Next Article in Journal
Task Specific and General Patterns of Joint Motion Variability in Upright- and Hand-Standing Postures
Next Article in Special Issue
Polarization Attack on Continuous-Variable Quantum Key Distribution with a Local Local Oscillator
Previous Article in Journal
PGraphD*: Methods for Drift Detection and Localisation Using Deep Learning Modelling of Business Processes
Previous Article in Special Issue
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Routing Protocol for Quantum Key Distribution Networks

1
Department of Computer Science and Technology, Harbin Institute of Technology, Harbin 150080, China
2
EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
3
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shibin El Kom 32511, Egypt
4
School of Foreign Languages, Harbin Institute of Technology, Harbin 150080, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2022, 24(7), 911; https://doi.org/10.3390/e24070911
Submission received: 30 April 2022 / Revised: 23 June 2022 / Accepted: 29 June 2022 / Published: 30 June 2022
(This article belongs to the Special Issue Quantum Communication)

Abstract

:
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do not account for the state of quantum secure keys on links, applying them in QKD networks directly will result in underutilization of quantum secure keys. Therefore, an efficient routing protocol for QKD networks, especially for large-scale QKD networks, is desperately needed. In this study, an efficient routing protocol based on optimized link-state routing, namely QOLSR, is proposed for QKD networks. QOLSR considerably improves quantum key utilization in QKD networks through link-state awareness and path optimization. Simulation results demonstrate the validity and efficiency of the proposed QOLSR routing protocol. Most importantly, with the growth of communication traffic, the benefit becomes even more apparent.

1. Introduction

The risks and challenges threatening network security have gradually increased with the rapid development of networks in recent years. It is therefore crucial to ensure the security of transmitted information in the network. Quantum communication is a novel secure communication technology based on the fundamental concepts and properties of quantum mechanics [1,2,3,4]. Quantum secure communication based on QKD is the most-rapidly evolving quantum communication technology currently in use. QKD is a key-distribution technology in which the two parties of the communication first encode and transmit the key information using the quantum state as the information carrier, and then negotiate the key between them. Quantum states can represent a wide range of binary data combinations due to their superposition. Quantum key generation is typically performed by QKD using protocols such as BB84 [5], twin-field (TF) [6,7], and so on [8,9]. The security of QKD is based on the Heisenberg uncertainty principle and the quantum no-cloning theorem in quantum mechanics [2,3]. The combination of QKD and a one-time pad (OTP) algorithm has the unique advantage of information-theoretical security [10,11]. However, QKD can only provide point-to-point information-theoretic secure keys for two connected users. To broaden the service scale of QKD technology, study of QKD networks that can deliver end-to-end secure key services for more users is crucial [12,13,14]. Thanks to years of intense research on QKD networks, the number of nodes in experimental QKD networks has expanded from 6 to 56, and the transmission distance has increased from 19.6 km to 7600 km [15,16,17].
To maintain the security of data packets transmitted in the QKD network, they must be encrypted with quantum secure keys. In this study, it is assumed that routing packets must also be encrypted with quantum secure keys in order to guarantee the security of routing data. Therefore, QKD networks are characterized by their reliance on quantum secure keys in communication. Since traditional routing protocols do not account for this characteristic of QKD networks, applying them in QKD networks directly will result in the underutilization of quantum secure keys. That is not desirable because quantum secure keys are very precious in QKD networks. Consequently, a routing protocol that can achieve high quantum secure key utilization is crucial to QKD networks.
Many scholars have looked at routing protocols in QKD networks in order to address the routing problem. For example, the open shortest path first (OSPF) protocol has been used in the experimental DARPA QKD network [18]. Later, the upgraded version, OSPF-v2 protocol, was used in the SECOQC network [19]. The authors of [19] used the number of quantum secure keys instead of hop count as the routing metric for local load balancing. A similar study [20] was also conducted to improve the routing strategy based on OSPF for QKD networks. Likewise, based on traditional routing protocols, considering the similarity between wireless ad hoc networks (WANETs) and QKD networks, the authors of [21] applied three typical WANET routing protocols to QKD networks to solve the problem of frequent changes in link-state. Following a similar idea, a dynamic routing scheme for QKD networks based on trusted relays was proposed in [22]. Some scholars have also conducted research on routing protocols of QKD networks from other aspects, such as adaption to multiple types of QKD networks [23,24], security enhancement [25], and cross-talk suppression [26]. In summary, the research mentioned above has not paid enough attention to high quantum key utilization, which is currently the major concern of QKD networks.
In order to achieve high quantum secure key utilization, the problem of excessive packet loss due to frequent changes in link-state caused by the limited quantum secure key generation capability of QKD devices should be tackled first. Taking into account that both WANETs and QKD networks have frequent changes in link-state [27], the typical routing protocols of WANETs, including ad hoc on-demand distance vector routing (AODV), destination sequenced distance vector (DSDV), and optimized link-state routing (OLSR) are chosen as the research basis for designing a routing protocol for QKD networks. Both analysis and our simulation results using these three protocols show that OLSR is a more suitable option for QKD networks. To further enhance quantum secure key utilization of QKD networks, an efficient routing protocol based on OLSR, named QOLSR, for QKD networks is proposed in this paper. The graphical representation and the architecture of the proposed QOLSR protocol are shown in Figure 1. First, we modify the link-state awareness mechanism in OLSR to reduce packet loss during path switching in QKD networks. A more efficient link-state awareness mechanism is proposed in which decisions on sending data and routing packets are determined by the state of the key pool. Second, a new routing metric based on secure key recovery capability is designed. The suggested route selection approach based on quantum secure key recovery capability can reduce the frequency of path switching in QKD networks and increase quantum secure key utilization. Finally, simulation tests are used to evaluate the proposed QOLSR protocol. The simulation data demonstrate the validity and efficiency of QOLSR. Moreover, the benefit of our protocol becomes more apparent with the growth of communication traffic.
The remainder of this paper is organized as follows. In the next section, Section 2, the limitations of AODV, DSDV, and OLSR in QKD networks are first analyzed, and then the proposed efficient routing protocol, QOLSR, is introduced in detail. Simulation results and detailed analysis is provided in Section 3. Finally, the summary of this work is drawn in Section 4.

