NetWare 2018
September 16 - 20, 2018 - Venice, Italy

  • SENSORCOMM 2018, The Twelfth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2018, The Ninth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2018, The Tenth International Conference on Advances in Future Internet
  • CENICS 2018, The Eleventh International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2018, The Twelfth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2018, The Fourth International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2018, The Third International Conference on Green Communications, Computing and Technologies

SoftNet 2018
October 14 - 18, 2018 - Nice, France

  • ICSEA 2018, The Thirteenth International Conference on Software Engineering Advances
  • ICSNC 2018, The Thirteenth International Conference on Systems and Networks Communications
  • CENTRIC 2018, The Eleventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2018, The Tenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2018, The Tenth International Conference on Advances in System Simulation
  • SOTICS 2018,The Eighth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2018, The Seventh International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2018, The Third International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NexTech 2018
November 18 - 22, 2018 - Athens, Greece

  • UBICOMM 2018, The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2018, The Twelfth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2018, The Twelfth International Conference on Advances in Semantic Processing
  • AMBIENT 2018, The Eighth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2018, The Tenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2018, The Seventh International Conference on Data Analytics
  • GLOBAL HEALTH 2018, The Seventh International Conference on Global Health Challenges
  • CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems

DigitalWorld 2019
February 24 - 28, 2019 - Athens, Greece

  • ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments
  • ACHI 2019, The Twelfth International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2019, The Eleventh International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2019, The Eleventh International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2019, The Eleventh International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2019, The Eleventh International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2019, The Fourth International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2019, The Fourth International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2019
March 24 - 28, 2019 - Valencia, Spain

  • ICDT 2019, The Fourteenth International Conference on Digital Telecommunications
  • SPACOMM 2019, The Eleventh International Conference on Advances in Satellite and Space Communications
  • ICN 2019, The Eighteenth International Conference on Networks
  • ICONS 2019, The Fourteenth International Conference on Systems
  • MMEDIA 2019, The Eleventh International Conference on Advances in Multimedia
  • PESARO 2019, The Ninth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2019, The Twelfth International Conference on Communication Theory, Reliability, and Quality of Service
  • ALLDATA 2019, The Fifth International Conference on Big Data, Small Data, Linked Data and Open Data
  • SOFTENG 2019, The Fifth International Conference on Advances and Trends in Software Engineering

ComputationWorld 2019
May 5 - 9, 2019 - Venice, Italy

  • SERVICE COMPUTATION 2019, The Eleventh International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2019, The Eleventh International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2019, The Eleventh International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2019, The Eleventh International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2019, The Eleventh International Conference on Creative Content Technologies
  • PATTERNS 2019, The Eleventh International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2019, The Tenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2019, The Ninth International Conference on Business Intelligence and Technology

InfoSys 2019
June 2 - 6, 2019 - Athens, Greece

  • ICNS 2019, The Fiteenth International Conference on Networking and Services
  • ICAS 2019, The FIfteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2019, The Ninth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2019, The Sseventh International Conference on Building and Exploring Web Based Environments
  • DBKDA 2019, The Eleventh International Conference on Advances in Databases, Knowledge, and Data Applications
  • SIGNAL 2019, The Fourth International Conference on Advances in Signal, Image and Video Processing
  • BIOTECHNO 2019, The Eleventh International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies

(to be completed)

 


ThinkMind // International Journal On Advances in Systems and Measurements, volume 5, numbers 1 and 2, 2012 // View article sysmea_v5_n12_2012_3


Turning Quantum Cryptography Against Itself: How to Avoid Indirect Eavesdropping in Quantum Networks by Passive and Active Adversaries

Authors:
Stefan Rass
Sandra Koenig

Keywords: Quantum Cryptography, Markov-Chain, Secure Routing, Information-Theoretic Security

Abstract:
Quantum networks are communication networks in which adjacent nodes enjoy perfectly secure channels thanks to quantum key distribution (QKD). While QKD is renowned for perfect point-to-point security and its eavesdropping detection capabilities, end-to-end security is nontrivial to achieve. More importantly, the eavesdropping detection can indeed be turned against the system itself. It is known that perfect end-to-end security can be created from point-to-point security by means of multipath transmission (in fact, there is no other way to do this, assuming no pre-shared secrets and avoiding public-key cryptography). However, multipath transmission requires node-disjoint paths, which in turn are to be assured by the underlying routing protocol. At this point, an active or passive adversary may intentionally eavesdrop on the QKD protocol to temporarily cut a channel and to cause key-buffers running empty and enforcing local rerouting of packets towards nodes under his control. Consequently, the multipath transmission channels might no longer be non-intersecting, thus defeating the overall security by exploiting QKD's eavesdropping detection facilities. Alternatively, an active adversary may as well insert bogus traffic to cause local congestion, thus even sparing the effort of eavesdropping on a QKD link. In this work, we use Markov chains to model a multipath transmission, and we discuss the extent to which secure multipath transmission is resilient against local congestions caused by an adversary. We argue that a protection against an active adversary who uses bogus traffic to fiddle with the routing, calls for additional security measures, perhaps even beyond the capabilities of QKD or multipath transmission. It turns out that robustness against passive and active adversaries can be retained as long as no bogus traffic is observed.

Pages: 22 to 33

Copyright: Copyright (c) to authors, 2012. Used with permission.

Publication date: June 30, 2012

Published in: journal

ISSN: 1942-261x

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.