Adaptive and Quantum-Resilient Intrusion Detection for Wireless Sensor Networks and IoT Environments

Authors

  • Mathan Kumar Mounagurusamy Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology, Kattankulathur, Chennai, Tamilnadu, India
  • A. Anil Kumar Reddy Department of CSE, Samskruti College of Engineering and Technology, Medchal Telangana, India
  • C. M. Velu Department of CSE (AIDS), Saveetha Engineering College, Thandalam, Chennai, Tamil Nadu, India
  • Gera Vijaya Nirmala Department of ECE, CVR College of Engineering, Hyderabad. Telangana, India
  • D. Arivazhagan AMET Business School, Academy of Maritime Education and Training Deemed to be University, Chennai, Tamilnadu, India
  • Myasar Mundher Adnan Medical Instrumentation Techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Hillah, Babil, Iraq
  • Rahmaan Κ. Department of Artificial Intelligence and Data Science, Mahendra Engineering College, Mallasamudram, Namakkal, Tamil Nadu, India
  • T. Prabhakaran Department of CSE, JB Institute of Engineering and Technology, Hyderabad, Telangana, India
Volume: 15 | Issue: 4 | Pages: 24723-24728 | August 2025 | https://doi.org/10.48084/etasr.10464

Abstract

Integrating Wireless Sensor Networks (WSNs) with the Internet of Things (IoT) has transformative potential for data acquisition, processing, and decision-making across dynamic connected environments. Ensuring the security and integrity of these systems is paramount, especially in the face of increasingly sophisticated cyber threats. This study introduces a novel security framework that combines Quantum Key Distribution (QKD) with an adaptive Deep Reinforcement Learning (DRL)-based Intrusion Detection System (IDS), specifically designed to address the unique challenges of the WSN-IoT ecosystem. The key innovation lies in integrating QKD not only for encryption but also as a dynamic quantum-secure layer that continuously adapts to security requirements based on real-time threats and communication patterns. Unlike previous approaches that focus primarily on routing and resource allocation, the proposed framework employs DRL with Proximal Policy Optimization (PPO) to refine intrusion detection by adapting its policies based on evolving attack signatures and threat types. This dual-layer QKD-DRL approach enhances intrusion detection accuracy and establishes a self-optimizing, quantum-secure communication protocol. Tested using the CICIDS2017 dataset, the proposed model achieved a 99.75% detection rate, outperforming traditional Random Forest (97.12%) and Deep Neural Network (96.88%) models. This improvement underscores the efficacy of combining quantum cryptographic techniques with DRL-based adaptive learning, providing a robust, real-time defense mechanism for IoT-driven environments in applications such as smart cities, healthcare, and industrial IoT systems. Thus, the proposed QKD-DRL framework sets a new standard for scalable, secure communication and threat mitigation in the IoT ecosystem.

Keywords:

quantum key distribution, deep reinforcement learning, wireless sensor networks, Internet of Things, intrusion detection, cyber security, deep Q-network

Downloads

Download data is not yet available.

Author Biography

D. Arivazhagan, AMET Business School, Academy of Maritime Education and Training Deemed to be University, Chennai, Tamilnadu, India

AMET Business School. Academy of Maritime Education and Training Deemed to be University. Chennai, Tamilnadu, India.

 

References

H. Allioui and Y. Mourdi, "Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey," Sensors, vol. 23, no. 19, Jan. 2023, Art. no. 8015. DOI: https://doi.org/10.3390/s23198015

K. Nirmal and S. Murugan, "Dynamic Arithmetic Optimization Algorithm with Deep Learning-based Intrusion Detection System in Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18453–18458, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8742

P. Sharma, S. Gupta, V. Bhatia, and S. Prakash, "Deep reinforcement learning-based routing and resource assignment in quantum key distribution-secured optical networks," IET Quantum Communication, vol. 4, no. 3, pp. 136–145, 2023. DOI: https://doi.org/10.1049/qtc2.12063

P. Sharma, V. Bhatia, and S. Prakash, "Routing Based on Deep Reinforcement Learning in Quantum Key Distribution-secured Optical Networks," in 2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Jaipur, India, Dec. 2023, pp. 1–5. DOI: https://doi.org/10.1109/ANTS59832.2023.10469164

G. Long, F. Deng, C. Wang, X. Li, K. Wen, and W. Wang, "Quantum secure direct communication and deterministic secure quantum communication," Frontiers of Physics in China, vol. 2, no. 3, pp. 251–272, Jul. 2007. DOI: https://doi.org/10.1007/s11467-007-0050-3

F. Pervez, M. Shoukat, M. Usama, M. Sandhu, S. Latif, and J. Qadir, "Affective Computing and the Road to an Emotionally Intelligent Metaverse," IEEE Open Journal of the Computer Society, vol. 5, pp. 195–214, 2024. DOI: https://doi.org/10.1109/OJCS.2024.3389462

R. Alléaume et al., "Using quantum key distribution for cryptographic purposes: A survey," Theoretical Computer Science, vol. 560, pp. 62–81, Dec. 2014. DOI: https://doi.org/10.1016/j.tcs.2014.09.018

M. Mehic et al., "Quantum Cryptography in 5G Networks: A Comprehensive Overview," IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 302–346, 2024. DOI: https://doi.org/10.1109/COMST.2023.3309051

G. K. Walia, M. Kumar, and S. S. Gill, "AI-Empowered Fog/Edge Resource Management for IoT Applications: A Comprehensive Review, Research Challenges, and Future Perspectives," IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 619–669, 2024. DOI: https://doi.org/10.1109/COMST.2023.3338015

B. He, J. Wang, Q. Qi, H. Sun, and J. Liao, "Towards Intelligent Provisioning of Virtualized Network Functions in Cloud of Things: A Deep Reinforcement Learning Based Approach," IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 1262–1274, Apr. 2022. DOI: https://doi.org/10.1109/TCC.2020.2985651

E. Alalwany and I. Mahgoub, "Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions," Sensors, vol. 24, no. 2, Jan. 2024, Art. no. 368. DOI: https://doi.org/10.3390/s24020368

M. Venkatasubramanian, A. H. Lashkari, and S. Hakak, "IoT Malware Analysis Using Federated Learning: A Comprehensive Survey," IEEE Access, vol. 11, pp. 5004–5018, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3235389

M. Njorbuenwu, B. Swar, and P. Zavarsky, "A Survey on the Impacts of Quantum Computers on Information Security," in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, Jun. 2019, pp. 212–218. DOI: https://doi.org/10.1109/ICDIS.2019.00039

Kurniabudi, D. Stiawan, Darmawijoyo, M. Y. Bin Idris, A. M. Bamhdi, and R. Budiarto, "CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection," IEEE Access, vol. 8, pp. 132911–132921, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3009843

Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, "Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset," IEEE Access, vol. 9, pp. 22351–22370, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3056614

Downloads

How to Cite

[1]
M. K. Mounagurusamy, “Adaptive and Quantum-Resilient Intrusion Detection for Wireless Sensor Networks and IoT Environments”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 24723–24728, Aug. 2025.

Metrics

Abstract Views: 283
PDF Downloads: 286

Metrics Information