Quantum Computing Impacts on Smart City Cybersecurity Through Resilient Defense Framework
Quantum Computing Impacts on Resilient Cybersecurity Frameworks for Smart Cities
DOI:
https://doi.org/10.71346/utj.v1i1.8Keywords:
Quantum computing, Smart city cybersecurity, Quantum-resilient cryptography, Zero-day attacks, Hybrid quantum-classical simulations, Anomaly detection systems, Blockchain security protocols, Machine learning-based threat detection, Lattice-based encryption, Adaptive cybersecurity frameworksAbstract
The research investigates the implications of quantum computing on smart city infrastructure with a specific focus on addressing cybersecurity challenges. Smart cities, reliant on interconnected systems, are increasingly vulnerable to zero-day attacks exacerbated by quantum computing advancements. This study aims to develop a robust defense framework integrating quantum-resilient cryptographic techniques, artificial intelligence-based anomaly detection systems, and hybrid quantum-classical simulations. The methodology utilizes lattice-based encryption schemes and hash-based signatures to fortify communications, while machine learning models such as Long Short-Term Memory networks and Convolutional Neural Networks identify complex patterns indicative of cyber threats. Evaluation within a simulated smart city environment demonstrates high detection accuracy of 97.8 percent, reduced false positive rates, and efficient resource consumption, validating the framework’s practical applicability. By bridging theoretical advancements and practical implementation, this work enhances the resilience of urban infrastructures against quantum-augmented threats. Findings contribute to the growing body of knowledge by offering scalable and adaptable solutions tailored to the resource-constrained nature of smart cities. Future research can extend this work by addressing energy efficiency, interoperability across sectors, and incorporating federated learning paradigms to enhance distributed anomaly detection. These advancements hold significant implications for securing next-generation urban systems while ensuring sustainability and operational efficiency.
References
M. S. Peelam, A. A. Rout, and V. Chamola, "Quantum computing applications for Internet of Things," IET Quantum Communication, vol. 5, no. 2, pp. 103–112, Nov. 2023. doi: 10.1049/qtc2.12079.
M. J. D. Vermeer, C. Heitzenrater, E. Parker, A. Moon, D. Lumpkin, and J. Awan, "Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems," Journal of Critical Infrastructure Policy, Sep. 2024. doi: 10.1002/jci3.12024.
E. M. Stoudenmire and X. Waintal, "Opening the black box inside Grover’s algorithm," Physical Review X, vol. 14, no. 4, Nov. 2024. doi: 10.1103/physrevx.14.041029.
D. Willsch, M. Willsch, F. Jin, H. De Raedt, and K. Michielsen, "Large-scale simulation of Shor’s quantum factoring algorithm," Mathematics, vol. 11, no. 19, p. 4222, Oct. 2023. doi: 10.3390/math11194222.
H. Yalcin, T. Daim, M. M. Moughari, and A. Mermoud, "Supercomputers and quantum computing on the axis of cyber security," Technology in Society, vol. 77, p. 102556, Apr. 2024. doi: 10.1016/j.techsoc.2024.102556.
H. Chen, A. E. Azzoui, H. Park, D. Camacho, and J. H. Park, "A comprehensive study of quantum computing technologies in smart city: Review and future directions," SSRN, vol. Preprint, pp. 1–23, Dec. 2023. doi: 10.2139/ssrn.4661705.
Y. Baseri, V. Chouhan, and A. Ghorbani, "Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure," arXiv (Cornell University), vol. 2404.10659, pp. 1–25, Apr. 2024. doi: 10.48550/arxiv.2404.10659.
K. Seyhan, T. N. Nguyen, S. Akleylek, and K. Cengiz, "Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey," Cluster Computing, vol. 25, no. 3, pp. 1729–1748, Aug. 2021. doi: 10.1007/s10586-021-03380-7.
K. C. Dekkaki, I. Tasic, and M.-D. Cano, "Exploring post-quantum cryptography: Review and directions for the transition process," Technologies, vol. 12, no. 12, p. 241, Nov. 2024. doi: 10.3390/technologies12120241.
X. Zheng, "Research on blockchain smart contract technology based on resistance to quantum computing attacks," PLoS ONE, vol. 19, no. 5, p. e0302325, May 2024. doi: 10.1371/journal.pone.0302325.
R. Zhao, "NSL-KDD," KDDTrain+, KDDTest+, IEEE Data Port, Feb. 2022. doi: 10.21227/8rpg-qt98.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Amna Khatoon , Rubina Riaz

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright for all articles published in CrossLink Studies journals. These articles are made freely available under a Creative Commons CC BY 4.0 license, which allows unrestricted downloading and reading by the public.