Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Monitoring and Physical-Layer Attack Mitigation in SDN-Controlled Quantum Key Distribution Networks

Not Accessible

Your library or personal account may give you access

Abstract

Quantum key distribution (QKD) has been identified as a secure method for providing symmetric keys between two parties based on the fundamental laws of quantum physics, making it impossible for a third party to copy the quantum states exchanged without being detected by the sender (Alice) and receiver (Bob) and without altering the original states. However, when QKD is applied in a deployed optical network, physical-layer intrusions may occur in the optical links by injecting harmful signals directly into the optical fiber. This can have a detrimental effect on the key distribution and eventually lead to its disruption. On the other hand, network architectures with software-defined networking (SDN) benefit from a homogeneous and unified control plane that can seamlessly control a QKD-enabled optical network end-to-end. There is no need for a separate QKD control, a separate control for each segment of an optical network, and an orchestrator to coordinate between these parts. Furthermore, SDN allows customized and application-tailored control and algorithm provisioning, such as QKD-aware optical path computation, to be deployed in the network, independent of the underlying infrastructure. Therefore, in this paper, we investigate the integration of the application, SDN, and QKD infrastructure layers and confirm capability for flexible supervision and uninterrupted key service provisioning in the event of link level attacks. An experimental demonstrator is used, for the first time, to verify the architecture proposed, considering real-time monitoring of quantum parameters and fiber-optic link intruders to emulate real-world conditions. Furthermore, attacks on a standard single-mode fiber (via a 3 dB coupler) and a multicore fiber (via an adjacent core) are undertaken to explore different connectivity between QKD units. Results show additional attacker identification and switching time of less than 60 ms for the link cases investigated, being negligible compared to the total (re-)initialization time of 14 min of the QKD units.

© 2019 Optical Society of America

Full Article  |  PDF Article
More Like This
Cost-Efficient Quantum Key Distribution (QKD) Over WDM Networks

Yuan Cao, Yongli Zhao, Jianquan Wang, Xiaosong Yu, Zhangchao Ma, and Jie Zhang
J. Opt. Commun. Netw. 11(6) 285-298 (2019)

SDQaaS: software defined networking for quantum key distribution as a service

Yuan Cao, Yongli Zhao, Jianquan Wang, Xiaosong Yu, Zhangchao Ma, and Jie Zhang
Opt. Express 27(5) 6892-6909 (2019)

Protection Schemes for Key Service in Optical Networks Secured by Quantum Key Distribution (QKD)

Hua Wang, Yongli Zhao, Xiaosong Yu, Zhangchao Ma, Jianquan Wang, Avishek Nag, Longteng Yi, and Jie Zhang
J. Opt. Commun. Netw. 11(3) 67-78 (2019)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (18)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved