Abstract
The main service provided by the coming quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers. We have modeled the components for and structure of quantum repeater network nodes. With this model, we point out attack vectors, then analyze attacks in terms of confidentiality, integrity, and availability. While we are reassured about the promises of quantum networks from the confidentiality point of view, integrity and availability present new vulnerabilities not present in classical networks and require care to handle properly. We observe that the requirements on the classical computing/networking elements affect the systems’ overall security risks. This component-based analysis establishes a framework for further investigation of network-wide vulnerabilities.
Highlights
HE computers and networks in common use today are built on classical notions of information, generally using small amounts of electrical charge, the orientation of tiny magnets, and optical signals as data
This work is the first attempt to summarize the threats on the Quantum Internet
We have provided an analysis of security for a quantum repeater architecture based on our current knowledge, by referring to proposed taxonomies for classical systems
Summary
HE computers and networks in common use today are built on classical notions of information, generally using small amounts of electrical charge, the orientation of tiny magnets, and optical signals as data. The classical Internet, the global-scale network of networks, has emerged over some five decades, and security is a major area in research, engineering and operations [45], [46] Both hardware and software evolve quickly, and both attacks and defense applied to network infrastructure and end nodes emerge at an astounding rate. Other vulnerabilities affect the stability of the network itself by disrupting routing or naming systems, or by flooding portions of the network with excess traffic Such vulnerabilities and attacks have to be discussed to design secure Quantum Internet architectures. Since RFID systems are sensitive to noise and intentional, malicious input, a classification of attack methods, such as information theft and spoofing, has been developed by Weingart [49], Mitrokotsa [50], and Mirowski [51] These methods inspired us to classify attacks on quantum networks. Knowledge gained during the engineering of classical networks will be beneficial to minimize security issues of developing quantum networks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have