Attacking the Quantum Internet

43Citations
Citations of this article
51Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The main service provided by the coming quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers. We have modeled the components for and structure of quantum repeater network nodes. With this model, we point out attack vectors, then analyze attacks in terms of confidentiality, integrity, and availability. While we are reassured about the promises of quantum networks from the confidentiality point of view, integrity and availability present new vulnerabilities not present in classical networks and require care to handle properly. We observe that the requirements on the classical computing/networking elements affect the systems' overall security risks. This component-based analysis establishes a framework for further investigation of network-wide vulnerabilities.

Cite

CITATION STYLE

APA

Satoh, T., Nagayama, S., Suzuki, S., Matsuo, T., Hajdušek, M., & van Meter, R. (2021). Attacking the Quantum Internet. IEEE Transactions on Quantum Engineering, 2. https://doi.org/10.1109/TQE.2021.3094983

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free