Secure End-To-End Data Transport in Quantum Networks
نویسندگان
چکیده
A secure end-to-end data transport protocol in quantum network is presented. A quantum network means we transport data by encoding a data into a certain quantum state on a qubit, and transmitting the qubit from sender to receiver. Because of the network scalability and physical technology limit in long distance teleportation, a fully connected quantum network model is impossible. Hence, in our quantum network model, the qubit is transported node by node to the receiver. However, this model arises two new security issues. The first is that intermediate nodes, which forward the qubit in the route, can snoop on information during the data transport. The second is that intermediate nodes can maliciously and illegally modify the transported qubit and forward it to the successor. In this paper, we present a protocol that can (1) prevent from snooping and (2) imperceptibly determine the node that maliciously modifies the transported data. By the presented protocol, we can transport information securely through the entire route in the quantum network.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملTransport Layer and Security Protocols for Ad Hoc Wireless Networks
The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end delivery of data packets, flow control, and congestion control. There exist simple, unreliable, and connection-less transport layer protocols such as UDP, and reliable, byte-stream-based, and connection-oriented transport layer protocols such as TCP for wired networks. These traditional w...
متن کاملTransport Layer and Security Protocols for Ad Hoc Wireless Networks
The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end delivery of data packets, flow control, and congestion control. There exist simple, unreliable, and connection-less transport layer protocols such as UDP, and reliable, byte-stream-based, and connection-oriented transport layer protocols such as TCP for wired networks. These traditional w...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملKey management and multi-layer IPSEC for satellite multicast
Satellites are also ideally suited for delivery of multicast applications. However secure multicast over satellites is a challenging problem. One important step toward the correct solution for end-to-end security is the integration of security architectures between satellites and IP terrestrial networks. This paper presents a secure group management and key distribution architecture based on th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011