Quantum Key Distribution Networks: A Quality of Service Perspective

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology.
This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. 
Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.

Author(s): Miralem Mehic, Stefan Rass, Peppino Fazio, Miroslav Voznak
Publisher: Springer
Year: 2022

Language: English
Pages: 231
City: Cham

Acknowledgments
Contents
1 Fundamentals of Quantum Key Distribution
1.1 Information-Theoretic Secrecy
1.2 QKD Protocols
1.2.1 BB84 Protocol
1.2.1.1 Sifting: Extraction of a Raw Key
1.2.1.2 Error Rate Estimation
1.2.1.3 Error Key Reconciliation
1.2.1.4 Privacy Amplification
1.2.1.5 Authentication
1.2.2 B92 Protocol
1.2.3 CV-QKD
1.3 Key Length
1.4 Summary
References
2 Quality of Service Requirements
2.1 Quality of Service
2.2 Quality of Service Constraints
2.3 Quality of Service Components
2.4 QKD Networking
2.4.1 QKD Networks
2.4.1.1 Key Relay
2.4.2 QKD Virtual Private Networking
2.4.3 IPsec
2.4.3.1 Authentication Header
2.4.3.2 Encapsulating Security Payload
2.4.3.3 IP Payload Compression Protocol (IPComp)
2.4.3.4 Internet Key Exchange (IKE) Protocols
2.4.4 IPsec and QKD
2.4.5 Passive and Active Eavesdropping
2.4.6 QoS Constraints in QKD Network
2.5 Similarities Between QKD and Ad Hoc Networking
2.6 Summary
References
3 Quality of Service Architectures of Quantum Key Distribution Networks
3.1 Integrated Services
3.1.1 RSVP Protocol
3.1.2 ETSI 004: QKD Application Interface
3.2 Differentiated Services
3.2.1 DiffServ Components
3.2.2 The Per Hop Behavior (PHB) Classes
3.2.3 Per-Domain Behavior (PDB) Metrics
3.2.4 ETSI 014: Protocol and Data Format of REST-Based Key Delivery API
3.3 MultiProtocol Label Switching
3.3.1 MPLS Operation and Architecture Basics
3.3.1.1 MPLS Header
3.3.1.2 MPLS Control and Forwarding Planes
3.3.2 MPLS and QKD
3.4 Flexible Quality of Service Model
3.5 Summary
References
4 Quality of Service Media Access Control of Quantum Key Distribution Networks
4.1 Post-Processing Applications
4.1.1 Improving Error Reconciliation
4.1.1.1 Adaptive Cascade
4.1.1.2 Using Error Correcting Codes
4.1.2 Out-of-Band Authentication and Key Validation
4.1.2.1 Watermarking by Quantum Coin Flipping
4.1.2.2 Watermarking Using Pseudorandom Sequences
4.2 Overlay QKD Networking
4.3 Impact of QKD Key Management
4.4 Summary
References
5 Quality of Service Signaling Protocols in Quantum Key Distribution Networks
5.1 In-Band signaling and QKD
5.1.1 QSIP: A Quantum Key Distribution Signaling Protocol
5.2 Out-of-Band Signaling and QKD
5.2.1 Q3P: Quantum Point-to-Point Protocol
5.2.1.1 Q3P Key Store
5.2.1.2 Q3P Network Stack
5.2.2 RSVP
5.3 Summary
References
6 Quality of Service Routing in Quantum Key Distribution Networks
6.1 Routing in General
6.1.1 Routing Algorithms
6.1.2 Routing Architecture
6.2 Routing Requirements in QKD Networks
6.3 Addressing in QKD Networks
6.4 Routing Protocols
6.4.1 Distance Vector Routing Protocols
6.4.1.1 Distance Vector-Based QKD Routing
6.4.2 Link State Routing Protocols
6.4.3 QKD Routing Based on Link-States
6.5 Greedy Perimeter Stateless Routing for QKD Networks
6.5.1 QKD Link Metric
6.5.1.1 Quantum Channel Status Metric
6.5.1.2 Public Channel Status Metric
6.5.1.3 Overall QKD Link Status Metric
6.5.1.4 GPSRQ Routing Protocol
6.5.2 Greedy Forwarding
6.5.3 Recovery-Mode Forwarding
6.6 Summary
References
7 From Point-to-Point to End-to-End Security in Quantum Key Distribution Networks
7.1 Single-Path Transmission: Trusted Relay
7.2 Relaxing the Trust Assumption: Multipath Transmission
7.2.1 Quantifying the Probability of Eavesdropping
7.2.1.1 Computing the Probability of Eavesdropping
7.2.2 Quantifying the Probability for a DoS
7.2.3 Quantifying Multiple Security Goals
7.3 Weaponizing the Detection of Eavesdropping
7.4 Summary
References
8 Modern Trends in Quantum Key Distribution Networks
8.1 QKD in 5G Networks
8.2 Measurement-Device Independent QKD
8.3 Quantum Repeater
8.4 Summary
References