| Literature DB >> 35205445 |
Liquan Chen1,2, Qianye Chen1, Mengnan Zhao1, Jingqi Chen1, Suhui Liu1, Yongli Zhao3.
Abstract
In the era of the interconnection of all things, the security of the Internet of Things (IoT) has become a new challenge. The theoretical basis of unconditional security can be guaranteed by using quantum keys, which can form a QKD network-based security protection system of quantum Internet of Things (Q-IoT). However, due to the low generation rate of the quantum keys, the lack of a reasonable key allocation scheme can reduce the overall service quality. Therefore, this paper proposes a dynamic on-demand key allocation scheme, named DDKA-QKDN, to better meet the requirements of lightweight in the application scenario of Q-IoT and make efficient use of quantum key resources. Taking the two processes of the quantum key pool (QKP) key allocation and the QKP key supplement into account, the scheme dynamically allocates quantum keys and supplements the QKP on demand, which quantitatively weighs the quantum key quantity and security requirements of key requests in proportion. The simulation results show that the system efficiency and the ability of QKP to provide key request services are significantly improved by this scheme.Entities:
Keywords: QKD network; QKP; key allocation scheme; quantum Internet of Things
Year: 2022 PMID: 35205445 PMCID: PMC8871126 DOI: 10.3390/e24020149
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Related works comparison.
| References | Allocation Schemes | |||
|---|---|---|---|---|
| Application Scenarios of QKD | Major Consideration | Allocate on Demand | Key Supplement | |
| Niu et al. [ | classical QKD network | key size-driven wavelength | × | × |
| Wang et al. [ | multiple domains | key allocation within arbitrary domains | × | × |
| Meng et al. [ | Internet of Things | quantum key generation rate | × | × |
| Cao et al. [ | software-defined optical network | key-updating based on time and data complexity | × | × |
| Wang et al. [ | passive optical network | the number of keys in QKP | √ | √ |
| Cao et al. [ | multi-tenant QKD network | secret-key-rate | √ | × |
| Cao et al. [ | multi-tenant QKD network | success probability of multi-tenant provisioning | √ | × |
| Cao et al. [ | QKD as a service (QaaS) | secret-key-rate | √ | × |
| Zuo et al. [ | classical QKD network | current resource usage of the network | √ | √ |
| Our scheme | Internet of Things | quantum key quantity and security requirements | √ | √ |
Figure 1Schematic diagram of QKD.
Abbreviation List.
| Abbreviation | Descriptions |
|---|---|
| Qtra | Quantum transmitter |
| Qrec | Quantum receiver |
| QCh | Quantum Channel |
| PCh | Public Channel |
| VKP | Virtual Key Pool |
| Ti | Internet of Things Terminal |
| Gi | Edge Gateway |
| Ki | Quantum Key |
| Mi | Metropolitan Area Node |
| OTP | One Time Password |
Figure 2Schematic diagram of QKP architecture based on SDN.
Figure 3(a) The communication between devices under the same edge gateway; (b) The communication between devices under two edge gateways of the same OLT; (c) The communication between devices under two edge gateways of different OLTs.
Mathematical symbol list.
| Mathematical Symbol | Descriptions |
|---|---|
|
| security level |
|
| response weight value |
|
| trade-off degree of the quantity and security requirements |
|
| quantum key quantity requirement |
|
| quantum key security requirement |
|
| remaining key amount of the QKP |
|
| the low threshold of the QKP |
|
| the high threshold of the QKP |
|
| arrival time of the requests |
|
| key stream load |
|
| the key transmission delay |
|
| key generation rate |
|
| the delay of the key request for waiting |
|
| the average delay of each key request for waiting |
|
| the queuing delay of key requests waiting to obtain the key |
|
| time slot |
|
| the arrival frequency of the key requests |
|
| the queuing delay of QKP waiting for key supplement |
|
| the time when the last key request obtained the keys |
|
| the link transmission rate |
|
| the time when the last QKP key supplement request obtained the key |
|
| the arrival time of the current QKP key supplement request |
|
| the success rate of no-waiting requests |
Figure 4Flow chart of responding to key requests.
Figure 5Flow of responding to key supplement requests.
The pseudo code of the DDKA-QKDN scheme.
| | |
| | |
| 1 | |
| 2 | calculate the weight value of the key quantity requirement |
| 3 |
|
| 4 | |
| 5 | sort in ascending order of the arrival time |
| 6 |
|
| 7 | |
| 8 | consider the corresponding QKP |
| 9 | |
| 10 | record this key request |
| 11 | record the waiting time |
| 12 | |
| 13 | update key surplus |
| 14 | |
| 15 | |
| 16 | supplement keys for the QKP |
| 17 | stop supplement keys till key surplus reach |
| 18 | |
| 19 | |
| 20 | sort in ascending order of the arrival time |
| 21 | record the waiting time |
| 22 | |
| 23 |
|
| 24 | |
| 25 | Calculate the average time for waiting |
| 26 |
|
Figure 6Simulated network topology.
Figure 7The average delay of the key services affected by traffic load and QKP threshold.
Figure 8The success rate of the no-waiting requests affected by traffic load and QKP threshold.
Figure 9The average delay of the key services under different trade-off degrees .
Figure 10(a) The effect of the key service traffic load on average key service delay of each scheme; (b) The percentage improvement of the key service delay of the DDKA-QKDN scheme compared with other schemes.
Figure 11(a) The effect of the key service traffic load on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.
Figure 12(a) The effect of the QKP key supplement threshold on average key service delay of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the key service delay compared with other schemes.
Figure 13(a) The effect of the QKP key supplement threshold on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.