Next Article in Journal
A Comprehensive Analysis of Hyperbolical Fluids in Modified Gravity
Next Article in Special Issue
Free-Space QKD with Modulating Retroreflectors Based on the B92 Protocol
Previous Article in Journal
Object Selection as a Biometric
Previous Article in Special Issue
A Verifiable Arbitrated Quantum Signature Scheme Based on Controlled Quantum Teleportation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network

1
School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
2
Purple Mountain Laboratories for Network and Communication Security, Nanjing 211118, China
3
School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(2), 149; https://doi.org/10.3390/e24020149
Submission received: 11 December 2021 / Revised: 14 January 2022 / Accepted: 14 January 2022 / Published: 19 January 2022
(This article belongs to the Special Issue Practical Quantum Communication)

Abstract

:
In the era of the interconnection of all things, the security of the Internet of Things (IoT) has become a new challenge. The theoretical basis of unconditional security can be guaranteed by using quantum keys, which can form a QKD network-based security protection system of quantum Internet of Things (Q-IoT). However, due to the low generation rate of the quantum keys, the lack of a reasonable key allocation scheme can reduce the overall service quality. Therefore, this paper proposes a dynamic on-demand key allocation scheme, named DDKA-QKDN, to better meet the requirements of lightweight in the application scenario of Q-IoT and make efficient use of quantum key resources. Taking the two processes of the quantum key pool (QKP) key allocation and the QKP key supplement into account, the scheme dynamically allocates quantum keys and supplements the QKP on demand, which quantitatively weighs the quantum key quantity and security requirements of key requests in proportion. The simulation results show that the system efficiency and the ability of QKP to provide key request services are significantly improved by this scheme.

1. Introduction

The Internet of Things (IoT), composed of numerous heterogeneous devices, has realized a convenient and efficient communication between things located in physically unconnected places [1,2]. Due to the peculiar requirements of IoT, guaranteeing the credibility and data security of the IoT still faces several challenges [3,4]. In the current IoT system, a relatively simple method of data encryption, commonly known as lightweight cryptography, is adopted to guarantee the security of data transmission. However, this method has the risk of being cracked by quantum computers [5], which will lead to a series of challenges, especially those related to the privacy and security of the IoT.
Quantum key distribution (QKD) has the potential to provide long-term security for communication. Due to the basic law of quantum physics [6], for example, No-Cloning Theorem, uncertainty principle, etc. Distributing keys by the QKD mechanism can effectively realize the security of data transmission [7,8]. A quantum key distribution network (QKDN) formed by multiple point-to-point QKD systems, can be used to provide a remote quantum key service for multiple users.
Under the traditional IoT architecture, combined with the characteristics of QKDN, the layered system of quantum Internet of things (Q-IoT) is realized. On the basis of the three-layer structure of the traditional IoT: application layer, network layer and perception layer, Q-IoT adds a quantum security layer [9]. The application layer processes the data securely based on the quantum keys. The network layer provides service support for quantum key distribution of quantum backbone network, metropolitan area network and access network. The perception layer realizes the quantum key distribution between the edge gateway and the IoT terminal. The quantum security layer realizes the centralized management and efficient scheduling of the quantum keys for the entire IoT.
In the application scenario of Q-IoT, due to the low generation rate of quantum keys, in order to obtain the quantum key more efficiently, the QKD network uses the QKPs at the edge gateway to store the quantum keys. Therefore, in face of a large number of IoT requests, the quantum key is a scarce resource. How to allocate quantum key resources to satisfy the efficiency and lightweight requirements of Q-IoT applications is an urgent problem to be solved.

1.1. Related Works

The QKDN involves the efficiency problem of quantum key allocation. The QKDN involves the efficiency problem of quantum key allocation. Many researchers have reconstructed the scheme based on the research of classical key allocation schemes and the application scenarios of QKD on this problem. For the elaboration of the problem of quantum key allocation, we analyzed the related work developed in recent years.
Niu et al. [10] proposed a scheme of key size-driven wavelength assignment (KSD-WA), which reclaims the wavelength segments to transmit the quantum signals, thus, the wavelength of the quantum channels may require reconfiguration at different time slots if required. Taking the QKP technique in the QKD network into account, KSD-WA optimizes it with a heuristic algorithm and designs a deep reinforcement learning-based algorithm to optimize the fragment selection. The choice of wavelength maximizes the security key rate in dynamic scenarios.
Wang et al. [11] constructed intra-domain key pools for nodes within arbitrary domains, as well as inter-domain key pools for nodes at domain boundaries and proposed a capacity adaptive supplementary scheme based on the balance between key resources and routing, which reduces the service congestion rate and improves the utilization of key resources.
In the application scenario of the IoT, a RAKP scheme was proposed by Meng et al. [12] in which the quantum key generation rate of a pair of QKD devices mainly depends on the receiving rate of QKD receivers. Considering that the QKD receivers of each optical line terminal (OLT) generate quantum keys for the QKPs, RAKP is proposed to make rational use of OLT quantum receivers to dynamically adjust the quantum key generation rate according to the utilization rate of quantum keys.
Cao et al. [13] proposed the KoD scheme using the RWKA algorithm to allocate the routing and wavelength by the data channel and used the First-Fit algorithm to allocate the keys by the control channel and the data channel. The adaptive key assignment strategy considers two cases, i.e., key-updating based on time complexity and data complexity. Simulation results show that KoD is beneficial to achieve the balance of security requirements and key resource usage.
A dynamic key configuration (DSKP) scheme was proposed to assign keys stored in the QKP of OLT and optical network unit (ONU) to users by Wang et al. [14]. DSKP scheme effectively generates and assigns keys from users’ demands. When the number of keys in QKP is less than the threshold, the secret-key-generation process is triggered to release the “Supplementary Request” to obtain the required key quantity in QKP. The secret-key-consumption process clusters secret-key-provisioning requests with the same destination nodes.
Cao et al. [15] proposed a new multi-tenant QKD network architecture and key rate sharing scheme based on Software Defined Network (SDN) and QKP technology, and then designed a heuristic algorithm to realize efficient multi-tenant key assignment on the QKD network. Based on each QKD tenant request, if the secret-key-rate demands can be satisfied, the algorithm selects the required secret-key-rate slots to form the corresponding QKD node pairs with the First Fit algorithm.
In 2019, Cao et al. [16] proposed an on-demand key resource allocation strategy based on SDN for multi-tenant configuration on the metro QKD network. The First-Fit algorithm is used to select the required key resource from the corresponding key server of QKD. The key resources are assigned according to the tenancy request.
A QaaS oriented SDN framework was proposed by Cao et al. [17]. Based on SDN technology, more efficient QKD network management is obtained when multiple users apply for quantum key services. The protocol extension, intercommunication workflow, and routing and secret-key-rate assignment strategy are presented for QaaS implementation over the QKD network.
Zuo et al. [18] introduce the reinforcement learning model and designs a heuristic quantum key resource distribution method based on best fitting so that each security service can choose a resource allocation method with higher long-term return according to the current resource usage of the network, so as to improve the stability of the QKP and the utilization of quantum key resources.
A comparison of the existing works with our scheme is shown in Table 1. In this table, ‘×’ means this issue has not been discussed in the paper while ‘√’ means this issue has been discussed in the paper. In this comparison, we list the advantages and disadvantages of each scheme.
Based on current researches, it can be derived that the QKD network still faces the following difficult problems in the application scenario of IoT:
  • From the perspective of IoT terminal devices, specific scenarios of the IoT have their own unique security requirements. Current research does not make a reasonable and efficient allocation of quantum key resources considering the difference of security requirements among IoT applications, which will reduce the overall service quality.
  • There are numerous and heterogeneous terminal devices accessed in the IoT. Due to the storage capacity limitations of many terminal devices of the IoT and the high cost of QKD device deployment, it is unable to store quantum keys on IoT terminal devices. Therefore, the efficiency of the IoT system to allocate quantum key resources is low especially facing a large number of quantum key requests.
  • From the perspective of QKD network, due to the low generation rate of the quantum keys, the QKD network adopts the accumulation of the quantum key resources to satisfy numerous IoT key requests by storing quantum keys in QKPs. Dealing with the security issue of the QKP storing quantum keys, the current research does not take into account the efficiency of the QKP responding when confronting a large number of IoT key requests.

