Skip to main content

Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum Computers

  • Conference paper
  • First Online:
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs (ICGS3 2023)

Abstract

The mounting prevalence of quantum computing poses a threat not only to conventional but also to futuristic network systems. As a result, today the focus shifts towards strengthening existing networks to secure sensitive data that may be threatened as a result of the potential for breaking present encryption protocols with the introduction of quantum computing. Cryptography, commonly referred to as encryption, is the underlying principle that enables safe data storage and communication. Cryptography involves key distribution, for which the current best method is a public key distribution based on principles such as Diffie-Hellman key exchange. However, these principles rely on classical computer limitations, such as factoring big numbers, which are expected to be eliminated with quantum computers and algorithms. This research provides an overview of using Quantum Key Distribution (QKD) protocols for satellite-based and Unmanned-Aerial-Vehicle (UAV) related communication. This research also proposes a none QKD protocol to provide an understanding of analysis of the advantages and applications of these protocols. As several QKD protocols have been proposed in the past, identifying the advantages and unique performance characteristics of these protocols is important, especially when adapting these protocols to specific use cases such as satellite-based communications and UAV-related communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chamola V, Jolfaei A, Chanana V, Parashari P, Hassija V (2021) Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput Commun 176:99–118

    Article  Google Scholar 

  2. Sasirekha MHN (2014) Quantum cryptography using quantum key distribution and its applications. Int J Eng Adv Technol (IJEAT) 3(4)

    Google Scholar 

  3. Lo H, Curty M, Tamaki K (2014) Secure quantum key distribution. Nat Photon 8:595–604

    Article  ADS  Google Scholar 

  4. Kirsch Z, Chow M (2015) Quantum computing: the risk to existing encryption methods

    Google Scholar 

  5. Ampatzis M, Andronikos T (2021) QKD based on symmetric entangled Bernstein-Vazirani. Entropy 23(7)

    Google Scholar 

  6. Singh H, Gupta D, Singh A (2014) Quantum key distribution protocols: a review. IOSR J Comput Eng (IOSR-JCE) 16(2):1–9

    Google Scholar 

  7. Toshiba (2022) Quantum key distribution and Blockchain white paper. [Online]. https://www.global.toshiba/content/dam/toshiba/ww/products-solutions/security-ict/qkd/resources/pdf/Toshiba_QKD_Blockchain_White_Paper.pdf. Accessed 4 July 2023

  8. Quantum Computing Cybersecurity Preparedness Act of 2022, Pub. L. No. 117-260, 136 STAT. 2389

    Google Scholar 

  9. IBM (2023) IBM Quantum Safe IBM. [Online]. https://www.ibm.com/quantum/quantum-safe. Accessed 20 April 2023

  10. Bennett CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. Theor Comput Sci

    Google Scholar 

  11. Ekert AK (1991) Quantum cryptography based on bell’s theorem. Phys Rev Lett 67(6)

    Google Scholar 

  12. Scarani V, Acin A, Ribordy G, Gisin N (2004) Quantum cryptography protocols robust against Photon number Splitting attack. Phys Rev Lett 92

    Google Scholar 

  13. Post-Quantum TLS Without Handshake Signatures by Peter Schwabe, Douglas Stebila and Thom Wiggers https://dl.acm.org/doi/abs/https://doi.org/10.1145/3372297.3423350

  14. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem by Joppe W. Bos; Craig Costello; Michael Naehrig; Douglas Stebila https://ieeexplore.ieee.org/abstract/document/7163047

  15. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH by Eric Crockett, Christian Paquin, and Douglas Stebila https://eprint.iacr.org/2019/858

  16. Saha R, Kumar G, Devgun T, Buchanan WJ, Thomas R, Alazab M, Hoon-Kim T, Rodrigues JJPC (2023) A Blockchain framework in post-quantum decentralization. IEEE Trans Serv Comput 16:1–12. https://doi.org/10.1109/TSC.2021.3116896

  17. Bacsardi L, Imre S (2011) Analyzing the quantum based satellite communications. Procedia Comput Sci 7:256–257. https://doi.org/10.1016/j.procs.2011.09.036

  18. Yin J, Cao Y, Li Y-H, Liao S-K, Zhang L, Ren J-G, Cai W-Q, Liu W-Y, Li B, Dai H, Li G-B, Lu Q-M, Gong Y-H, Xu Y, Li S-L, Li F-Z, Yin Y-Y, Jiang Z-Q, Li M, Jia JJ, He D, Ren G (2017) Satellite-based entanglement distribution over 1200 kilometers. Science 356:1140–1144. https://doi.org/10.1126/science.aan3211

  19. Fernández-Caramès TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8: 21091–21116. https://doi.org/10.1109/ACCESS.2020.2968985

  20. Fernández-Caramés TM (2020) From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the internet of things. IEEE Internet Things J 7: 6457–6480. https://doi.org/10.1109/JIOT.2019.2958788

  21. Canadian Space Agency (2020) Satellites serving Earth. [Online]. https://www.asc-csa.gc.ca/eng/satellites/. Accessed 20 July 2023

  22. Ivashov S, Tataraidze A, Razevig V, Smirnova E (2019) Railway transport infrastructure monitoring by UAVs and satellites. J Transp Technol 9(3):342–353

    Google Scholar 

  23. Cao Y, Li Y-H, Yang K-X, Jiang Y-F, Li S-L, Hu X-L, Abulizi M, Li C-L, Zhang W, Sun Q-C, Liu W-Y, Jiang X, Liao S-K, Ren J-G, Li H, You L, Wang Z, Yin J, Lu C-Y, Xian Y (2020) Long-Distance Free-Space Measurement-Device-Independent Quantum Key Distribution. Phys Rev Lett 125(26)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Jahankhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hussien, O.A.A.M., Arachchige, I.S.W., Jahankhani, H. (2024). Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum Computers. In: Jahankhani, H. (eds) Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs. ICGS3 2023. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47594-8_1

Download citation

Publish with us

Policies and ethics