Adaptive Covert Communication Framework for 6G Networks Integrating Quantum Cryptography and AI-Augmented Physical Layer Security

Alyaa Ali Hameed Kjwan
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue 4, December 2024, pp 203-213


Author's Information
Alyaa Ali Hameed Kjwan 1 
Corresponding Author
1Department of Basic Science, College of Dentistry, Tikrit University, Salahalddin, Iraq
alyaa.ali@tu.edu.iq

Research Paper -- Peer Research Papered
First online on – 30 December 2024

Open Access article under Creative Commons License

Cite this article –Alyaa Ali Hameed Kjwan“Adaptive Covert Communication Framework for 6G Networks Integrating Quantum Cryptography and AI-Augmented Physical Layer Security”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 4, pp. 203-213, 2024.
https://doi.org/10.26706/ijceae.5.4.20241108


Abstract:-
The novel 6G-communication systems offer unparalleled opportunities in terms of reliability, speed and intelligence of the communication path. However, the characteristics of 6G network include dynamic nature and various type of nodes which make scenario more complex and open to various types of security threats such as advanced attacker and quantum attacker. As a result, this paper introduces an Adaptive Covert Communication Framework that combines quantum cryptography, and artificial intelligent-based physical layer security, and covert communication methods for secure and undetectable signal transmission. It uses the BB84 protocol for quantum key distribution and realizes the secure key rate up to 784 kbps over 10 km of quantum channel with 2 percent photon loss per kilometer. The AI models are used in real-time threat monitoring coupled with real-time reconfiguring in case of an adversarial situation, hence ensuring the detection probability of 5% during adversarial movements. Additional measures are added into the communication paradigm to ensure that the probability of interception is significantly reduced while offering a very high data rate of 1.2Gbps through frequency-hopping spread spectrum (FHSS) and signal obfuscation. The system also ensures energy efficiency with energy consumption of only 0.1 J/bit and thus has the possibility of being applied in different 6G applications. The analysis of different types of attacks demonstrates that the framework remains stable under different types of attacks such as jamming attack and quantum eavesdropping attack. The results show that the proposed framework can fit the current and future 6G security requirements to deliver efficient end-to-end protection in next-generation networks.
Index Terms:-
6G Networks; Quantum Cryptography; Covert Communication; AI-Driven Physical Layer Security (PLS); Adaptive Threat Detection
REFERENCES
  1. S. K. Jalal, R. Z. Yousif, F. H. Al-Mukhtar, et al., "An optimized up to 16-user and 160 Gbps dual cascaded optical modulators PON-based power combined array fiber Bragg grating and pre-distortion device for 5th G system," Photon Netw. Commun., vol. 49, no. 1, 2025.

  2. X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F. R. Yu, and A. Nallanathan, "Covert communications: A comprehensive survey," IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173–1198, 2023.

  3. S. Sathasivam and M. Velavan, "Boltzmann Machine and Hyperbolic Activation Function in Higher Order Network," Mod. Appl. Sci., vol. 8, no. 3, pp. 140, 2014.

  4. A. Chorti, A. N. Barreto, S. Köpsell, M. Zoli, M. Chafii, P. Sehier, et al., "Context-aware security for 6G wireless: The role of physical layer security," IEEE Commun. Stand. Mag., vol. 6, no. 1, pp. 102–108, 2022.

  5. I. Ara and B. Kelley, "Physical layer security for 6G: Toward achieving intelligent native security at layer-1," IEEE Access, vol. 12, pp. 82800–82824, 2024.

  6. M. F. Mahdi, "Revolutionizing the Future Investigating the Role of Smart Devices in IoT," Int. J. Comput. Electron. Asp. Eng. (IJCEAE), vol. 5, no. 1, 2024.

  7. Y. Xiao, Z. Ye, M. Wu, H. Li, M. Xiao, M. S. Alouini, et al., "Space-Air-Ground Integrated Wireless Networks for 6G: Basics, Key Technologies and Future Trends," IEEE J. Sel. Areas Commun., 2024.

  8. I. A. Ameen and M. A. Al-Sheikh, "Wireless Sensor Networks for Smart Gardening: ESP-NOW and Blynk IoT Integration for Water and Energy Optimization," Int. J. Comput. Electron. Asp. Eng. (IJCEAE), vol. 5, no. 3, 2024.

  9. K. U. Chafle, B. M. Faruk, and R. S. Shrivas, "Design and development of coin-based mobile charger using solar energy," Int. J. Comput. Electron. Asp. Eng., vol. 1, no. 2, pp. 52–55, 2015/2020.