1.2. Contributions and Organizations

In response to the above challenges faced by the QKD network in the application scenario of IoT, this paper mainly involves the following contributions:
  • In the QKD-based Q-IoT security protection system, quantum key distribution is achieved with QKDN and trusted relay technology, and the key storage management of QKP is realized with SDN technology. Moreover, based on the requirements of the IoT application for quantum key quantity and security, a reasonable allocation method of quantum key resources is proposed in this paper.
  • A dynamic on-demand key allocation scheme is designed to allocate quantum key resources. Specifically, quantum key resources are distributed more efficiently by considering the arrival time of the key requests, the key quantity and security requirements. The number of requests arriving at the same time can be large, resulting in a long queuing delay, which involves the prioritization of queues. Therefore, the scheme designs the response weight of requests, which quantitatively determines the response order based on the quantum key quantity and security requirements in proportion. The scheme is designed to better meet the requirements for efficiency and lightweight of the Q-IoT in the application scenarios.
  • In our scheme, the quantum keys of the QKP are dynamically supplemented. In the key resource supplement stage, the quantum keys are replenished in sequence based on the response weight of the key supplement request. Additionally, in consideration of the time slice resources, the remaining key amount of the QKP, and the key supplement request, a reasonable key supplement threshold is set to maximize the use of network resources and improve the ability of the QKP to provide quantum key services.
This paper is organized as follows: Section 1 introduces the background of Q-IoT and the related research of key resource allocation in the field of quantum communication. A quantum key distribution framework in the IoT scenario is presented in Section 2. In Section 3, a dynamic on-demand key allocation scheme for Q-IoT is demonstrated. The simulation experiments of the dynamic on-demand key allocation scheme and the analysis of improvement effect are detailed in Section 4. Section 5 analyzes the performance and summarizes the paper.

2. Quantum Key Distribution Framework for IoT

2.1. QKD Mechanism

Here, the QKD mechanism used in this paper is the BB84 protocol first proposed by Bennett et al. [19] in 1984. Different from the classical cryptosystem, the BB84 quantum key distribution protocol is based on the principles of quantum mechanics to ensure the security of point-to-point key distribution. The schematic diagram of the process is shown in Figure 1. Some abbreviations and their descriptions used in the following sections are listed in Table 2.
The schematic diagram of QKD shown in Figure 1 involves the exchange of quantum qubits between the quantum transmitter (Qtra) and the quantum receiver (Qrec) through the quantum channel (QCh), then exchanges the measurement base through the public channel (PCh). Next, the key is screened. Finally, the errors are corrected to determine whether there is an attacker and determine the final session key.

2.2. Quantum Key Storage

Because the storage resources of IoT terminal devices are limited and the generation efficiency of the quantum keys is low, the accumulation of quantum key resources will be used to satisfy the quantum key usage. A QKP is placed at the edge gateway to store the quantum keys used for communication between IoT devices. When the IoT terminal device needs encrypted communication, it initiates a key request to the edge gateway. Then, the edge gateway extracts the quantum key from the QKP and transmits it to the IoT terminal device.
The key storage device is abstractly virtualized as a QKP, which exists between any two QKD nodes. The keys are managed in pairs between the two nodes. According to the source node and the destination node of the communication, the QKP can be divided into multiple virtual spaces to become virtual key pools (VKP), which are specifically identified by indexes. The keys are placed in the VKP corresponding to the index number according to the source node and the destination node of the communication requests, which meets the security requirements of the communication parties for one-to-one key resource distribution. In this way, the QKPs at the edge gateway nodes can be divided into two virtual key pools according to different communication scenarios, one is the internal key pool and the other is the cross key pool. The internal key pool that refers to the key generation in the QKP involves only one OLT while the cross key pool that refers to the key generation in the QKP involves two OLT optical line terminals [12].
The construction of QKP and VKP adopts software-defined network (SDN) technology [20] to flexibly schedule key resources according to communication requests. The overall structure is shown in Figure 2.

2.3. Quantum Key Distribution Scenario

The quantum transceivers cannot be placed in IoT terminals because the QKD technology is limited at this stage and the IoT terminals are numerous. Moreover, from the perspective of deployment cost, computing resources, security and credibility, quantum transceivers can only be placed in metropolitan nodes and access network nodes, etc.
Therefore, to realize the quantum key distribution from the access network to the IoT terminal devices, a quantum receiver Qrec and a trusted quantum relay device are arranged at the OLT, which can be shared by multiple quantum transmitters Qtra [21] for key generation. The quantum transmitter Qtra is arranged at the ONU to realize the point to multi-point quantum key distribution from the access network to the edge gateway. Long-distance communication needs to overcome the influence of transmission medium on signal loss. So, to solve the problem of signal loss of quantum signal in the quantum channel during long-distance transmission, the key trusted relay technology is used to provide end-to-end quantum keys with trusted repeaters [22,23]. The relay key generated by the point-to-point QKD link can be XOR-encrypted to relay it to the target node. The final session key is not transmitted directly. The node only transmits the quantum key processed by XOR encryption technology. The receiver decrypts it with the shared symmetric key to obtain the quantum key finally used for the session, which can achieve high security end-to-end key distribution.
The following three different Q-IoT communication scenarios are considered respectively: (a) the communication between IoT devices under the same edge gateway; (b) the communication between IoT devices under two edge gateways of the same OLT; (c) the communication between IoT devices under two edge gateways of different OLTs. A schematic diagram of a specific key distribution scenario is shown in Figure 3.
Take the communication between devices under two edge gateways of different OLTs as an example. As shown in Figure 3c, the device T1 under the edge gateway G1 of OLTA and the device T2 under the edge gateway G2 of OLTB communicate: when they are under different metropolitan area nodes, the relay process between metropolitan area nodes is required. The key KM12 is shared between metropolitan area node M1 and metropolitan area node M2. When the M1 receives the quantum key K, it performs the XOR encryption K ⨁ KM12 on the quantum key K. The M2 uses the key KM12 shared with M1 to decrypt to obtain the quantum key K. At this time, both M1 and M2 obtain the quantum key K.
Next, M1 and the OLTA share the key KAM1. The M1 performs XOR encryption K ⨁ KAM1 on the quantum key K. The OLTA uses the key KAM1 shared with M1 to decrypt the quantum key K. The OLTA and the ONUC share key KAC. The OLTA then performs XOR encryption K ⨁ KAC on the quantum key K. The ONUC decrypts the quantum key K with the key KAC shared with the OLTA. The quantum key K is stored in the QKP corresponding to the edge gateway G1. The quantum key K in the QKP corresponding to the edge gateway G2 is transmitted in the same way.
Based on the principle of OTP, the quantum key distribution from edge gateways to IoT terminal devices is realized by physical layer key generation technology [24]. The IoT devices and the edge gateways extract channel features on the wireless channel of communication to generate keys. Then, the quantum keys are encrypted by the encryption key and sent to the IoT terminals through the wireless channel. Finally, the IoT mobile terminals obtain the quantum key by decryption.
It should be noted that all relay nodes are required to be trustworthy. At the same time, all quantum keys used for the final session are not transmitted directly. They are transmitted after being processed by XOR encryption technology, which increases the security of key transmission.

