IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v13y2025i13p2074-d1685556.html
   My bibliography  Save this article

Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks

Author

Listed:
  • Mohammed Alwakeel

    (Computer Engineering Department, Faculty of Computers and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
    Artificial Intelligence and Sensing Technologies (AIST) Research Center, University of Tabuk, Tabuk 71491, Saudi Arabia)

Abstract

Around the same time that 6G networks will be launched, advances in quantum computing could challenge existing cryptographic security. This study provides a new approach for designing a quantum-safe 6G security architecture powered by neurons. The framework uses connected cognitive agents that apply neuro-symbolic learning to respond quickly to any quantum-based security threats that may appear in network slices. Experiments carried out using simulations across various network setups with different threats verify that the presented method improves the detection rate of quantum attacks by 37.8%, uses 29.2% less communication capacity than other methods in the field. This network includes features that strengthen it to resist quantum decryption, while at the same time keeping replies fast enough for 6G. When using specific quantum-inspired techniques, accomplishing tasks requires only 42.5% fewer false alarms compared to other intrusion methods. With this research, people are now better prepared for quantum-protected wireless networks and 6G systems that ensure stability in the future.

Suggested Citation

  • Mohammed Alwakeel, 2025. "Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks," Mathematics, MDPI, vol. 13(13), pages 1-34, June.
  • Handle: RePEc:gam:jmathe:v:13:y:2025:i:13:p:2074-:d:1685556
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/13/13/2074/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/13/13/2074/
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:13:p:2074-:d:1685556. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.