Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks

Shravan Kumar Sehgal,Rashmi Gupta
DOI: https://doi.org/10.1007/s11277-024-10955-1
IF: 2.017
2024-04-04
Wireless Personal Communications
Abstract:In today's world, optical fiber networks are susceptible to numerous cyber-attacks and conventional key distribution techniques that are limited by the growing computational power. By introducing Quantum Key Distribution (QKD) into optical networks, it is possible to leverage existing fiber infrastructures and apply wavelength division multiplexing (WDM) for effective secret key deployments to improve optical-layer security. Security is a major challenge during key exchange in QKD, at that same time restricted number of network resources also have a big concern recently. Thus a wavelength resources as well as security enhancement is performed through Time Continuous Compactness (TCC) based wavelength allocation algorithm with African Vulture Optimization (AVO) based BB84 protocol for quantum keys distribution. In this model, the dual secret key assembly is done through the KP (Key pool) and VKP (Virtualization Key Pool) assembly for storing the data in the SDN server, which can be accessed later using the user authentication. The data from the sender is encrypted using the AES-RC4 algorithm for transmitting to the receiver at the data channel. This designed model is evaluated and compared with the existing model based on the parameters such as key generation and eavesdropping rate. The attained key generation and eavesdropping rate (64 byte) of the proposed AVO-QKD model is 0.41 s and 0.45 Bps/Hz. These attained values of the proposed model are greater than the existing model. Thus, the Dual Secret Key virtualization through TCC based Wavelength Allocation and BB84 protocol in QKD over Optical Networks secures and allocates resources better than other techniques.
telecommunications
What problem does this paper attempt to address?