scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Analysis of Quantum Key Distribution Based Satellite Communication

TL;DR: The noisy quantum channel is modeled and implemented by the redundancy-free quantum error correction scheme which provides better security and throughput efficiency as shown in simulation results.
Abstract: Quantum key distribution is an effective encryption technique which can be used to perform secure quantum communication between satellite and ground stations. Quantum cryptography enhances security in various networks such as optical fibers and wireless networks. In addition to this, these networks become vulnerable in presence of high attenuation due to atmospheric effects and noise. Hence, errors occurs due to decoherence. The noisy quantum channel is modeled and implemented by the redundancy-free quantum error correction scheme which provides better security and throughput efficiency as shown in simulation results.
Citations
More filters
Journal ArticleDOI
TL;DR: 6G with additional technical requirements beyond those of 5G will enable faster and further communications to the extent that the boundary between physical and cyber worlds disappears.
Abstract: The fifth generation (5G) wireless communication networks are being deployed worldwide from 2020 and more capabilities are in the process of being standardized, such as mass connectivity, ultra-reliability, and guaranteed low latency. However, 5G will not meet all requirements of the future in 2030 and beyond, and sixth generation (6G) wireless communication networks are expected to provide global coverage, enhanced spectral/energy/cost efficiency, better intelligence level and security, etc. To meet these requirements, 6G networks will rely on new enabling technologies, i.e., air interface and transmission technologies and novel network architecture, such as waveform design, multiple access, channel coding schemes, multi-antenna technologies, network slicing, cell-free architecture, and cloud/fog/edge computing. Our vision on 6G is that it will have four new paradigm shifts. First, to satisfy the requirement of global coverage, 6G will not be limited to terrestrial communication networks, which will need to be complemented with non-terrestrial networks such as satellite and unmanned aerial vehicle (UAV) communication networks, thus achieving a space-air-ground-sea integrated communication network. Second, all spectra will be fully explored to further increase data rates and connection density, including the sub-6 GHz, millimeter wave (mmWave), terahertz (THz), and optical frequency bands. Third, facing the big datasets generated by the use of extremely heterogeneous networks, diverse communication scenarios, large numbers of antennas, wide bandwidths, and new service requirements, 6G networks will enable a new range of smart applications with the aid of artificial intelligence (AI) and big data technologies. Fourth, network security will have to be strengthened when developing 6G networks. This article provides a comprehensive survey of recent advances and future trends in these four aspects. Clearly, 6G with additional technical requirements beyond those of 5G will enable faster and further communications to the extent that the boundary between physical and cyber worlds disappears.

935 citations

Journal ArticleDOI
TL;DR: A novel QC-assisted and QML-based framework for 6G communication networks is proposed while articulating its challenges and potential enabling technologies at the network infrastructure, network edge, air interface, and user end.
Abstract: The upcoming fifth generation (5G) of wireless networks is expected to lay a foundation of intelligent networks with the provision of some isolated artificial intelligence (AI) operations. However, fully intelligent network orchestration and management for providing innovative services will only be realized in Beyond 5G (B5G) networks. To this end, we envisage that the sixth generation (6G) of wireless networks will be driven by on-demand self-reconfiguration to ensure a many-fold increase in the network performance and service types. The increasingly stringent performance requirements of emerging networks may finally trigger the deployment of some interesting new technologies, such as large intelligent surfaces, electromagnetic–orbital angular momentum, visible light communications, and cell-free communications, to name a few. Our vision for 6G is a massively connected complex network capable of rapidly responding to the users’ service calls through real-time learning of the network state as described by the network edge (e.g., base-station locations and cache contents), air interface (e.g., radio spectrum and propagation channel), and the user-side (e.g., battery-life and locations). The multi-state, multi-dimensional nature of the network state, requiring the real-time knowledge, can be viewed as a quantum uncertainty problem. In this regard, the emerging paradigms of machine learning (ML), quantum computing (QC), and quantum ML (QML) and their synergies with communication networks can be considered as core 6G enablers. Considering these potentials, starting with the 5G target services and enabling technologies, we provide a comprehensive review of the related state of the art in the domains of ML (including deep learning), QC, and QML and identify their potential benefits, issues, and use cases for their applications in the B5G networks. Subsequently, we propose a novel QC-assisted and QML-based framework for 6G communication networks while articulating its challenges and potential enabling technologies at the network infrastructure, network edge, air interface, and user end. Finally, some promising future research directions for the quantum- and QML-assisted B5G networks are identified and discussed.

