Exportar Publicação
A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.
Noetzold, D., Barbosa, J. L. V., Santana, J. F. P. & Leithardt, V. R. Q. (N/A). Reinforcement learning-based adaptive quantum-safe cryptography for DN25-compliant smart environments. IEEE Access. N/A
D. Noetzold et al., "Reinforcement learning-based adaptive quantum-safe cryptography for DN25-compliant smart environments", in IEEE Access, vol. N/A, N/A
@article{noetzoldN/A_1777824308587,
author = "Noetzold, D. and Barbosa, J. L. V. and Santana, J. F. P. and Leithardt, V. R. Q.",
title = "Reinforcement learning-based adaptive quantum-safe cryptography for DN25-compliant smart environments",
journal = "IEEE Access",
year = "N/A",
volume = "N/A",
number = "",
doi = "10.1109/ACCESS.2026.3685890",
url = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639"
}
TY - JOUR TI - Reinforcement learning-based adaptive quantum-safe cryptography for DN25-compliant smart environments T2 - IEEE Access VL - N/A AU - Noetzold, D. AU - Barbosa, J. L. V. AU - Santana, J. F. P. AU - Leithardt, V. R. Q. PY - N/A SN - 2169-3536 DO - 10.1109/ACCESS.2026.3685890 UR - https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 AB - The emergence of quantum computing challenges traditional security mechanisms, particularly in heterogeneous and resource-constrained IoT and smart environments that must satisfy DN25 requirements. This work introduces a reinforcement learning-driven model for the adaptive selection and orchestration of cryptographic algorithms. Acting as an intelligent decision layer, the system observes contextual, network, and operational metrics to recommend or enforce configurations combining classical schemes, post-quantum cryptography, and Quantum Key Distribution when available. The selection problem is formulated as a Markov Decision Process with state and action spaces aligned with protocol control flows and is embedded into a security middleware with negotiation and fallback mechanisms to ensure interoperability and policy compliance without modifying application logic. Experimental results demonstrate that the model dynamically adjusts key lengths, algorithm families, and security policies according to risk and resource conditions, increasing post-quantum cryptography and Quantum Key Distribution usage by up to 33.4% and 23.9% in high-risk scenarios while favoring low-latency classical or hybrid options for less critical traffic. The system achieves success rates above 78% while maintaining stable latency and resource usage during extended operation. ER -
English