2. The Proposed QOLSR Protocol

2.1. Analysis of the Limitations of AODV, DSDV, and OLSR in QKD Networks

QKD networks consume quantum secure keys on links during communication. As a result, the link cannot communicate normally when quantum secure key resources remaining on the link are insufficient. The quantity of quantum secure key resources remaining on the link determines whether or not the link can continue to transfer data. Hence, the problem of frequent changes in the link-state caused by changes in the number of remaining key resources on the link must be resolved to make QKD networks efficient. Different from wired networks but similar to WANETs, QKD networks have changes in connection state between nodes caused by node movement. Thus, inspired by [21], three typical WANET routing protocols—AODV, DSDV, and OLSR—are selected in this research. First, we analyze the limitations of applying the three protocols to QKD networks. Then, a simulation experiment and performance comparison are performed using NS3 in Section 3.1. Finally, we make further improvements based on the OLSR protocol, which has the best performance among the three protocols.
The AODV protocol is a demand-driven passive routing protocol [28]. Routing discovery is performed by sending routing request RREQ packets and receiving routing response RREP packets when the source node has communication requirements and there is no corresponding route in the routing table. The link-state is sensed by sending and receiving HELLO packets periodically. The QKD network with this protocol suffers from high time delays and packet loss during the process of changing routing paths, resulting in underutilization of quantum secure keys. To solve this problem, the link-state should be pre-sensed by including information conveying the number of quantum secure keys in the HELLO packet. By minimizing the time required for link-state sensing, the performance of QKD networks can be increased. Then, the routing metrics should be improved by adding parameters such as quantum secure key generation capability, quantum secure key consumption rate, and the amount of remaining quantum secure key resources. Moreover, the frequency of path switching can be reduced by increasing the working duration of the path, in turn improving quantum secure key utilization of QKD networks. However, the on-demand-driven passive routing discovery mode makes it difficult to optimize the time necessary for routing discovery.
The DSDV protocol [29] is an active routing protocol that is driven by routing tables. The routing table is broadcast on a regular basis to detect changes in global topology. Each node in the network sends its routing table to other nodes during the broadcasting process, resulting in a large routing cost. Since the routing packet also needs to be protected by QKD encryption, a huge number of quantum secure keys will be consumed. In large-scale QKD networks, where quantum secure keys are valuable, this cannot be tolerated. When the current communication path is disabled, substantial packet loss occurs in QKD networks using the DSDV protocol since the loss cannot be detected until the next broadcast cycle. Therefore, DSDV should be optimized by shortening the broadcast cycle and reducing the routing overhead. However, these goals are mutually constraining and difficult to optimize simultaneously.
Likewise, the OLSR protocol is an active routing protocol driven by routing tables [30]. OLSR combines global topology awareness based on periodic broadcast as in DSDV and link-state awareness based on HELLO packet as in AODV through multipoint replay (MPR). It not only ensures timely awareness of global topology but also significantly reduces routing overhead. However, QKD networks with OLSR protocol also suffer from excessive time delays and packet loss caused by the link-state awareness mechanism based on HELLO packets and the routing metrics based on minima-hopping during path switching. Therefore, OLSR can be optimized by adding the information of the remaining quantum secure keys in the HELLO packet to pre-sense the link state. In addition, parameters such as quantum secure key generation capabilities should be added to the routing metrics. Unlike AODV, the routing table of OLSR is constructed locally using topology awareness and does not require the routing discovery procedure.
Based on the above analysis, OLSR is the most suitable of the three protocols for QKD networks. This is also confirmed by the simulation results in Section 3.1. Therefore, a more efficient routing protocol based on OLSR for QKD networks is investigated in this research.

