Adaptive and Quantum-Resilient Intrusion Detection for Wireless Sensor Networks and IoT Environments
Received: 5 February 2025 | Revised: 26 February 2025 and 12 March 2025 | Accepted: 17 March 2025 | Online: 9 June 2025
Corresponding author: Mathan Kumar Mounagurusamy
Abstract
Integrating Wireless Sensor Networks (WSNs) with the Internet of Things (IoT) has transformative potential for data acquisition, processing, and decision-making across dynamic connected environments. Ensuring the security and integrity of these systems is paramount, especially in the face of increasingly sophisticated cyber threats. This study introduces a novel security framework that combines Quantum Key Distribution (QKD) with an adaptive Deep Reinforcement Learning (DRL)-based Intrusion Detection System (IDS), specifically designed to address the unique challenges of the WSN-IoT ecosystem. The key innovation lies in integrating QKD not only for encryption but also as a dynamic quantum-secure layer that continuously adapts to security requirements based on real-time threats and communication patterns. Unlike previous approaches that focus primarily on routing and resource allocation, the proposed framework employs DRL with Proximal Policy Optimization (PPO) to refine intrusion detection by adapting its policies based on evolving attack signatures and threat types. This dual-layer QKD-DRL approach enhances intrusion detection accuracy and establishes a self-optimizing, quantum-secure communication protocol. Tested using the CICIDS2017 dataset, the proposed model achieved a 99.75% detection rate, outperforming traditional Random Forest (97.12%) and Deep Neural Network (96.88%) models. This improvement underscores the efficacy of combining quantum cryptographic techniques with DRL-based adaptive learning, providing a robust, real-time defense mechanism for IoT-driven environments in applications such as smart cities, healthcare, and industrial IoT systems. Thus, the proposed QKD-DRL framework sets a new standard for scalable, secure communication and threat mitigation in the IoT ecosystem.
Keywords:
quantum key distribution, deep reinforcement learning, wireless sensor networks, Internet of Things, intrusion detection, cyber security, deep Q-networkDownloads
References
H. Allioui and Y. Mourdi, "Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey," Sensors, vol. 23, no. 19, Jan. 2023, Art. no. 8015. DOI: https://doi.org/10.3390/s23198015
K. Nirmal and S. Murugan, "Dynamic Arithmetic Optimization Algorithm with Deep Learning-based Intrusion Detection System in Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18453–18458, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8742
P. Sharma, S. Gupta, V. Bhatia, and S. Prakash, "Deep reinforcement learning-based routing and resource assignment in quantum key distribution-secured optical networks," IET Quantum Communication, vol. 4, no. 3, pp. 136–145, 2023. DOI: https://doi.org/10.1049/qtc2.12063
P. Sharma, V. Bhatia, and S. Prakash, "Routing Based on Deep Reinforcement Learning in Quantum Key Distribution-secured Optical Networks," in 2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Jaipur, India, Dec. 2023, pp. 1–5. DOI: https://doi.org/10.1109/ANTS59832.2023.10469164
G. Long, F. Deng, C. Wang, X. Li, K. Wen, and W. Wang, "Quantum secure direct communication and deterministic secure quantum communication," Frontiers of Physics in China, vol. 2, no. 3, pp. 251–272, Jul. 2007. DOI: https://doi.org/10.1007/s11467-007-0050-3
F. Pervez, M. Shoukat, M. Usama, M. Sandhu, S. Latif, and J. Qadir, "Affective Computing and the Road to an Emotionally Intelligent Metaverse," IEEE Open Journal of the Computer Society, vol. 5, pp. 195–214, 2024. DOI: https://doi.org/10.1109/OJCS.2024.3389462
R. Alléaume et al., "Using quantum key distribution for cryptographic purposes: A survey," Theoretical Computer Science, vol. 560, pp. 62–81, Dec. 2014. DOI: https://doi.org/10.1016/j.tcs.2014.09.018
M. Mehic et al., "Quantum Cryptography in 5G Networks: A Comprehensive Overview," IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 302–346, 2024. DOI: https://doi.org/10.1109/COMST.2023.3309051
G. K. Walia, M. Kumar, and S. S. Gill, "AI-Empowered Fog/Edge Resource Management for IoT Applications: A Comprehensive Review, Research Challenges, and Future Perspectives," IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 619–669, 2024. DOI: https://doi.org/10.1109/COMST.2023.3338015
B. He, J. Wang, Q. Qi, H. Sun, and J. Liao, "Towards Intelligent Provisioning of Virtualized Network Functions in Cloud of Things: A Deep Reinforcement Learning Based Approach," IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 1262–1274, Apr. 2022. DOI: https://doi.org/10.1109/TCC.2020.2985651
E. Alalwany and I. Mahgoub, "Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions," Sensors, vol. 24, no. 2, Jan. 2024, Art. no. 368. DOI: https://doi.org/10.3390/s24020368
M. Venkatasubramanian, A. H. Lashkari, and S. Hakak, "IoT Malware Analysis Using Federated Learning: A Comprehensive Survey," IEEE Access, vol. 11, pp. 5004–5018, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3235389
M. Njorbuenwu, B. Swar, and P. Zavarsky, "A Survey on the Impacts of Quantum Computers on Information Security," in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, Jun. 2019, pp. 212–218. DOI: https://doi.org/10.1109/ICDIS.2019.00039
Kurniabudi, D. Stiawan, Darmawijoyo, M. Y. Bin Idris, A. M. Bamhdi, and R. Budiarto, "CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection," IEEE Access, vol. 8, pp. 132911–132921, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3009843
Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, "Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset," IEEE Access, vol. 9, pp. 22351–22370, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3056614
Downloads
How to Cite
License
Copyright (c) 2025 Mathan Kumar Mounagurusamy, A. Anil Kumar Reddy, C. M. Velu, Gera Vijaya Nirmala, D. Arivazhagan, Myasar Mundher Adnan, K. Rahmaan, T. Prabhakaran

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
