Secure and Robust Ant-Fly Optimized Dual Key Infrastructure Compatible with 6G Communication Technologies

Main Article Content

Dr Hussain Jassim Mohammad Alaaedi

Keywords

6G communication, Dual key infrastructure, Diffie-Hellman Elliptical curve, Digital signature verification

Abstract

 


Sixth Generation (6G) communication, the successor to 5G, is expected to deliver data rates up to 1 Tbps, enabling ultra-HD streaming and real-time holographic communication. However, security threats, such as hacking and espionage, pose significant challenges. To address this, a dual-key encryption model is proposed, generating two keys—one from randomness and another from a distance metric. The key generation process includes channel probing, preprocessing, quantization, encoding, reconciliation, and amplification. Channel probing assesses parameters; preprocessing prepares data; quantization approximates levels; encoding converts data to binary; and reconciliation corrects quantization errors. The model’s performance, evaluated in terms of key disagreement rate, bit generation rate, key mismatch rate and throughput, demonstrates superior results compared to existing methods. Metrics like latency, reliability, scalability, and security further validate the system’s effectiveness.

Abstract 82 | 1318-PDF-v14n1pp18-45 Downloads 3

References

Abdelwahab, Z. H., Abdellatif, A. G., Ibrahim, I. M., Ahmed, M. I., & Elmahallawy, A. A. (2025). Robustness of cloud security against brute-force attack. Advanced Sciences and Technology Journal, 2(1), 1–14. https://doi.org/10.21608/astj.2024.341331.1015
Almalki, S. A., Alkhorem, A. H., & Alghamdi, T. A. (2024). Enhanced security framework for 6G communication network based on dual-key extraction-based NOMA technique with two-tier encryption and optimized ant fly optimizer (AFO) keys. Research Square. [preprint] https://doi.org/10.21203/rs.3.rs-5427647/v1
Alsamhi, M. H., Hawbani, A., Kumar, S., & Alsamhi, S. H. (2024). Multisensory metaverse-6G: A new paradigm of commerce and education. IEEE Access, 12, 75657–75677. https://doi.org/10.1109/ACCESS.2024.3392838
Chataut, R., Nankya, M., & Akl, R. (2024). 6G networks and the AI revolution: Exploring technologies, applications, and emerging challenges. Sensors, 24(6), 1888. https://doi.org/10.3390/s24061888
Chauhan, G. S., Budda, R., Srinivasan, K., Jadon, R., Gollapalli, V. S. T., & Awotunde, J. B. (2025). Spectrum heterogeneity-based efficient spectrum sensing in 6G wireless communication using ATRC-LSNN and F-ExpoTIS. Intelligent Data Analysis, 41(4), 1088467X251339366. https://doi.org/10.1177/1088467X251339366
Floridi, L., & Cowls, J. (2020). A unified framework of five principles for AI in society. Harvard Data Science Review, 1, 1–15. https://doi.org/10.1002/9781119815075.ch45
Javed, A. R., Shahzad, F., Rehman, S. U., Zikria, Y. B., Razzak, I., Jalil, Z., & Xu, G. (2022). Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects. Cities, 129, 103794. https://doi.org/10.1016/j.cities.2022.103794
Kim, M. S., Kim, J., & Kim, S. (2023). Korea’s leadership in 5G and beyond: Footprints and futures. Telecommunications Policy, 47(8), 102613. https://doi.org/10.1016/j.telpol.2023.102613
Li, Y., Li, J., Sun, Y., & Li, H. (2022). Load Balancing Based on Firefly and Ant Colony Optimization Algorithms for Parallel Computing. Biometrics, 7(4), 168. https://doi.org/10.3390/biomimetics7040168
Liao, S.-H., Widowati, R., & Tang, W. (2025). Social media, mobile payment, and mobile gaming for intentional and behavioral recommendations. International Journal of Human–Computer Interaction, 41(4), 2560–2578. https://doi.org/10.1080/10447318.2024.2325178
Mao, B., Liu, J., Wu, Y., & Kato, N. (2023). Security and privacy on 6G network edge: A survey. IEEE Communications Surveys & Tutorials, 25(2), 1095–1127. https://doi.org/10.1109/COMST.2023.3244674
Mohammed, S. M., Al-Barrak, A., & Mahmood, N. T. (2024). Enabling technologies for ultra-low latency and high-reliability communication in 6G networks. Ingenierie des Systemes d’Information, 29(3). https://doi.org/10.18280/isi.290336
Mthembu, L., & Smith, A. (2024). Impacts of quantum computing on cryptographic algorithms: Challenges and the future of cybersecurity. Global Research Perspectives on Cybersecurity Governance, Policy, and Management, 8(12), 12–23. https://hammingate.com/index.php/GRPCGPM/article/view/2
Ouyang, Y., Yang, A., Ye, X., Cheng, B., & Wu, M. (2023). White paper on 6G OSS technologies. arXiv preprint. arXiv:2307.09045. https://arxiv.org/pdf/2307.09045
Pugazhendiran, P., Kumar, K. S., Kumar, T. A., & Sundaresan, S. (2022). An advanced revealing and classification system for plant illnesses using unsupervised Bayesian-based SVM classifier and modified HOG-ROI algorithm. In H. K. D. Sarma, V. E. Balas, B. Bhuyan, & N. Dutta (Eds.), Contemporary Issues in Communication, Cloud and Big Data Analytics (pp. 259–269). Springer. https://doi.org/10.1007/978-981-16-4244-9_21
Saad, W., Bennis, M., & Chen, M. (2020). A vision of 6G wireless systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Network, 34(3), 134–142. https://doi.org/10.1109/MNET.001.1900287
Salahdine, F., Han, T., & Zhang, N. (2023). 5G, 6G, and beyond: Recent advances and future challenges. Annals of Telecommunications, 78(9), 525–549. https://doi.org/10.1007/s12243-022-00938-3
Ullah, I., Ali, F., Khan, H., Khan, F., & Bai, X. (2024). Ubiquitous computation in Internet of Vehicles for human-centric transport systems. Computers in Human Behavior, 161, 108394. https://doi.org/10.1016/j.chb.2024.108394
Uzunidis, D., Logothetis, M., Stavdas, A., Hillerkuss, D., & Tomeos, I. (2022). Fifty years of fixed optical networks evolution: A survey of architectural and technological developments in a layered approach. Telecom, 3(4), 619–674. https://doi.org/10.3390/telecom3040035
Verhoef, P. C., Broekhuizen, T., Bart, Y., Bhattacharya, A., Dong, J. Q., Fabian, N., & Haenlein, M. (2021). Digital transformation: A multidisciplinary reflection and research agenda. Journal of Business Research, 122, 889–901. https://doi.org/10.1016/j.jbusres.2019.09.022
Wong, O. S., Gregory, M. A., & Li, S. (2025). Integration of non-terrestrial networks for 5G IoT and future 6G. Journal of Telecommunications and the Digital Economy, 13(1), 384–406. https://doi.org/10.18080/jtde.v13n1.1174
Xia, E., Hu, B.-J., & Shen, Q. (2024). A survey of physical-layer secret key generation enhanced by intelligent reflecting surfaces. Electronics, 13, 258. https://doi.org/10.3390/electronics13020258