2.2. An Overview of the OLSR Routing Protocol

Figure 2 depicts the OLSR protocol’s workflow. As shown, it includes three main modules: link-state awareness, routing discovery and routing calculation modules [30]. HELLO packets and TC packets are used for awareness of the link-state and the topology, respectively. HELLO_interval and TC_interval represent the sending periods of HELLO and TC packets, respectively. The shorter the sending periods, the higher the sensitivity. As a result, there is a lot of routing overhead and the over-consumption of quantum secure keys. Each module’s workflow will be discussed in depth below. The limits of OLSR in QKD networks, as well as optimization strategies, are also discussed.
The link-state awareness mechanism of OLSR is similar to that of AODV. Changes in link-state are sensed by sending and receiving HELLO packets periodically. In order to calculate the MPR set, the HELLO packages in OLSR must not only sense the link-state among neighbor nodes but also undertake the task of calculating the two-hop neighbors. Therefore, HELLO packets containing the information of all neighbor nodes are sent to each neighbor node by non-selective broadcast. Each node in the network maintains the neighbor table and two-hop neighbor table by listening to the HELLO packets. Because there is no pre-sense of link-state in OLSR, path-switching causes significant time delays and packet loss. The link-state can be pre-sensed by adding information about the remaining quantum secure keys in the HELLO packets. Thereby, the utilization of quantum secure keys can be enhanced by reducing the packet loss caused by path switching.
The routing discovery module calculates the MPR set in real-time according to the neighbor table and the two-hop neighbor table. The MPR mechanism significantly reduces the routing overhead and has no effect on the awareness of global topology. Since the topology changes dynamically, each node in the network needs to store an MPR selector table that contains the information of the real-time MPR set. Subsequently, the TC packets containing the MPR selector table will be sent to each neighbor node by selective broadcast based on the MPR mechanism. In the meantime, each node in the network maintains the topology table by listening to the TC packets. The topology table is used to find the source node based on the destination node and then calculate the optimal path.
The routing calculation module generates a routing table based on the neighbor table and topology table generated by the above two modules. The OLSR routing protocol will recalculate the routing table when the neighbor table or topology table is changed. OLSR selects the optimal path based on the minima-hopping method. However, information transmission in QKD networks relies heavily on quantum secure keys. Therefore, the path’s quality is determined by the information of the quantum secure key. The routing metrics should be improved by adding parameters such as quantum secure key generation capability, quantum secure key consumption rate, and the amount of remaining quantum secure key resources in order to improve quantum secure key utilization of QKD networks.

2.3. The Proposed QOLSR Protocol

According to the previous analysis, OLSR is a better fit for QKD networks than AODV or DSDV. Therefore, an optimized routing protocol based on OLSR that is more efficient and more suitable for QKD networks is proposed in this study. The main drawbacks of QKD networks are the frequent changes in link-state, which cause low quantum secure key utilization. The proposed routing protocol, QOLSR, can reduce the frequency of changes in link-state and enhance quantum secure key utilization of QKD networks through link-state awareness and a path optimization algorithm.

2.3.1. Efficient Link-State Awareness Mechanism for QKD Networks

The traffic on each link is dynamic due to the high concurrency and highly fluctuating nature of communication requirements. Furthermore, each link’s key generation capability varies, resulting in differences in the quantity of residual key resources on each link throughout communication. The link-state in QKD networks depends on whether there are enough quantum secure key resources in the key pool for communication. During communication, the variable amount of remaining quantum secure key resources regularly causes changes in the link-state. In turn, the topology of QKD networks changes. Link-state awareness must be timely and efficient to overcome the challenge of frequent topology changes. By utilizing a timely and effective link-state awareness mechanism, QKD networks can communicate with high quantum secure key utilization.
As mentioned above, in order to enhance quantum secure key utilization in QKD networks, a key pool is set on each link. Considering the limited storage resources, the amount of quantum secure key resources in each key pool has a maximum threshold MAX. A minimal threshold MIN is specified for each key pool to ensure that there are enough authentication keys for key generation. In addition, each key pool also has a warning threshold WARN for link-state awareness. WARN can warn that the link is going to be in a broken state and a new routing path should be calculated in advance. According to the three thresholds, there are three states of the key pool: unavailable, warning, and ready, as shown in Figure 1. In this paper, the link-state is judged through the states of the key pool. The ready state of the key pool indicates that the link is in a healthy communication state. The warning state of the key pool indicates that the link is about to transform to a broken state. The unavailable state of the key pool indicates that the link is in a broken state.
In the OLSR protocol, a new routing path is calculated locally when the neighbor routing table or the topology table changes. When the link is disconnected, the neighbor routing table will be changed due to the loss of HELLO packets. Subsequently, the two-hop neighbor table changes, too. This causes further changes in the MPR selector table and topology table. Therefore, timely awareness of the link-state is largely dependent on when HELLO packet loss is sensed. If the HELLO packets sent by neighbor nodes are not received, the OLSR protocol assumes the link is broken due to inadequate quantum secure keys. To communicate the information of broken links to each node in the entire network, numerous TC interval cycles are required. Data packets cannot be transferred normally during this time because the routing path in the routing table is actually inaccessible. To address this issue, this paper proposes a pre-sensed link-state strategy based on the amount of remaining quantum secure key resources, which involves separating communication data packets from routing packets and upgrading the QKD network’s HELLO packet transmission mechanism. The workflow of this scheme is shown in Figure 3. In comparison to the original link-state awareness mechanism of OLSR, the red component is the improved version proposed in this paper.
The required key pool’s information can be retrieved locally using HELLO packets. Therefore, whether the number of remaining quantum secure key resources can meet communication needs can be estimated locally. WARN can anticipate the link-state by comparing the quantity of remaining quantum secure key resources with the warning threshold. If the quantity of remaining quantum secure key resources is less than WARN, the node will not broadcast HELLO packets to neighboring nodes. Communication data packets are sent normally until the amount of remaining quantum secure key resources is lower than the minimum threshold MIN or the communication path is changed. Based on the above scheme, there will be WARN-MIN quantum secure keys that can be used to provide communication services during path switching, which can enhance quantum secure key utilization in QKD networks.

