Skip to main content
Log in

Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In today's world, optical fiber networks are susceptible to numerous cyber-attacks and conventional key distribution techniques that are limited by the growing computational power. By introducing Quantum Key Distribution (QKD) into optical networks, it is possible to leverage existing fiber infrastructures and apply wavelength division multiplexing (WDM) for effective secret key deployments to improve optical-layer security. Security is a major challenge during key exchange in QKD, at that same time restricted number of network resources also have a big concern recently. Thus a wavelength resources as well as security enhancement is performed through Time Continuous Compactness (TCC) based wavelength allocation algorithm with African Vulture Optimization (AVO) based BB84 protocol for quantum keys distribution. In this model, the dual secret key assembly is done through the KP (Key pool) and VKP (Virtualization Key Pool) assembly for storing the data in the SDN server, which can be accessed later using the user authentication. The data from the sender is encrypted using the AES-RC4 algorithm for transmitting to the receiver at the data channel. This designed model is evaluated and compared with the existing model based on the parameters such as key generation and eavesdropping rate. The attained key generation and eavesdropping rate (64 byte) of the proposed AVO-QKD model is 0.41 s and 0.45 Bps/Hz. These attained values of the proposed model are greater than the existing model. Thus, the Dual Secret Key virtualization through TCC based Wavelength Allocation and BB84 protocol in QKD over Optical Networks secures and allocates resources better than other techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Broadbent, A., & Schaffner, C. (2016). Quantum cryptography beyond quantum key distribution. Designs, Codes and Cryptography, 78, 351–382.

    Article  MathSciNet  Google Scholar 

  2. Mao, Y., Huang, W., Zhong, H., Wang, Y., Qin, H., Guo, Y., & Huang, D. (2020). Detecting quantum attacks: A machine learning based defense strategy for practical continuous-variable quantum key distribution. New Journal of Physics, 22(8), 083073.

    Article  Google Scholar 

  3. Karthick, S., Sankar, S. P., & Prathab, T. R. (2018, July). An approach for image encryption/decryption based on quaternion fourier transform. In 2018 international conference on emerging trends and innovations in engineering and technological research (ICETIETR) (pp. 1-7). IEEE.

  4. Hosseinidehaj, N., Walk, N., & Ralph, T. C. (2021). Composable finite-size effects in free-space continuous-variable quantum-key-distribution systems. Physical Review A, 103(1), 012605.

    Article  MathSciNet  Google Scholar 

  5. Aguado, A., Lopez, V., Lopez, D., Peev, M., Poppe, A., Pastor, A., & Martin, V. (2019). The engineering of software-defined quantum key distribution networks. IEEE Communications Magazine, 57(7), 20–26.

    Article  Google Scholar 

  6. Kumar, A., Dadheech, P., Singh, V., Raja, L., & Poonia, R. C. (2019). An enhanced quantum key distribution protocol for security authentication. Journal of Discrete Mathematical Sciences and Cryptography, 22(4), 499–507.

    Article  MathSciNet  Google Scholar 

  7. Ioannou, M., Sekatski, P., Abbott, A. A., Rosset, D., Bancal, J. D., & Brunner, N. (2022). Receiver-device-independent quantum key distribution protocols. New Journal of Physics, 24(6), 063006.

    Article  MathSciNet  Google Scholar 

  8. Adu-Kyere, A., Nigussie, E., & Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors, 22(16), 6284.

    Article  Google Scholar 

  9. Kalra, M., & Poonia, R. C. (2019). Design a new protocol and compare with BB84 protocol for quantum key distribution. In Soft computing for problem solving: SocProS 2017, Volume 2 (pp. 969–978). Springer Singapore.

  10. Su, H. Y. (2020). Simple analysis of security of the BB84 quantum key distribution protocol. Quantum Information Processing, 19(6), 169.

    Article  MathSciNet  Google Scholar 

  11. Li, Y., Zhang, P., & Huang, R. (2019). Lightweight quantum encryption for secure transmission of power data in smart grid. IEEE Access, 7, 36285–36293.