3. The Proposed DDKA-QKDN Scheme

3.1. Scheme Characteristics

QKD network will face many problems in the application scenario of the IoT. Firstly, when encountering a large number of quantum key requests, due to the limitation of storage and computing capabilities of many IoT terminal devices, it puts forward high requirements on how to efficiently allocate quantum key resources. In addition, the storage security problem of quantum keys in the QKPs needs to be solved. Furthermore, because of the limitation of the storage capacity of IoT devices, a QKP is used at the edge gateway to store quantum keys. When dealing with the distribution of quantum key resources, the supplement of quantum keys of the QKPs needs to be considered.
Therefore, according to the requirements of IoT applications, it is of great significance to allocate quantum key resources efficiently to reduce the response delay of quantum key requests, improve IoT system efficiency and even reduce the time cost of receiving quantum keys for IoT terminal devices.
Considering a general application scenario in the Q-IoT, quantum keys with different bits are selected for encrypted communication according to the different security requirements of IoT applications. After the IoT application arrives, the IoT terminal device node sends a quantum key request to the edge gateway and queues up for the QKP to respond to the key request, and then obtains the quantum keys from the QKPs. When the remaining key amount of the QKP does not meet the required number of keys, the QKP needs to send a key supplement request for the key replenishment. Because the number of requests arriving at the same time could be potentially huge, there will be a large queuing delay. Therefore, the efficiency problem needs to be solved due to the lightweight characteristics of the IoT.
The proposed dynamic on-demand key allocation scheme, DDKA-QKDN, considers the key allocation and the key supplement of the QKP simultaneously. In the key allocation phase of the QKPs, the remaining keys in the QKPs are allocated on demand based on the arrival time of the key requests, the quantum key quantity requirements, the security requirements of the quantum keys, and the remaining keys quantity in the QKPs. In the key supplement phase of the QKPs, the keys are supplemented sequentially based on the response weight of the key supplement requests. At the same time, the keys in the QKPs are dynamically supplemented in the idle time slot. The goal of the DDKA-QKDN scheme is to achieve a balance between quantum key resources and the security requirements of IoT terminal applications, further improving the IoT system efficiency as a whole. Some mathematical symbols and their descriptions used in the following sections are listed in Table 3.

3.2. Key Request Security Classification

In response to the requests of IoT applications, combined with the characteristics of lightweight data processing of IoT itself, lightweight data acquisition and message management are adopted to classify the security level of the messages. According to different security levels, the quantum key security requirements for information encryption of IoT applications are quantitatively determined.
According to the security requirements of IoT applications, the security level Sec is classified. First, select whether quantum key communication is required. Based on the lightweight requirements of the IoT and system efficiency, the use of the quantum key is only for the case when the security requirements of message applications are high. For the case of a low-security level (Sec = 0), the message is directly transmitted in plaintext. For the case of a high-security level (Sec > 0), the quantum keys of different lengths can be selected for secure communication according to the security level Sec. The lengths of quantum keys are 128 bits, 256 bits, 512 bits, 1024 bits, and 2048 bits.

3.3. Quantum Key Allocation on Demand

The on-demand key allocation process of the QKPs is that after the application key requests arrive, multiple IoT terminal devices send multiple key requests to the edge gateway. The key requests need to include quantum key quantity requirements, quantum key security requirements, and other information. After receiving multiple key requests, the edge gateways extract the quantum keys from the corresponding QKPs at the edge gateway. The specific process is shown in Figure 4.
There are many IoT devices, the QKP may process a large number of IoT key requests, so the DDKA-QKDN scheme designs a queuing response sequence as follows:
  • The highest priority is the arrival time. The QKP responds to the key requests in order according to the arrival time of the key requests.
  • The second highest priority is the response weight value of the key requests, which is quantified by a certain weight e s t ( K i ) to identify the key quantity requirements and key security requirements of the key requests, that is, the key requests in the case of the same arrival time, weigh the key quantity requirements and key security requirements to determine the key allocation order. The calculation equation of the response weight value e s t ( K i ) is as follows:
    e s t ( K i ) = ( 1 ω ) l n K q u a + ω l n ( 10 K s e c ) .
    where K q u a represents the quantum key quantity requirement, K s e c represents the quantum key security requirement, ω [ 0 , 1 ] , which represents the trade-off degree of the quantity requirements and the security requirements of the key services. By adjusting the size of ω , the different requirements of the key quantity and the security of the key requests are met. The response weight value e s t ( K i ) of the key request is arranged in ascending order. In consideration of the system efficiency, the smaller the key requirement K q u a , the higher the priority of the key request. From the perspective of system security, the higher the key security requirement K s e c , the higher the priority of the key request.
Based on the queuing response sequence requirements of the above key requests, two different application scenarios are considered according to the remaining key amount of the QKP:
  • If the quantum remaining key quantity of the QKP is sufficient to meet the key quantity requirements of the arriving key requests, the keys are allocated according to the queuing response sequence of the key requests.
  • Otherwise, the edge gateway sends a quantum key supplement request of the QKP. After waiting for the QKP to supplement the keys and when the remaining key quantity of the QKP can satisfy the key quantity requirement of the key requests, the key allocation of the key request is performed.

3.4. Quantum Key Supplement

The key supplement process of the QKP consists of two parts. One part is that when the remaining key quantity of multiple QKPs is not enough to provide key services, the QKP sends a key supplement request, which needs to include quantum key quantity requirements, quantum key security requirements, and other information. According to the key supplement request, keys are generated between the OLTs and the ONUs to supplement the QKP. The specific process is shown in Figure 5.
The key generated between the OLTs and the ONUs can only be relayed one-to-one at the same time. Therefore, when responding to multiple QKP key supplement requests, the DDKA-QKDN scheme designs the queuing response sequence of key supplement requests, which is detailed as follows:
  • If the quantum remaining key quantity of the QKP is sufficient to meet the key quantity requirements of the arriving key requests, the keys are allocated according to the queuing response sequence of the key requests.
  • The second priority is the response weight value of the key supplement request, which is the same as the response weight value of the key request. When the arrival time of the key supplement request is the same, it is used to determine the order of key supplements by balancing the requirements of key quantity and key security. The calculation equation of the response weight value e s t ( K i ) is as follows:
    e s t ( K i ) = ( 1 ω ) l n K q u a + ω l n ( 10 K s e c )
Here ω [ 0 , 1 ] and it represents the trade-off degree of the system’s key supplement requirements for the quantity requirements and the security requirements. By adjusting the size of ω , the different requirements of the key quantity and the security of the key supplement requests are met.
Another part of the key supplement process of the QKP is to dynamically supplement the keys in the QKP in the idle time slot. Due to the dynamic and suddenness of key services, the generation and consumption of key resources are often unbalanced. If the quantum key resources in the QKP are consumed too fast, it may reduce the success probability of subsequent key services. Conversely, if the quantum key resources are consumed slowly, the quantum key resources in the QKP may accumulate gradually. When the quantum key resources are stored in the QKP for a long time, it will increase the risk of quantum key disclosure and reduce the security of quantum keys.
In order to solve the above two problems of key storage, the thresholds of QKP are set up. When the remaining key amount is too small and is lower than the set low threshold, to prevent the remaining key quantity of the QKP from being unable to meet the key quantity requirement of the subsequent key requests, the keys are supplemented in time. At the same time, when the number of remaining keys is too large and higher than the set high threshold, to prevent too many quantum keys from being stored for too long, the security of quantum keys will be reduced, and the supplement of quantum keys will be stopped. When in the range of the two thresholds, the quantum keys of the QKP are dynamically supplemented according to the key quantity requirements and security requirements.