2.3.2. Efficient Path Optimization for QKD Networks

In addition to efficient link-state awareness as proposed above, QKD networks should also be able to make timely path adjustments based on this awareness. OLSR selects the optimal path based on the minima-hopping method. However, QKD networks are different from traditional networks. Information transmission in QKD networks relies heavily on quantum secure keys. As a result, the path’s quality is determined by the remaining quantum secure key resources, the ability to generate quantum secure keys, and the quantum secure key consumption rate. This research assesses the optimal path in terms of the remaining quantum secure key resources, the ability to generate quantum secure keys, and the quantum secure key consumption rate, and proposes an efficient path selection strategy based on key recovery ability.
In order to reduce the switching frequency of the communication path, the path with the longest sustainable working time is considered the optimal path. The sustainable working time takes into account the amount of remaining quantum secure key resources, quantum secure key generation capability, and quantum secure key consumption rate. Given the topology of QKD networks, N = V , E , where V is the set of nodes and E is the set of edges. The quantum secure key rate on each edge is represented by C u , v u , v E , where κ is packet size, ω u , v s , t i is traffic on edge u , v at time i when source node s communicates with destination node t, and C u r u , v i and D u r u , v i represent the amount of remaining available quantum secure key resources and the sustainable working time of edge u , v at time i, respectively. When the key generation rate is higher than the key consumption rate, the sustainable working time of the link is infinite. When the key generation rate is lower than the key consumption rate, the formula to calculate D u r u , v i is:
D u r u , v i = C u r u , v i s V , t V ω u , v s , t i · κ C u , v ,
where s V , t V ω u , v s , t i · κ is used to calculate the total traffic of each communication pair through edge u , v at time i. The sustainable working time is calculated based on the current routing protocol. Therefore, if the routing protocol is adjusted according to the calculation result, it will cause uncontrollable negative feedback problems, resulting in unstable communication and low quantum secure key utilization.
Thus, this paper suggests using quantum secure key recovery time instead of sustainable working time as a new routing metric. Specifically, sustainable working time refers to the time required for the quantum secure keys in the key pool to be exhausted when the quantum secure key consumption rate is higher than the quantum secure key generation rate. Key recovery time refers to the time required for the key pool to be filled when the quantum secure key generation rate is higher than the quantum secure key consumption rate. With a maximum threshold in the key pool, the amount of quantum secure key resources cannot increase indefinitely. Therefore, the shorter the key recovery time, the closer the key pool is to the full state, and the higher the priority of the link. On the contrary, the longer the quantum secure key recovery time, the closer the key pool is to the empty state, and the lower the priority of the link.
Considering that the link priority is inversely proportional to the quantum secure key recovery time, the reciprocal of the quantum secure key recovery time (called the quantum secure key recovery capability) is used to judge link priority. Let M a x u , v represent the maximum threshold of the key pool on edge u , v and γ u , v i represent the quantum secure key recovery capability of edge u , v at time i. The formula to calculate γ u , v i is:
γ u , v i = C u , v s V , t V ω u , v s , t i · κ M a x u , v C u r u , v i .
In addition, for a path that contains multiple links in the QKD network, the priority of the path can be expressed by the minimum value of the priority of all the links it contains. The formula is:
γ p a t h i = min u , v p a t h C u , v s V , t V ω u , v s , t i · κ M a x u , v C u r u , v i .
Path optimization based on the quantum secure key recovery capability has a higher level of stability and is also good at coping with the link-state frequency changes in QKD networks. Therefore, quantum secure key utilization can be enhanced by selecting the optimal path.

2.3.3. An Example of QOLSR Protocol

This section provides a basic example to explain QOLSR protocol’s link-state awareness mechanism and path optimization. In this section, an SECOQC network is chosen as the network topology, as illustrated in Figure 4. The length of the optical fiber link is indicated by the numbers on each edge (in km). It is assumed that each edge generates the quantum secure key through the VWDDS protocol. The optical parameters of the QKD devices are the same as in [31]. The GLLP formula can be used to calculate the key generation rate on each link, as shown in Figure 4. The key pool parameter MIN is set to 2 Mbit, WARN to 10 Mbit, and MAX to 50 Mbit. It is assumed that node 2 and node 4 communicate by path 2-4 at the beginning. Link 2-4 has a key generation rate of 5.6 Mbps and a key consumption rate of 6 Mbps. Figure 5 shows the entire workflow of link-state awareness and path optimization of QOLSR. First, since the key consumption rate of link 2-4 is higher than the key generation rate, the keys in key pool 2-4 will be consumed indefinitely. When the number of keys in key pool 2-4 decreases to the warning threshold of 10 Mb, the link-state awareness mechanism of QOLSR will be triggered. At the same time, HELLO packets will not be sent between nodes 2 and 4. However, the data packets will be sent as usual. When node 2 does not receive HELLO packets from node 4 during the HELLO interval, link 2-4 is considered disconnected. As a result, it will begin routing discovery in order to find a new communication path. Packet loss during path switching is reduced and quantum secure key consumption is improved because data packets are still transferred properly while searching for a new path.
There are four possible communication paths between nodes 2 and 4, as shown in Figure 4: 2-3-4, 2-3-5-4, 2-5-4, and 2-5-3-4. Thus, the optimal path will be selected based on key recovery capability. First, we calculate the key recovery capability of path 2-3-4. Path 2-3-4 consists of two links: 2-3 and 3-4. Therefore, the key recovery capabilities of links 2-3 and 3-4 are calculated first, and then the key recovery capability of path 2-3-4 is calculated as the minimum value between them. The key generation rate on link 2-3 is 4 Mbps, the key consumption rate is 1 Mbps, and the remaining key amount in the key pool is 40 Mb, as shown in Figure 4. Therefore, its key recovery capability is 4 Mbps 1 Mbps 50 Mb 40 Mb = 0.3 . Similarly, the key recovery capability of link 3-4 is 8.5 Mbps 10 Mbps 50 Mb 30 Mb = 0.075 . Therefore, the key recovery capability of path 2-3-4 is −0.075. Similarly, the key recovery capabilities of paths 2-3-5-4, 2-5-4, and 2-5-3-4 can be calculated as shown in Figure 5. As a result, it can be seen that path 2-5-4 has the best key recovery capability; hence it is chosen as the new communication path. Since the key recovery capability of path 2-5-4 is higher, it can continue to function properly for a longer period of time. Subsequently, the frequency of path switching is lowered, and quantum secure key utilization improves.