339 citations


Cites background from "Analysis of Quantum Key Distributio..."

  • ...Recently, authors in [126] VOLUME xx, 201x 15 investigated the application of QKD in the satellite communication system to perform secure quantum communication between ground stations and the satellite....

    [...]

  • ...For example, authors in [126] discussed and analyzed the applicability of QKD protocols in quantum-assisted SatCom systems in order to perform secure communication between ground stations and the satellite....

    [...]

  • ...The QKD can be used to enhance security in various networks including optical networks, terrestrial wireless networks and satellite networks....

    [...]

  • ...Some of the promising quantum communication protocols to expand the possibility of classical data transmission in quantum-based systems include quantum key distribution (QKD) [126], [127], quantum teleportation [128] and dense coding [129]....

    [...]

  • ...In this QKD approach, quantum mechanism provides the unconditional guarantee of the security of the key....

    [...]

Journal ArticleDOI
TL;DR: In SARG04 QKD protocol with two decoy states, the optimum signal-state mean photon number is independent of the link distance and is valid for the attacks considered here, highlighting its use in a realistic scenario of satellite quantum communication.
Abstract: Quantum key distribution (QKD) is a key exchange protocol which is implemented over free space optical links or optical fiber cable. When direct communication is not possible, QKD is performed over fiber cables, but the imperfections in detectors used at the receiver side and also the material properties of fiber cables limit the long-distance communication. Free space-based QKD is free from such limitations and can pave the way for satellite-based quantum communication to set up a global network for sharing secret messages. To implement free space optical links, it is essential to study the effect of atmospheric turbulence. Here, an analysis is made for satellite-based quantum communication using QKD protocols. We assume two specific attacks, namely PNS (photon number splitting) and IRUD (intercept-resend with unambiguous discrimination), which could be main threats for future QKD-based satellite applications. The key generation rates and the error rates of the considered QKD protocols are presented. Other parameters such as optimum signal and decoy states mean photon numbers are calculated for each protocol and distance. Further, in SARG04 QKD protocol with two decoy states, the optimum signal-state mean photon number is independent of the link distance and is valid for the attacks considered here. This is significant, highlighting its use in a realistic scenario of satellite quantum communication.

22 citations

Journal ArticleDOI
TL;DR: This work focuses on the envisaged gap existing between currently in use strategies for design of Hardware-Software (HW-SW) systems and what the AI-driven 6G will demand, in terms of adaptivity, flexibility and evolution.
Abstract: To date, 5G (5th generation of mobile communications) roll out has been going on for more than two years, and the most of it has still to come. Meanwhile, Key Performance Indicators (KPIs) and Key Enabling Technologies (KETs) of Beyond-5G (B5G) and 6G (6th generation of mobile communications) are already at stake, looking at 2030. Future networks will leverage autonomous and evolutionary characteristics, triggered by the cornerstone of Artificial Intelligence (AI), falling well-beyond the scopes of 5G. Besides, seamless increase of KPIs, across the transition from 5G to 6G, with 100-1000 times higher data rate per user, latency reduction and reliability improvement, also stepping into the domain of (sub-)THz and optical communications, will set unparalleled demands for Hardware (HW) systems and components. This work focuses on the envisaged gap existing between currently in use strategies for design of Hardware-Software (HW-SW) systems and what the AI-driven 6G will demand, in terms of adaptivity, flexibility and evolution. An important part is forecasted for Micro/Nano technologies, devices and systems, in enabling 6G functionalities, especially at the network edge, stimulating partial reconceptualization of the classical idea of HW, in fact, rising its level of abstraction.

13 citations

Journal ArticleDOI
TL;DR: In this article, an add-drop multiplexer capable of pushing and withdrawing a single photon into an optical fiber cable which carries quantum bits from multiusers is used to combine different single photon channels into a single path.
Abstract: For combining different single photon channels into a single path, we use an effective and reliable technique which is known as quantum multiple access. We take advantage of an add-drop multiplexer capable of pushing and withdrawing a single photon into an optical fiber cable which carries quantum bits from multiusers. In addition to this, spreading spreads the channel noise at receiver side and use of filters stop the overlapping of adjacent channels, which helps in reducing the noise level and improved signal-to-noise ratio. In this way, we obtain enhanced performance of code division multiple access-based QKD links with a single photon without necessity of amplifiers and modulators.

