Logo

Publikacije (82)

Nazad
Patrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, J. Rozhon, L. Kapicak, Libor Michalek, Dzana Pivac et al.

: QKD integration into traditional telecommunication networks is anticipated in the upcoming decades in order to maintain adequate levels of communication security. QKD establishes ITS (Information-Theoretic secure) symmetric keys between the two parties, which they may use to sustain secure flow of data even in the post-quantum era. Since QKD-keys are a valuable and scarce resource, they must be carefully maintained. This paper investigates DoS attacks on actual QKD equipment, in which an adversary with access to QKD services depletes the reserves of QKD-keys maintained at the KMS system. As a result, safety precautions are proposed in order to prevent this scenario and maintain operational QKD service.

Aside from significant advancements in the development of optical and quantum components, the performance of practical quantum key distribution systems is largely determined by the type and settings of the error key reconciliation procedure. It is realized through public channel and it dominates the communication complexity of the quantum key distribution process. The practical utilization significantly depends on the computational capacities that are of great importance in satellite-oriented quantum communications. Here we present SarDub19 error key estimation and reconciliation protocol that improves performances of practical quantum systems.

P. Fazio, Miralem Mehic, M. Voznák

Mobility is a key aspect of modern networking systems. To determine how to better manage the available resources, many architectures aim to a priori know the future positions of mobile nodes. This can be determined, for example, from mobile sensors in a smart city environment or wearable devices carried by pedestrians. If we consider infrastructure networks, frequently changing the coverage cell may lead to service disruptions if a predictive approach is not deployed in the system. All predictive systems are based on the storage of old mobility samples to adequately train the model. Our focus is based on the possibility to determine an approach for adaptively sampling mobility patterns based on the intrinsic features of the human/node behavior. Several works in the literature examine mobility prediction mobile networks, but all of them are dedicated to the study of time features in mobility traces: none took into account the spectral content of historical mobility patterns for predictive purposes. In contrast, we take into account this spectral content in mobility samples. Through a set of wavelet transforms, we adapted the sampling frequency dynamically and obtained a considerable set of advantages (space, energy, accuracy, etc.). In fact, this issue covers an important role in the IoT paradigm, where energy consumption is one of the main variables requiring optimization (frequent and unnecessary mobility samplings can disrupt battery life). We performed several simulations using real-world traces to confirm the merit of our proposal.

Matej Plakalovic, Enio Kaljic, Miralem Mehic

New generation networks are facing ever greater demands. When testing new network devices that must process packets at extremely high rates, it is essential to test their functionality and desired performance under maximum traffic load. As a result, in order to test the hardware, a traffic generator is required. This paper proposes an affordable and extensible high-speed FPGA-based Ethernet traffic generator. The proposed solution is able of fully utilizing a 40GbE link, with the possibility of manipulating traffic characteristics at the level of an individual packet. Although intended to run on the DE10-Pro system, the proposed design is portable to other FPGA boards with minimal development effort and changes.

Emir Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, Mirza Hamza, P. Fazio et al.

A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the critical components of the QKD network in charge of key management and key provisioning to authorized consumers. Through simulation methods performed in the QKDNetSim, we show that legitimate customers experience significantly worse service during an excessive DoS attack on KMS.

Filip Lauterbach, Patrik Burdiak, J. Rozhon, Emir Dervisevic, Martina Slívová, Matej Plakalovic, Miralem Mehic, M. Voznák

The article presents a series of measurements conducted on the fully-operated Quantum Key Distribution system. These measurements primarily focus on the Quantum Bit Error Rate (QBER), which is the most important parameter of the quantum channel. This parameter was observed and measured for 16 days under the quantum channel’s operating conditions to determine any correlations between the QBER and other quantum link parameters, such as secret key rate. A thorough statistical analysis of the measured data was performed as a part of this investigation and is presented in the paper.

