Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution

Maryam Shabbir, Fahad Ahmad, Ayesha Shabbir, Saad Awadh Alanazi

Research output: Contribution to journalArticlepeer-review


Nuclear Command and Control Center (NCCC) security must be considered a high priority in the nation, country, and ultimately humanity’s best interest. Presently, with the expanding nuclear security risks, it is pivotal to guarantee that malevolent agent never acquires nuclear access. The purpose of this manuscript is to develop Cognitively Managed Multi-Level Authentication (CMMLA) through a collaboration among Cognitive Computing (CC), Quantum Computing (QC) and Cyber Security (CS). Thus, the proposed scheme will provide NCCC with the capability of self-learning, management, inherent security, rigorous, and reliable authentication protocols. Fuzzy Logic-based Quantum Key Distribution (FLQKD) is used to implement CMMLA and perform the experimentation for tangible results over the Simulink from MATLAB R2021a. For the reliability analysis of irregular Charles H. Bennett and Gilles Brassard 1984, (BB84) algorithm that we used and is a variant of Quantum Key Distribution (QKD), experimentation is done through an online QKD Simulator. Consequently, the results of FLQKD implementation show high throughput for the security of NCCC by combining the advantages of well-known techniques of their kind, where the authorized and unauthorized persons are successfully identified, and access granted only to the authenticated persons while considering the different scenarios of access allowance.
Original languageEnglish
Pages (from-to)1468-1485
Number of pages18
JournalJournal of King Saud University-Computer and Information Sciences
Issue number4
Early online date29 Mar 2022
Publication statusPublished - 1 Apr 2022


  • Cognitive computing
  • Conventional computing
  • Quantum computing
  • Cyber security
  • Fuzzy Logic
  • Quantum Key Distribution
  • Irregular BB84
  • Multi-level authentication

Cite this