Abstract
Quantum key distribution (QKD) is a promising technique to resist the threat against quantum computers. However, the high loss of quantum signals over a long-distance optical fiber is an obstacle for QKD in the intercontinental domain. In this context, the quantum satellite network is preferred over the terrestrial quantum optical network. Due to the mobility of satellites, the satellite topology is dynamic in the quantum satellite network, which remains a challenge for routing. In hybrid geostationary-earth-orbit (GEO)/low-earth-orbit (LEO) quantum satellite networks, the lack of an efficient scheduling scheme for GEO/LEO satellites also limits the construction of quantum satellite networks. Therefore, this paper provides a topology abstraction-based routing scheme for secret-key provisioning, where the dynamic physical topology is translated into a quasi-static abstracted topology. This scheme contributes to saving the precious secret key resources. In order to improve the success probability of long-distance QKD requests, three novel resource-scheduling heuristic algorithms are proposed in hybrid GEO/LEO quantum satellite networks. Simulation results indicate that the proposed algorithms can improve the success probability of QKD requests by 47% compared to the benchmark.
1. Introduction
The conventional cryptographic techniques are mostly based on the mathematical complexities. They will become less reliable for critical areas in face of the threat against quantum computers [,]. The future-proof security techniques are gaining attention from the research community. Quantum key distribution (QKD) [,] has emerged for providing the unconditional security, which is based on the laws of quantum physics (e.g., Heisenberg’s uncertainty principle and no-cloning theorem) [,]. Compared to the conventional cryptographic techniques, it does not rely on the mathematical complexity, which can provide keys with the future-proof security level. However, due to the immaturity of existing techniques, challenges remain for practical QKD, especially in the long distance scenario.
Since the first QKD protocol, i.e., Bennett-Brassard-1984 (BB84), was developed in 1984 [], the QKD technique over optical fibers has become more and more mature with the development of advanced QKD protocols. At the time of writing, the QKD secret key rate has achieved 115.8 Mbps over 10 km standard optical fiber in 2023 []. However, due to the quantum no-cloning theorem, the quantum signal cannot be amplified, which limits the QKD distance. The ultra-long-distance QKD (e.g., several thousand kilometers) over the optical fiber is extremely difficult even with current advanced protocols []. The trusted relay technique can be used to extend the distance of QKD, which is deployed in the practical ground QKD network. However, to achieve QKD in the intercontinental domain, a large number of trusted relays required to be deployed, which is obviously not practical for commercial use. Therefore, the optical fiber-based QKD is not an effective way to achieve a global quantum network.
The free-space QKD is expected to become a critical technique for deploying the global quantum network. Compared to the optical fiber, the quantum signal loss over the free space in a vacuum can be omitted, which makes the long-distance QKD possible. When considering the satellite-to-ground QKD, it will suffer the atmospheric loss. However, since most of the space is vacuum instead of air, the quantum signal loss over the free space is still much lower than that over an optical fiber of the same distance []. In 2016, a quantum low-earth-orbit (LEO) satellite, namely Micius, has successfully demonstrated the satellite-to-ground QKD [], which proved the feasibility of the satellite QKD. Some studies have been conducted on satellite QKD strategies in the intercontinental domain. However, they mostly focused on the free-space QKD based on only a single satellite, which cannot fulfill the requirements of global scale users. Meanwhile, due to the small coverage and flyover time of a single satellite, the conventional satellite QKD strategy may bring a large secret key provisioning delay.
In order to achieve practical QKD in the global scale, it is necessary to deploy the quantum satellite network. The quantum satellite network consists of several satellites, which is currently based on the trusted-relay satellite QKD scheme [,,]. Due to the mobility nature of satellites, the physical topology of the quantum satellite network is dynamic, which is a central obstacle for its construction. The topology of the fiber-based network is static; hence, the widely studied techniques (e.g., the routing scheme) for operating the fiber-based network cannot be directly applied to the quantum satellite network. Some preliminary works have been conducted; for example, Vergoossen et al. [] analyzed the effectiveness of quantum satellites in different constellation arrangements. However, a large number of secret keys are wasted in existing routing strategies. The lack of the efficient routing scheme for key provisioning limits the construction of quantum satellite networks.
