001449508 000__ 06919cam\a2200601\a\4500 001449508 001__ 1449508 001449508 003__ OCoLC 001449508 005__ 20230310004404.0 001449508 006__ m\\\\\o\\d\\\\\\\\ 001449508 007__ cr\un\nnnunnun 001449508 008__ 220916s2022\\\\sz\a\\\\ob\\\\000\0\eng\d 001449508 019__ $$a1344539586 001449508 020__ $$a9783031066085$$q(electronic bk.) 001449508 020__ $$a3031066081$$q(electronic bk.) 001449508 020__ $$z3031066073 001449508 020__ $$z9783031066078 001449508 0247_ $$a10.1007/978-3-031-06608-5$$2doi 001449508 035__ $$aSP(OCoLC)1344421792 001449508 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dEBLCP$$dN$T$$dOCLCF$$dUKAHL$$dOCLCQ$$dWAU 001449508 049__ $$aISEA 001449508 050_4 $$aTK5103.592.Q83 001449508 08204 $$a003/.54$$223/eng/20220928 001449508 1001_ $$aMehic, Miralem,$$eauthor 001449508 24510 $$aQuantum key distribution networks :$$ba quality of service perspective /$$cMiralem Mehic, Stefan Rass, Peppino Fazio, Miroslav Voznak. 001449508 260__ $$aCham, Switzerland :$$bSpringer,$$c2022. 001449508 300__ $$a1 online resource (xvii, 223 pages) :$$billustrations 001449508 336__ $$atext$$btxt$$2rdacontent 001449508 337__ $$acomputer$$bc$$2rdamedia 001449508 338__ $$aonline resource$$bcr$$2rdacarrier 001449508 504__ $$aIncludes bibliographical references. 001449508 5050_ $$aIntro -- Acknowledgments -- Contents -- 1 Fundamentals of Quantum Key Distribution -- 1.1 Information-Theoretic Secrecy -- 1.2 QKD Protocols -- 1.2.1 BB84 Protocol -- 1.2.1.1 Sifting: Extraction of a Raw Key -- 1.2.1.2 Error Rate Estimation -- 1.2.1.3 Error Key Reconciliation -- 1.2.1.4 Privacy Amplification -- 1.2.1.5 Authentication -- 1.2.2 B92 Protocol -- 1.2.3 CV-QKD -- 1.3 Key Length -- 1.4 Summary -- References -- 2 Quality of Service Requirements -- 2.1 Quality of Service -- 2.2 Quality of Service Constraints -- 2.3 Quality of Service Components -- 2.4 QKD Networking 001449508 5058_ $$a2.4.1 QKD Networks -- 2.4.1.1 Key Relay -- 2.4.2 QKD Virtual Private Networking -- 2.4.3 IPsec -- 2.4.3.1 Authentication Header -- 2.4.3.2 Encapsulating Security Payload -- 2.4.3.3 IP Payload Compression Protocol (IPComp) -- 2.4.3.4 Internet Key Exchange (IKE) Protocols -- 2.4.4 IPsec and QKD -- 2.4.5 Passive and Active Eavesdropping -- 2.4.6 QoS Constraints in QKD Network -- 2.5 Similarities Between QKD and Ad Hoc Networking -- 2.6 Summary -- References -- 3 Quality of Service Architectures of Quantum Key Distribution Networks -- 3.1 Integrated Services -- 3.1.1 RSVP Protocol 001449508 5058_ $$a3.1.2 ETSI 004: QKD Application Interface -- 3.2 Differentiated Services -- 3.2.1 DiffServ Components -- 3.2.2 The Per Hop Behavior (PHB) Classes -- 3.2.3 Per-Domain Behavior (PDB) Metrics -- 3.2.4 ETSI 014: Protocol and Data Format of REST-Based Key Delivery API -- 3.3 MultiProtocol Label Switching -- 3.3.1 MPLS Operation and Architecture Basics -- 3.3.1.1 MPLS Header -- 3.3.1.2 MPLS Control and Forwarding Planes -- 3.3.2 MPLS and QKD -- 3.4 Flexible Quality of Service Model -- 3.5 Summary -- References -- 4 Quality of Service Media Access Control of Quantum Key Distribution Networks 001449508 5058_ $$a4.1 Post-Processing Applications -- 4.1.1 Improving Error Reconciliation -- 4.1.1.1 Adaptive Cascade -- 4.1.1.2 Using Error Correcting Codes -- 4.1.2 Out-of-Band Authentication and Key Validation -- 4.1.2.1 Watermarking by Quantum Coin Flipping -- 4.1.2.2 Watermarking Using Pseudorandom Sequences -- 4.2 Overlay QKD Networking -- 4.3 Impact of QKD Key Management -- 4.4 Summary -- References -- 5 Quality of Service Signaling Protocols in Quantum Key Distribution Networks -- 5.1 In-Band signaling and QKD -- 5.1.1 QSIP: A Quantum Key Distribution Signaling Protocol 001449508 5058_ $$a5.2 Out-of-Band Signaling and QKD -- 5.2.1 Q3P: Quantum Point-to-Point Protocol -- 5.2.1.1 Q3P Key Store -- 5.2.1.2 Q3P Network Stack -- 5.2.2 RSVP -- 5.3 Summary -- References -- 6 Quality of Service Routing in Quantum Key Distribution Networks -- 6.1 Routing in General -- 6.1.1 Routing Algorithms -- 6.1.2 Routing Architecture -- 6.2 Routing Requirements in QKD Networks -- 6.3 Addressing in QKD Networks -- 6.4 Routing Protocols -- 6.4.1 Distance Vector Routing Protocols -- 6.4.1.1 Distance Vector-Based QKD Routing -- 6.4.2 Link State Routing Protocols -- 6.4.3 QKD Routing Based on Link-States 001449508 506__ $$aAccess limited to authorized users. 001449508 520__ $$aThis book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology. This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book. 001449508 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 28, 2022). 001449508 650_0 $$aQuantum communication. 001449508 650_0 $$aQuantum cryptography. 001449508 650_0 $$aQuantum computing. 001449508 650_0 $$aQuality of service (Computer networks) 001449508 655_0 $$aElectronic books. 001449508 7001_ $$aRass, Stefan,$$eauthor. 001449508 7001_ $$aFazio, Peppino,$$eauthor 001449508 7001_ $$aVoznak, Miroslav,$$eauthor 001449508 77608 $$iPrint version:$$z3031066073$$z9783031066078$$w(OCoLC)1312150175 001449508 852__ $$bebk 001449508 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-06608-5$$zOnline Access$$91397441.1 001449508 909CO $$ooai:library.usi.edu:1449508$$pGLOBAL_SET 001449508 980__ $$aBIB 001449508 980__ $$aEBOOK 001449508 982__ $$aEbook 001449508 983__ $$aOnline 001449508 994__ $$a92$$bISE