3. Simulation Results and Analysis

3.1. Comparative Study of AODV, DSDV, and OLSR

A comparative study is done with AODV, DSDV, and OLSR through simulator NS3. In this paper, the QKD simulation module based on NS3 developed in the literature [21] is used to simulate the QKD network. The open source code with this QKD simulation module can be downloaded from the git repository supplied in [21]. A modified USNET network is selected as the network topology in this experiment, as shown in Figure 6. There are 24 nodes and 27 edges in this network topology [32]. The numbers on each edge represent the length of the optical fiber link (in km). The parameters of QKD devices and key pools are the same as in Section 2.3.3. We first discuss the concept of communication level before moving on to the network requirement configuration in this experiment. The communication level is defined as follows:
communication _ level = communication _ demand I T S _ c o m m u n i c a t i o n _ c a p a b i l i t y .
The highest communication demand that the network topology can theoretically accommodate is its I T S _ c o m m u n i c a t i o n _ c a p a c i t y [31]. If the network’s communication demand exceeds the I T S _ c o m m u n i c a t i o n _ c a p a c i t y , severe network congestion will occur. Please refer to [31] for a detailed calculation of the I T S _ c o m m u n i c a t i o n _ c a p a c i t y . The communication level is calculated as the ratio of the average communication requirement and the I T S _ c o m m u n i c a t i o n _ c a p a c i t y . The QKD network cannot work normally when the average communication requirement exceeds the I T S _ c o m m u n i c a t i o n _ c a p a c i t y . Therefore, the range of values of the ITS communication level is [0, 1]. In this experiment, the entire network communication mode is used for communication settings in the simulation process. In other words, there is a communication requirement between any two nodes in the network. The communication level in this experiment is set to 0.01, 0.2, 0.4, 0.6, 0.8, and 1. The packet size is set to 500 bytes, and the simulation time is 100 s. Due to path switching, some packets will be lost throughout the network’s communication process. Since the lost data packets are also encrypted by a quantum secure key, the quantum secure key utilized by the lost data packets appears to have been ineffectively employed. As a result, quantum secure key utilization refers to the fraction of quantum secure keys consumed by successfully transmitted data packets compared to the total number of quantum secure keys consumed, calculated as follows:
Q K U = D P S T P S ,
where D P S and T P S represent the number of quantum secure keys consumed by delivered data packets and total data packets, respectively, and Q K U stands for quantum secure key utilization. Quantum secure key utilization is mainly affected by the packet delivery rate (PDR), as can be observed from the formula. Therefore, real-time PDR in the 100 s simulation is also used in this experiment to reflect the evolution of quantum secure key utilization.
Figure 7 shows that AODV performs the worst among the three protocols, whereas the OLSR protocol performs the best. The DSDV protocol performs better when the communication level is low. However, as the communication level rises, its PDR drops sharply. The variation of the PDR curve also shows that the OLSR protocol recovers the PDR faster than AODV and DSDV, implying that OLSR has better link-state awareness. The statistical experimental results shown in Figure 8 indicate that quantum secure key utilization of OLSR is significantly higher than that of AODV and DSDV at all communication levels. The performance of the OLSR protocol is mainly attributed to its dynamic link state awareness and selective broadcasting. It can detect changes in network topology faster than AODV and DSDV protocols, thereby reducing the loss of data packets during path switching. As a result, a higher PDR is obtained. At the same time, fewer quantum secure keys are wasted, resulting in increased quantum secure key utilization. Results of the experiment show that OLSR is more suitable for QKD networks than the other two protocols. However, the quantum secure key utilization of OLSR is only 38.81% when the communication level is 1, indicating that there remains significant room for improvement. As a result, in this paper, we attempt to propose a more efficient routing protocol based on OLSR.

