2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT) 2022
DOI: 10.1109/icat54566.2022.9811238
|View full text |Cite
|
Sign up to set email alerts
|

Simulations of Denial of Service Attacks in Quantum Key Distribution Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The process assumes a perfect cloning device capable of cloning and maintaining all the characteristics and properties of that specific polarized photon, even though they are affected by the fidelity of the equipment used. Relative attacks such as beam-splitting [34][35][36] have been a platform for daisy chaining other exploratory exploitations, such as calibration attacks [37,38], side-channel attacks [39][40][41], which extend wavelength manipulation [42,43] with a similar profile attack, such as detector-deviceindependent [44], denial of service attack [45,46], intercept-resend attack [47], and Trojan horse attack [48].…”
Section: Quantum Attacksmentioning
confidence: 99%
“…The process assumes a perfect cloning device capable of cloning and maintaining all the characteristics and properties of that specific polarized photon, even though they are affected by the fidelity of the equipment used. Relative attacks such as beam-splitting [34][35][36] have been a platform for daisy chaining other exploratory exploitations, such as calibration attacks [37,38], side-channel attacks [39][40][41], which extend wavelength manipulation [42,43] with a similar profile attack, such as detector-deviceindependent [44], denial of service attack [45,46], intercept-resend attack [47], and Trojan horse attack [48].…”
Section: Quantum Attacksmentioning
confidence: 99%
“…Especially in cases when encryptors try to maintain a large number of IPsec sessions for which they initiate separate ETSI 004 sessions [6]. We analyzed such an approach in our previous work [13].…”
Section: Qkd End-user Standardsmentioning
confidence: 99%
“…Following the previously discussed categorization of requests into priority queues [13], we calculated value of k as follows, and using the smallest possible characteristic p = 3, using 2 bits per element of Z 3 , which we use in the linear mixing (via Hadamard matrices).…”
Section: B Handling a Dos-danger By Key Store Exhaustion Attemptsmentioning
confidence: 99%
See 1 more Smart Citation