Hacking the Least Trusted Node: Indirect Eavesdropping in Quantum Networks

被引:0
|
作者
Rass, Stefan [1 ,2 ]
Mehic, Miralem [3 ,4 ,5 ]
Voznak, Miroslav [4 ,5 ]
Konig, Sandra [6 ]
机构
[1] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, A-4040 Linz, Austria
[2] Univ Klagenfurt, Dept Artificial Intelligence & Cybersecur, A-9020 Klagenfurt, Austria
[3] Univ Sarajevo, Fac Elect Engn, Dept Telecommun, Sarajevo 71000, Bosnia & Herceg
[4] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[5] Klaipeda Univ, Marine Res Inst, LT-92295 Klaipeda, Lithuania
[6] Res Driven Solut Ltd, Greystones D08 TX29, Ireland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Routing; Relays; Security; Quantum networks; Eavesdropping; Quality of service; Protocols; Network topology; Hardware; Quantum key distribution; Denial-of-service attack; Quantum network; denial-of-service; quantum key distribution; eavesdropping; KEY-DISTRIBUTION; SECURITY;
D O I
10.1109/ACCESS.2024.3490378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the significance of the common trusted relay assumption in quantum networks. While most practical implementations of quantum networks rely on trusted devices, the question of security without this assumption has been rarely addressed. Device independent security attempts to minimize the assumptions made on the quantum hardware, entanglement based methods try to avoid relays to the extent possible, and multipath transmission improves robustness and security by enforcing the attacker to conquer more than just a single intermediate node. Common to all these past studies is their focus on the physical layer and direct connections. We describe an attack from the networking and routing layer. Assuming at least one node that is not perfectly tamper-proof, meaning that an attacker has established a foothold to read traffic from the inside, we show how to exploit the eavesdropping detection mechanisms of the quantum key distribution (QKD) devices to cause traffic redirection over the vulnerable node, thus defeating security under the trusted node assumption. We experimentally demonstrate how the attack works on networks of different size and topology, and thereby further substantiate the significance of the trust assumptions for end-to-end security of QKD networks.
引用
收藏
页码:160973 / 160981
页数:9
相关论文
共 50 条
  • [21] A differentialized service providing scheme on trusted relay quantum key distribution networks
    Sun, Yong-Mei
    Cheng, Xian-Zhu
    Ji, Yue-Feng
    Guangzi Xuebao/Acta Photonica Sinica, 2014, 43 (07):
  • [22] Resources-aware trusted node selection for content distribution in mobile ad hoc networks
    Djatmiko, Mentari
    Boreli, Roksana
    Seneviratne, Aruna
    Ries, Sebastian
    WIRELESS NETWORKS, 2013, 19 (05) : 843 - 856
  • [23] Resources-aware trusted node selection for content distribution in mobile ad hoc networks
    Mentari Djatmiko
    Roksana Boreli
    Aruna Seneviratne
    Sebastian Ries
    Wireless Networks, 2013, 19 : 843 - 856
  • [24] Cost-Optimized Quantum Communication Networks: The Crucial Role of Trusted Node Placement in Multi-Band and Multi-Fiber Realms (Invited)
    Dibaj, M. Reza
    Mehdizadeh, Pouya
    Beyranvand, Hamzeh
    Zefreh, Mahdi Ranjbar
    Hernandez-Hernandez, Juan Carlos
    Fernandez-Palacios, Juan Pedro
    Larrabeiti, David
    Alberto Hernandez, Jose
    Arpanaei, Farhad
    2024 12TH IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY, IWCIT, 2024,
  • [25] Trusted node selection in clusters for underwater wireless acoustic sensor networks using fuzzy logic
    Krishnaswamy, Vani
    Manvi, Sunilkumar S.
    PHYSICAL COMMUNICATION, 2021, 47
  • [26] Robust Distributed Least-Squares Estimation in Sensor Networks with Node Failures
    Zhou, Qing
    Kar, Soummya
    Huie, Lauren
    Poor, H. Vincent
    Cui, Shuguang
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [27] Routing With Minimum Activated Trusted Nodes in Quantum Key Distribution Networks for Secure Communications
    Kong, Peng-Yong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15219 - 15228
  • [28] Sybil Node Detection in Peer-to-Peer Networks using Indirect Validation
    Banerjee, Chayan
    Saxena, Shubhra
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [29] Asymmetric node placement in fiber-based quantum networks
    Avis, Guus
    Knegjens, Robert
    Sorensen, Anders S.
    Wehner, Stephanie
    PHYSICAL REVIEW A, 2024, 109 (05)
  • [30] A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks
    Mehic, Miralem
    Fazio, Peppino
    Rass, Stefan
    Maurhart, Oliver
    Peev, Momtchil
    Poppe, Andreas
    Rozhon, Jan
    Niemiec, Marcin
    Voznak, Miroslav
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (01) : 168 - 181