25 research outputs found

    SarDub19: An Error Estimation and Reconciliation Protocol

    Full text link
    Aside from significant advancements in the development of optical and quantum components, the performance of practical quantum key distribution systems is largely determined by the type and settings of the error key reconciliation procedure. It is realized through public channel and it dominates the communication complexity of the quantum key distribution process. The practical utilization significantly depends on the computational capacities that are of great importance in satellite-oriented quantum communications. Here we present SarDub19 error key estimation and reconciliation protocol that improves performances of practical quantum systems

    Toward designing a quantum key distribution network simulation model

    Get PDF
    As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator

    Pembuatan Sistem Penunjang Keputusan untuk Biro Tenaga Kerja Berbasis Web

    Get PDF
    Pekerjaan terdiri dari dua elemen penting yaitu elemen yang membutuhkan pekerjaan (pencari kerja) dan elemen yang menyediakan lowongan/kesempatan kerja (penyedia kerja) Kesulitan yang timbul sekarang ini adalah bagaimana sebuah lapangan kerja dapat dikatakan 'cocok' dengan tenaga/rekan kerja. Banyaknya lowongan pekerjaan yang dibuka tidak sebanding dengan banyaknya pencari kerja Hal ini menyebabkan sebuah lowongan pekerjaan akan 'kebanjiran' pelamar. Penyedia kerja sebagai pembuka lowongan tentunya akan kesulitan dalam menentukan mana dari pelamar yang memenuhi syarat dan mana dari yang memenuhi syarat tersebut memiliki overall yang baik. Untuk mengatasi permasalahan tersebut, maka perlu dibuat sebuah sistem penunjang keputusan untuk biro tenaga kerja berbasis web (melalui internet). Pada system ini, penyedia kerja dan pencari kerja memiliki fasilitas masing-masing. Penyedia kerja dapat mencari tenaga kerja yang sesuai dengan keinginan, dapat membuka lowongan dan memberikan tanggapan atas lamaran yang diajukan pencari kerja. Di samping itu penyedia kerja dibantu untuk memilih tenaga kerja dengan menampilkan tenaga kerja urut berdasarkan overall yang dimiliki. Pencari kerja juga dapat melamar lowongan sesuai yang diinginkan dan melihat status dari lamaran yang diajukan. Dengan demikian diharapkan kesulitan-kesulitan yang ditemui oleh penyedia kerja dapat diminimalkan dan diharapkan proses pencarian/pemilihan tenaga kerja yang sesuai dapat lebih efisien dalam segi biaya dan waktu

    Evaluation of Device-Independent Internet Spatial Location

    Get PDF
    Device-independent Internet spatial location is needed for many purposes, such as data personalisation and social behaviour analysis. Internet spatial databases provide such locations based the IP address of a device. The free to use databases are natively included into many UNIX and Linux operating systems. These systems are predominantly used for e-shops, social networks, and cloud data storage. Using a constructed ground truth dataset, we comprehensively evaluate these databases for null responses, returned country/region/city, and distance error. The created ground truth dataset differs from others by covering cities with both low and high populations and maintaining only devices that follow the rule of one IP address per ISP (Internet Service Provider) and per city. We define two new performance metrics that show the effect of city population and trustworthiness of the results. We also evaluate the databases against an alternative measurement-based approach. We study the reasons behind the results. The data evaluated comes from Europe. The results may be of use for engineers, developers and researchers that use the knowledge of geographical location for related data processing and analysis, such as marketing

    A novel approach to quality-of-service provisioning in trusted relay Quantum Key Distribution networks

    Get PDF
    In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we propose a novel quality of service (QoS) model including new metrics for determining the states of public and quantum channels as well as a comprehensive metric of the QKD link. We also propose a novel routing protocol to achieve high-level scalability and minimize consumption of cryptographic keys. Given the limited mobility of nodes in QKD networks, our routing protocol uses the geographical distance and calculated link states to determine the optimal route. It also benefits from a caching mechanism and detection of returning loops to provide effective forwarding while minimizing key consumption and achieving the desired utilization of network links. Simulation results are presented to demonstrate the validity and accuracy of the proposed solutions.Web of Science28118116

    LoRaWAN end nodes: Security and energy efficiency analysis

    Get PDF
    With the development of electronics and communication techniques, the interest in realizing sensor networks with a large number of end nodes is growing. The main idea is to install devices in remote locations without direct supervision, which requires an uninterrupted power supply and secure communication to the rest of the network. In this paper, an experimental comparative analysis of popular practical LoraWAN end nodes (WisNode RAK811 and Seeeduino SX1301) regarding energy consumption in different security modes, spreading factors, energy consumption in sleep/idle mode as well as the security keys extraction from memory was performed.Web of Science61119009899

