Table 1 Symbols used with description.

From: 6G -enabled qubit-based concealed communication with AI-driven breach detection in autonomous fleets

Symbol

Description

Symbol

Description

\(\:{h}_{n}\)

Sharing instances

\(\:S\)

Communication analysis

\(\:{\:h}_{0}\)

Single vehicle

\(\:{h}_{n}\)

Total vehicle count

\(\:{h}^{{\prime\:}}\)

Neighbor vehicle (initial)

\(\:{\:n}_{f}\)

Information sharing

\(\:{x}^{{\prime\:}}\)

Security parameter for sharing

\(\:{m}_{0}\)

Heterogeneous communication

\(\:{\:q}^{{\prime\:}}\)

Request

\(\:{p}_{s}\)

Response

\(\:L\)

Security measure

\(\:{m}^{{\prime\:}}\)

Data processing time

\(\:{d}^{{\prime\:}}\)

Previous information state

\(\:I\)

Information sharing identification

\(\:T\)

Authentication

\(\:{\:c}_{h}\)

Secured information sharing

\(\:{\:e}_{d}\)

Recommendation

\(\:E\)

Adverse breach detection

\(\:{b}_{e}\left({n}_{f}\right)\)

Adverse information sharing instances

\(\:{\:u}_{r}\)

Current security instances

\(\:{g}^{{\prime\:}}\)

Qubits

\(\:{i}_{0}\left({n}_{f}\right)\)

Training instances

\(\:{r}^{{\prime\:}}\)

Authenticated qubits

\(\:{\:i}_{0}\)

Secure communication between direct neighbors

\(\:C\left(E\right)\)

Mapping function

\(\:S\left(O\right)\)

Mapping decision

\(\:S\left({s}_{a}\right)\)

Mapping factor

\(\:E\left(T\right)\)

Authentication process

\(\:I\left({h}^{{\prime\:}}\right)\)

Secure neighbor identification

\(\:K\)

Security breach detection