. These results demonstrate that the proposed framework provides a practical and scalable approach for achieving post-quantum secure and low-latency command transmission in next-generation 6G smart hospital systems. Full article
(This article belongs to the Special Issue Key Enabling Technologies for Beyond 5G Networks—2nd Edition)
Show Figures

Graphical abstract

24 pages, 1160 KB  
Article
Enhancing Data Security in Satellite Communication Systems: Integrating Quantum Cryptography with CatBoost Machine Learning
by Mohd Nadeem, Syed Anas Ansar, Sakshi Halwai, Arpita Singh and Rajeev Kumar
Information 2026, 17(3), 220; https://doi.org/10.3390/info17030220 - 25 Feb 2026
Viewed by 517
Abstract
In modern communication networks, particularly satellite-based systems, data security faces significant challenges from vulnerabilities such as signal interception, jamming, and latency during long distance transmissions. Traditional cryptographic methods are increasingly vulnerable to quantum computing threats, underscoring the need for advanced solutions to protect [...] Read more.
In modern communication networks, particularly satellite-based systems, data security faces significant challenges from vulnerabilities such as signal interception, jamming, and latency during long distance transmissions. Traditional cryptographic methods are increasingly vulnerable to quantum computing threats, underscoring the need for advanced solutions to protect data integrity, confidentiality, and availability. This research investigates the fusion of quantum cryptography and Machine Learning (ML) to improve security in satellite communication. The Quantum Key Distribution (QKD), which is grounded in quantum mechanics, enables unbreakable encryption by detecting eavesdropping via quantum state disturbances. The CatBoost ML algorithm is applied to a dataset of 10,000 records featuring categorical attributes for prioritizing security elements such as anomaly detection, encryption types, and access controls. The model yields an accuracy of 89.23% and Area under Curve the Receiver Operating Characteristic (AUC-ROC) score of 94.56%, effectively predicting threat levels. Feature importance reveals anomaly detection (28.5%) and quantum encryption (22.3%) as primary contributors. While hurdles such as high implementation costs and transmission range limitations persist, this quantum ML synergy provides a proactive, adaptive framework for resilient, future-ready communication networks. Full article
(This article belongs to the Special Issue 2nd Edition of 5G Networks and Wireless Communication Systems)
Show Figures

Figure 1

16 pages, 3297 KB  
Article
In-Field Quantum-Protected Control-Based Key Distribution with a Lossy Urban Fiber Link
by Vladlen Statiev, Abdufattokh Ashurov, Vladimir Semenov, Dmitrii Kozliuk, Vladislav Zemlyanov, Aleksei Kodukhov, Valeria Pastushenko, Valerii Vinokur and Markus Pflitsch
Quantum Rep. 2025, 7(2), 16; https://doi.org/10.3390/quantum7020016 - 28 Mar 2025
Cited by 1 | Viewed by 2277
Abstract
Quantum cryptography protocols offering unconditional protection open great rout to full information security in quantum era. Yet, implementing these protocols using the existing fiber networks remains challenging due to high signal losses reducing the efficiency of these protocols to zero. The recently proposed [...] Read more.
Quantum cryptography protocols offering unconditional protection open great rout to full information security in quantum era. Yet, implementing these protocols using the existing fiber networks remains challenging due to high signal losses reducing the efficiency of these protocols to zero. The recently proposed quantum-protected control-based key distribution (QCKD) addresses this issue by physically controlling interceptable losses and ensuring that leaked quantum states remain non-orthogonal. Here, we present the first in-field development and demonstration of the QCKD over an urban fiber link characterized by substantial losses. Using information-theoretic considerations, we configure the system ensuring security and investigate the interplay between line losses and secret key rates. As an example, we present calculation for the communication distance 4 km, QCKD rate 490 bits per second, and find that the corresponding system’s total loss is about 1.628 decibels. Our results, backed by the statistical analysis of the secret key, confirm QCKD’s robustness under real-world conditions, and establish it as a practical solution for quantum-safe communications over existing fiber infrastructures. Full article
Show Figures

Figure 1

18 pages, 2390 KB  
Article
Loss Control-Based Key Distribution under Quantum Protection
by Nikita Kirsanov, Valeria Pastushenko, Aleksei Kodukhov, Aziz Aliev, Michael Yarovikov, Daniel Strizhak, Ilya Zarubin, Alexander Smirnov, Markus Pflitsch and Valerii Vinokur
Entropy 2024, 26(6), 437; https://doi.org/10.3390/e26060437 - 22 May 2024
Cited by 5 | Viewed by 5843
Abstract
Quantum cryptography revolutionizes secure information transfer, providing defense against both quantum and classical computational attacks. The primary challenge in extending the reach of quantum communication comes from the exponential decay of signals over long distances. We meet this challenge by experimentally realizing the [...] Read more.
Quantum cryptography revolutionizes secure information transfer, providing defense against both quantum and classical computational attacks. The primary challenge in extending the reach of quantum communication comes from the exponential decay of signals over long distances. We meet this challenge by experimentally realizing the Quantum-Protected Control-Based Key Distribution (QCKD) protocol, utilizing physical control over signal losses. By ensuring significant non-orthogonality of the leaked quantum states, this control severely constrains eavesdroppers’ capacities. We demonstrate the performance and scale of our protocol by experiments over a 1707 km long fiber line. The scalability of the QCKD opens the route for globally secure quantum-resistant communication. Full article
(This article belongs to the Special Issue Advanced Technology in Quantum Cryptography)
Show Figures

