Abstract:The main service provided by the coming Quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers. We have modeled the components for and structure of quantum repeater network nodes. With this model, we point out attack vectors, then analyze attacks in terms of confidentiality, integrity and availability. While we are reassured about the promises of quantum networks fr… Show more
“…lished, a Bell state measurement on β and δ projects α and γ onto an entangled state, even though these two particles have never shared any common past [19]. Therefore, the entanglement swapping procedure can also be defined as an extension of teleportation [51].…”
Swarms of drones are utilized in a wide range of applications, considering that they can be deployed on-demand and are economically affordable. Furthermore, they can also have a significant role in the creation of future Quantum Networks (QNs). As a matter of fact, the use of drones allows deploying a non terrestrial Quantum Metropolitan Area Network (QMAN), overcoming Optical Fibers' (OFs) limits, due to the large percentage of photons that scatters before reaching the receiver. However, random fluctuations of drones' positions and atmospheric turbulence can affect the quality of the Free Space Optic (FSO) link with a significant impact on performance. Considering that Quantum Drone Networks (QDNs) require significant control, Software-Defined Networking (SDN) paradigm can play a key role in their provisioning. Specifically, an SDN Controller is responsible for managing the global strategies for the distribution of end-to-end (E2E) entangled pairs. Therefore, this paper provides the design of an SDN-based architecture for supporting high-performance Metropolitan Quantum Drone Networks (MQDNs) with a specific protocol for creating entanglement between two Ground Stations (GSs) through the swarm of drones. The proposed architecture can be employed for distributed quantum computing applications and entanglement-based Quantum Key Distribution (QKD) services. Moreover, a suited objective function to optimize the planning and operation of the swarm mission has been proposed. Finally, the paper provides a performance evaluation considering the most relevant metrics, such as fidelity, entanglement rate, and the overhead of the proposed protocol, pointing out that even higher performance than OFs is achievable.
“…lished, a Bell state measurement on β and δ projects α and γ onto an entangled state, even though these two particles have never shared any common past [19]. Therefore, the entanglement swapping procedure can also be defined as an extension of teleportation [51].…”
Swarms of drones are utilized in a wide range of applications, considering that they can be deployed on-demand and are economically affordable. Furthermore, they can also have a significant role in the creation of future Quantum Networks (QNs). As a matter of fact, the use of drones allows deploying a non terrestrial Quantum Metropolitan Area Network (QMAN), overcoming Optical Fibers' (OFs) limits, due to the large percentage of photons that scatters before reaching the receiver. However, random fluctuations of drones' positions and atmospheric turbulence can affect the quality of the Free Space Optic (FSO) link with a significant impact on performance. Considering that Quantum Drone Networks (QDNs) require significant control, Software-Defined Networking (SDN) paradigm can play a key role in their provisioning. Specifically, an SDN Controller is responsible for managing the global strategies for the distribution of end-to-end (E2E) entangled pairs. Therefore, this paper provides the design of an SDN-based architecture for supporting high-performance Metropolitan Quantum Drone Networks (MQDNs) with a specific protocol for creating entanglement between two Ground Stations (GSs) through the swarm of drones. The proposed architecture can be employed for distributed quantum computing applications and entanglement-based Quantum Key Distribution (QKD) services. Moreover, a suited objective function to optimize the planning and operation of the swarm mission has been proposed. Finally, the paper provides a performance evaluation considering the most relevant metrics, such as fidelity, entanglement rate, and the overhead of the proposed protocol, pointing out that even higher performance than OFs is achievable.
“…Furthermore, PQC has led to new research directions driven by different quantum attacks. For instance, quantum-resistant routing aims at achieving a secure and sustainable quantum-safe Internet 16 .…”
Networked-Control Systems (NCSs), a type of cyber-physical systems, consist of tightly integrated computing, communication and control technologies. While being very flexible environments, they are vulnerable to computing and networking attacks. Recent NCSs hacking incidents had major impact. They call for more research on cyber-physical security. Fears about the use of quantum computing to break current cryptosystems make matters worse. While the quantum threat motivated the creation of new disciplines to handle the issue, such as post-quantum cryptography, other fields have overlooked the existence of quantum-enabled adversaries. This is the case of cyber-physical defense research, a distinct but complementary discipline to cyber-physical protection. Cyber-physical defense refers to the capability to detect and react in response to cyber-physical attacks. Concretely, it involves the integration of mechanisms to identify adverse events and prepare response plans, during and after incidents occur. In this paper, we assume that the eventually available quantum computer will provide an advantage to adversaries against defenders, unless they also adopt this technology. We envision the necessity for a paradigm shift, where an increase of adversarial resources because of quantum supremacy does not translate into a higher likelihood of disruptions. Consistently with current system design practices in other areas, such as the use of artificial intelligence for the reinforcement of attack detection tools, we outline a vision for next generation cyber-physical defense layers leveraging ideas from quantum computing and machine learning. Through an example, we show that defenders of NCSs can learn and improve their strategies to anticipate and recover from attacks.
“…However, the focus on QKD also painted a skewed and incomplete picture of security in quantum networks as a whole. This has been slowly changing lately and it has been recognized that while in principle quantum mechanics offers new methods of detecting malicious players in a network, it also enables new vectors of attack [75].…”
Entangled quantum communication is advancing rapidly, with laboratory and metropolitan testbeds under development, but to date there is no unifying Quantum Internet architecture. We propose a Quantum Internet architecture centered around the Quantum Recursive Network Architecture (QRNA), using RuleSet-based connections established using a two-pass connection setup. Scalability and internetworking (for both technological and administrative boundaries) are achieved using recursion in naming and connection control. In the near term, this architecture will support end-to-end, two-party entanglement on minimal hardware, and it will extend smoothly to multi-party entanglement and the use of quantum error correction on advanced hardware in the future. For a network internal gateway protocol, we recommend (but do not require) qDijkstra with seconds per Bell pair as link cost for routing; the external gateway protocol is designed to build recursively. The strength of our architecture is shown by assessing extensibility and demonstrating how robust protocol operation can be confirmed using the RuleSet paradigm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.