    Quantum key distribution: A networking perspective

    Get PDF
    The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds. The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first application on a broader scale. A major aspect of quantum cryptography is the methodology of Quantum Key Distribution (QKD), which is used to generate and distribute symmetric cryptographic keys between two geographically separate users using the principles of quantum physics. In previous years, several successful QKD networks have been created to test the implementation and interoperability of different practical solutions. This article surveys previously applied methods, showing techniques for deploying QKD networks and current challenges of QKD networking. Unlike studies focusing on optical channels and optical equipment, this survey focuses on the network aspect by considering network organization, routing and signaling protocols, simulation techniques, and a software-defined QKD networking approach.Web of Science535art. no. 9

    Použití distribuce kvantových klíčů pro zajištění aplikací v reálném čase

    No full text
    Quantum Key Distribution (QKD), based on the laws of physics rather than the computational complexity of mathematical problems, provides a secure way of establishing symmetrical binary keys between two geographically distant users. The keys are secure from eavesdropping during transmission and QKD ensures that any third party’s knowledge of the key is reduced to a minimum. In recent years, a noticeable progress in the development of quantum equipment has been reflected through a number of successful demonstrations of QKD technology. While they show the great achievements of QKD, many practical difficulties still need to be resolved, such as to provide better service differentiation. These networks are characterized as being multihop in nature where the consumption key rate is often higher than the charging key rate, which means that the links are available for a limited period of time only. Such features impose several challenges on the effective modeling and evaluation of reliability as well as finding appropriate Quality of Service (QoS) solution. This thesis focuses on research in the field of QKD for securing real-time communication by supporting QoS in QKD networks including a novel QoS model and novel distributed reactive routing protocol to achieve high-level scalability and minimize the consumption of key material used for securing routing data. As research in QKD networks grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. Due to the specificity of QKD link which requires optical/quantum and Internet connection between the network nodes, it is very costly to deploy a complete testbed containing multiple network hosts and links to validate and verify a certain network algorithm or protocol. The network simulators in these circumstances save a lot of money and time in accomplishing such task. A simulation environment offers the creation of complex network topologies, a high degree of control and repeatable experiments, which in turn allows researchers to conduct exactly the same experiments and confirm their results. This thesis describes the design and implementation of QKD network simulation module which was developed in the network simulator of version 3 (NS-3). The module supports simulation of QKD network in overlay mode or in a single TCP/IP mode. Therefore, it can be used for simulation of other network technologies regardless of QKD. Implemented simulation model was used for verification of proposed QoS solution. A number of simulations were performed. The obtained data have confirmed the primary thesis of this study, that it is possible to use real-time applications in QKD networks.Quantum Key Distribution (QKD), based on the laws of physics rather than the computational complexity of mathematical problems, provides a secure way of establishing symmetrical binary keys between two geographically distant users. The keys are secure from eavesdropping during transmission and QKD ensures that any third party’s knowledge of the key is reduced to a minimum. In recent years, a noticeable progress in the development of quantum equipment has been reflected through a number of successful demonstrations of QKD technology. While they show the great achievements of QKD, many practical difficulties still need to be resolved, such as to provide better service differentiation. These networks are characterized as being multihop in nature where the consumption key rate is often higher than the charging key rate, which means that the links are available for a limited period of time only. Such features impose several challenges on the effective modeling and evaluation of reliability as well as finding appropriate Quality of Service (QoS) solution. This thesis focuses on research in the field of QKD for securing real-time communication by supporting QoS in QKD networks including a novel QoS model and novel distributed reactive routing protocol to achieve high-level scalability and minimize the consumption of key material used for securing routing data. As research in QKD networks grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. Due to the specificity of QKD link which requires optical/quantum and Internet connection between the network nodes, it is very costly to deploy a complete testbed containing multiple network hosts and links to validate and verify a certain network algorithm or protocol. The network simulators in these circumstances save a lot of money and time in accomplishing such task. A simulation environment offers the creation of complex network topologies, a high degree of control and repeatable experiments, which in turn allows researchers to conduct exactly the same experiments and confirm their results. This thesis describes the design and implementation of QKD network simulation module which was developed in the network simulator of version 3 (NS-3). The module supports simulation of QKD network in overlay mode or in a single TCP/IP mode. Therefore, it can be used for simulation of other network technologies regardless of QKD. Implemented simulation model was used for verification of proposed QoS solution. A number of simulations were performed. The obtained data have confirmed the primary thesis of this study, that it is possible to use real-time applications in QKD networks.440 - Katedra telekomunikační technikyvyhově

    Multicast steganography using routing protocols

    No full text
    The strengthening of security solutions for computer networks increases the interests in new methods for the transfer of hidden information. In this paper, we considered the use of routing protocols for transmission of steganographic messages. We evaluated such approach using proactive and reactive routing protocols by analyzing the amount of sent data, the number of generated routing packets, the average size of routing packets, and the packet delivery ratio using the NS-3 simulator. Simulations included random network topologies with a various number of nodes and mobility settings. The obtained results showed that reactive routing protocols exchange a large amount of routing packets which can be suitable for steganographic purposes due to network flooding mechanism
    corecore