Abstract
Increasing incidents of cyber attacks and evolution of quantum computing poses challenges to secure existing information and communication technologies infrastructure. In recent years, quantum key distribution (QKD) is being extensively researched, and is widely accepted as a promising technology to realize secure networks. Optical fiber networks carry a huge amount of information, and are widely deployed around the world in the backbone terrestrial, submarine, metro, and access networks. Thus, instead of using separate dark fibers for quantum communication, integration of QKD with the existing classical optical networks has been proposed as a cost-efficient solution, however, this integration introduces new research challenges. In this paper, we do a comprehensive survey of the state-of-the-art QKD secured optical networks, which is going to shape communication networks in the coming decades. We elucidate the methods and protocols used in QKD secured optical networks, and describe the process of key establishment. Various methods proposed in the literature to address the networking challenges in QKD secured optical networks, specifically, routing, wavelength and time-slot allocation (RWTA), resiliency, trusted repeater node (TRN) placement, QKD for multicast service, and quantum key recycling are described and compared in detail. This survey begins with the introduction to QKD and its advantages over conventional encryption methods. Thereafter, an overview of QKD is given including quantum bits, basic QKD system, QKD schemes and protocol families along with the detailed description of QKD process based on the Bennett and Brassard-84 (BB84) protocol as it is the most widely used QKD protocol in the literature. QKD system are also prone to some specific types of attacks, hence, we describe the types of quantum hacking attacks on the QKD system along with the methods used to prevent them. Subsequently, the process of point-to-point mechanism of QKD over an optical fiber link is described in detail using the BB84 protocol. Different architectures of QKD secured optical networks are described next. Finally, major findings from this comprehensive survey are summarized with highlighting open issues and challenges in QKD secured optical networks.
Highlights
Q UANTUM KEY DISTRIBUTION (QKD) has emerged as a solution to provide security for the future optical communication networks
Technoeconomic analysis of other schemes that do not require trusted repeater node (TRN), such as measurement-device-independent QKD (MDI-QKD) and twin-field QKD (TF-QKD) need to be done researched in detail for QKD secured optical networks as an alternative to TRN supported long-distance optical networks secured by QKD
It may be noted here that in a quantum cloud infrastructure supported by optical network, the quantum computing facilities share the same network that will be used for classical communication
Summary
Q UANTUM KEY DISTRIBUTION (QKD) has emerged as a solution to provide security for the future optical communication networks. Several successful demonstrations of quantum-classical coexistence in a single fiber have been conducted for point-to-point links, the QKD secured networks present new challenges to be addressed for practical realization of quantum communication globally over the existing optical networks. Discussion on the limitations of the existing technology and important future research directions covering various aspects are essential for a survey article that we provide in this paper
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.