3.2. Simulation Results of QOLSR and Analysis

In this section, we compare our proposed approach with original OLSR and the multi-SPF routing protocol proposed in [22]. The simulation environment in Section 3.2 is the same as in Section 3.1.
When the communication level is low, the performance of QOLSR and multi-SPF is close and is higher than that of OLSR, as shown in Figure 9. As communication level increases, the PDRs of OLSR and multi-SPF decrease sharply. However, the PDR of QOLSR still remains high after fluctuation. This is mainly due to link-state awareness and routing based on key recovery capability. Even if the network’s communication demand is enormous, it can still route packets in a reasonable manner, and the network will not be paralyzed. It can be seen from the experimental result statistics in Figure 10 that the efficient routing protocol proposed here has very high quantum secure key utilization at any communication level, which is significantly higher than the original, unimproved routing protocol. In particular, it can be seen that when the communication level is 1, the quantum secure key utilization rate of the original OLSR is 38.81%, while the quantum secure key utilization rate of the QOLSR we proposed is 81.84%, which is 2.1 times higher than that of the original OLSR. This is mainly due to improved link-state awareness, which reduces the number of packets lost during path switching, and improved path optimization based on key recovery capability, which reduces the path switching frequency and improves quantum secure key utilization. At low communication levels, the multi-SPF quantum secure key functions effectively. However, its performance decreases rapidly when the communication level rises. This is primarily due to multi-path SPF’s selection approach, which is based on the amount of the key pool’s remaining keys. When the communication level is low, the key consumption rate is low. Therefore, the key consumption rate has a minimal impact on communication. However, when the amount of communication increases, so does the key consumption rate. For the performance of multi-SPF, which does not take into account key generation, the consumption rate in routing is reduced dramatically. In particular, when the communication level is 0.01 and 0.2, the quantum key utilization of multi-SPF is slightly higher than that of QOLSR. This is mainly due to the low frequency of path switching at extremely low communication levels. The link pre-judgment in the link-state awareness mechanism of QOLSR may cause path switching to occur earlier than multi-SPF. As a result, the switching frequency of QOLSR is higher than that of multi-SPF. Moreover, due to the low key consumption rate, the advantage of choosing a path with a long sustainable working time based on key recovery capability cannot be exerted. Consequently, the quantum key utilization rate of QOLSR is slightly lower than that of multi-SPF when the communication level is extremely low. However, with increased communication, the quantum key utilization of QOLSR is significantly higher than that of multi-SPF. The performance of QOLSR, on the other hand, is relatively stable even at high communication levels. This means the quantum secure key utilization of the QKD network with the optimized routing protocol is significantly improved.
In addition, since routing packets also need to be encrypted and protected, the routing cost and one-way delay (OWD) time are also compared for a more comprehensive evaluation of the QOLSR protocol’s performance. The number of quantum keys consumed by routing packets in communication is referred to as routing cost. The delay of data packets from transmitting to receiving is referred to as OWD. Although routing cost fluctuates during communication, the routing cost of QOLSR is always minimal, as shown in Figure 11. The routing cost of QOLSR is substantially lower than that of original OLSR and multi-SPF, as seen in Figure 12. As a result of the increased link-state awareness and path optimization suggested in this research, the quantum secure keys spent by routing packets is lowered. This cuts down on the waste of quantum secure keys. Herein, it can be seen from Figure 13 that the delay of QOLSR during communication is similar to that of multi-SPF, and it has been kept at a low level. The OWD of QOLSR is much lower than that of original OLSR, as illustrated in Figure 14, which further demonstrates that the quality of service in QKD networks with QOLSR has improved.
In summary, the simulation results show that QOLSR not only has better quantum secure key utilization, it also performs well in routing cost and OWD. This is statistically significant because in QKD networks, quantum secure key resources are very precious. A key reason for this is that the efficient link-state awareness mechanism of the routing protocol is based on the amount of remaining key resources, which reserves time for path switching and reduces packet loss. Moreover, efficient path optimization is based on key recovery capability, which reduces the frequency of path switching. As a result, the efficiency of the proposed QOLSR routing protocol is verified.

4. Conclusions

This paper has presented an efficient routing protocol, QOLSR, for QKD networks. To be exact, in this routing protocol, we primarily built efficient link-state awareness and path optimization based on key recovery capability. Simulations demonstrated that QOLSR has significant performance improvements. As a result, we believe that the proposed routing algorithm has the potential to dramatically improve QKD networks’ quantum secure key utilization.

