Hybrid quantum computing and deep learning approaches for enhaving wireless communication security

Hybrid quantum computing and deep learning approaches for enhaving wireless communication security

Autores/as

  • Mallu Navya Velammal Institute of Technology Autor/a
  • Binu Allen Infanta J Velammal Institute of Technology Autor/a
  • Athiraja A Saveetha Engineering College Autor/a
  • Keerthana M Velammal Institute of Technology Autor/a

Palabras clave:

Hybrid quantum computing, deep learning, wireless security, quantum key distribution, intrusion detection

Resumen

The rapid expansion of wireless communication networks has introduced significant security challenges, particularly with the rise of sophisticated cyberattacks. Traditional cryptographic methods often struggle to balance security and computational efficiency, necessitating innovative approaches. In this study, we propose a hybrid quantum computing and deep learning framework to enhance wireless communication security. The quantum computing component leverages quantum key distribution (QKD) to establish theoretically unbreakable encryption, while deep learning models—trained on adversarial attack datasets—enhance intrusion detection and anomaly recognition. Experimental results demonstrate that our hybrid approach improves attack detection accuracy to 98.7%, surpassing conventional machine learning models by 5.2%. The quantum-enhanced cryptographic layer reduces key exchange vulnerabilities, leading to a 40% improvement in resistance against man-in-the-middle attacks compared to classical schemes. Our findings underscore the potential of integrating quantum computing with deep learning for robust, scalable, and future-proof wireless security solutions

Descargas

Publicado

2024-06-11

Número

Sección

Articles

Cómo citar

Hybrid quantum computing and deep learning approaches for enhaving wireless communication security: Hybrid quantum computing and deep learning approaches for enhaving wireless communication security. (2024). Frontiers in Science and Technology, 3(1). https://journal.dharapublishers.com/index.php/FST/article/view/17

Artículos más leídos del mismo autor/a

1 2 > >>