  10. S. Khan, K. A. Awan, I. U. Din, A. Almogren, and B. Seo-Kim, "An Adaptive Biomimetic Ant Colony Optimization with 6G Integration for IoT Network Communication," IEEE Access, 2023.

  11. P. K. Dutta, P. Raj, B. Sundaravadivazhagan, and C. P. Selvan, Artificial Intelligence Solutions for Cyber Physical Systems, 2024.

  12. H. H. Mohammed, A. F. Shareef, and S. A. Abdulqader, "Streaming Video Over Heterogenous Systems Using Real Time Protocol," Int. J. Comput. Electron. Asp. Eng. (IJCEAE), vol. 5, no. 2, 2024.

  13. S. Yrjölä, P. Ahokangas, A. Arslan, M. Matinmikko-Blue, I. Golgeci, and S. Tarba, "Artificial intelligence in the telecommunication sector: Exploratory analysis of 6G’s potential for organizational agility," in Entrepreneurial Connectivity: Network, Innovation and Strategy Perspectives, pp. 63–81, 2021.

  14. H. S. Nguyen and M. Voznak, "A bibliometric analysis of technology in digital health: Exploring health metaverse and visualizing emerging healthcare management trends," IEEE Access, 2024.

  15. S. K. Singh, A. Azzaoui, K. K. R. Choo, L. T. Yang, and J. H. Park, "A Comprehensive Survey on Blockchain for Secure IoT-enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities," Hum.-Centric Comput. Inf. Sci., vol. 13, pp. 51, 2023.

  16. A. Kumar, M. Gupta, S. Sharma, E. H. Sharma, and K. Aurangzeb, Eds., Smart Hospitals: 5G, 6G and Moving Beyond Connectivity. John Wiley & Sons, 2024.

  17. J. N. Jakawa, F. Gonten, D. U. Emmanuel, D. A. Pandok, and P. C. Maikano, "Systematic Survey Analysis of the Application of Artificial Intelligence Base Network on Grid Computing Techniques," J. Inf. Syst. Technol. Res., vol. 3, no. 3, pp. 125–135, 2024.

  18. L. Mei, Fintech Fundamentals: Big Data/Cloud Computing/Digital Economy. Mercury Learning and Information, 2022.

  19. S. Mishra, "Cyber-security threats and vulnerabilities in 4G/5G network enabled systems," Int. J. Comput. Sci. Eng., vol. 25, no. 5, pp. 548–561, 2022.

  20. J. Santos, "Emerging Paradigms in Non-Profit Governance: A Comprehensive Analysis of Disruptive Innovations," in New Trends for the Governance of Non-Profit Organizations, IGI Global Scientific Publishing, pp. 1–86, 2025.

  21. M. S. Jameaba, Digitalization, Emerging Technologies, and Financial Stability: Challenges and Opportunities for the Indonesian Banking Sector and Beyond, 2024.

  22. R. Rabetino, M. Kohtamäki, and T. Huikkola, "Digital service innovation (DSI): A multidisciplinary (re)view of its origins and progress using bibliometric and text mining methods," J. Serv. Manage., vol. 35, no. 2, pp. 176–201, 2024.

  23. T. Ngomana, "An analysis of Fourth Industrial Revolution (4IR) and entrepreneurship in South Africa: Opportunities and challenges," 2023.

  24. O. Serrat, "Information and communication technology in organizations: Impacts and implications," in Digital Solutions: Reframing Leadership, Springer Nature Singapore, pp. 13–28, 2022.

  25. A. N. Barreto, S. Köpsell, A. Chorti, B. Poettering, J. Jelitto, J. Hesse, et al., "Towards intelligent context-aware 6G security," arXiv preprint arXiv:2112.09411, 2021.

  26. M. P. Khobragade, B. D. Sayare, and D. B. Channawar, "Difference between AODV and DSDV routing protocols using NS2 simulation," Int. J. Comput. Electron. Asp. Eng., vol. 1, no. 2, pp. 85–88, 2015/2020.

  27. H. H. Mohammed, A. F. Shareef, and S. A. Abdulqader, "Streaming video over heterogeneous systems using real-time protocol," Int. J. Comput. Electron. Asp. Eng., vol. 5, no. 2, pp. 46–53, 2024.

  28. A. V. Karthick and S. Balasubramanian, "Information Technology for Smart Business," Int. J. Comput. Electron. Asp. Eng. (IJCEAE), vol. 4, no. 3, 2023.

  29. X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F. R. Yu, and A. Nallanathan, "Covert communications: A comprehensive survey," IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173–1198, 2023.

  30. To view full paper, Download here


Publishing with