Abstract

The main service provided by the coming quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers. We have modeled the components for and structure of quantum repeater network nodes. With this model, we point out attack vectors, then analyze attacks in terms of confidentiality, integrity, and availability. While we are reassured about the promises of quantum networks from the confidentiality point of view, integrity and availability present new vulnerabilities not present in classical networks and require care to handle properly. We observe that the requirements on the classical computing/networking elements affect the systems’ overall security risks. This component-based analysis establishes a framework for further investigation of network-wide vulnerabilities.

Highlights

  • HE computers and networks in common use today are built on classical notions of information, generally using small amounts of electrical charge, the orientation of tiny magnets, and optical signals as data

  • This work is the first attempt to summarize the threats on the Quantum Internet

  • We have provided an analysis of security for a quantum repeater architecture based on our current knowledge, by referring to proposed taxonomies for classical systems

Read more

Summary

INTRODUCTION

HE computers and networks in common use today are built on classical notions of information, generally using small amounts of electrical charge, the orientation of tiny magnets, and optical signals as data. The classical Internet, the global-scale network of networks, has emerged over some five decades, and security is a major area in research, engineering and operations [45], [46] Both hardware and software evolve quickly, and both attacks and defense applied to network infrastructure and end nodes emerge at an astounding rate. Other vulnerabilities affect the stability of the network itself by disrupting routing or naming systems, or by flooding portions of the network with excess traffic Such vulnerabilities and attacks have to be discussed to design secure Quantum Internet architectures. Since RFID systems are sensitive to noise and intentional, malicious input, a classification of attack methods, such as information theft and spoofing, has been developed by Weingart [49], Mitrokotsa [50], and Mirowski [51] These methods inspired us to classify attacks on quantum networks. Knowledge gained during the engineering of classical networks will be beneficial to minimize security issues of developing quantum networks

QUANTUM INTERNET
THE ROLE OF A QUANTUM REPEATER
LINK TYPES AND GENERATIONS OF QUANTUM
MANAGEMENT OF A QUANTUM REPEATER
APPLICATIONS OF A QUANTUM INTERNET
Quantum computing
HARDWARE MODEL OF THE QUANTUM INTERNET
QUANTUM PLANE COMPONENTS OF A QNODE
A QNIC is a quantum network’s equivalent of a classical
CLASSICAL PLANE COMPONENTS OF A QNODE
ELEMENTS OF QNODE TO QNODE CONNECTION
ATTACKS WITHOUT CONTROL OF QUANTUM
ATTACKS ON THE QUANTUM PLANE
ATTACKS ON THE CLASSICAL PLANE
ATTACKS BY A MALICIOUS REPEATER NODE
ATTACKS BY A MALICIOUS ROUTER NODE
ATTACKS BY MULTIPLE HIJACKED QNODES
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call