3.5. Scheme Detail

The main idea of the DDKA-QKDN scheme is to dynamically allocate quantum key resources according to the application requirements. The following is an analysis of the scheme features from two perspectives, efficiency and security, specifically explaining how each feature affects the way of key resource allocation.
  • System efficiency: Because there are a large amount of IoT devices, the IoT key requests arriving at the same time will cause the rapid consumption of network resources and the risk of congestion. To minimize the waiting delay after the IoT key request arrives, the two main factors that affect the system efficiency, the key quantity requirement K q u a and QKP remaining key amount K s u r , should be considered primarily. From the perspective of application requirements, a higher priority is given to the key request with a smaller K q u a value. Because it takes less processing time, the waiting time can be reduced for subsequent key requests. When it comes to key resource storage, the scheme considers that when the remaining key amount K s u r of the QKP is lower than the low threshold K t h r e s h o l d _ l o w of the QKP, the keys are supplemented in time. This can reduce the time for key requests to wait for the keys to be supplemented and increase the number of key requests that can be responded to in time.
  • Security: Because the security requirements of IoT key requests are different, and due to the limitations of the computing and storage resources of the IoT, the quantum keys are stored in the QKPs in advance, the scheme considers the security of the system in terms of application requirements and key resource storage. In terms of application requirements, the scheme considers the security requirement K s e c of key requests as a dimension to be considered for the queuing response sequence of the key requests and the key supplement requests. The key requests with higher K s e c values are given higher priority. In terms of key resource storage, when the QKP performs the key supplement, if the high threshold K t h r e s h o l d _ h i g h of the QKP is exceeded, the key supplement is stopped. This can reduce the risk of key leakage in the QKP.
The detailed steps of the scheme are shown in Table 4 below.
After the IoT application key requests K R e q u e s t arrive, multiple IoT devices send multiple key requests K R e q u e s t to the edge gateway G1. The key request K R e q u e s t must contain the quantum key quantity requirement K q u a , quantum key security requirements K s e c , ID of both sides of the session, namely the session application terminal T 1 , the session target terminal T 2 and the edge gateway G 1 corresponding to T 1 and the edge gateway G 2 corresponding to T 2 , etc. That is, K R e q u e s t = ( K q u a , K s e c , T 1 , T 2 , G 1 , G 2 ) .
The arrival of the key requests K R e q u e s t obeys the Poisson distribution, which can simulate and describe the network data traffic. The probability that there are n key requests K R e q u e s t arriving in the t s l o t time slot is:
P = ( N ( t s l o t ) = n ) = ( λ t s l o t ) n n ! e λ t s l o t .
In Equation (3), λ represents the arrival frequency of the key requests K R e q u e s t , t s l o t can be regarded as a fixed value within a certain period of time. According to the characteristics of Poisson distribution, the average key stream load L r e q that can be carried in the t s l o t time slot is:
L r e q = E ( L ( t s l o t ) ) = λ × t s l o t
When the remaining key quantity K s u r of the QKP cannot satisfy the requirement of the key requirement K q u a of the current key request K R e q u e s t , it is necessary to send a key supplement request K S u p p l e m e n t to the OLT. The key supplement request K S u p p l e m e n t shall include information on the QKP and the quantum key requirement K q u a and quantum key security requirement K s e c of current key request K R e q u e s t , ID of both sides of the session, namely the session application terminal T 1 , the session target terminal T 2 and the edge gateway G 1 corresponding to T 1 and the edge gateway G 2 corresponding to T 2 , etc. That is, K S u p p l e m e n t = ( Q K P , K R e q u e s t ( K q u a , K s e c ,   T 1 , T 2 ,   G 1 ,   G 2 ) ) .
For incoming key request K R e q u e s t and key supplement request K S u p p l e m e n t , the highest priority of the response order is the arrival time. In the case of the same arrival time, the key quantity requirements K q u a and security requirements K s e c for key services are considered to determine the response order for the requests. A certain weight e s t ( K i ) is used to quantitatively identify the key quantity requirement K q u a and the key security requirements K s e c :
e s t ( K i ) = ( 1 ω ) l n K q u a + ω l n ( 10 K s e c )
In Equation (5), ω [ 0 , 1 ] . The scheme quantitatively considers the quantum key quantity requirements and quantum key security requirements of key requests according to the proportion and calculates the e s t ( K i )   value corresponding to each request. Based on this criterion, the queuing response order of key requests with the same arrival time is determined. The weights e s t ( K i ) are arranged in ascending order, the smaller the key requirement K q u a , the higher the security requirement of the key service K s e c , the higher the priority of the request. The ranking strategy aims to better meet the requirements of efficiency and lightweight in the application scenario of Q-IoT.
Furthermore, when the QKP, the OLT and the ONU are in the idle time slot, the dynamic key supplement is carried out for the QKP. Accordingly, two thresholds of the QKP, low threshold K t h r e s h o l d _ l o w and high threshold K t h r e s h o l d _ h i g h are set. When the remaining key quantity K s u r of the QKP is less than the low threshold K t h r e s h o l d _ l o w , the QKP is supplemented to the QKP remaining key quantity K s u r = the high threshold K t h r e s h o l d _ h i g h . The remaining key quantity K s u r of the QKP is:
K s u r ( n t s l o t ) = K s u r ( ( n 1 ) t s l o t ) + n t s l o t V g e n ,                     K s u r ( ( n 1 ) t s l o t ) < K t h r e s h o l d l o w ;
K s u r ( n t s l o t ) = K s u r ( ( n 1 ) t s l o t ) ,                                                 0 < K s u r ( n t s l o t ) K t h r e s h o l d h i g h .
In the idle time slot, as shown in Equation (6), the remaining key amount of the QKP for each time slot is judged. When the remaining key amount K s u r is less than the set low threshold K t h r e s h o l d _ l o w , the remaining key amount K s u r in the QKP is increased. At the same time, as shown in Equation (7), it is judged whether the remaining key quantity K s u r of the QKP in the time slot is within an interval less than the set high threshold K t h r e s h o l d _ h i g h . If this interval is exceeded, the key supplement will be stopped, and the remaining key amount K s u r in the QKP remains unchanged.
Based on the above scheme architecture, the dynamic on-demand key allocation scheme considers three parts of the time delay: the queuing delay t w a i t of key requests waiting to obtain the key, the queuing delay T w a i t of QKP waiting for key supplement and the key transmission delay T t r a . The delay calculation of key requests is divided into two circumstances according to the actual key resources. One is that the number of remaining keys in the QKP meets the key quantity requirement of the key request and the QKP does not need to be supplemented, as shown in Equation (8); The other is that the amount of remaining keys in the QKP does not meet the key quantity requirement of the key requests and the QKP needs to be supplemented, as shown in Equation (9).
T s u m = t w a i t + T t r a = { K q u a × t t r a ,                         t g e t t a r r ; ( t g e t t a r r ) + K q u a × t t r a ,             t g e t > t a r r .
where t g e t represents the time when the last key request K R e q u e s t ( i 1 ) obtained the keys from the QKP, t a r r represents the arrival time of the current key request K R e q u e s t ( i ) , and t t r a represents the link transmission rate. According to the time slice resource occupancy, if t g e t > t a r r , it means that the time slot of the QKP is occupied by the previous key request K R e q u e s t ( i 1 ) , and the current key request K R e q u e s t ( i ) needs to queue up to wait for the time slot to be released. If t g e t t a r r , it means that the current key request K R e q u e s t ( i ) gets the response directly, and the quantum keys can be extracted from the QKP without queuing.
T s u m = t w a i t + T w a i t + T t r a = { ( t g e t t a r r ) + ( T g e t T a r r ) + K q u a K s u r V g e n + K q u a × t t r a , t g e t > t a r r T g e t > T a r r ; ( t g e t t a r r ) + K q u a K s u r V g e n + K q u a × t t r a , t g e t > t a r r T g e t T a r r ; ( T g e t T a r r ) + K q u a K s u r V g e n + K q u a × t t r a , t g e t t a r r T g e t > T a r r ; K q u a K s u r V g e n + K q u a × t t r a , t g e t t a r r T g e t T a r r .
where T g e t represents the time when the last QKP key supplement request K S u p p l e m e n t ( i 1 ) obtained the key, T a r r represents the arrival time of the current QKP key supplement request K S u p p l e m e n t ( i ) , and V g e n represents the generation rate of the keys between the OLT and the ONU. According to the time slice resource occupancy, if T g e t > T a r r , it means that the time slot of the OLT relay is occupied by the previous key supplement request K S u p p l e m e n t ( i 1 ) , and the current key request K S u p p l e m e n t ( i ) needs to queue up to wait for the time slot to be free. If T g e t T a r r , it means that the current key supplement request K S u p p l e m e n t ( i ) gets a response directly without queuing.
Then the average delay T s u m ¯ between the arrival of the key requests and the completion of the request processing is:
T s u m ¯ = T s u m / L r e q

