Adaptive Tangent Homomorphic Encryption with Equivariant Quantum Neural Networks for Secure Data Transmission Routing in MANET

PDF (1172KB), PP.126-148

Views: 0 Downloads: 0

Author(s)

V. Ravi Kumar 1,2,* Prasada Reddy. M. M. 3 B. Nancharaiah 4

1. Department of Electronics and Communication Engineering, GIET University., Gunupur, Odisha, -765022, India

2. Department of Electronics and Communication Engineering, Swarnandhra College of Engineering and Technology., Narsapur – 534 280., West Godavari District., Andhra Pradesh., India

3. Dept. of ECE, GIET University, Gunupur, Odisha - 765022., India

4. ECE Department, Usha Rama College of Engineering and Technology, Telaprolu- 521 109, A.P.

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2026.02.08

Received: 11 Oct. 2025 / Revised: 2 Dec. 2025 / Accepted: 27 Jan. 2026 / Published: 8 Apr. 2026

Index Terms

Cluster Head, Optimal Route Selection, Data Transmission, Encryption, Tangent Search, Residual Energy

Abstract

Due to the dynamic nature of the network architecture, resource constraints, and susceptibility to security attacks, securing data transmission in Mobile Ad-hoc Networks (MANETs) is a significant problem. This work proposes a novel Equivariant Quantum Neural Networks with Adaptive Tangent Brakerski-Gentry Vaikuntanathan Homomorphic Encryption algorithm (EQNN-ATBGVHEA)- based secure routing in MANET. The suggested approach comprises three steps: cluster head (CH) selection, optimal path selection, and secure data transfer. Initially, the Bowerbird Optimization Algorithm chooses the CH and sends the message through the constructed path. Once the clusters are established, data is transferred between the sender and receiver. For optimal route selection, developed the EQNNs technique which incorporates a neural network for quick route selection. EQNN resolves the issues of local optimality by constructing a new fitness process based on residual energy (RE) and delay. After the optimal path selection, Data transfer is secured by the innovative ATBGVHEA technique. Furthermore, this method is built using NS3, and the variables are determined. Additionally, the acquired results are contrasted with existing approaches for validating the efficiency of the suggested strategy. The developed method achieved a clustering accuracy of 98.5%, a computational time of 55ms, and a residual energy of 0.44.

Cite This Paper

V. Ravi Kumar, Prasada Reddy. M. M., B. Nancharaiah, "Adaptive Tangent Homomorphic Encryption with Equivariant Quantum Neural Networks for Secure Data Transmission Routing in MANET", International Journal of Computer Network and Information Security(IJCNIS), Vol.18, No.2, pp.126-148, 2026. DOI:10.5815/ijcnis.2026.02.08

Reference

[1]S. Singh, A. Pise, O. Alfarraj, A. Tolba, B. Yoon, “A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET”. Sustainable Cities and Society. Vol.79, p.103483, 2022.
[2]S. Dalal, B. Seth, V. Jaglan, M. Malik, Surbhi, N. Dahiya, U. Rani, DN. Le, YC.Hu, “An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks”. Soft Computing. Vol.26, No.11, pp.5377-88, 2022.
[3]B. Reddy, B. Dhananjaya, “The AODV routing protocol with built-in security to counter blackhole attack in MANET”. Materials Today: Proceedings. Vol.50, pp.1152-8, 2022.
[4]A. Ali, A. Ali, F. Masud, MK. Bashir, AH. Zahid, G. Mustafa, Z. Ali, “Enhanced fuzzy logic zone stable election protocol for cluster head election (E-FLZSEPFCH) and multipath routing in wireless sensor networks”. Ain Shams Engineering Journal. Vol.15, No.2, p.102356, 2024.
[5]S. Li, B. Gong, “Developing a reliable route protocol for mobile self-organization networks”. High-confidence computing. Vol.4, No.3, p.100194, 2024.
[6]S. Shafi, DV. Ratnam, “Ant-colony optimization based energy aware cross layer routing protocol to improve route reliability in MANETs”. Wireless Personal Communications. Vol.129, No.3, pp.1865-79, 2023.
[7]SA. Alghamdi, Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud. International Journal of Information Security. Vol.21, No.3, pp.469-88, 2022.
[8]X. Wang, Y. Weng, H. Gao, “A low-latency and energy-efficient multimetric routing protocol based on network connectivity in VANET communication”. IEEE Transactions on Green Communications and Networking. Vol.5, No.4, pp.1761-76, 2021.
[9]OT. Abdulhae, JS. Mandeep, M. Islam, “Cluster-based routing protocols for flying ad hoc networks (FANETs)”. IEEE access. Vol.10, pp.32981-3004, 2022.
[10]K. Manasa, LM. Leo Joseph, “IoT security vulnerabilities and defensive measures in Industry 4.0”. InArtificial Intelligence and Cyber Security in Industry 4.0 2023 Jun 14 (pp. 71-112). Singapore: Springer Nature Singapore.
[11]V. S. Murugan, B. Unhelkar, “Optimizing Mobile Ad Hoc Network cluster based routing: Energy prediction via improved deep learning technique”. International Journal of Communication Systems, p.e5777, 2024.
[12]G. Rajeshkumar, M. V. Kumar, K. S. Kumar, S. Bhatia, A. Mashat, P. Dadheech, “An Improved Multi-Objective Particle Swarm Optimization Routing on MANET”. Computer Systems Science & Engineering, Vol.44, No.2, (2023).
[13]S. Ravi, S. Matheswaran, U. Perumal, S. Sivakumar, S. K. Palvadi, “Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization”. Peer-to-Peer Networking and Applications, Vol.16, No.1, pp.22-34, 2023.
[14]S. Selvaraj, M. Chakkaravarthy, “Enhancing security and efficiency in MANETs: a clustering-based approach with CGRUN and AGTO optimization for intrusion detection and path establishment”. International Journal of Information Technology, pp.1-11, 2024.
[15]MR. Jose, SM. Vigila, “F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET”. Expert Systems with Applications. Vol.234, p.120944, 2023.
[16]C. Manthiramoorthy, KM. Khan, “A Hybrid Effective Trusted Knowledge Algorithm for Effective Integrated Internet MANET based on Secure Data Transmission”. In2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2023 (pp. 1-6). IEEE.
[17]P. Singh, M. Khari, S. Vimal, “EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT”. Wireless Personal Communications. Vol.126, No.3, pp.2149-73, 2022.
[18]Zhang, L. and Liu, Q., 2022. Optimisation of the routing protocol for quantum wireless Ad Hoc network. IET Quantum Communication, 3(1), pp.5-12.
[19]Su, Y., Wang, X.A., Du, W., Ge, Y., Zhao, K. and Lv, M., 2023. A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT. Journal of High Speed Networks, 29(1), pp.41-56.
[20]S. Zhang, Y. Zhou, Q. Luo, “A complex-valued encoding satin bowerbird optimization algorithm for global optimization”. Evolving Systems. Vol.12, pp.191-205, 2021.
[21]RT. Forestano, M. Comajoan Cara, GR. Dahale, Z. Dong, S. Gleyzer, D. Justice, K. Kong, T. Magorsch, KT. Matchev, K. Matcheva, EB. Unlu, “A comparison between invariant and equivariant classical and quantum graph neural networks”. Axioms. Vol.13, No.3, p.160, 2024.
[22]S. Ahmad, S. Mehfuz, J. Beg, “An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage”. Concurrency and Computation: Practice and Experience. Vol.35, No.23, p.e7806, 2023.