
With the growing need for implementation QKD tech-
nology into conventional networks, arises question
which security measurements should be taken. We
investigate previous research about security of KMS
systems. This article is describing real-time QKD
nodes and DoS attack on KMS. In previous chapters
we represented security measurements against DoS
attack on QKD nodes. This security measurements
are described within various technologies, with usage
of our proposed threshold formula. From this thresh-
old formula network administrators can easy calculate
how many keys can be consumed by end-users or this
formula can be implemented to protocol, service and
so on. This security approach could be used when
KMS is using for communication with SAE standard
ETSI 014. With usage of standard like ETSI 004
which is using reservation of keys for specific period
of time security measurements should be different.
Subsequently we have implemented this solution to
Suricata IPS/IDS service and performed experiment
with actual QKD nodes. The Experiment showed,
that SAE obtain only maximum amount of keys for
specific time period other key requests were blocked.
ACKNOWLEDGEMENTS
The research leading to the published results was sup-
ported under the NATO SPS G894 project “Quantum
Cybersecurity in 5G Networks (QUANTUM5)” and
partly under the H2020 project OPENQKD and grant
agreement No. 857156. The work was also supported
by the Ministry of Science, Higher Education and
Youth of Canton Sarajevo, Bosnia and Herzegovina
under Grants No. 27-02-35-35137-29/22 and 27-02-
35-35143-6/22.
REFERENCES
Alani, M. (2014). TCP/IP model, pages 19–50.
Bennett, C. H. (1992). Quantum cryptography using any
two nonorthogonal states. Physical review letters,
68(21):3121.
Bennett, C. H. and Brassard, G. (1984). Proceedings of the
ieee international conference on computers, systems
and signal processing.
Bresnahan, C. and Blum, R. (2019). Implementing Logging
Services, pages 473–486.
Dai, E., Huang, D., and Zhang, L. (2022). Low-rate denial-
of-service attack detection: Defense strategy based
on spectral estimation for cv-qkd. In Photonics, vol-
ume 9, page 365. MDPI.
Dervisevic, E., Lauterbach, F., Burdiak, P., Rozhon, J.,
Sl
´
ıvov
´
a, M., Plakalovic, M., Hamza, M., Fazio, P.,
Voznak, M., and Mehic, M. (2022). Simulations of de-
nial of service attacks in quantum key distribution net-
works. In 2022 XXVIII International Conference on
Information, Communication and Automation Tech-
nologies (ICAT), pages 1–5. IEEE.
ETSI (2019). Quantum key distribution (qkd); protocol and
data format of rest-based key delivery api (etsi gs qkd
014).
Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner,
N., and Scarani, V. (2004). Towards practical and
fast quantum cryptography. arXiv preprint quant-
ph/0411022.
Hugues-Salas, E., Ntavou, F., Ou, Y., Kennard, J. E., White,
C., Gkounis, D., Nikolovgenis, K., Kanellos, G., Er-
ven, C., Lord, A., et al. (2018). Experimental demon-
stration of ddos mitigation over a quantum key distri-
bution (qkd) network using software defined network-
ing (sdn). In Optical fiber communication conference,
pages M2A–6. Optica Publishing Group.
Konikiewicz, W. and Markowski, M. (2017). Analysis of
performance and efficiency of hardware and software
firewalls. Journal of Applied Computer Science Meth-
ods, 9.
Krishna, T. V. and Karthik, P. (2022). Dominance of
hardware firewalls and denial of firewall attacks (case
study blacknurse attack). International Journal of Sci-
ence and Research (IJSR), 11:28–33.
Li, Y., Huang, P., Wang, S., Wang, T., Li, D., and
Zeng, G. (2018). A denial-of-service attack on fiber-
based continuous-variable quantum key distribution.
Physics Letters A, 382(45):3253–3261.
Mehic, M., Maurhart, O., Rass, S., and Voznak, M. (2017).
Implementation of quantum key distribution network
simulation module in the network simulator ns-3.
Quantum Information Processing, 16(10):1–23.
Mehic, M., Rass, S., Dervisevic, E., and Voznak, M.
(2022a). Tackling denial of service attacks on key
management in software-defined quantum key distri-
bution networks. IEEE Access, 10:110512–110520.
Mehic, M., Rass, S., Fazio, P., and Voznak, M. (2022b).
Modern trends in quantum key distribution networks.
Quantum Key Distribution Networks, pages 209–223.
Mehic, M., Rass, S., Fazio, P., and Voznak, M. (2022c).
Quality of service architectures of quantum key distri-
bution networks. In Quantum Key Distribution Net-
works, pages 73–107. Springer.
Vagenas, E. C., Farag Ali, A., and Alshal, H. (2019). Gup
and the no-cloning theorem. The European Physical
Journal C, 79(3):1–5.
Waleed, A., Jamali, A. F., and Masood, A. (2022). Which
open-source ids? snort, suricata or zeek. Computer
Networks, 213:109116.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
94