4. Simulation and Analysis

In order to evaluate the performance of the DDKA-QKDN scheme for Q-IoT secured by QKDN, the simulation was performed based on the following settings. The simulation experiment is carried out on the network topology shown in Figure 6.
In the following performance evaluations, here are the common parameters. The arrival interval of the key service request meets the Poisson distribution and the Poisson distribution parameter of the request time interval is 5 s. The simulation scenario has four edge gateway nodes and the communication sender source edge gateway ID is generated randomly, so as the receiver destination edge gateway ID. The ID value is generated between 1 and 4, I D { 1 , 2 , 3 , 4 } . The quantum key quantity requirements K q u a and quantum key security requirements K s e c of the key service requests are also generated randomly. K s e c { 1 , 2 , 3 , 4 , 5 } corresponds the lengths of quantum keys are 128 bits, 256 bits, 512 bits, 1024 bits, and 2048 bits. The benchmark capacity of the QKPs is 5120 bits and the initial remaining key amount K s u r of the QKPs is pre-set K s u r { 1280 , 2560 }   bits . The edge gateway is connected to n IoT sensor devices. The trade-off degree ω of the quantity requirement and the security requirement of the key service is set to 0.5. The key generation rate V g e n between OLT and ONU is 2560 bps, the link transmission rate t t r a is 1280 bps. The factors affecting the performance of the proposed scheme are analyzed through simulations built in Matlab R2020b (The MathWorks, Natick, MA, USA). The simulation environment is 64-bit Windows 10. The hardware environment is Intel (R) Core (TM) i7-10700 CPU @ 2.90 GHz processor and 8.00 GB RAM.
This section evaluates scheme performance from two parameters, one is the average delay T s u m ¯ of the key service and another is the success rate S R of no-waiting requests. First, the average delay T s u m ¯ of key service refers to the average waiting time between the arrival of the key request and the completion of the request processing, which reflects the efficiency level of the key service of the scheme. Meanwhile, the success rate S R of no-waiting requests refers to the ratio of the key requests that can extract the keys from QKP upon arrival to the total key services, that is, the T s u m of key requests is equal to the key transmission delay T t r a . The success rate of no-waiting requests S R reflects the ability of the QKP to directly provide the key request services. What is more, we measured the two parameters, T s u m ¯ and S R , according to the different key stream load, QKP thresholds, the trade-off degree ω of the quantity and security requirement of the key service.

4.1. Evaluation of DDKA-QKDN Scheme

Figure 7 shows the efficiency level of the system, that is, the average key service delay T s u m ¯ of the entire system when the QKP differs in the minimum supplementary threshold K t h r e s h o l d _ l o w under different key service traffic loads. The average key service delay T s u m ¯ of the entire system averages the delay of all key requests for waiting T s u m , which consists of three parts: the queuing delay t w a i t of key requests waiting to obtain the key, the queuing delay T w a i t of QKP waiting for key supplement and the key transmission delay T t r a .The Y-axis of Figure 7 represents the average delay T s u m ¯ of key services, and the X-axis represents the traffic load of the key services.
As shown in Figure 7, the efficiency of key allocation of the whole system is related to the threshold K t h r e s h o l d _ l o w for the QKP key supplement and the key service traffic load L r e q . As can be seen in Figure 7, as the key service traffic load L r e q gradually increases, the average delay T s u m ¯ of key service will gradually rise, and the efficiency of system key processing service will decline. This is because when the key resources are limited, it is necessary to wait for the dynamic supplement of the key resources. When continuous requests arrive, the time slice resource has not been able to be in an idle state, resulting in a corresponding increase in the delay of waiting for the supplement of key resources. It can also be seen that as the QKP low threshold K t h r e s h o l d _ l o w increases, the average key service delay T s u m ¯ and the efficiency of the system in processing key services will increase. The reason is that the key resources are gradually enriched and can provide more key request processing services, which improves the system efficiency.
Figure 8 shows the ability of QKP to directly provide the key request services, that is the success rate S R of no-waiting requests, under different key service traffic loads with variable minimum supplementary thresholds K t h r e s h o l d _ l o w . The success rate SR of no-waiting requests is the ratio of key requests responded by QKP in time to all requests, which means that the queuing delay t w a i t of key requests waiting to obtain the key and the queuing delay T w a i t of QKP waiting for key supplement equals 0. The keys can be extracted from the QKP upon the arrival of the key request. The Y-axis in Figure 8 represents the success rate S R of no-waiting requests, and the X-axis represents the traffic load of the key services.
As shown in Figure 8, the ability of QKP to directly provide the key request services is related to the threshold K t h r e s h o l d _ l o w for QKP key supplement and the traffic load L r e q of the key services. It also can be seen that with the increase in traffic load L r e q of the key services, the success rate S R of no-waiting requests will decrease, which means the ability of QKP to directly provide the key request services will decrease. In the case of limited key resources, the increase in load will reduce the ability of QKP to directly provide the key request services. Meanwhile, as the QKP low threshold K t h r e s h o l d _ l o w increases, the success rate S R of no-waiting requests will increase, the reason of which is that the QKP key supplement process is added and the remaining key amount K s u r of QKP is taken as a consideration. The dynamic key supplement can effectively enrich the key resources so that QKP can serve more quantum key requests.
In Figure 9, in order to verify the impact of the key request queuing strategy on the average delay T s u m ¯ of key service after the key request arrives, the same key supplement low threshold K t h r e s h o l d _ l o w is set and the trade-off degree ω in the sorting strategy is changed to adjust the proportion of the key demand K q u a and the key security requirement K s e c in the queuing standard. The trade-off degree ω of the quantity and security requirements in the sorting strategy is set to 0.5 in the initial state. In Figure 9, the trade-off degree ω is set from 0 to 1, ω [ 0 , 1 ] , which means different requirements of the key quantity and the security of the system. When ω = 0 , it means that the sorting strategy only includes the key quantity requirement and when ω = 1 , it means that the sorting strategy only includes the security requirement. The Y-axis of Figure 9 represents the average delay T s u m ¯ of key service, and the X-axis represents the traffic load of the key services.
It can be seen that based on ω = 0.5 , the key requirement K q u a and the key security requirement K s e c account for the same proportion. When the proportion of key quantity requirement K q u a decreases, T s u m ¯ will increase and the system efficiency will decrease. While the T s u m ¯ decreases and the system efficiency increases as the proportion of the key quantity requirement K q u a increases, which situation is opposite to that before. However, at the same time, since the key security requirement K s e c accounts for a lower proportion, the system security will decrease. Therefore, in practical application, the trade-off degree ω in the sorting strategy should be adjusted according to the application requirements.

4.2. Comparison of Different Schemes

The comparison schemes adopted in this section are the key allocation schemes proposed in [12,13,14]. In [12], the author proposed the RAKP scheme, which dynamically adjusts the key generation rate according to the key utilization of QKP. Ref. [13] proposed the KoD scheme, which uses the First-Fit algorithm to distribute keys through the control channel and data channel. Ref. [14] proposed a DSKP scheme, which selects the QKP with the lowest number of remaining keys to supplement first when the number of keys in QKP is less than a certain threshold.
In addition, the following three scenarios are considered. S1: when the key request arrives, the key application is not sorted according to the key requirement K q u a and the key security requirement K s e c weight, and at the same time there is no dynamic key supplement when the keys in QKP are insufficient; S2: for the key requests, they are not sorted according to the key requirement K q u a and the key security requirement K s e c weight; S3: when the keys in QKP are insufficient, there is no dynamic key supplement.

