Affiliation:
1. Dr. APJ Abdul Kalam Gov. College, UT of Dadra and Nagar Haveli & Daman and Diu
Abstract
Abstract
This research focuses on enhancing secure quantum communication in multi-subnetwork environments, specifically focusing on vulnerabilities associated with quantum key distribution (QKD) protocols. The study uses an in-depth analysis of the decoy state strategy within the QKD protocol, quantifying security parameters and proposing dynamic recalibration strategies based on quantum channel parameters. Sensitivity analyses are used to assess the impact of variations in attenuation coefficient, detector efficiency, and the fraction of rounds with eavesdropping attempts. A dynamic adaptation mechanism is introduced to optimize the choice between entangled and decoy states over time. The research reveals modest disclosures into the vulnerabilities of quantum communication channels and offers dynamic recalibration strategies to ensure ongoing security against quantum threats. Quantitative metrics, such as the quantum key rate (QKR) and information leakage (SKR), are presented, providing a comparative analysis between entangled and decoy states. The findings highlight the efficacy of the proposed multi-subnetwork QKD protocol in mitigating external threats and adapting to evolving quantum environments. The research contributes to the field by providing a comprehensive understanding of security parameters influencing QKD protocols and paving the way for improved quantum communication protocols with applications in secure information transfer.
Publisher
Research Square Platform LLC
Reference47 articles.
1. Pasricha, S.: Overview of indoor navigation techniques. Position, Navigation, and Timing Technologies in the 21st Century: Integrated Satellite Navigation, Sensor Systems, and Civil Applications 2 : 1141–1170. (2020)
2. Ang, J., et al.: Reimagining codesign for advanced scientific computing: Report for the ascr workshop on reimagining codesign. USDOE Office of Science (SC)(United States (2022)
3. A Novel Physical Unclonable Function Based on Silver Nanowire Networks;Liu Y;Adv. Funct. Mater.,2023
4. A systematic security assessment and review of Internet of things in the context of authentication;Saqib M;Computers Secur.,2022
5. Quantum Cryptography in 5G Networks: A Comprehensive Overview;Mehic M;IEEE Commun. Surv. Tutorials,2023