11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

Providing Adaptive Quality of Security in Quantum Networks

Download468 downloads
  • @INPROCEEDINGS{10.4108/eai.19-8-2015.2260982,
        author={Baokang Zhao and Ziling Wei and Bo Liu and Jinshu Su and Ilsun You},
        title={Providing Adaptive Quality of Security in Quantum Networks},
        proceedings={11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={IEEE},
        proceedings_a={QSHINE},
        year={2015},
        month={9},
        keywords={quantum key distribution; quality of security; analytic hierarchy process},
        doi={10.4108/eai.19-8-2015.2260982}
    }
    
  • Baokang Zhao
    Ziling Wei
    Bo Liu
    Jinshu Su
    Ilsun You
    Year: 2015
    Providing Adaptive Quality of Security in Quantum Networks
    QSHINE
    IEEE
    DOI: 10.4108/eai.19-8-2015.2260982
Baokang Zhao1, Ziling Wei1, Bo Liu1, Jinshu Su1, Ilsun You,*
  • 1: National University of Defense Technology
*Contact email: ilsunu@gmail.com

Abstract

Recently, several Quantum Key Distribution (QKD) networks, such as Tokyo QKD, SECOQC, have been built to evaluate the quantum based OTP(One Time Pad) secure communication. As an ideal unconditional secure technique, OTP requires the key rate the same as the information rate. However, comparing with high speed information traffic (Gbps), the key generation rate of QKD is very poor(Kbps). Therefore, in practical QKD networks, it is difficult to support numerous applications and multiple users simultaneously. To address this issue, we argue that it is more practical to provide quality of security instead of OTP in quantum networks. We further propose ASM, an Adaptive Security Selection Mechanism for quantum networks based on the Analytic Hierarchy Process (AHP). In ASM, services can select an appropriate encryption algorithm that satisfies the proper security level and performance metrics under the limit of the key generation rate. We also implement ASM under our RT-QKD platform, and evaluate its performance. Experimental results demonstrate that ASM can select the optimal algorithm to meet the requirement of security and performance under an acceptable cost.