An AI-Enhanced Quantum Key Management for Cloud-Based Aviation Communication Systems
Received: 22 August 2025 | Revised: 12 September 2025 and 1 October 2025 | Accepted: 6 October 2025 | Online: 28 October 2025
Corresponding author: Lara Mohammad Hamza Shhab
Abstract
The emerging complexity of edge-based and autonomous UAV communication networks requires smart, secure, and adaptive architectures to defend against emerging cyber threats. Traditional access control and cryptographic key management systems, inherently static and rule-based, cannot support the demands of both real-time responsiveness and contextual decision-making. This paper presents a modular AI-enabled system that integrates Support Vector Machines (SVMs) for access control and Deep Q-Networks (DQNs) for adaptive encryption key rotation within a simulated quantum-secure communication channel. The proposed system was implemented with Docker and Kubernetes, with testing on NS-3 and SimulaQron platforms to allow scalable deployment and modularity. The SVM classifier achieved 96.8% accuracy and 99.2% recall in anomalous traffic, proving it to be effective in edge-based access control. The DQN agent is trained on the best key rotation policies and achieves 92.5% accuracy in the simulated environments of reinforcement learning, with stable convergence. These findings are in agreement with existing studies that recommend the use of AI to improve security in cloud-edge systems. The proposed framework provides an effective design blueprint of intelligent UAV communications based on low-latency inference and adaptive cryptographic policy control. Future work involves real-world implementation using Quantum Key Distribution (QKD) equipment, along with federated learning extensions to support collaborative intelligence across decentralized UAV swarms and edge devices.
Keywords:
Quantum communication, UAV networks, support vector machine, deep Q-network, edge AIDownloads
References
P. Bhide, D. Shetty, and S. Mikkili, "Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain," IET Quantum Communication, vol. 6, no. 1, 2025, Art. no. e12114. DOI: https://doi.org/10.1049/qtc2.12114
I. Mahmud and A. Abdelhadi, "Artificial Intelligence in Quantum Communications: A Comprehensive Survey," IEEE Access, vol. 13, pp. 121174–121205, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3585799
S. Hashima, A. Gendia, K. Hatano, O. Muta, M. S. Nada, and E. M. Mohamed, "Next-Gen UAV-Satellite Communications: AI Innovations and Future Prospects," IEEE Open Journal of Vehicular Technology, vol. 6, pp. 1990–2021, 2025. DOI: https://doi.org/10.1109/OJVT.2025.3587028
Y. Sanjalawe, S. Fraihat, S. Al-E’Mari, M. Abualhaj, S. Makhadmeh, and E. Alzubi, "A Review of 6G and AI Convergence: Enhancing Communication Networks With Artificial Intelligence," IEEE Open Journal of the Communications Society, vol. 6, pp. 2308–2355, 2025. DOI: https://doi.org/10.1109/OJCOMS.2025.3553302
B. R. Das, S. R. Hasan, S. R. Sabuj, M. A. Hossain, and S. K. Ray, "A Comprehensive Survey on Emerging AI Technologies for 6G Communications: Research Direction, Trends, Challenges, and Opportunities," International Journal of Intelligent Networks, vol. 6, pp. 113–150, Jan. 2025. DOI: https://doi.org/10.1016/j.ijin.2025.06.001
A. Alsaeed, S. Almowuena, and A. N. Alyahya, "BAAIoV: A Blockchain-Based Authentication and Authorization Framework for Secure and Reliable Internet of Vehicles Communication," IEEE Access, vol. 13, pp. 150821–150837, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3601003
X. Li, F. Dunkin, and J. Dezert, "Multi-source information fusion: Progress and future," Chinese Journal of Aeronautics, vol. 37, no. 7, pp. 24–58, Jul. 2024. DOI: https://doi.org/10.1016/j.cja.2023.12.009
M. Alsader, A. A. Barakabitze, and I. H. Mkwawa, "QoE-Driven Adaptive Video Streaming: Architectures, Techniques, and Future Research Challenges Toward 6G Networks," IEEE Access, vol. 13, pp. 157408–157441, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3597058
