2022
DOI: 10.3390/e24020149
|View full text |Cite
|
Sign up to set email alerts
|

DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network

Abstract: In the era of the interconnection of all things, the security of the Internet of Things (IoT) has become a new challenge. The theoretical basis of unconditional security can be guaranteed by using quantum keys, which can form a QKD network-based security protection system of quantum Internet of things (Q-IoT). However, due to the low generation rate of the quantum keys, the lack of a reasonable key allocation scheme can reduce the overall service quality. Therefore, this paper proposes a dynamic on-demand key … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Yu et al [24] proposed a heuristic collaborative routing algorithm for partially trusted relay QKD networks, considering relay deployment and remaining key quantities, but with certain deficiencies in handling request disparities. Additionally, some routing schemes [25][26][27][28][29][30] prioritize subsequent processing requests based on criteria such as security levels, business variations, and request arrival times. These schemes can accommodate diverse domain requirements with relatively few restrictions concerning efficiency enhancement considerations.…”
Section: Related Workmentioning
confidence: 99%
“…Yu et al [24] proposed a heuristic collaborative routing algorithm for partially trusted relay QKD networks, considering relay deployment and remaining key quantities, but with certain deficiencies in handling request disparities. Additionally, some routing schemes [25][26][27][28][29][30] prioritize subsequent processing requests based on criteria such as security levels, business variations, and request arrival times. These schemes can accommodate diverse domain requirements with relatively few restrictions concerning efficiency enhancement considerations.…”
Section: Related Workmentioning
confidence: 99%
“…Many different solutions are proposed to achieve resource allocation, including routing, wavelength, and quantum key methods. Table 1 compares focus points and performance metrics of the related works [33][34][35][36][37] with our scheme, where '-' means that this issue is not involved in the corresponding paper. Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Yu et al [ 23 ] proposed a heuristic collaborative routing algorithm for partially-trusted relay QKD networks, which integrates consideration of relay and residual keys, but it lacks sufficient consideration of the differences among requests. In addition, some routing schemes [ 24 , 25 , 26 , 27 ] set up different request priorities for subsequent processing based on criteria such as security level, business differences, and request arrival time. These schemes satisfy the demand differences of requests in diverse areas and have relatively little limitation in terms of efficiency improvement consideration.…”
Section: Introductionmentioning
confidence: 99%