4.2.1. Performance Comparison of Schemes under Different Traffic Loads

In order to verify the improvement of the DDKA-QKDN scheme on the efficiency of key resource distribution, the same low threshold K t h r e s h o l d _ l o w of the QKP is set for key supplement and the trend of the average delay T s u m ¯ of key services of different schemes is compared with the change of the key service traffic load L r e q . In order to verify the improvement of the DDKA-QKDN scheme on the ability of QKP to directly provide the key request services, we set the same low threshold K t h r e s h o l d _ l o w of the QKP for key supplement and compare the trend of the success rate S R of no-waiting requests of different schemes with the change of the key service traffic load L r e q . In Figure 10b and Figure 11b, the percentage improvement refers to the ratio of the optimized value of the DDAK-QKDN scheme on this parameter to the value of the compared scheme.
As shown above in Figure 10 and Figure 11 comparing S1, S2, S3 and DDKA-QKDN schemes, it can be concluded that the current queuing strategy has little effect on the system efficiency and the improvement of the capability of QKP to provide key services, which is not greatly affected by the traffic load L r e q . However, when the keys in QKP are insufficient, the key dynamic supplement improves the system efficiency and the ability of QKP to directly provide the key services, which decreases with the increase in L r e q . An increase in L r e q means that K q u a increases, and the possibility that the remaining key quantity K s u r of QKP needs to be supplemented increases, so that more time slots are occupied. The idle time slots and the time slice resources are reduced so that the system efficiency is not significantly improved after L r e q is increased. However, the dynamic key supplement process takes the remaining key quantity K s u r of QKP as a consideration, the dynamic supplement of key resources can significantly improve the capability of QKP to provide quantum key services.
Comparing this scheme with the RAKP scheme, KoD scheme, DSKP scheme, it can be seen that the DDKA-QKDN scheme improves the system efficiency by about 4% and the ability of the QKP to directly provide the key request services by about 7% compared with RAKP scheme and DSKP scheme. The RAKP scheme sorts the response order of key requests based on the key utilization of QKP, and the DSKP scheme sorts the response order of key requests based on the remaining key amount of QKP. In terms of improving the system efficiency, the sorting strategies of these two schemes are not as well as the DDKA-QKDN scheme. In addition, compared with the KoD scheme, the DDKA-QKDN scheme improves the system efficiency by about 2–5% and the ability of the QKP to directly provide the key request services by about 9–15%. The KoD scheme uses the First-Fit algorithm for key allocation, which is equivalent to the case of ω = 0 in the DDKA-QKDN scheme. According to the simulation results in the previous section, this strategy will have a certain effect on improving the system efficiency. However, the KoD scheme does not consider the key supplement process of QKP, and the excessive consumption of key resources after L r e q increases is not considered, which will lead to the decline of the ability of the QKP to provide the key request services. Meanwhile, in terms of improving the overall system efficiency, the effect is not equivalent to the DDKA-QKDN scheme and because the remaining key quantity K s u r of QKP will drastically decrease as L r e q increases, and the time slice resources occupied by key supplement increase, it will result in less significant improvement in system efficiency after L r e q increases.
To sum up, the dynamic supplementary processing of QKP in the DDKA-QKDN scheme improves the overall efficiency of the system. The timely enrichment of key resources enables QKP to provide more key request processing services with the same time slice resources, which improves the system efficiency. Compared with the RAKP scheme and DSKP scheme, the queuing response strategy of the DDKA-QKDN scheme for requests improves the system efficiency more significantly. A key request with a large key demand K q u a takes up more time to slice resources and link resources during processing, which will cause congestion in request processing. Therefore, when the request arrival time is the same, considering the key request with less key quantity requirement K q u a first, which means key requests occupying with less time slice will improve the overall efficiency of the system.

4.2.2. Performance Comparison of Schemes under Different QKP Thresholds

For the sake of verifying the improvement of the DDKA-QKDN scheme on the efficiency of key resource allocation, we set the same traffic load L r e q of key services and compare the trend of the average delay T s u m ¯ of key services of different schemes with the change of the low threshold K t h r e s h o l d _ l o w for QKP key supplement. In order to verify the improvement of the DDKA-QKDN scheme on the ability of QKP to directly provide the key services, we set the same traffic load L r e q of key services and compare the trend of the success rate S R of no-waiting requests of different schemes changing with the low threshold K t h r e s h o l d _ l o w of QKP key supplement. In Figure 12b and Figure 13b, the percentage improvement refers to the ratio of the optimized value of the DDAK-QKDN scheme on this parameter to the value of the compared scheme.
As shown above in Figure 12 and Figure 13 comparing S1, S2, S3 and DDKA-QKDN schemes, we can come to the conclusion that after the requests are sorted according to the key requirement K q u a and the key security K s e c weight, the QKP threshold has little effect on the improvement of the system efficiency and the ability of QKP to provide the key services. The QKP threshold K t h r e s h o l d _ l o w mainly affects the dynamic supplement part of the key allocation. With the increase in the QKP threshold K t h r e s h o l d _ l o w , the key resources become more abundant, which reduces the queuing delay of key requests and improves the system efficiency. When the keys in the QKP are insufficient, the dynamic key supplement improves the ability of QKP to directly provide the key services. Compared with the sorting strategy, the dynamic key supplement process will consider the remaining key quantity K s u r of QKP, and the dynamic supplement of key resources can significantly improve the ability of QKP to provide the quantum key services.
Comparing this scheme with the RAKP scheme, KoD scheme, and DSKP scheme, it can be seen that the DDKA-QKDN scheme improves the system efficiency by about 5% and the ability of the QKP to directly provide the key request services by about 5% compared with the RAKP scheme and DSKP scheme respectively. In addition, compared with the KoD scheme, the DDKA-QKDN scheme improves the system efficiency by about 10–23% and improves the ability of the QKP to directly provide the key request services by about 23–37%. When the KoD scheme only adopts the First-Fit algorithm, it does not take the key supplement process of QKP, resulting in the change of the QKP threshold K t h r e s h o l d _ l o w in this scheme that has no effect on the improvement of the system efficiency. The response request sorting strategy adopted by the KoD scheme plays a limited role in the ability of the QKP to provide the key request services. However, the key supplement process of QKP in the DDKA-QKDN scheme can significantly improve the ability to provide quantum key services.
To sum up, the change of the QKP threshold K t h r e s h o l d _ l o w in the DDKA-QKDN scheme has a significant impact on the process of QKP key dynamic supplementation. Compared with the RAKP scheme and DSKP scheme, the queuing response strategy of the DDAK-QKDN scheme for requests has more stable variation during the change of threshold. Since the increase in the QKP threshold K t h r e s h o l d _ l o w mainly promotes timely enrichment of key resources, also because a key request with a large key quantity requirement K q u a occupies more time slice resources and key resources, the abundance of key resources can reduce the delay of large demand requests, which can not only reduce the possibility of request congestion but also provide more key request processing services, so as to improve the system efficiency.
This section evaluates the performance of this scheme from multiple aspects and compares it with the RAKP scheme, KoD scheme, and DSKP scheme comprehensively. The simulation results show that the queuing response strategy of the DDKA-QKDN scheme has a significant effect on improving the efficiency of the system compared with the RAKP scheme and DSKP scheme. The DDKA-QKDN scheme puts great emphasis on the characteristics of requests and sorts them by the key quantity requirement K q u a and key security requirement K s e c so that the key resources can be allocated more efficiently. Compared with the KoD scheme, the dynamic key supplement process of the QKP in this scheme makes the time slice resources effectively utilized and improves the ability of the QKP to provide the key services, which leads to the improvement of the overall performance to a certain extent.

