{"id":"https://openalex.org/W7131363215","doi":"https://doi.org/10.3390/info17030220","title":"Enhancing Data Security in Satellite Communication Systems: Integrating Quantum Cryptography with CatBoost Machine Learning","display_name":"Enhancing Data Security in Satellite Communication Systems: Integrating Quantum Cryptography with CatBoost Machine Learning","publication_year":2026,"publication_date":"2026-02-25","ids":{"openalex":"https://openalex.org/W7131363215","doi":"https://doi.org/10.3390/info17030220"},"language":"en","primary_location":{"id":"doi:10.3390/info17030220","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info17030220","pdf_url":"https://www.mdpi.com/2078-2489/17/3/220/pdf","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/17/3/220/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123350820","display_name":"Mohd Nadeem","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106473","display_name":"Shri Ramswaroop Memorial University","ror":"https://ror.org/011nk9770","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210106473"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohd Nadeem","raw_affiliation_strings":["Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki 225003, India"],"raw_orcid":"https://orcid.org/0000-0003-4244-8076","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki 225003, India","institution_ids":["https://openalex.org/I4210106473"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078792432","display_name":"Syed Anas Ansar","orcid":"https://orcid.org/0000-0001-7387-8912"},"institutions":[{"id":"https://openalex.org/I2802982682","display_name":"Sandip Foundation","ror":"https://ror.org/04vhxp922","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802982682"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Syed Anas Ansar","raw_affiliation_strings":["School of Computer Science and Engineering, Sandip University, Sijoul, Madhubani 847235, India"],"raw_orcid":"https://orcid.org/0000-0001-7387-8912","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sandip University, Sijoul, Madhubani 847235, India","institution_ids":["https://openalex.org/I2802982682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094006943","display_name":"Sakshi Halwai","orcid":null},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sakshi Halwai","raw_affiliation_strings":["Department of Computer Applications, Chandigarh School of Business, CGC University, Mohali 140307, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, Chandigarh School of Business, CGC University, Mohali 140307, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Arpita Singh","orcid":"https://orcid.org/0000-0001-8561-587X"},"institutions":[{"id":"https://openalex.org/I229991691","display_name":"Chhatrapati Shahu Ji Maharaj University","ror":"https://ror.org/040qxz868","country_code":"IN","type":"education","lineage":["https://openalex.org/I229991691"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arpita Singh","raw_affiliation_strings":["Department of Computer Application, UIET, Chhatrapati Shahuji Maharaj University, Kanpur 208024, India"],"raw_orcid":"https://orcid.org/0000-0001-8561-587X","affiliations":[{"raw_affiliation_string":"Department of Computer Application, UIET, Chhatrapati Shahuji Maharaj University, Kanpur 208024, India","institution_ids":["https://openalex.org/I229991691"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126745761","display_name":"Rajeev Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106473","display_name":"Shri Ramswaroop Memorial University","ror":"https://ror.org/011nk9770","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210106473"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajeev Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki 225003, India"],"raw_orcid":"https://orcid.org/0000-0002-1813-1362","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki 225003, India","institution_ids":["https://openalex.org/I4210106473"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123350820"],"corresponding_institution_ids":["https://openalex.org/I4210106473"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37585319,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"3","first_page":"220","last_page":"220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.120899997651577,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.120899997651577,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.07779999822378159,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.034299999475479126,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.6596999764442444},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6075999736785889},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5954999923706055},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5376999974250793},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4203000068664551},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4099000096321106},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3646000027656555},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.34869998693466187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7386000156402588},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.6596999764442444},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6075999736785889},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5954999923706055},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5376999974250793},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4203000068664551},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3646000027656555},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.34869998693466187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3301999866962433},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.32820001244544983},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C15706264","wikidata":"https://www.wikidata.org/wiki/Q230883","display_name":"Quantum state","level":3,"score":0.3003999888896942},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.29919999837875366},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28360000252723694},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2824000120162964},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2741999924182892},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.26919999718666077},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2676999866962433},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26019999384880066},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info17030220","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info17030220","pdf_url":"https://www.mdpi.com/2078-2489/17/3/220/pdf","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1f605e4e7f3e4ac3abfa7723dd4bcb27","is_oa":true,"landing_page_url":"https://doaj.org/article/1f605e4e7f3e4ac3abfa7723dd4bcb27","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 17, Iss 3, p 220 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info17030220","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info17030220","pdf_url":"https://www.mdpi.com/2078-2489/17/3/220/pdf","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46024447679519653,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7131363215.pdf","grobid_xml":"https://content.openalex.org/works/W7131363215.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"modern":[1],"communication":[2,175],"networks,":[3],"particularly":[4],"satellite-based":[5],"systems,":[6],"data":[7,43],"security":[8,62,104],"faces":[9],"significant":[10],"challenges":[11],"from":[12],"vulnerabilities":[13],"such":[14,106,153],"as":[15,107,148,154],"signal":[16],"interception,":[17],"jamming,":[18],"and":[19,46,56,112,122,144,158],"latency":[20],"during":[21],"long":[22],"distance":[23],"transmissions.":[24],"Traditional":[25],"cryptographic":[26],"methods":[27],"are":[28],"increasingly":[29],"vulnerable":[30],"to":[31,41,60,93],"quantum":[32,54,75,84,145,164],"computing":[33],"threats,":[34],"underscoring":[35],"the":[36,51,126],"need":[37],"for":[38,102,172],"advanced":[39],"solutions":[40],"protect":[42],"integrity,":[44],"confidentiality,":[45],"availability.":[47],"This":[48],"research":[49],"investigates":[50],"fusion":[52],"of":[53,96,120,132],"cryptography":[55],"Machine":[57],"Learning":[58],"(ML)":[59],"improve":[61],"in":[63,74],"satellite":[64],"communication.":[65],"The":[66,87,115],"Quantum":[67],"Key":[68],"Distribution":[69],"(QKD),":[70],"which":[71],"is":[72,91],"grounded":[73],"mechanics,":[76],"enables":[77],"unbreakable":[78],"encryption":[79,110,146],"by":[80],"detecting":[81],"eavesdropping":[82],"via":[83],"state":[85],"disturbances.":[86],"CatBoost":[88],"ML":[89,165],"algorithm":[90],"applied":[92],"a":[94,168],"dataset":[95],"10,000":[97],"records":[98],"featuring":[99],"categorical":[100],"attributes":[101],"prioritizing":[103],"elements":[105],"anomaly":[108,141],"detection,":[109],"types,":[111],"access":[113],"controls.":[114],"model":[116],"yields":[117],"an":[118],"accuracy":[119],"89.23%":[121],"Area":[123],"under":[124],"Curve":[125],"Receiver":[127],"Operating":[128],"Characteristic":[129],"(AUC-ROC)":[130],"score":[131],"94.56%,":[133],"effectively":[134],"predicting":[135],"threat":[136],"levels.":[137],"Feature":[138],"importance":[139],"reveals":[140],"detection":[142],"(28.5%)":[143],"(22.3%)":[147],"primary":[149],"contributors.":[150],"While":[151],"hurdles":[152],"high":[155],"implementation":[156],"costs":[157],"transmission":[159],"range":[160],"limitations":[161],"persist,":[162],"this":[163],"synergy":[166],"provides":[167],"proactive,":[169],"adaptive":[170],"framework":[171],"resilient,":[173],"future-ready":[174],"networks.":[176]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-25T00:00:00"}
