Optical Fiber Communication Conference 2018
DOI: 10.1364/ofc.2018.m2a.6
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN)

Abstract: We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 7 publications
0
17
0
Order By: Relevance
“…In addition, to the best of the authors' knowledge, attacks over quantum channels have not been investigated in SDM (MCF) and in this work, the experimental demonstration has been used to verify the impact and to probe the mitigation technique using SDN and real-time monitoring. This work details the concept of a SDN-based network control application suitable for mitigating a channel attack in a QKD network and extends the results of [22] with further investigations of the impact of the optical fiber length in SSMF, the effect of wavelength-tuning the attacker and the result of crosstalk in MCFs and intercore MCF switching after adjacent-core attack. Characterization of the MCF is shown as well as fundamental descriptions of the encryption operation with respect to key material.…”
Section: Monitoring and Physical Layer Attack Mitigation In Sdn-contrmentioning
confidence: 70%
See 2 more Smart Citations
“…In addition, to the best of the authors' knowledge, attacks over quantum channels have not been investigated in SDM (MCF) and in this work, the experimental demonstration has been used to verify the impact and to probe the mitigation technique using SDN and real-time monitoring. This work details the concept of a SDN-based network control application suitable for mitigating a channel attack in a QKD network and extends the results of [22] with further investigations of the impact of the optical fiber length in SSMF, the effect of wavelength-tuning the attacker and the result of crosstalk in MCFs and intercore MCF switching after adjacent-core attack. Characterization of the MCF is shown as well as fundamental descriptions of the encryption operation with respect to key material.…”
Section: Monitoring and Physical Layer Attack Mitigation In Sdn-contrmentioning
confidence: 70%
“…path computation algorithm) for optimum QKD performance. In particular, in [22] it has been demonstrated that the combination of QKD and SDN can provide continuous realtime monitoring of quantum parameters, such as quantum bit error rate (QBER) and secret key rate (SKR), and flexible configuration of optical paths to ensure the uninterrupted distribution of quantum keys in a network prone to physical-layer attacks or with randomly appearing physical impairments.…”
Section: Monitoring and Physical Layer Attack Mitigation In Sdn-contrmentioning
confidence: 99%
See 1 more Smart Citation
“…A simple and traditional one is to switch back to classical key distribution, which however loses unconditional security. Most research groups [21]- [24] focus on reselecting different quantum channels for two distant partners during DoS attacks. For instance, Hugues-Salas et al [21] experimentally demonstrate the effectiveness of simply selecting an alternative path for a QKD-enabled optical network under DoS attacks.…”
Section: Transactions On Ieeementioning
confidence: 99%
“…In 2018, to effectively alleviate the problem of in-band noise in the QKD network, Ou et al used machine learning-based approach to estimate physical performances of quantum channel for the successful key generation and transmission [23]. In the same year, Hugues-Salas et al demonstrated that QKD resources can be successfully allocated through SDN control under DDoS attacks [24]. The results indicate that the application of SDN technology is conducive to alleviate the impact of DDoS attack on QKD networks.…”
Section: Experimental Verification Of the Networkmentioning
confidence: 99%