Miralem Mehic, S. Rass, Emir Dervisevic, M. Voznák

A QKD network provides an additional security layer for IT-secure cryptographic key distribution that is added to existing conventional networks. Thus, QKD network components must be resilient to security challenges from conventional network environments. This paper provided a novel solution for designing a Key Management System resistant to DoS attacks. Our solution allows applications to function securely in environments with fewer keys. In addition, we have provided approaches for allocating and managing QKD resources to avoid malicious key reservations. Simulation experiments verified the proposed solutions.

Emir Dervisevic, Miralem Mehic

Quantum Key Distribution (QKD) is an approach for establishing symmetrical binary keys between distant users in an information-theoretically secure way. In this paper we provide an overview of existing solutions that integrate QKD within the most popular architecture for establishing secure communications in modern IP (Internet Protocol) networks - IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within the IPsec architecture striving for a standardized solution.

Florian Kutschera, Emir Dervisevic, Ladislav Behan, Diego R. López, Miralem Mehic, M. Voznák, H. Hübel, A. Pastor et al.

The OPENQKD project is demonstrating deployed QKD networks in several European cities. We present a virtual QKD testbed that allows the user to monitor live data but also to re-enact the past QKD exchange over the various links, together with a QKD network simulation tool.

P. Fazio, Miralem Mehic, M. Voznák

Abstract With the proliferation of connected vehicles, new coverage technologies and colossal bandwidth availability, the quality of service and experience in mobile computing play an important role for user satisfaction (in terms of comfort, security and overall performance). Unfortunately, in mobile environments, signal degradations very often affect the perceived service quality, and predictive approaches become necessary or helpful, to handle, for example, future node locations, future network topology or future system performance. In this paper, our attention is focused on an in-depth stochastic micro-mobility analysis in terms of nodes coordinates. Many existing works focused on different approaches for realizing accurate mobility predictions. Still, none of them analyzed the way mobility should be collected and/or observed, how the granularity of mobility samples collection should be set and/or how to interpret the collected samples to derive some stochastic properties based on the mobility type (pedestrian, vehicular, etc.). The main work has been carried out by observing the characteristics of vehicular mobility, from real traces. At the same time, other environments have also been considered to compare the changes in the collected statistics. Several analyses and simulation campaigns have been carried out and proposed, verifying the effectiveness of the introduced concepts.

28. 9. 2020.
128
Miralem Mehic, Marcin Niemiec, S. Rass, Jiajun Ma, M. Peev, A. Aguado, V. Martín, S. Schauer et al.

The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds. The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first application on a broader scale. A major aspect of quantum cryptography is the methodology of Quantum Key Distribution (QKD), which is used to generate and distribute symmetric cryptographic keys between two geographically separate users using the principles of quantum physics. In previous years, several successful QKD networks have been created to test the implementation and interoperability of different practical solutions. This article surveys previously applied methods, showing techniques for deploying QKD networks and current challenges of QKD networking. Unlike studies focusing on optical channels and optical equipment, this survey focuses on the network aspect by considering network organization, routing and signaling protocols, simulation techniques, and a software-defined QKD networking approach.

P. Fazio, Miralem Mehic, P. Partila, J. Továrek, M. Voznák

In the modern telecommunication systems, mobility is one of the key advantage of wireless communications, given that it is possible to transmit/receive data, without caring of having a static position into the network. Of course, mobility poses special issues such as degradations, channel quality fluctuations, fast topology changes, and so on. Modern researches focus their attention on predicting mobile future node positions, in order to a-priori know, for example, what the evolution of the network topology will be or which level of stability each node will reach. Each prediction scheme is based on the storage and analysis of several historical mobility trajectories, in order to train the proper prediction algorithm. In this paper, we focus our attention on the optimization of the space needed to store historical mobility samples, encoding their values and evaluating the conversion error, comparing different encoding functions. Several simulation campaigns have been carried out in order to evaluate the goodness and feasibility of our proposal.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više