2020
DOI: 10.3390/app10155193
|View full text |Cite
|
Sign up to set email alerts
|

On the QKD Integration in Converged Fiber/Wireless Topologies for Secured, Low-Latency 5G/B5G Fronthaul

Abstract: A research contribution focusing on the Quantum Key Distribution (QKD)-enabled solutions assisting in the security framework of an optical 5G fronthaul segment is presented. We thoroughly investigate the integration of a BB84-QKD link, operating at telecom band, delivering quantum keys for the Advanced Encryption Standard (AES)-256 encryption engines of a packetized fronthaul layer interconnecting multiple 5G terminal nodes. Secure Key Rate calculations are studied for both dedicated and shared fiber configura… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 53 publications
0
16
0
Order By: Relevance
“…Therefore, it is of high importance that the keys that will support the AES-256 engines are frequently refreshed. Different quantum key rotation times can be selected, depending on the attack surface that we need to pursue in the link, as well the classical data rates fed into AES-256 cryptographic engines [64].…”
Section: Aes-256 Key Refresh Timementioning
confidence: 99%
“…Therefore, it is of high importance that the keys that will support the AES-256 engines are frequently refreshed. Different quantum key rotation times can be selected, depending on the attack surface that we need to pursue in the link, as well the classical data rates fed into AES-256 cryptographic engines [64].…”
Section: Aes-256 Key Refresh Timementioning
confidence: 99%
“…5G networks have enabled multiple simultaneous connection of devices which one report named 'Internet of Actions', thereby providing significantly more intelligent service in a fully automated environment [17], [18]. The authors of such seminal publications conclude that this new era of smart connectivity signifies that cybersecurity has extended to physical space, with life-threatening situations with the potential for mass casualties/ deaths, and quote as a pertinent example, autopilot hacking [17], [18].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, several reviews and research were conducted in 5G [5][6][7]. Although security was one of the main requirements in 5G, however, limited research was proposed in that domain such as [8][9][10] are some of few a survey that emphasizes on the security challenges and communications security of 5G. In the 5G security model, the main security domain such as confidentiality, integrity and availability are ensured [11].…”
Section: Introductionmentioning
confidence: 99%