5. Conclusions

In IoT, to solve the problems of low key generation rate, the high deployment cost of QKD devices and the low storage capacity of IoT devices, the QKD network always needs to store quantum keys in the QKPs at the edge gateway. Due to the lightweight and efficient requirements of the IoT, it is urgent to improve the efficiency of the quantum key allocation. We creatively propose a dynamic on-demand key allocation scheme named DDKA-QKDN for Q-IoT, which fully considers the two processes of quantum key allocation and quantum key supplement. The scheme sorts the response sequence of the key requests based on the quantity and security requirements. Additionally, the scheme dynamically supplements the QKPs on-demand in consideration of the time slice resource, the remaining key amount of the QKPs and the key supplement request. The simulation results show that, compared with the RAKP and DSKP scheme, the DDKA-QKDN scheme can improve the system efficiency by up to about 5% and the ability of the QKP to directly carry the key request services by up to about 7%. In addition, compared with the KoD scheme, the DDAK-QKDN scheme can improve the system efficiency by up to about 10–23% and the ability of the QKP to directly handle the key request services by up to about 23–37%. Therefore, the scheme has higher key processing efficiency and can realize the balance between the QKD network quantum key resources and the security requirements of IoT terminal applications. In future work, the feedback obtained from each key allocation effect among multi-agents will be considered to dynamically adjust the key allocation scheme. Moreover, we will use the PADRES [25], a tool for privacy, data regulation, and security, to further test the security, privacy, and trust in the data that is processed.

Author Contributions

Conceptualization, L.C. and Q.C.; methodology, Q.C.; validation, M.Z., J.C. and Y.Z.; resources, S.L.; writing—original draft preparation, L.C., Q.C., M.Z. and S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China, grant number 2020YFE0200600.