M. S. Akbar, Z. Hussain, M. Ikram, Q. Z. Sheng, and S. C. Mukhopadhyay, "On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues," Journal of Network and Computer Applications, vol. 233, Jan. 2025, Art. no. 104040. DOI: https://doi.org/10.1016/j.jnca.2024.104040
M. Banafaa et al., "6G Mobile Communication Technology: Requirements, Targets, Applications, Challenges, Advantages, and Opportunities," Alexandria Engineering Journal, vol. 64, pp. 245–274, Feb. 2023. DOI: https://doi.org/10.1016/j.aej.2022.08.017
S. K. Khan, N. Shiwakoti, A. Diro, A. Molla, I. Gondal, and M. Warren, "Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions," International Journal of Critical Infrastructure Protection, vol. 47, Dec. 2024, Art. no. 100724. DOI: https://doi.org/10.1016/j.ijcip.2024.100724
A. Alhosban, "Binary Offset Carrier (BOC) and Binary Phase Shift Keying (BPSK) Modulation in Indoor Drones GNSS Recievers using Multipath Error Envelope MEE Technique," International Journal of Membrane Science and Technology, vol. 10, no. 3, pp. 460–475, Jul. 2023. DOI: https://doi.org/10.15379/ijmst.v10i3.1554
M. I. Khan et al., "Integrating industry 4.0 for enhanced sustainability: Pathways and prospects," Sustainable Production and Consumption, vol. 54, pp. 149–189, Mar. 2025. DOI: https://doi.org/10.1016/j.spc.2024.12.012
A. Rovira-Sugranes, A. Razi, F. Afghah, and J. Chakareski, "A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook," Ad Hoc Networks, vol. 130, May 2022, Art. no. 102790. DOI: https://doi.org/10.1016/j.adhoc.2022.102790
S. R. Pokhrel, J. Kua, B. Fleming, S. Ozer, J. Howe, and A. Walid, "Multipath TCP implementation under FreeBSD-13 for pluggable machine learning models," Computer Networks, vol. 252, Oct. 2024, Art. no. 110671. DOI: https://doi.org/10.1016/j.comnet.2024.110671
B. A. Begum and S. V. Nandury, "Data aggregation protocols for WSN and IoT applications – A comprehensive survey," Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 2, pp. 651–681, Feb. 2023. DOI: https://doi.org/10.1016/j.jksuci.2023.01.008
M. Trigka and E. Dritsas, "Wireless Sensor Networks: From Fundamentals and Applications to Innovations and Future Trends," IEEE Access, vol. 13, pp. 96365–96399, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3572328
M. Safaldin, M. Otair, and L. Abualigah, "Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 2, pp. 1559–1576, Feb. 2021. DOI: https://doi.org/10.1007/s12652-020-02228-z
S. Ali and B. Djaouida, "Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15133–15140, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7521
B. M. Mohsen and M. Mohsen, "Intelligent Supply Chain Networks: Integrating AI, Big Data, and Future Communication Technologies for Enhanced Decision-Making," Procedia Computer Science, vol. 265, pp. 8–16, Jan. 2025. DOI: https://doi.org/10.1016/j.procs.2025.07.150
S. Krishnan, B. Boroujerdian, W. Fu, A. Faust, and V. J. Reddi, "Air Learning: a deep reinforcement learning gym for autonomous aerial robot visual navigation," Machine Learning, vol. 110, no. 9, pp. 2501–2540, Sep. 2021. DOI: https://doi.org/10.1007/s10994-021-06006-6
M. Sheraz, T. C. Chuah, Y. L. Lee, M. M. Alam, A. Al-Habashna, and Z. Han, "A Comprehensive Survey on Revolutionizing Connectivity Through Artificial Intelligence-Enabled Digital Twin Network in 6G," IEEE Access, vol. 12, pp. 49184–49215, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3384272
D. Ivanov, "Conceptual and formal models for design, adaptation, and control of digital twins in supply chain ecosystems," Omega, vol. 137, Dec. 2025, Art. no. 103356. DOI: https://doi.org/10.1016/j.omega.2025.103356
S. Hosseini and H. Seilani, "The role of agentic AI in shaping a smart future: A systematic review," Array, vol. 26, Jul. 2025, Art. no. 100399. DOI: https://doi.org/10.1016/j.array.2025.100399
H. Karim, D. Gupta, and S. Sitharaman, "Securing LLM Workloads With NIST AI RMF in the Internet of Robotic Things," IEEE Access, vol. 13, pp. 69631–69649, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3561235
Downloads
How to Cite
License
Copyright (c) 2025 Lara Mohammad Hamza Shhab, Ahmad Alhosban

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
