Hacking the Least Trusted Node: Indirect Eavesdropping in Quantum Networks

被引:0
|
作者
Rass, Stefan [1 ,2 ]
Mehic, Miralem [3 ,4 ,5 ]
Voznak, Miroslav [4 ,5 ]
Konig, Sandra [6 ]
机构
[1] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, A-4040 Linz, Austria
[2] Univ Klagenfurt, Dept Artificial Intelligence & Cybersecur, A-9020 Klagenfurt, Austria
[3] Univ Sarajevo, Fac Elect Engn, Dept Telecommun, Sarajevo 71000, Bosnia & Herceg
[4] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[5] Klaipeda Univ, Marine Res Inst, LT-92295 Klaipeda, Lithuania
[6] Res Driven Solut Ltd, Greystones D08 TX29, Ireland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Routing; Relays; Security; Quantum networks; Eavesdropping; Quality of service; Protocols; Network topology; Hardware; Quantum key distribution; Denial-of-service attack; Quantum network; denial-of-service; quantum key distribution; eavesdropping; KEY-DISTRIBUTION; SECURITY;
D O I
10.1109/ACCESS.2024.3490378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the significance of the common trusted relay assumption in quantum networks. While most practical implementations of quantum networks rely on trusted devices, the question of security without this assumption has been rarely addressed. Device independent security attempts to minimize the assumptions made on the quantum hardware, entanglement based methods try to avoid relays to the extent possible, and multipath transmission improves robustness and security by enforcing the attacker to conquer more than just a single intermediate node. Common to all these past studies is their focus on the physical layer and direct connections. We describe an attack from the networking and routing layer. Assuming at least one node that is not perfectly tamper-proof, meaning that an attacker has established a foothold to read traffic from the inside, we show how to exploit the eavesdropping detection mechanisms of the quantum key distribution (QKD) devices to cause traffic redirection over the vulnerable node, thus defeating security under the trusted node assumption. We experimentally demonstrate how the attack works on networks of different size and topology, and thereby further substantiate the significance of the trust assumptions for end-to-end security of QKD networks.
引用
收藏
页码:160973 / 160981
页数:9
相关论文
共 50 条
  • [31] A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks
    Wang, Mingjun
    Li, Jian
    Xue, Kaiping
    Li, Ruidong
    Yu, Nenghai
    Li, Yangyang
    Liu, Yifeng
    Sun, Qibin
    Lu, Jun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (12) : 184 - 190
  • [32] Design of Trusted Security Routing in Wireless Sensor Networks Based on Quantum Ant Colony Algorithm
    Shu, Xiao-bin
    Liu, Cai-hong
    Jiao, Chun-xia
    Wang, Qin
    Yin, Hongfeng
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2017, 13 (07) : 4 - 13
  • [33] Collaborative Routing in Partially-Trusted Relay based Quantum Key Distribution Optical Networks
    Zou, Xingyu
    Yu, Xiaosong
    Zhao, Yongli
    Nag, Avishek
    Zhang, Jie
    2020 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2020,
  • [34] Dynamic DV-QKD Networking in Trusted-Node-Free Software-Defined Optical Networks
    Alia, Obada
    Tessinari, Rodrigo Stange
    Hugues-Salas, Emilio
    Kanellos, George T.
    Nejabati, Reza
    Simeonidou, Dimitra
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2022, 40 (17) : 5816 - 5824
  • [35] Collaboration of Trusted Node and QoS Based Energy Multi Path Routing Protocol for Vehicular Ad Hoc Networks
    S. Baskar
    V. R. Sarma Dhulipala
    Wireless Personal Communications, 2018, 103 : 2833 - 2842
  • [36] Collaboration of Trusted Node and QoS Based Energy Multi Path Routing Protocol for Vehicular Ad Hoc Networks
    Baskar, S.
    Dhulipala, V. R. Sarma
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (04) : 2833 - 2842
  • [37] Voice over quantum IP routing based on least relay node constrained optimization strategy
    Nie Min
    Liu Guang-Teng
    Yang Guang
    Pei Chang-Xing
    ACTA PHYSICA SINICA, 2016, 65 (12)
  • [38] 40-user fully connected entanglement-based quantum key distribution network without trusted node
    Xu Liu
    Jingyuan Liu
    Rong Xue
    Heqing Wang
    Hao Li
    Xue Feng
    Fang Liu
    Kaiyu Cui
    Zhen Wang
    Lixing You
    Yidong Huang
    Wei Zhang
    PhotoniX, 3
  • [39] 40-user fully connected entanglement-based quantum key distribution network without trusted node
    Liu, Xu
    Liu, Jingyuan
    Xue, Rong
    Wang, Heqing
    Li, Hao
    Feng, Xue
    Liu, Fang
    Cui, Kaiyu
    Wang, Zhen
    You, Lixing
    Huang, Yidong
    Zhang, Wei
    PHOTONIX, 2022, 3 (01)
  • [40] Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks
    Mengash, Hanan Abdullah
    Marzouk, Radwa
    Hassine, Siwar Ben Haj
    Hilal, Anwer Mustafa
    Yaseen, Ishfaq
    Motwakel, Abdelwahed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 327 - 342