Figure 1

19 pages, 1642 KB  
Article
A Lightweight Secure Scheme for Underwater Wireless Acoustic Network
by Jia Shi, Jinqiu Wu, Zhiwei Zhao, Xiaofei Qi, Wenbo Zhang, Gang Qiao and Dahong Zuo
J. Mar. Sci. Eng. 2024, 12(5), 831; https://doi.org/10.3390/jmse12050831 - 16 May 2024
Cited by 9 | Viewed by 2812
Abstract
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In [...] Read more.
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In recent years, the advancement of quantum computing has made anti-quantum attacks an important issue in the field of security. Algorithms such as lattice and SPHINCS+ have become a research topic of interest in the field of security. However, within the past five years, few papers have discussed security algorithms for UANs to resist quantum attacks, especially through classical algorithms. Some existing classical asymmetric and symmetric algorithms are considered to have no prospects. From the perspective of easy deployment in engineering and anti-quantum attacks, our research focuses on a comprehensive lightweight security framework for data protection, authentication, and malicious node detection through the Elliptic Curve and Hash algorithms. Our mechanism is suitable for ad hoc scenarios with limited underwater resources. Meanwhile, we have designed a multi-party bit commitment to build a security framework for the system. A management scheme is designed by combining self-certifying with the threshold sharing algorithm. All schemes are designed based on certificate-less and ad hoc features. The proposed scheme ensures that the confidentiality, integrity, and authentication of the system are well considered. Moreover, the scheme is proven to be of unconditional security and immune to channel eavesdropping. The resource and delay issues are also taken into consideration. The simulations considered multiple variables like number of nodes, attackers, and message length to calculate proper values that can increase the efficiency of this scheme. The results in terms of delay, delivery ratio, and consumption demonstrate the suitability of the proposal in terms of security, especially for malicious node detection. Meanwhile, the computational cost has also been controlled at the millisecond level. Full article
(This article belongs to the Special Issue Safety and Reliability of Ship and Ocean Engineering Structures)
Show Figures

Figure 1

24 pages, 1724 KB  
Article
Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams
by Adrien Green, Jeremy Lawrence, George Siopsis, Nicholas A. Peters and Ali Passian
Sensors 2023, 23(24), 9818; https://doi.org/10.3390/s23249818 - 14 Dec 2023
Cited by 13 | Viewed by 5289
Abstract
Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. [...] Read more.
Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility’s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

40 pages, 4527 KB  
Article
Heterogeneous Network Architecture for Integration of AI and Quantum Optics by Means of Multiple-Valued Logic
by Alexey Yu. Bykovsky
Quantum Rep. 2020, 2(1), 126-165; https://doi.org/10.3390/quantum2010010 - 31 Jan 2020
Cited by 13 | Viewed by 5348
Abstract
Quantum optics is regarded as the acknowledged method to provide network quantum keys distribution and in the future secure distributed quantum computing, but it should also provide cryptography protection for mobile robots and the Internet of Things (IoT). This task requires the design [...] Read more.
Quantum optics is regarded as the acknowledged method to provide network quantum keys distribution and in the future secure distributed quantum computing, but it should also provide cryptography protection for mobile robots and the Internet of Things (IoT). This task requires the design of new secret coding schemes, which can be also based on multiple-valued logic (MVL). However, this very specific logic model reveals new possibilities for the hierarchical data clustering of arbitrary data sets. The minimization of multiple-valued logic functions is proposed for the analysis of aggregated objects, which is possible for an arbitrary number of variables. In order to use all the useful properties of the multiple-valued logic, the heterogeneous network architecture is proposed, which includes three allocated levels of artificial intelligence (AI) logic modeling for discrete multiple-valued logic, Boolean logic, and fuzzy logic. Multiple-valued logic is regarded as the possible platform for additional secret coding, data aggregation, and communications, which are provided by the united high dimensional space for network addressing and the targeted control of robotic devices. Models of Boolean and fuzzy logic are regarded as separate logic levels in order to simplify the integration of various algorithms and provide control of additional data protection means for robotic agents. Full article
(This article belongs to the Special Issue Quantum Technologies for Future Internet)
Show Figures

Figure 1

Back to TopTop