Quantum key distribution secured optical networks: a survey

Show simple item record

dc.contributor.author Sharma, Purva
dc.contributor.author Agrawal, Anuj
dc.contributor.author Bhatia, Vimal
dc.contributor.author Prakash, Shashi
dc.contributor.author Mishra, Amit Kumar
dc.coverage.spatial United States of America
dc.date.accessioned 2012-10-11T15:51:32Z
dc.date.available 2012-10-11T15:51:32Z
dc.date.issued 2021-08
dc.identifier.citation Sharma, Purva; Agrawal, Anuj; Bhatia, Vimal; Prakash, Shashi and Mishra, Amit Kumar, "Quantum key distribution secured optical networks: a survey", IEEE Open Journal of the Communications Society, DOI: 10.1109/OJCOMS.2021.3106659, Aug. 2021. en_US
dc.identifier.issn 2644-125X
dc.identifier.uri https://doi.org/10.1109/OJCOMS.2021.3106659
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/6892
dc.description.abstract Increasing incidents of cyber attacks and evolution of quantum computing poses challenges to secure existing information and communication technologies infrastructure. In recent years, quantum key distribution (QKD) is being extensively researched, and is widely accepted as a promising technology to realize secure networks. Optical fiber networks carry a huge amount of information, and are widely deployed around the world in the backbone terrestrial, submarine, metro, and access networks. Thus, instead of using separate dark fibers for quantum communication, integration of QKD with the existing classical optical networks has been proposed as a cost-efficient solution, however, this integration introduces new research challenges. In this paper, we do a comprehensive survey of the state-of-the-art QKD secured optical networks, which is going to shape communication networks in the coming decades. We elucidate the methods and protocols used in QKD secured optical networks, and describe the process of key establishment. Various methods proposed in the literature to address the networking challenges in QKD secured optical networks, specifically, routing, wavelength and time-slot allocation (RWTA), resiliency, trusted repeater node (TRN) placement, QKD for multicast service, and quantum key recycling are described and compared in detail. This survey begins with the introduction to QKD and its advantages over conventional encryption methods. Thereafter, an overview of QKD is given including quantum bits, basic QKD system, QKD schemes and protocol families along with the detailed description of QKD process based on the Bennett and Brassard-84 (BB84) protocol as it is the most widely used QKD protocol in the literature. QKD system are also prone to some specific types of attacks, hence, we describe the types of quantum hacking attacks on the QKD system along with the methods used to prevent them. Subsequently, the process of point-to-point mechanism of QKD over an optical fiber link is described in detail using the BB84 protocol. Different architectures of QKD secured optical networks are described next. Finally, major findings from this comprehensive survey are summarized with highlighting open issues and challenges in QKD secured optical networks.
dc.description.statementofresponsibility by Purva Sharma, Anuj Agrawal, Vimal Bhatia, Shashi Prakash and Amit Kumar Mishra
dc.language.iso en_US en_US
dc.publisher Institute of Electrical and Electronics Engineers en_US
dc.subject Quantum-classical coexistence en_US
dc.subject Quantum key distribution en_US
dc.subject Lightpath attacks en_US
dc.subject Optical networks en_US
dc.subject Routing, wavelength and time-slot allocation en_US
dc.subject Trusted repeater nodes. en_US
dc.title Quantum key distribution secured optical networks: a survey en_US
dc.type Article en_US
dc.relation.journal IEEE Open Journal of the Communications Society


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account