A Quantum-Optimized Graph Transformer Framework for Secure and Adaptive Trust Management in Edge Computing
Received: 18 January 2026 | Revised: 12 February 2026 | Accepted: 19 February 2026 | Online: 6 March 2026
Corresponding author: P. Praveen Yadav
Abstract
This work proposes TrustFi-SecNet, a quantum-optimized graph-transformer–driven trust and security reinforcement framework designed for distributed edge–cloud environments. The model integrates multidimensional behavioral features, attention-driven trust aggregation, anomaly detection through transformer autoencoders, and chaotic lightweight encryption to ensure end-to-end security. Extensive evaluations demonstrate that TrustFi-SecNet achieves 99.1% anomaly detection accuracy, reduces average energy consumption by 66.3%, improves trust stability by 37.5%, increases secure throughput by 41.8%, and decreases latency and packet loss by 32% and 27%, respectively, compared with state-of-the-art baseline models. These results collectively establish TrustFi-SecNet as an efficient, secure, and scalable solution for modern edge intelligence ecosystems.
Keywords:
graph transformer, quantum optimization, chaotic encryption, anomaly detection, trust management, congestion control, QoS optimization, edge computing, secure routingDownloads
References
N. Saha et al., "Edge-enabled quantum-safe real-time vaccine supply chain optimization: a decentralized framework for autonomous decision making," PeerJ Computer Science, vol. 12, Feb. 2026, Art. no. e3597.
C. Cicconetti, D. Sabella, P. Noviello, and G. D. Paduanelli, "Quantum-safe Edge Applications: How to Secure Computation in Distributed Computing Systems," in 2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications, Valencia, Spain, 2024, pp. 1–6.
M. Ali et al., "A Machine Learning Approach to Reduce Latency in Edge Computing for IoT Devices," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16751–16756, Oct. 2024.
M. Xu et al., "Privacy-Preserving Intelligent Resource Allocation for Federated Edge Learning in Quantum Internet," IEEE Journal of Selected Topics in Signal Processing, vol. 17, no. 1, pp. 142–157, Jan. 2023.
R. Xu, S. R. Pokhrel, Q. Lan, and G. Li, "Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing." arXiv, Feb. 26, 2023.
N. Innan, A. Marchisio, M. Bennai, and M. Shafique, "QFNN-FFD: Quantum Federated Neural Network for Financial Fraud Detection," in 2025 IEEE International Conference on Quantum Software, Helsinki, Finland, 2025, pp. 41–47.
D. Commey and G. V. Crosby, "PQS-BFL: A post-quantum secure blockchain-based federated learning framework," Expert Systems with Applications, vol. 312, May 2026, Art. no. 131449.
D. Gurung and S. R. Pokhrel, "sat-QFL: Secure Quantum Federated Learning for Low Orbit Satellites." arXiv, Sept. 20, 2025.
M. A. Ferrag et al., "Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses," IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2654–2713, 2023.
D. Swetha and S. K. Mohiddin, "Quantum-Enhanced Security Advances for Cloud Computing Environments," International Journal of Advanced Computer Science and Applications, vol. 15, no. 6, pp. 1162–1171, June 2024.
P. Li, T. Chen, and J. Liu, "Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography," in 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, Washington, DC, USA, 2024, pp. 499–505.
S. G. Thomas and P. K. Myakala, "Beyond the Cloud: Federated Learning and Edge AI for the Next Decade," Journal of Computer and Communications, vol. 13, no. 2, pp. 37–50, Feb. 2025.
A. S. Bhatia and S. Kais, "Enhancing Quantum Federated Learning with Fisher Information-Based Optimization," in 2025 IEEE International Conference on Quantum Computing and Engineering, Albuquerque, NM, USA, 2025, pp. 1015–1020.
A. S. Bhatia, M. K. Saggi, and S. Kais, "Application of quantum-inspired tensor networks to optimize federated learning systems," Quantum Machine Intelligence, vol. 7, no. 1, Jan. 2025, Art. no. 12.
C. Ren et al., "Toward Quantum Federated Learning," IEEE Transactions on Neural Networks and Learning Systems, vol. 36, no. 9, pp. 15580–15600, Sept. 2025.
X. Zhang, H. Deng, R. Wu, J. Ren, and Y. Ren, "PQSF: post-quantum secure privacy-preserving federated learning," Scientific Reports, vol. 14, no. 1, Oct. 2024, Art. no. 23553.
S. Saha, A. Hota, A. K. Chattopadhyay, A. Nag, and S. Nandi, "A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities," Artificial Intelligence Review, vol. 57, no. 7, June 2024, Art. no. 184.
S. Dutta et al., "Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML." arXiv, Oct. 12, 2024.
N. Innan, M. A.-Z. Khan, A. Marchisio, M. Shafique, and M. Bennai, "FedQNN: Federated Learning using Quantum Neural Networks," in 2024 International Joint Conference on Neural Networks, Yokohama, Japan, 2024, pp. 1–9.
M. Chehimi, S. Y.-C. Chen, W. Saad, and S. Yoo, "Federated quantum long short-term memory (FedQLSTM)," Quantum Machine Intelligence, vol. 6, no. 2, July 2024, Art. no. 43.
E. Sorbera, F. Zanetti, G. Brandi, A. Tomasi, R. Doriguzzi-Corin, and S. Ranise, "Adaptive Federated Learning with Functional Encryption: A Comparison of Classical and Quantum-safe Options." arXiv, July 15, 2025.
Z.-P. Liu et al., "Practical quantum federated learning and its experimental demonstration." arXiv, Jan. 22, 2025.
H. Gharavi, J. Granjal, and E. Monteiro, "PQBFL: A Post-Quantum Blockchain-based protocol for Federated Learning," Computer Networks, vol. 269, Sept. 2025, Art. no. 111472.
Downloads
How to Cite
License
Copyright (c) 2026 P. Praveen Yadav, T. Bhaskar Reddy

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
