Smart City Gnosys

Smart city article details

Title Next-Gen Iot Security Using Polar Codes-Based Cryptography For Malware Defence Through Quantum Self-Attention Neural Network
ID_Doc 39223
Authors Kumari S.
Year 2025
Published Knowledge-Based Systems, 321
DOI http://dx.doi.org/10.1016/j.knosys.2025.113716
Abstract The rapid expansion of the Internet of Things (IoT) has increased security concerns, particularly regarding malware threats. The static and dynamic analysis of malware signatures and behaviour patterns used by current malware detection technologies are time-consuming and have proven to be ineffective for unknown malware detection in real-time. This paper proposes a Next-Gen IoT Security using Polar Codes-based Cryptography for Malware Defense through Quantum Self-Attention Neural Network (NGIT-PCBC-MD-QSANN) for enhancing malware detection and secure data transmission in IoT environments. The framework integrates advanced pre-processing using Multi-Aspect Co-Attentional Collaborative Filtering (MAACF) to address the data irregularities and employs the Signed Cumulative Distribution Transform (SCDT) for extracting contextual features and trust rating. After extraction, the malware detection is performed using Quantum Self-Attention Neural Network (QSANN). It leverages quantum-inspired mechanisms for accurate classification of attacks such as DoS, probe, anomaly and R2L. The Polar Codes-based Cryptography (PCBC) is used with cryptographic key optimization managed by the Multi-Objective Fitness Dependent Optimizer Algorithm (MOFDOA) to ensure secure communication. The experimental results demonstrates high accuracy of 99.5 %, precision of 96 % and low error rate of 5 % when compared with existing methods such as: Enhancement of IoT device security with an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM: High-Confidence Computing (EIDS-IECC-MDUL), An Advance Encryption and Attack Detection Framework for Securing Smart Cities Data in Blockchain using Deep Learning Approach:Wireless Personal Communications (AE-ADF-SSCD-BUDL), an optimized hybrid deep neural network architecture for intrusion detection in real‐time IoT networks (AOH-DNNA-IDRIN) respectively. © 2025
Author Keywords IoT Security; Key optimization; Malware detection; Polar Codes-based Cryptography; Quantum self-attention neural network; Secure transmission


Similar Articles


Id Similarity Authors Title Published
44005 View0.881Mujlid H.M.; Alshahrani R.Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly DetectionJournal of Supercomputing, 81, 9 (2025)
7453 View0.861Saeed M.M.An Ai-Driven Cybersecurity Framework For Iot: Integrating Lstm-Based Anomaly Detection, Reinforcement Learning, And Post-Quantum EncryptionIEEE Access, 13 (2025)
47733 View0.856Pawar P.P.; Kumar D.; Meesala M.K.; Pareek P.K.; Addula S.R.; Shwetha K.S.Securing Digital Governance: A Deep Learning And Blockchain Framework For Malware Detection In Iot Networks2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024 (2024)
2549 View0.851Ronghua M.A.A Method By Utilizing Deep Learning To Identify Malware Within Numerous Industrial Sensors On IotsInternational Journal of Advanced Computer Science and Applications, 15, 8 (2024)
43805 View0.851Ravindran S.; Sarveshwaran V.Qdkffhnet: Quantum Dilated Kronecker Feed Forward Harmonic Net For Intrusion Detection In Iot-Based Smart City ApplicationsTransactions on Emerging Telecommunications Technologies, 36, 5 (2025)