{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:46:04Z","timestamp":1763451964822,"version":"3.45.0"},"reference-count":28,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100007414","name":"Qassim University","doi-asserted-by":"publisher","award":["QU\u2010APC\u20102025"],"award-info":[{"award-number":["QU\u2010APC\u20102025"]}],"id":[{"id":"10.13039\/501100007414","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>\n                    This paper presents a novel system,\n                    <jats:italic>QDrone<\/jats:italic>\n                    , that employs Quantum Key Distribution (QKD) in Internet of Battlefield Things (IoBT) networks under the backdrop of Sixth Generation (6G) communication services. The system is designed to build a resilient, confidential, and fail\u2010safe mission\u2010critical communication network. In\n                    <jats:italic>QDrone<\/jats:italic>\n                    , a three\u2010layered architecture is presented, which comprises a UAV layer, the quantum edge layer, and the ground control station (GCS) layer. A comparative analysis of QKD protocols such as BB84, B92, and E91 is performed at the edge layer, where key generation and eavesdropping detection are guaranteed. Extensive simulation is performed for the UAV\u2010GCS and the GCS\u2010GCS communication links, on metrics such as average runtime of QKD protocols, the private key lengths, and eavesdropper detection probability. For the 6G analysis, we have considered parameters like the Quantum Bit Error Rate (QBER) and latency. The results show that BB84, in conjunction with 6G, achieves a 40% reduction in QBER and a 50% improvement in the key generation rate compared to 5G, providing a robust, secure, and energy\u2010efficient IoBT network.\n                  <\/jats:p>","DOI":"10.1002\/spy2.70101","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T07:46:00Z","timestamp":1758959160000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Envisioned Edge Key Distribution System for 6G Assisted Internet\u2010of\u2010Battlefield\u2010Things"],"prefix":"10.1002","volume":"8","author":[{"given":"Milap","family":"Patel","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Institute of Technology, Nirma University  Ahmedabad India"}]},{"given":"Virendrasinh","family":"Raol","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Institute of Technology, Nirma University  Ahmedabad India"}]},{"given":"Pronaya","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Amity School of Engineering and Technology and Research and Innovation Cell Amity University  Kolkata India"}]},{"given":"Rajesh","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Institute of Technology, Nirma University  Ahmedabad India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1776-4651","authenticated-orcid":false,"given":"Sudeep","family":"Tanwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Institute of Technology, Nirma University  Ahmedabad India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0646-5872","authenticated-orcid":false,"given":"Abdulatif","family":"Alabdulatif","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Qassim University  Buraidah Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3436674"},{"key":"e_1_2_8_3_1","unstructured":"\u201cMarkets and Markets\u2010 the Report by Digital Battlefeild Market \u201d(2024) https:\/\/www.marketsandmarkets.com\/Market\u2010Reports\/digital\u2010battlefield\u2010market\u201073234342.html."},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICCIT60255.2023.10465762"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781394167401.ch19"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCI49893.2020.9256705"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303211"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3188929"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50327-6_31"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137357"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2582376"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3226127"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2022.3212590"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"S.Chatterjee K.Goswami R.Chatterjee andU.Sinha \u201cPolarization Correction Towards Satellite\u2010Based QKD Without an Active Feedback \u201d(2022).","DOI":"10.1038\/s42005-023-01235-8"},{"key":"e_1_2_8_15_1","first-page":"7","article-title":"Satellite\u2010To\u2010Ground Quantum Key Distribution","volume":"549","author":"Shengkai L.","year":"2017","journal-title":"Nature"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.010504"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.133.200801"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"e_1_2_8_19_1","first-page":"209","volume-title":"International Conference on Cryptology in Africa","author":"Botros L.","year":"2019"},{"issue":"3","key":"e_1_2_8_20_1","article-title":"Module\u2010Lattice\u2010Based Key\u2010Encapsulation Mechanism Performance Measurements","volume":"7","author":"Nagy N.","year":"2025","journal-title":"Sciences"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography9020032"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109664"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.123.2200094"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365897"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIT64916.2025.11010328"},{"issue":"1","key":"e_1_2_8_26_1","first-page":"6","article-title":"The Digital Battlefield: Safeguarding Military Drones Against Cyberattacks","volume":"8","author":"Ashong J.","year":"2025","journal-title":"Military Cyber Affairs"},{"key":"e_1_2_8_27_1","first-page":"1","volume-title":"Proceedings of the 2025 10th International Conference on Smart and Sustainable Technologies (SpliTech)","author":"Pathak L.","year":"2025"},{"volume-title":"Qiskit Textbook","year":"2023","author":"Various Authors","key":"e_1_2_8_28_1"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:42Z","timestamp":1763451762000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70101"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70101","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"2025-06-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70101"}}