Hacking the Least Trusted Node: Indirect Eavesdropping in Quantum Networks

被引:0
|
作者
Rass, Stefan [1 ,2 ]
Mehic, Miralem [3 ,4 ,5 ]
Voznak, Miroslav [4 ,5 ]
Konig, Sandra [6 ]
机构
[1] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, A-4040 Linz, Austria
[2] Univ Klagenfurt, Dept Artificial Intelligence & Cybersecur, A-9020 Klagenfurt, Austria
[3] Univ Sarajevo, Fac Elect Engn, Dept Telecommun, Sarajevo 71000, Bosnia & Herceg
[4] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[5] Klaipeda Univ, Marine Res Inst, LT-92295 Klaipeda, Lithuania
[6] Res Driven Solut Ltd, Greystones D08 TX29, Ireland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Routing; Relays; Security; Quantum networks; Eavesdropping; Quality of service; Protocols; Network topology; Hardware; Quantum key distribution; Denial-of-service attack; Quantum network; denial-of-service; quantum key distribution; eavesdropping; KEY-DISTRIBUTION; SECURITY;
D O I
10.1109/ACCESS.2024.3490378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the significance of the common trusted relay assumption in quantum networks. While most practical implementations of quantum networks rely on trusted devices, the question of security without this assumption has been rarely addressed. Device independent security attempts to minimize the assumptions made on the quantum hardware, entanglement based methods try to avoid relays to the extent possible, and multipath transmission improves robustness and security by enforcing the attacker to conquer more than just a single intermediate node. Common to all these past studies is their focus on the physical layer and direct connections. We describe an attack from the networking and routing layer. Assuming at least one node that is not perfectly tamper-proof, meaning that an attacker has established a foothold to read traffic from the inside, we show how to exploit the eavesdropping detection mechanisms of the quantum key distribution (QKD) devices to cause traffic redirection over the vulnerable node, thus defeating security under the trusted node assumption. We experimentally demonstrate how the attack works on networks of different size and topology, and thereby further substantiate the significance of the trust assumptions for end-to-end security of QKD networks.
引用
收藏
页码:160973 / 160981
页数:9
相关论文
共 50 条
  • [1] Indirect Eavesdropping in Quantum Networks
    Rass, Stefan
    Koenig, Sandra
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES (ICQNM 2011), 2011, : 83 - 88
  • [2] Trusted Node Deployment Strategies for Long-Haul Quantum Key Distribution Networks
    Patri, Sai Kireet
    Wenning, Mario
    Gonde, Shivraj Hanumant
    Autenrieth, Achim
    Elbers, Joerg-Peter
    Mas-Machuca, Carmen
    2023 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING, ONDM, 2023,
  • [3] Eavesdropping attack on a trusted continuous-variable quantum random-number generator
    Thewes, Johannes
    Lueders, Carolin
    Assmann, Marc
    PHYSICAL REVIEW A, 2019, 100 (05)
  • [4] Modelling of satellite constellations for trusted node QKD networks
    Vergoossen, Tom
    Loarte, Sergio
    Bedington, Robert
    Kuiper, Hans
    Ling, Alexander
    ACTA ASTRONAUTICA, 2020, 173 : 164 - 171
  • [5] Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
    Valluri, Bhanu Priyanka
    Sharma, Nitin
    Measurement: Sensors, 2024, 36
  • [6] Security of trusted repeater quantum key distribution networks
    Salvail, Louis
    Peev, Momtchil
    Diamanti, Eleni
    Alleaume, Romain
    Luetkenhaus, Norbert
    Laenger, Thomas
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) : 61 - 87
  • [7] A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks
    Shirichian, Masoumeh
    Sabbaghi-Nadooshan, Reza
    Houshmand, Mahboobeh
    Houshmand, Monireh
    QUANTUM INFORMATION PROCESSING, 2024, 23 (03)
  • [8] A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks
    Masoumeh Shirichian
    Reza Sabbaghi-Nadooshan
    Mahboobeh Houshmand
    Monireh Houshmand
    Quantum Information Processing, 23
  • [9] Demonstration of a Quantum Key Distribution Trusted Node on an Electric Utility Fiber Network
    Evans, Philip
    Peterson, Glen
    Morgan, Tyler
    Jones, Ken
    Morrison, Steve
    Newell, Raymond
    Peters, Nicholas
    2019 IEEE PHOTONICS CONFERENCE (IPC), 2019,
  • [10] Fully Connected Entanglement-based Quantum Communication Network without Trusted Node
    Liu, Xu
    Xue, Rong
    Huang, Yidong
    Zhang, Wei
    2021 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2021,