Quantum-Enabled Drones for Battlefield Information Dominance: Integrating Sensing, Computing, and Secure Communications

Authors

  • Dr. Sai Krishna Thota Researcher, University of the Cumberlands, Williamsburg, Kentucky, USA. Author
  • Sathish Krishna Anumula Enterprise Cloud Solutions CSM Architect, IBM, USA. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V5I4P116

Keywords:

Quantum Drones, Battlefield Intelligence, Quantum Senses, Secure Communications, Autonomous Working, Information Superiority

Abstract

Modern battlefields have been growing in complexity thus putting additional pressure on the need to have quick, precise, and resilient information dominance. Drones have become unavoidable intelligence, surveillance, reconnaissance, and communications tools in the form of autonomous unmanned aerial vehicles (UAVs). Nevertheless, the traditional types of drones are limited by sensing accuracy weaknesses, computational latency, exposure to electronic warfare, and unsecured data transmission. New breakthroughs in quantum technologies provide the opportunity to overcome these drawbacks successfully. The article investigates the formation of quantum-enabled sensing, quantum-assisted computing, and quantum-secure communications into future military drone programs. Drone vehicles in battlefields can enjoy a new level of information dominance by using quantum sensors to improve situational awareness, quantum-inspired computing in less time to make critical decisions, and quantum-resistant or quantum key distribution-based communications to exchange data and information securely. The article suggests a stacked design of quantum-powered drone, derives the benefits of its use in contested settings, and explores technical issues connected to scalability, energy requirements, and deployment capabilities. Such an orientation on quantum enables drones as a defense-focused perspective on the future of the battlefield information dominance enabling.

Downloads

Download data is not yet available.

References

[1] Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 175–179.

[2] Bongs, K., Holynski, M., Vovrosh, J., Bouyer, P., Condon, G., Rasel, E., Schubert, C., Schleich, W. P., & Roura, A. (2019). Taking atom interferometric quantum sensors from the laboratory to real-world applications. Nature Reviews Physics, 1(12), 731–739.

[3] Gyongyosi, L., & Imre, S. (2019). A survey on quantum computing technology. Computer Science Review, 31, 51–71.

[4] Kaplan, E. D., & Hegarty, C. J. (2017). Understanding GPS/GNSS: Principles and applications (3rd ed.). Artech House.

[5] Preskill, J. (2018). Quantum computing in the NISQ era and beyond. Quantum, 2, 79.

[6] Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509.

[7] Zhang, Q., Xu, F., Chen, Y. A., Peng, C. Z., & Pan, J. W. (2014). Large scale quantum key distribution: Challenges and solutions. Optics Express, 21(20), 24147–24159.

Published

2024-12-30

Issue

Section

Articles

How to Cite

1.
Thota SK, Anumula SK. Quantum-Enabled Drones for Battlefield Information Dominance: Integrating Sensing, Computing, and Secure Communications. IJETCSIT [Internet]. 2024 Dec. 30 [cited 2026 Feb. 26];5(4):147-50. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/580

Similar Articles

31-40 of 316

You may also start an advanced similarity search for this article.