9 citations

References
More filters
Journal ArticleDOI
TL;DR: It is demonstrated that the property that two channels with zero quantum capacity can be used together to yield a positive capacity exists for a wide class of inequivalent channels, none of which can simulate each other.
Abstract: Superactivation is the property that two channels with zero quantum capacity can be used together to yield a positive capacity. Here we demonstrate that this effect exists for a wide class of inequivalent channels, none of which can simulate each other. We also consider the case where one of two zero-capacity channels is applied, but the sender is ignorant of which one is applied. We find examples where the greater the entropy of mixing of the channels, the greater the lower bound for the capacity. Finally, we show that the effect of superactivation is rather generic by providing an example of superactivation using the depolarizing channel.

41 citations

Proceedings ArticleDOI
18 Sep 2006
TL;DR: This paper describes how the ATN can be secured by using Quantum Cryptography (QC), either fiber-based QC or free-space QC, instead of classical PKI.
Abstract: Aeronautical Telecommunication Network (ATN) is the network used by the Air Traffic Authorities, the Air Traffic Controllers (ATCo), the aircrafts and all Ground Stations (GS) to communicate voice and data. This paper describes how the ATN can be secured by using Quantum Cryptography (QC), either fiber-based QC or free-space QC, instead of classical PKI. ATN is a good example of special-purpose dedicated networks that could be secured by QC.

24 citations


"Analysis of Quantum Key Distributio..." refers background in this paper

  • ...A description of quantum key distribution [17] with two channels, quantum and classical are shown in Fig....

    [...]

Journal ArticleDOI
TL;DR: In SARG04 QKD protocol with two decoy states, the optimum signal-state mean photon number is independent of the link distance and is valid for the attacks considered here, highlighting its use in a realistic scenario of satellite quantum communication.
Abstract: Quantum key distribution (QKD) is a key exchange protocol which is implemented over free space optical links or optical fiber cable. When direct communication is not possible, QKD is performed over fiber cables, but the imperfections in detectors used at the receiver side and also the material properties of fiber cables limit the long-distance communication. Free space-based QKD is free from such limitations and can pave the way for satellite-based quantum communication to set up a global network for sharing secret messages. To implement free space optical links, it is essential to study the effect of atmospheric turbulence. Here, an analysis is made for satellite-based quantum communication using QKD protocols. We assume two specific attacks, namely PNS (photon number splitting) and IRUD (intercept-resend with unambiguous discrimination), which could be main threats for future QKD-based satellite applications. The key generation rates and the error rates of the considered QKD protocols are presented. Other parameters such as optimum signal and decoy states mean photon numbers are calculated for each protocol and distance. Further, in SARG04 QKD protocol with two decoy states, the optimum signal-state mean photon number is independent of the link distance and is valid for the attacks considered here. This is significant, highlighting its use in a realistic scenario of satellite quantum communication.

22 citations


"Analysis of Quantum Key Distributio..." refers background in this paper

  • ...Quantum key distribution (QKD) protocols are deployed for satellite communications, but their performance is affected due to environmental noise, adversary attacks, atmospheric turbulence, and telescope dimensions [4], [8]....

    [...]

  • ...IN quantum-based satellite networks, one of the central demands for free-space quantum communication is the ability of successful transmission of qubits under noisy environments [1]–[8]....

    [...]

Journal ArticleDOI
TL;DR: Low Density Parity Check codes are evaluated by comparing the runtime, throughput and communication complexity empirically with the Cascade and Winnow algorithms to characterize the strengths and weaknesses of each protocol.
Abstract: Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretic secure key exchange. QKD enables two parties to “g...

19 citations


"Analysis of Quantum Key Distributio..." refers background or methods in this paper

  • ...In these protocols numerous performance comparison parameters such as throughput efficiency, computational, communication complexity, and run time was evaluated [6]....

    [...]

  • ...In addition to this, various classical error correction schemes were proposed in [6], namely Winnow protocol, LDPC protocol, and Cascade protocol....

    [...]

Journal ArticleDOI
TL;DR: In this article, a single classical bit is used to send information under the influence of a noisy quantum channel and the entanglement content of quantum states is computed under noisy channels.
Abstract: Entanglement is an important resource for various applications of quantum computation. Another important endeavor is to establish the role of entanglement in practical implementation where system of interest is affected by various kinds of noisy channels. Here, a single classical bit is used to send information under the influence of a noisy quantum channel. The entanglement content of quantum states is computed under noisy channels such as amplitude damping, phase damping, squeesed generalised amplitude damping, Pauli channels and various collective noise models on the protocols of quantum key distribution.

18 citations