A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks

被引:43
作者
Mehic, Miralem [1 ,2 ]
Fazio, Peppino [2 ]
Rass, Stefan [3 ]
Maurhart, Oliver [4 ]
Peev, Momtchil [5 ]
Poppe, Andreas [4 ]
Rozhon, Jan [2 ]
Niemiec, Marcin [6 ]
Voznak, Miroslav [2 ]
机构
[1] Univ Sarajevo, Fac Elect Engn, Dept Telecommun, Sarajevo 71000, Bosnia & Herceg
[2] VSB Tech Univ Ostrava, Ostrava 70833, Czech Republic
[3] Univ Klagenfurt, Inst Appl Informat, Syst Secur Grp, A-9020 Klagenfurt, Austria
[4] AIT Austrian Inst Technol GmbH, Ctr Digital Safety & Secur, Secur & Commun Technol, A-1220 Vienna, Austria
[5] Huawei Technol Duesseldorf GmbH, Munich Res Ctr, Opt & Quantum Lab, D-80992 Munich, Germany
[6] AGH Univ Sci & Technol, Dept Telecommun, PL-30059 Krakow, Poland
基金
欧盟地平线“2020”;
关键词
Quantum key distribution; quality of service; routing protocol; real-time traffic; SECURITY; FIELD; AUTHENTICATION; CRYPTOGRAPHY; MANAGEMENT;
D O I
10.1109/TNET.2019.2956079
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we propose a novel quality of service (QoS) model including new metrics for determining the states of public and quantum channels as well as a comprehensive metric of the QKD link. We also propose a novel routing protocol to achieve high-level scalability and minimize consumption of cryptographic keys. Given the limited mobility of nodes in QKD networks, our routing protocol uses the geographical distance and calculated link states to determine the optimal route. It also benefits from a caching mechanism and detection of returning loops to provide effective forwarding while minimizing key consumption and achieving the desired utilization of network links. Simulation results are presented to demonstrate the validity and accuracy of the proposed solutions.
引用
收藏
页码:168 / 181
页数:14
相关论文
共 86 条
[1]  
Abidin A., 2011, ARXIV11095168
[2]   Using quantum key distribution for cryptographic purposes: A survey [J].
Alleaume, R. ;
Branciard, C. ;
Bouda, J. ;
Debuisschert, T. ;
Dianati, M. ;
Gisin, N. ;
Godfrey, M. ;
Grangier, P. ;
Laenger, T. ;
Luetkenhaus, N. ;
Monyk, C. ;
Painchault, P. ;
Peev, M. ;
Poppe, A. ;
Pornin, T. ;
Rarity, J. ;
Renner, R. ;
Ribordy, G. ;
Riguidel, M. ;
Salvail, L. ;
Shields, A. ;
Weinfurter, H. ;
Zeilinger, A. .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :62-81
[3]   Topological optimization of quantum key distribution networks [J].
Alleaume, R. ;
Roueff, F. ;
Diamanti, E. ;
Luetkenhaus, N. .
NEW JOURNAL OF PHYSICS, 2009, 11
[4]   Resilient overlay networks [J].
Andersen, D ;
Balakrishnan, H ;
Kaashoek, F ;
Morris, R .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (01) :66-66
[5]  
Andersen DavidG., 2003, P 3 ACM SIGCOMM C IN, P91, DOI DOI 10.1145/948205.948218
[6]  
[Anonymous], 2015, IEEE J SEL TOP QUANT
[7]  
[Anonymous], 2000, THESIS
[8]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[9]  
Basagni S., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P76, DOI 10.1145/288235.288254
[10]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318