Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks

Authors

DOI:

https://doi.org/10.34190/iccws.18.1.982

Keywords:

Internet of Things, satellite communications, quantum cryptography, quantum key distribution

Abstract

There has been a dramatic increase in the number of Internet of Things (IoT) devices and their applications. Furthermore, there is a growing impetus to integrate IoT networks on a global scale, using satellites to expand the range of IoT connectivity into geographically remote areas.  Ensuring the security of satellite backhaul for IoT networks is thus of paramount importance. The steady advance of quantum computing in recent years threatens to nullify classical cryptographic approaches based on assumptions of computational hardness, motivating the need for post-quantum cryptography. Quantum computing algorithms have been developed that, once a quantum computer of sufficient scale is realised, will be able to break classical cryptosystems efficiently (at polynomial-time complexity).  A promising method of securing information against this threat at the physical layer has emerged in the form of quantum key distribution (QKD).  QKD exploits the fundamental physical properties of light to guarantee information-theoretic security.  Research into the application and standardisation of QKD to secure satellite backhaul, however, is still in its infancy. This paper presents a brief overview of the theoretical basis for QKD, whilst also providing a survey of contemporary QKD protocols. It evaluates the ability of these protocols to secure satellite backhaul in the context of a typical satellite-IoT network architecture.  Furthermore, it highlights the vulnerabilities, as well as the technical challenges associated with this endeavour. Finally, it proposes directions for future research and development into protocols and standardisation for the satellite-integrated IoT domain. Several challenges must be overcome before QKD can evolve into a global-scale solution for securing satellite-IoT. Secret key generation rate remains very low in practical demonstrations of trusted-relay QKD satellite architectures.  Further research is needed to overcome or mitigate the fundamental rate-distance trade-off before satellite QKD can be considered practicable in an IoT application.  Alternatives that do not rely on trusted nodes are contingent on nascent technologies such as quantum repeaters and quantum memory.  Whilst in theory QKD provides perfect information-theoretic security, it remains vulnerable to attacks that exploit imperfections in real-world equipment.  Further effort is needed to develop QKD protocols that can safeguard against the aforementioned challenges.

Author Biographies

Andrew Edwards, UniSA STEM, University of South Australia, Mawson Lakes, Australia

Andrew Edwards is a student at the University of South Australia, currently undertaking a Master of Telecommunication Engineering.  The focus of research for his minor thesis is in quantum cryptography as applied to satellite-integrated communication networks.

Yee Wei Law, UniSA STEM, University of South Australia, Mawson Lakes, Australia

Dr Yee Wei Law is a Senior Lecturer at UniSA STEM, University of South Australia. His research is currently focusing on space system security, adversarial machine learning and machine diagnostics.

Ronald Mulinde, UniSA STEM, University of South Australia, Mawson Lakes, Australia

Dr Ronald Mulinde lectures at the University of South Australia (UniSA STEM). He is a member of the (ISC)² and holds the CISSP. Holds a Ph.D. in Information and Communication Technologies (2017) from UniSA. Research interests include signal processing for communications and cybersecurity. An IEEE member and reviewer for the Elsevier journal of Digital Signal Processing.

Jill Slay, UniSA STEM, University of South Australia, Mawson Lakes, Australia

Prof Jill Slay is the SmartSat Professorial Chair in Cybersecurity at University of South Australia, a Fellow of ISC2, and a member of the Order of Australia. She has published more than 140 outputs in information assurance, critical infrastructure protection, security, and forensic computing. She currently focuses on the context of satellite cybersecurity and resilience.

Downloads

Published

2023-02-28