Acknowledgments

The authors would like to thank the reviewers for their valuable comments and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yi, Q. Internet of Things and Next Generation Wireless Communication Systems. IEEE Wirel. Commun. 2021, 28, 2–3. [Google Scholar] [CrossRef]
  2. Chopra, K.; Gupta, K.; Lambora, A. Future Internet: The Internet of Things-A Literature Review. In Proceedings of the International Conferece Machine. Learning Big Data Cloud Parallel Computing (COMITCon), Faridabad, India, 14–16 February 2019; pp. 135–139. [Google Scholar] [CrossRef]
  3. Hemmes, J.; Dressler, J.; Fulton, S. Trust Models and Risk in the Internet of Things. Adv. Inf. Commun. 2021, 1363, 684–695. [Google Scholar] [CrossRef]
  4. Azrour, M.; Mabrouki, J.; Guezzaz, A.; Kanwal, A. Internet of Things Security: Challenges and Key Issues. Secur. Commun. Netw. 2021, 2021, 5533843. [Google Scholar] [CrossRef]
  5. Fisher, K.A.G.; Broadbent, A.; Shalm, L.K. Quantum computing on encrypted data. Nat. Commun. 2014, 5, 1–7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Elkouss, D.; Martinez-Mateo, J.; Ciurana, A.; Martin, V. Secure optical networks based on quantum key distribution and weakly trusted repeaters. J. Opt. Commun. Netw. 2013, 5, 316–328. [Google Scholar] [CrossRef] [Green Version]
  7. Amer, O.; Garg, V.; Krawec, W.O. An Introduction to Practical Quantum Key Distribution. IEEE Aerosp. Electron. Syst. Mag. 2021, 36, 30–55. [Google Scholar] [CrossRef]
  8. Pattaranantakul, M.; Janthong, A.; Sanguannam, K.; Sangwongngam, P.; Sripimanwat, K. Secure and efficient key management technique in quantum cryptography network. In Proceedings of the Fourth Internationl Conference Ubiquitous Future Network (ICUFN), Phuket, Thailand, 4–6 July 2012; pp. 280–285. [Google Scholar] [CrossRef]
  9. Rahman, M.S.; Hossam-E-Haider, M. Quantum IoT: A Quantum Approach in IoT Security Maintenance. In Proceedings of the International Conference Robotics Electrical Signal Processing Techniques (ICREST), Dhaka, Bangladash, 10–12 January 2019; pp. 269–272. [Google Scholar] [CrossRef]
  10. Niu, J.; Sun, Y.; Jia, X.; Ji, Y. Key-Size-Driven Wavelength Resource Sharing Scheme for QKD and the Time-Varying Data Services. J. Lightwave Technol. 2021, 39, 2661–2672. [Google Scholar] [CrossRef]
  11. Wang, Q.; Yu, X.; Zhu, Q.; Zhao, Y.; Zhang, J. QKP construction and key distribution scheme in multi-domain QKD optical networks (QKD-ON). Opt. Young Sci. Summit 2021, 11781, 1178122. [Google Scholar] [CrossRef]
  12. Meng, X.; Yu, X.; Chen, W.; Zhao, Y.; Zhang, J. Residual-adaptive Key Provisioning in Quantum-Key-Distribution Enhanced Internet of Things (Q-IoT). In Proceedings of the International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 2022–2027. [Google Scholar] [CrossRef]
  13. Cao, Y.; Zhao, Y.; Colman-Meixner, C.; Yu, X.; Zhang, J. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD). Opt. Express 2017, 25, 26453–26467. [Google Scholar] [CrossRef] [PubMed]
  14. Wang, H.; Zhao, Y.; Tornatore, M.; Yu, X.; Zhang, J. Dynamic secret-key provisioning in quantum-secured passive optical networks (PONs). Opt. Express 2021, 29, 1578–1596. [Google Scholar] [CrossRef] [PubMed]
  15. Cao, Y.; Zhao, Y.; Lin, R.; Yu, X.; Zhang, J.; Chen, J. Multi-tenant secret-key assignment over quantum key distribution networks. Opt. Express 2019, 27, 2544–2561. [Google Scholar] [CrossRef] [PubMed]
  16. Cao, Y.; Zhao, Y.; Yu, X.; Zhang, J. Multi-tenant provisioning over software defined networking enabled metropolitan area quantum key distribution networks. J. Opt. Soc. Am. B Opt. Phys. 2019, 36, B31–B40. [Google Scholar] [CrossRef]
  17. Cao, Y.; Zhao, Y.; Wang, Y.; Yu, X.; Ma, Z.; Zhang, J. SDQaaS: Software defined networking for quantum key distribution as a service. Opt. Express 2019, 27, 6892–6909. [Google Scholar] [CrossRef] [PubMed]
  18. Zuo, Y.; Zhao, Y.; Yu, X.; Nag, A.; Zhang, J. Reinforcement Learning-based Resource Allocation in Quantum Key Distribution Networks. In Proceedings of the Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC), Beijing, China, 24–27 October 2020; pp. 1–3. [Google Scholar]
  19. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 1984, 560, 7–11. [Google Scholar] [CrossRef]
  20. Cao, Y.; Zhao, Y.; Wu, Y.; Yu, X.; Zhang, J. Time-Scheduled Quantum Key Distribution (QKD) Over WDM Networks. J. Lightwave Technol. 2018, 36, 3382–3395. [Google Scholar] [CrossRef]
  21. Gong, L.H.; Liu, Y.; Zhou, N.R. Novel quantum virtual private network scheme for PON via quantum secure direct communication. Int. J. Theor. Phys. 2013, 52, 3260–3268. [Google Scholar] [CrossRef]
  22. Peev, M.; Pacher, C.; Alleaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J.F.; et al. The SECOQC quantum key distribution network in Vienna. New J. Phys. 2009, 11, 075001. [Google Scholar] [CrossRef] [Green Version]
  23. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Miki, S.; Yamashita, T.; Wang, Z.; Tanaka, A.; et al. Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 2011, 19, 10387–10409. [Google Scholar] [CrossRef] [PubMed]
  24. Li, G.; Zhang, Z.; Zhang, J.; Hu, A. Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet Things J. 2021, 8, 357–369. [Google Scholar] [CrossRef]
  25. Pereira, F.; Crocker, P.; Leithardt, V.R.Q. PADRES: Tool for PrivAcy, Data REgulation and Security. SoftwareX 2022, 17, 100895. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of QKD.
Figure 1. Schematic diagram of QKD.
Entropy 24 00149 g001
Figure 2. Schematic diagram of QKP architecture based on SDN.
Figure 2. Schematic diagram of QKP architecture based on SDN.
Entropy 24 00149 g002
Figure 3. (a) The communication between devices under the same edge gateway; (b) The communication between devices under two edge gateways of the same OLT; (c) The communication between devices under two edge gateways of different OLTs.
Figure 3. (a) The communication between devices under the same edge gateway; (b) The communication between devices under two edge gateways of the same OLT; (c) The communication between devices under two edge gateways of different OLTs.
Entropy 24 00149 g003
Figure 4. Flow chart of responding to key requests.
Figure 4. Flow chart of responding to key requests.
Entropy 24 00149 g004
Figure 5. Flow of responding to key supplement requests.
Figure 5. Flow of responding to key supplement requests.
Entropy 24 00149 g005
Figure 6. Simulated network topology.
Figure 6. Simulated network topology.
Entropy 24 00149 g006
Figure 7. The average delay of the key services affected by traffic load and QKP threshold.
Figure 7. The average delay of the key services affected by traffic load and QKP threshold.
Entropy 24 00149 g007
Figure 8. The success rate of the no-waiting requests affected by traffic load and QKP threshold.
Figure 8. The success rate of the no-waiting requests affected by traffic load and QKP threshold.
Entropy 24 00149 g008
Figure 9. The average delay of the key services under different trade-off degrees ω .
Figure 9. The average delay of the key services under different trade-off degrees ω .
Entropy 24 00149 g009
Figure 10. (a) The effect of the key service traffic load on average key service delay of each scheme; (b) The percentage improvement of the key service delay of the DDKA-QKDN scheme compared with other schemes.
Figure 10. (a) The effect of the key service traffic load on average key service delay of each scheme; (b) The percentage improvement of the key service delay of the DDKA-QKDN scheme compared with other schemes.
Entropy 24 00149 g010
Figure 11. (a) The effect of the key service traffic load on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.
Figure 11. (a) The effect of the key service traffic load on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.
Entropy 24 00149 g011
Figure 12. (a) The effect of the QKP key supplement threshold on average key service delay of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the key service delay compared with other schemes.
Figure 12. (a) The effect of the QKP key supplement threshold on average key service delay of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the key service delay compared with other schemes.
Entropy 24 00149 g012
Figure 13. (a) The effect of the QKP key supplement threshold on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.
Figure 13. (a) The effect of the QKP key supplement threshold on the success rate of no-waiting requests of each scheme; (b) The percentage improvement of the DDKA-QKDN scheme in the success rate of no-waiting requests compared with other schemes.
Entropy 24 00149 g013
Table 1. Related works comparison.
Table 1. Related works comparison.
ReferencesAllocation Schemes
Application Scenarios of QKDMajor ConsiderationAllocate on DemandKey Supplement
Niu et al. [10]classical QKD networkkey size-driven wavelength××
Wang et al. [11]multiple domainskey allocation within arbitrary domains××
Meng et al. [12]Internet of Thingsquantum key generation rate××
Cao et al. [13]software-defined optical networkkey-updating based on time and data complexity××
Wang et al. [14]passive optical networkthe number of keys in QKP
Cao et al. [15]multi-tenant QKD networksecret-key-rate×
Cao et al. [16]multi-tenant QKD networksuccess probability of multi-tenant provisioning×
Cao et al. [17]QKD as a service (QaaS)secret-key-rate×
Zuo et al. [18]classical QKD networkcurrent resource usage of the network
Our schemeInternet of Thingsquantum key quantity and security requirements
Table 2. Abbreviation List.
Table 2. Abbreviation List.
AbbreviationDescriptions
QtraQuantum transmitter
QrecQuantum receiver
QChQuantum Channel
PChPublic Channel
VKPVirtual Key Pool
TiInternet of Things Terminal
GiEdge Gateway
KiQuantum Key
MiMetropolitan Area Node
OTPOne Time Password
Table 3. Mathematical symbol list.
Table 3. Mathematical symbol list.
Mathematical SymbolDescriptions
S e c security level
e s t ( K i ) response weight value
ω trade-off degree of the quantity and security requirements
K q u a quantum key quantity requirement
K s e c quantum key security requirement
K s u r remaining key amount of the QKP
K t h r e s h o l d _ l o w the low threshold of the QKP
K t h r e s h o l d _ h i g h the high threshold of the QKP
t a r r arrival time of the requests
L r e q key stream load
T t r a the key transmission delay
V g e n key generation rate
T s u m the delay of the key request for waiting
T s u m ¯ the average delay of each key request for waiting
t w a i t the queuing delay of key requests waiting to obtain the key
t s l o t time slot
λ the arrival frequency of the key requests
T w a i t the queuing delay of QKP waiting for key supplement
t g e t the time when the last key request obtained the keys
t t r a the link transmission rate
T g e t the time when the last QKP key supplement request obtained the key
T a r r the arrival time of the current QKP key supplement request
S R the success rate of no-waiting requests
Table 4. The pseudo code of the DDKA-QKDN scheme.
Table 4. The pseudo code of the DDKA-QKDN scheme.
Scheme: DDKA-QKDN: Dynamic on-Demand Key Allocation Scheme
  Input: key request r (source gateway s , destination gateway d , key quantity requirement K q u a , key security requirement K s e c , arrival time t a r r ), key stream load L r e q , QKP P (key surplus K s u r , high threshold K t h r e s h o l d _ h i g h , low threshold K t h r e s h o l d _ l o w ), transmitting delay T t r a , key generation rate V g e n .
  Output: the average delay of each key request for waiting T s u m ¯ .
1for all the key request r i  do
2  calculate the weight value of the key quantity requirement K q u a and the security K s e c requirement e s t ( K i ) ;
3end for
4for all the key request r i  do
5  sort in ascending order of the arrival time t a r r and the weight value e s t ( K i ) ;
6end for
7for each edge gateway x i  do
8  consider the corresponding QKP P i j , according to the destination gateway x j of each key request r i ;
9  if key quantity K q u a   > key surplus K s u r of the QKP P i j , then
10    record this key request r i requiring key supplement for the QKP as f l a g i ;
11    record the waiting time t w a i t and update the time t a r r till applying for the key supplement;
12  else record the waiting time t w a i t and the time to obtain the key t g e t ;
13    update key surplus K s u r of the QKP P i j ;
14  end if
15  if key surplus K s u r K t h r e s h o l d _ l o w , then
16    supplement keys for the QKP P i j in the interval time between two key requests, update key surplus k s u r of the QKP P i j ;
17    stop supplement keys till key surplus reach K t h r e s h o l d _ h i g h ;
18  end if
19  if key supplement f l a g i under the same O L T i , then
20    sort in ascending order of the arrival time t a r r and the weight value e s t ( K i ) ;
21    record the waiting time T w a i t ;
22  end if
23end for
24for all the key request r i  do
25  Calculate the average time for waiting T s u m ¯ = ( t w a i t + T w a i t + T t r a ) / L r e q ;
26end for
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, L.; Chen, Q.; Zhao, M.; Chen, J.; Liu, S.; Zhao, Y. DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network. Entropy 2022, 24, 149. https://doi.org/10.3390/e24020149

AMA Style

Chen L, Chen Q, Zhao M, Chen J, Liu S, Zhao Y. DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network. Entropy. 2022; 24(2):149. https://doi.org/10.3390/e24020149

Chicago/Turabian Style

Chen, Liquan, Qianye Chen, Mengnan Zhao, Jingqi Chen, Suhui Liu, and Yongli Zhao. 2022. "DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network" Entropy 24, no. 2: 149. https://doi.org/10.3390/e24020149

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop