Next-Generation Secure Communication Networks: Leveraging Quantum Cryptography and AI

Authors

  • Gourishetty Raga mounika ssistant Professor,CSE( Data science) Institute: Geethanjali College of Engineering and Technology,District: Ranga reddy City: Hyderabad,State: Telangana Author
  • Dr.A.m.Ravishankkar Designation: professor,Department:cse Institute:jaishriram engineering college , Avinashipalayam District:Tirupur,State:tamilnadu Author
  • M Babu Assistant Professor,Department: Computer Science & Engineering Institute: Rajalakshmi Institute of Technology,District: Chennai City: Chennai,State: Tamilnadu Author
  • shiyam v assistant professor,Department: cse Institute: Koneru Lakshmiaha Education Foundation District: gundur,City: vaddeswaram,State: andha Pradesh Author
  • Dr Phani Kumar Solleti Assistant Professor,Department: Computer Science & Engineering Institute: K L (Deemed to be) University,District: Guntur City: Vaddeswaram,State: Andhra Pradesh Author
  • R. SARAVANAN ASSOCIATE PROFESSOR & HEAD,Department: CORPORATE SECRETARYSHIP Institute: S.I.V.E.T.COLLEGE, GOWRIVAKKAM,District: CHENNAI-73 City:State: TAMILNADU Author

DOI:

https://doi.org/10.48047/mxxmyf44

Keywords:

Quantum Cryptography, Artificial Intelligence, Network Security, Post-Quantum Cryptography, Blockchain Encryption

Abstract

Next generation communication networks require advanced solutions in security to prevent the complex increasing threats in cyber space. This research combines quantum cryptography and artificial intelligence (AI) as a way to make network security stronger by protecting data’s confidentiality, integrity and authentication. Four key algorithms – Quantum Key Distribution (QKD), AI based Intrusion Detection, Blockchain enhanced Encryption and Post Quantum Cryptography are studied in the paper to assess their capability to secure the communication infrastructures. 

Downloads

Download data is not yet available.

References

ABBAS, H.H., KAREEM, M.I.A. and GHENI, H.M., 2023. A survey on security and policy aspects of blockchain technology. Telkomnika, 21(2), pp. 302-313.

ABDEL HAKEEM, S.,A., HUSSEIN, H.H. and KIM, H., 2022. Security Requirements and Challenges of 6G Technologies and Applications. Sensors, 22(5), pp. 1969.

Downloads

Published

2025-02-20

How to Cite

Next-Generation Secure Communication Networks: Leveraging Quantum Cryptography and AI (G. Raga mounika, A. Ravishankkar, M. . Babu, shiyam . v, P. Kumar Solleti, & R. SARAVANAN , Trans.). (2025). Cuestiones De Fisioterapia, 54(4), 1287-1295. https://doi.org/10.48047/mxxmyf44