Author Contributions

J.Y. and Y.W. contributed to the initial conception of the ideas. H.M. and Q.L. refined the ideas. J.Y. and Y.W. wrote the source code and completed the simulations. N.C. and A.A.A.E.-L. contributed to editing. All authors contributed to writing the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (grant number: 62071151).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Flügge, S. Practical Quantum Mechanics; Springer: New York, NY, USA, 2012; pp. 1–22. [Google Scholar]
  2. Heisenberg, W. Uber den anschaulichen inhalt der quantentheoretischen kinematik und mechanik. Z. Phys. 1927, 43, 172–198. [Google Scholar] [CrossRef]
  3. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  4. Valagiannopoulos, C. Predicting the quantum texture from transmission probabilities. J. Appl. Phys. 2020, 127, 174301. [Google Scholar] [CrossRef]
  5. Bennett, C.H.; Brassad, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 7–11. [Google Scholar]
  6. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef] [PubMed]
  7. Yu, Y.; Xu, R.; Wang, L.; Mao, Q.P.; Zhao, S.M. Prefixed-Threshold Real-Time Selection for Free-Space Sending-or-Not Twin-Field Quantum Key Distribution. Entropy 2022, 24, 344. [Google Scholar] [CrossRef] [PubMed]
  8. Bennett, C.H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 1992, 68, 3121–3124. [Google Scholar] [CrossRef] [PubMed]
  9. He, G.P. Quantum key distribution based on orthogonal states allows secure quantum bit commitment. J. Phys. A Math. Theor. 2011, 44, 445305. [Google Scholar] [CrossRef] [Green Version]
  10. Rekhate, V.; Tale, A.; Sambhus, N.; Joshi, A. Secure and efficient message passing in distributed systems using One-Time Pad. In Proceedings of the 2016 International Conference on Computing, Analytics and Security Trends, Pune, India, 19–21 December 2016; pp. 393–397. [Google Scholar]
  11. Armanuzzaman, M.; Alam, K.M.R.; Hassan, M.M.; Morimoto, Y. A secure and efficient data transmission technique using quantum key distribution. In Proceedings of the 2017 4th International Conference on Networking, Systems and Security, Dhaka, Bangladesh, 18–20 December 2017; pp. 105–109. [Google Scholar]
  12. Chen, Y.A.; Zhang, Q.; Cheng, T.Y.; Cai, W.Q.; Liao, S.K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.G.; Cheng, Z.; et al. An integrated space-to-ground quantum communication network over 4600 km. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef] [PubMed]
  13. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Han, Z.Y.; Ma, S.Z.; Hu, X.L.; Li, Y.H.; Liu, H.; et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 2021, 15, 570–575. [Google Scholar] [CrossRef]
  14. Liu, H.; Jiang, C.; Zhu, H.T.; Zou, M.; Yu, Z.W.; Hu, X.L.; Xu, H.; Ma, S.Z.; Han, Z.Y.; Chen, J.P.; et al. Field test of Twin-Field quantum key distribution through Sending-or-Not-Sending over 428 km. Phys. Rev. Lett. 2021, 126, 250502. [Google Scholar] [CrossRef] [PubMed]
  15. Razavi, M. An Introduction to Quantum Communications Networks or, How Shall We Communicate in the Quantum Era? Morgan and Claypool Publishers: San Rafael, CA, USA, 2018; pp. 1–7. [Google Scholar]
  16. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Hu, X.L.; Guan, J.Y.; Yu, Z.W.; Xu, H.; Lin, J.; et al. Sending-or-Not-Sending with independent lasers: Secure Twin-Field quantum key distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Liao, S.K.; Cai, W.Q.; Handsteiner, J.; Liu, B.; Yin, J.; Zhang, L.; Rauch, D.; Fink, M.; Ren, J.G.; Liu, W.Y.; et al. Satellite-Relayed intercontinental quantum network. Phys. Rev. Lett. 2018, 120, 030501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Elliott, C.; Colvin, A.; Pearson, D.; Pikalo, O.; Schlafer, J.; Yeh, H. Current status of the DARPA quantum network. In Proceedings of the Quantum Information and Computation III, Orlando, FL, USA, 29–30 March 2005; pp. 138–149. [Google Scholar]
  19. Dianati, M.; Alleaume, R.; Gagnaire, M.; Shen, X.M. Architecture and protocols of the future European quantum key distribution network. Secur. Commun. Netw. 2008, 1, 57–74. [Google Scholar] [CrossRef]
  20. Tanizawa, Y.; Takahashi, R.; Dixon, A.R. A routing method designed for a quantum key distribution network. In Proceedings of the 2016 Eighth International Conference on Ubiquitous and Future Networks, Vienna, Austria, 5–8 July 2016; pp. 208–214. [Google Scholar]
  21. Mehic, M.; Maurhart, O.; Rass, S.; Voznak, M. Implementation of quantum key distribution network simulation module in the network simulator NS-3. Quantum Inf. Process. 2017, 16, 253. [Google Scholar] [CrossRef]
  22. Yang, C.; Zhang, H.Q.; Su, J.H. The QKD network: Model and routing scheme. J. Mod. Opt. 2017, 64, 2350–2362. [Google Scholar] [CrossRef]
  23. Zou, X.Y.; Yu, X.S.; Zhao, Y.L.; Nag, A.; Zhang, J. Collaborative routing in Partially-Trusted relay based quantum key distribution optical networks. In Proceedings of the 2020 Optical Fiber Communications Conference and Exhibition, San Diego, CA, USA, 8–12 March 2020. [Google Scholar]
  24. Amer, O.; Krawec, W.O.; Wang, B. Efficient routing for quantum key distribution networks. In Proceedings of the IEEE International Conference on Quantum Computing and Engineering, Electr Network, Denver, CO, USA, 12–16 October 2020; pp. 137–147. [Google Scholar]