The feasibility of quantum communication between the high-orbit satellite and the ground station has been attested in []. The quantum GEO satellite has a larger coverage area but with a relatively low secret key rate. On the contrary, the quantum LEO satellite has a relatively high secret key rate but with the limited coverage area. However, there is a lack of efficient strategies to utilize the characteristic of both GEO and LEO in a hybrid GEO/LEO quantum satellite network, resulting in the resource wastage.
In this work, we remedy the lack of routing schemes for secret-key provisioning in hybrid GEO/LEO quantum satellite networks. We present a novel routing scheme that improves the efficiency of secret-key provisioning and propose three algorithms to fully utilize the superiorities of GEO and LEO. The main contributions of this paper are described as follows.
- A layered architecture for quantum satellite networks is proposed, where the quantum key pool layer is decoupled from the dynamic physical topology for implementing efficient key management.
- We present a novel topology abstraction-based routing scheme for secret-key provisioning, where the quantum key pools are utilized to construct the abstracted topology for routing over the classical channels.
- We propose three heuristic algorithms, namely the GEO-free topology abstraction-based routing (GF-TAR) algorithm, the LEO-first topology abstraction-based routing (LF-TAR) algorithm, and the mixed satellite topology abstraction-based routing (MS-TAR) algorithm.
The rest of this paper is organized as follows. The related works are reviewed in Section 2. The network architecture is presented in Section 3. Section 4 describes the novel topology abstraction-based routing scheme for secret-key provisioning. Section 5 proposes the heuristic algorithms. Section 6 presents the simulation results and analyzes the performance of the proposed algorithms. This paper is concluded in Section 7.
2. Related Work
This section briefly introduces several related works, covering satellite-based QKD, quantum satellite networks, and QKD techniques in hybrid GEO/LEO scenarios.
2.1. Satellite-Based QKD
A detailed review can be found in [,,]. Due to the transmission loss scales exponentially over the optical fiber, free-space QKD becomes an effective scheme in the context of long distances. The free-space QKD relying on the satellite is also called the satellite-based QKD. Since the first quantum satellite Micius was launched in China, many research studies have been conducted on satellite-based QKD [,]. The feasibility of the satellite-based QKD in daylight was proven in []. In [], a time-delayed single quantum repeater node was presented for global QKD with a single satellite. However, most of the researchers focused on the QKD scheme with a single satellite, which cannot fulfill the increasing requirements of the global QKD.
2.2. Quantum Satellite Networks
The quantum satellite network is an effective way to achieve QKD in the intercontinental domain. Moreover, as more and more quantum satellites are planned to be launched and interconnected [], the research on the construction and application of quantum satellite networks is inevitable. Similar to the ground optical fiber QKD network, the quantum satellites can be used as trusted relays to form a large-scale quantum network. The problem of optimizing the orbits of the quantum satellites was studied in []. In [], a point-to-multipoint quantum satellite relay scheme was proposed. The modeling research of quantum satellite constellations was conducted in []. Most of the routing schemes in existing research studies are virtual topology-based routing schemes, which treat the dynamic physical topology as a static one over a small time interval. However, they only make efforts to overcome the mobility of the satellite instead of increasing the efficiency of secret-key provisioning.
2.3. QKD Techniques in Hybrid GEO/LEO Scenarios
The quantum-limited coherent measurements of optical signals were successfully sent from a GEO satellite to the ground station in 2017 [], indicating that the GEO can implement QKD in principle. In [], a double-layer quantum satellite network architecture was proposed, where both GEO and LEO satellites were included. In particular, the researchers are planning to launch the higher-orbit quantum satellite []. These works have demonstrated the value of further research on the routing and secret-key provisioning schemes in the hybrid GEO/LEO scenario. In this paper, we focus on improving the relatively low efficiency of secret-key provisioning.
3. Network Architecture
As shown in Figure 1, the layered quantum satellite network architecture is divided into the physical layer, quantum key pool layer, control layer, and application layer.
Figure 1.
A layered architecture for quantum satellite networks.
Physical layer: It consists of the satellites and the ground stations. The satellites and ground stations are linked with each other to form the classical and quantum channels over the free space. The practical linking motion is conducted in this layer to transmit the classical signal and the quantum signal.
Quantum key pool layer: It comprises the quantum key pools (QKPs). The QKP is an effective technique to save the secret keys for timely provisioning [], which can store the secret keys in the storage medium for reducing the key wastage. The secret keys are obtained from the physical layer to this layer for storage. This layer will be detailed in Section 4.