    Article  Google Scholar 

  12. Kiktenko, E. O., Malyshev, A. O., Gavreev, M. A., Bozhedarov, A. A., Pozhar, N. O., Anufriev, M. N., & Fedorov, A. K. (2020). Lightweight authentication for quantum key distribution. IEEE Transactions on Information Theory, 66(10), 6354–6368.

    Article  MathSciNet  Google Scholar 

  13. Jassem, Y. H., & Abdullah, A. A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International, 11(3), 279–288.

    Google Scholar 

  14. Niemiec, M. (2019). Error correction in quantum cryptography based on artificial neural networks. Quantum Information Processing, 18(6), 174.

    Article  MathSciNet  Google Scholar 

  15. Perumal, A. M., & Nadar, E. R. S. (2021). Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. Journal of Ambient Intelligence and Humanized Computing, 12, 7173–7180.

    Article  Google Scholar 

  16. Yu, X., Liu, Y., Zou, X., Cao, Y., Zhao, Y., Nag, A., & Zhang, J. (2022). Secret-key provisioning with collaborative routing in partially-trusted-relay-based quantum-key-distribution-secured optical networks. Journal of Lightwave Technology, 40(12), 3530–3545.

    Article  Google Scholar 

  17. Pljonkin, A. P. (2021). Vulnerability of the synchronization process in the quantum key distribution system. In Research anthology on advancements in quantum technology (pp. 345–354). IGI Global.

  18. Yu, X., Li, S., Zhao, Y., Cao, Y., Nag, A., & Zhang, J. (2021). Routing, core and wavelength allocation in multi-core-fiber-based quantum-key-distribution-enabled optical networks. IEEE Access, 9, 99842–99852.

    Article  Google Scholar 

  19. Kwek, L. C., Cao, L., Luo, W., Wang, Y., Sun, S., Wang, X., & Liu, A. Q. (2021). Chip-based quantum key distribution. AAPPS Bulletin, 31, 1–8.

    Article  Google Scholar 

  20. Atikah, N., Ashila, M. R., Rachmawanto, E. H., & Sari, C. A. (2019). AES-RC4 Encryption Technique to Improve File Security. In 2019 Fourth international conference on informatics and computing (ICIC) (pp. 1–5). IEEE.

  21. Maniam, S. M., & Sasilatha, T. (2021). Area-efficient and high-speed hardware structure of hybrid cryptosystem (AES-RC4) for maximizing key lifetime using parallel subpipeline architecture. Concurrency and Computation: Practice and Experience, 33(3), e5287.

    Article  Google Scholar 

  22. Dataset 1 : https://www.kaggle.com/datasets/anmolkumar/fake-news-content-detection?select=test.csv

  23. Sehgal, S. K., & Gupta, R. (2023). SOA based BB84 protocol for enhancing quantum key distribution in cloud environment. Wireless Personal Communications, 130(3), 1759–1793.

    Article  Google Scholar 

  24. Cowper, N., Shaw, H., & Thayer, D. (2020). Chaotic quantum key distribution. Cryptography, 4(3), 24.

    Article  Google Scholar 

  25. Laudenbach, F., Pacher, C., Fung, C. H. F., Poppe, A., Peev, M., Schrenk, B., & Hübel, H. (2018). Continuous-variable quantum key distribution with Gaussian modulation—the theory of practical implementations. Advanced Quantum Technologies, 1(1), 1800011.

    Article  Google Scholar 

  26. Liu, Y., Chen, T. Y., Wang, L. J., Liang, H., Shentu, G. L., Wang, J., & Pan, J. W. (2013). Experimental measurement-device-independent quantum key distribution. Physical Review Letters, 111(13), 130502.

    Article  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

The corresponding author claims the major contribution of the paper including formulation, analysis and editing. The co-author provides guidance to verify the analysis result and manuscript editing.

Corresponding author

Correspondence to Shravan Kumar Sehgal.

Ethics declarations

Conflict of interest

The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Consent for Publication

This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.

Availability of Data and Material

Not applicable.

Code Availability

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sehgal, S.K., Gupta, R. Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks. Wireless Pers Commun 134, 1443–1468 (2024). https://doi.org/10.1007/s11277-024-10955-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10955-1

Keywords

Navigation