  25. Yu, X.S.; Liu, X.; Liu, Y.H.; Nag, A.; Zou, X.Y.; Zhao, Y.L.; Zhang, J. Multi-path-based quasi-real-time key provisioning in quantum-key-distribution enabled optical networks (QKD-ON). Opt. Express 2021, 29, 21225–21239. [Google Scholar] [CrossRef] [PubMed]
  26. Li, S.F.; Yu, X.S.; Zhao, Y.L.; Wang, H.; Zhou, X.T.; Zhang, J. Routing and wavelength allocation in spatial division multiplexing based quantum key distribution optical networks. In Proceedings of the 2020 International Conference on Computing, Networking and Communications, Big Island, HI, USA, 17–20 February 2020; pp. 268–272. [Google Scholar]
  27. Roy, R.R. Handbook of Mobile Ad Hoc Networks for Mobility Models; Springer: New York, NY, USA, 2011; pp. 3–21. [Google Scholar]
  28. Perkins, C.E.; Royer, E.M. Ad-hoc On-Demand distance vector routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Application, New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
  29. Perkins, C.E.; Bhagwat, P. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 1994, 24, 234–244. [Google Scholar] [CrossRef]
  30. Clausen, T.H.; Jacquet, P. Optimized Link State Routing Protocol (OLSR). RFC 2003, 3626, 1–75. [Google Scholar]
  31. Wang, Y.X.; Li, Q.; Han, Q.; Wang, Y.M. Modeling and simulation of practical quantum secure communication network. Quantum Inf. Process. 2019, 18, 278. [Google Scholar] [CrossRef] [Green Version]
  32. Wang, Q.P.; Yu, X.S.; Zhu, Q.C.; Zhao, Y.L.; Zhang, J. Quantum key pool construction and key distribution scheme in multi-domain QKD optical networks (QKD-ON). In Proceedings of the 4th Optics Young Scientist Summit, Ningbo, China, 4–7 December 2020. [Google Scholar]
Figure 1. The architecture of QOLSR. The numbers 1–6 represent the nodes in QKD networks.
Figure 1. The architecture of QOLSR. The numbers 1–6 represent the nodes in QKD networks.
Entropy 24 00911 g001
Figure 2. Schematic diagram of OLSR routing protocol.
Figure 2. Schematic diagram of OLSR routing protocol.
Entropy 24 00911 g002
Figure 3. The link-state prediction scheme.
Figure 3. The link-state prediction scheme.
Entropy 24 00911 g003
Figure 4. An example of QOLSR: KGR, quantum secure key generation rate; KSR, quantum secure key consumption rate. The numbers 1–6 represent the nodes in QKD networks.
Figure 4. An example of QOLSR: KGR, quantum secure key generation rate; KSR, quantum secure key consumption rate. The numbers 1–6 represent the nodes in QKD networks.
Entropy 24 00911 g004
Figure 5. Workflow of QOLSR in this example.
Figure 5. Workflow of QOLSR in this example.
Entropy 24 00911 g005
Figure 6. Topology of the USNET network [32]. The numbers on each edge represent the length of the optical fiber link (in km).
Figure 6. Topology of the USNET network [32]. The numbers on each edge represent the length of the optical fiber link (in km).
Entropy 24 00911 g006
Figure 7. Comparison of AODV, DSDV, and OLSR in real-time PDR. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Figure 7. Comparison of AODV, DSDV, and OLSR in real-time PDR. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Entropy 24 00911 g007
Figure 8. Comparison of AODV, DSDV, and OLSR in quantum secure key utilization.
Figure 8. Comparison of AODV, DSDV, and OLSR in quantum secure key utilization.
Entropy 24 00911 g008
Figure 9. Comparison of OLSR, multi-SPF, and QOLSR in real-time PDR. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Figure 9. Comparison of OLSR, multi-SPF, and QOLSR in real-time PDR. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Entropy 24 00911 g009
Figure 10. Comparison of OLSR, multi-SPF, and QOLSR in quantum secure key utilization.
Figure 10. Comparison of OLSR, multi-SPF, and QOLSR in quantum secure key utilization.
Entropy 24 00911 g010
Figure 11. Comparison of OLSR, multi-SPF, and QOLSR in real-time routing cost. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Figure 11. Comparison of OLSR, multi-SPF, and QOLSR in real-time routing cost. (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Entropy 24 00911 g011
Figure 12. Comparison of OLSR, multi-SPF, and QOLSR in routing cost.
Figure 12. Comparison of OLSR, multi-SPF, and QOLSR in routing cost.
Entropy 24 00911 g012
Figure 13. Comparison of OLSR, multi-SPF, and QOLSR in real-time one-way delay (OWD). (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Figure 13. Comparison of OLSR, multi-SPF, and QOLSR in real-time one-way delay (OWD). (a) Communication level = 0.2. (b) Communication level = 0.4. (c) Communication level = 0.6. (d) Communication level = 0.8.
Entropy 24 00911 g013
Figure 14. Comparison of OLSR, multi-SPF, and QOLSR in one-way delay (OWD).
Figure 14. Comparison of OLSR, multi-SPF, and QOLSR in one-way delay (OWD).
Entropy 24 00911 g014
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yao, J.; Wang, Y.; Li, Q.; Mao, H.; El-Latif, A.A.A.; Chen, N. An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 2022, 24, 911. https://doi.org/10.3390/e24070911

AMA Style

Yao J, Wang Y, Li Q, Mao H, El-Latif AAA, Chen N. An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy. 2022; 24(7):911. https://doi.org/10.3390/e24070911

Chicago/Turabian Style

Yao, Jiameng, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, and Nan Chen. 2022. "An Efficient Routing Protocol for Quantum Key Distribution Networks" Entropy 24, no. 7: 911. https://doi.org/10.3390/e24070911

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop