Abstract
In today's world, optical fiber networks are susceptible to numerous cyber-attacks and conventional key distribution techniques that are limited by the growing computational power. By introducing Quantum Key Distribution (QKD) into optical networks, it is possible to leverage existing fiber infrastructures and apply wavelength division multiplexing (WDM) for effective secret key deployments to improve optical-layer security. Security is a major challenge during key exchange in QKD, at that same time restricted number of network resources also have a big concern recently. Thus a wavelength resources as well as security enhancement is performed through Time Continuous Compactness (TCC) based wavelength allocation algorithm with African Vulture Optimization (AVO) based BB84 protocol for quantum keys distribution. In this model, the dual secret key assembly is done through the KP (Key pool) and VKP (Virtualization Key Pool) assembly for storing the data in the SDN server, which can be accessed later using the user authentication. The data from the sender is encrypted using the AES-RC4 algorithm for transmitting to the receiver at the data channel. This designed model is evaluated and compared with the existing model based on the parameters such as key generation and eavesdropping rate. The attained key generation and eavesdropping rate (64 byte) of the proposed AVO-QKD model is 0.41 s and 0.45 Bps/Hz. These attained values of the proposed model are greater than the existing model. Thus, the Dual Secret Key virtualization through TCC based Wavelength Allocation and BB84 protocol in QKD over Optical Networks secures and allocates resources better than other techniques.
Similar content being viewed by others
References
Broadbent, A., & Schaffner, C. (2016). Quantum cryptography beyond quantum key distribution. Designs, Codes and Cryptography, 78, 351–382.
Mao, Y., Huang, W., Zhong, H., Wang, Y., Qin, H., Guo, Y., & Huang, D. (2020). Detecting quantum attacks: A machine learning based defense strategy for practical continuous-variable quantum key distribution. New Journal of Physics, 22(8), 083073.
Karthick, S., Sankar, S. P., & Prathab, T. R. (2018, July). An approach for image encryption/decryption based on quaternion fourier transform. In 2018 international conference on emerging trends and innovations in engineering and technological research (ICETIETR) (pp. 1-7). IEEE.
Hosseinidehaj, N., Walk, N., & Ralph, T. C. (2021). Composable finite-size effects in free-space continuous-variable quantum-key-distribution systems. Physical Review A, 103(1), 012605.
Aguado, A., Lopez, V., Lopez, D., Peev, M., Poppe, A., Pastor, A., & Martin, V. (2019). The engineering of software-defined quantum key distribution networks. IEEE Communications Magazine, 57(7), 20–26.
Kumar, A., Dadheech, P., Singh, V., Raja, L., & Poonia, R. C. (2019). An enhanced quantum key distribution protocol for security authentication. Journal of Discrete Mathematical Sciences and Cryptography, 22(4), 499–507.
Ioannou, M., Sekatski, P., Abbott, A. A., Rosset, D., Bancal, J. D., & Brunner, N. (2022). Receiver-device-independent quantum key distribution protocols. New Journal of Physics, 24(6), 063006.
Adu-Kyere, A., Nigussie, E., & Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors, 22(16), 6284.
Kalra, M., & Poonia, R. C. (2019). Design a new protocol and compare with BB84 protocol for quantum key distribution. In Soft computing for problem solving: SocProS 2017, Volume 2 (pp. 969–978). Springer Singapore.
Su, H. Y. (2020). Simple analysis of security of the BB84 quantum key distribution protocol. Quantum Information Processing, 19(6), 169.
Li, Y., Zhang, P., & Huang, R. (2019). Lightweight quantum encryption for secure transmission of power data in smart grid. IEEE Access, 7, 36285–36293.
Kiktenko, E. O., Malyshev, A. O., Gavreev, M. A., Bozhedarov, A. A., Pozhar, N. O., Anufriev, M. N., & Fedorov, A. K. (2020). Lightweight authentication for quantum key distribution. IEEE Transactions on Information Theory, 66(10), 6354–6368.
Jassem, Y. H., & Abdullah, A. A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International, 11(3), 279–288.
Niemiec, M. (2019). Error correction in quantum cryptography based on artificial neural networks. Quantum Information Processing, 18(6), 174.
Perumal, A. M., & Nadar, E. R. S. (2021). Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. Journal of Ambient Intelligence and Humanized Computing, 12, 7173–7180.
Yu, X., Liu, Y., Zou, X., Cao, Y., Zhao, Y., Nag, A., & Zhang, J. (2022). Secret-key provisioning with collaborative routing in partially-trusted-relay-based quantum-key-distribution-secured optical networks. Journal of Lightwave Technology, 40(12), 3530–3545.
Pljonkin, A. P. (2021). Vulnerability of the synchronization process in the quantum key distribution system. In Research anthology on advancements in quantum technology (pp. 345–354). IGI Global.
Yu, X., Li, S., Zhao, Y., Cao, Y., Nag, A., & Zhang, J. (2021). Routing, core and wavelength allocation in multi-core-fiber-based quantum-key-distribution-enabled optical networks. IEEE Access, 9, 99842–99852.
Kwek, L. C., Cao, L., Luo, W., Wang, Y., Sun, S., Wang, X., & Liu, A. Q. (2021). Chip-based quantum key distribution. AAPPS Bulletin, 31, 1–8.
Atikah, N., Ashila, M. R., Rachmawanto, E. H., & Sari, C. A. (2019). AES-RC4 Encryption Technique to Improve File Security. In 2019 Fourth international conference on informatics and computing (ICIC) (pp. 1–5). IEEE.
Maniam, S. M., & Sasilatha, T. (2021). Area-efficient and high-speed hardware structure of hybrid cryptosystem (AES-RC4) for maximizing key lifetime using parallel subpipeline architecture. Concurrency and Computation: Practice and Experience, 33(3), e5287.
Dataset 1 : https://www.kaggle.com/datasets/anmolkumar/fake-news-content-detection?select=test.csv
Sehgal, S. K., & Gupta, R. (2023). SOA based BB84 protocol for enhancing quantum key distribution in cloud environment. Wireless Personal Communications, 130(3), 1759–1793.
Cowper, N., Shaw, H., & Thayer, D. (2020). Chaotic quantum key distribution. Cryptography, 4(3), 24.
Laudenbach, F., Pacher, C., Fung, C. H. F., Poppe, A., Peev, M., Schrenk, B., & Hübel, H. (2018). Continuous-variable quantum key distribution with Gaussian modulation—the theory of practical implementations. Advanced Quantum Technologies, 1(1), 1800011.
Liu, Y., Chen, T. Y., Wang, L. J., Liang, H., Shentu, G. L., Wang, J., & Pan, J. W. (2013). Experimental measurement-device-independent quantum key distribution. Physical Review Letters, 111(13), 130502.
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
The corresponding author claims the major contribution of the paper including formulation, analysis and editing. The co-author provides guidance to verify the analysis result and manuscript editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.
Consent for Publication
This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.
Availability of Data and Material
Not applicable.
Code Availability
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sehgal, S.K., Gupta, R. Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks. Wireless Pers Commun 134, 1443–1468 (2024). https://doi.org/10.1007/s11277-024-10955-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-10955-1