Control layer: It is made up with the software-defined networking (SDN) controller for the efficient resource allocation control [,]. The SDN controller has two control modules, namely QKP layer control module and physical layer control module. The QKP layer control module is used to route the requests over the QKP layer and manage the rest of the keys for provisioning. The physical layer control module is used to control the establishment and removal of the link between the satellite and the associated satellite/ground station.
Application layer: It consists of several applications for secret keys. This layer generates the requests for secret keys and sends the requirements to the control layer. This layer will finally obtain the secret keys from the quantum key pool layer via the key delivery application programming interface (API).
4. Topology Abstraction Implementation
4.1. Topology Abstraction-Based Routing Scheme
The satellite moves in the orbit, resulting in the dynamic change of the visibility and distance between satellites and satellites/ground stations. The satellite is controlled by the SDN controller in the control layer to establish the quantum link with other sites (including satellites and ground stations) based on specific algorithms, for example, establishing the quantum link with the closest site. The generated secret keys will be provided for the corresponding QKP in the QKP layer. Due the periodicity of the relationship between satellites and ground stations, the arrangement of the establishment for the quantum link between two sites is also periodic based on the specific algorithm. Once a pair of sites has established a quantum link in a period, there exists a corresponding QKP in the QKP layer. Meanwhile, each site is abstracted as a fixed node in the QKP layer. If there is a QKP between a pair of abstracted nodes, then the two nodes are connected on the abstracted topology, since the corresponding nodes can share secret keys with each other relying on a QKP. The global keys can be relayed by the shared keys even if there is no quantum link of the corresponding site pair at that time, which will be detailed in Section 4.2. As exemplified in Figure 2a, the dynamic physical topology in the physical layer is translated into a fixed abstracted topology in the QKP layer. For example, although LEO-2 and LEO-3 are unconnected in the physical layer now, they will be connected in other time slots in a period. Hence, there is a link between Node-2 and Node-3 on the abstracted topology. Other links, e.g., the link between Node-1 and Node-4 as well as the link between Node-1 and Node-3, can also be attributed to this reason. As depicted in Figure 2a, a QKD request from Ground station-a to Ground station-c is generated, and we route for this request on the abstracted topology to obtain the QKD relaying path (i.e., the red lines in Figure 2a). The QKD relaying path refers to the path of relaying the global secret keys hop by hop with the exclusive OR operation.
Figure 2.
Illustration of topology abstraction-based (a) routing scheme and (b) key relaying strategy.
4.2. Topology Abstraction-Based Key Relaying Strategy
After obtaining the QKD relaying path from the routing process on the abstracted topology, we use the classic channel (e.g., laser channel) to relay the global secret keys following the QKD relaying path. Due to the relatively high data rate over the classic channel, there can be a large number of classic channels between two sites with the time-division-multiplexing (TDM) technique. In the hybrid GEO/LEO network, due to the large coverage of the GEO satellite, there commonly exist classic channels to send the encrypted global secret keys to the corresponding site (in theory, three GEOs can fully cover the entire earth). Even if a GEO does not exist in the network, due to the large number of LEOs in most of the satellite constellations, it still can find a path to send the encrypted key to any site in most cases. As shown in Figure 2a, the QKD relaying path is from Node-a to Node-2, then, it is from Node-2 to Node-3, and finally, it is from Node-3 to Node-c. Since LEO-2 and LEO-3 cannot establish the link at this time (they are not visible to each other), we first send the encrypted global secret key (i.e., keya-2 ⊕ key2-3) from LEO-2 to GEO; then, the GEO forwards this key to LEO-3 to decrypt for the global secret key (i.e., keya-2), as shown in Figure 2b. Finally, LEO-3 send the encrypted global secret key (i.e., keya-2 ⊕ keyc-3) to Ground station-c to decrypt for the global secret key; then, Ground station-a and Ground station-c can successfully share the secret key.
5. Heuristic Algorithm Design
Based on the topology abstraction-based routing scheme, in this section, we design three heuristic algorithms, i.e., GF-TAR, LF-TAR, and MS-TAR algorithms, to efficiently allocate the time and secret key resources in hybrid GEO/LEO quantum satellite networks. The notations and their definitions used in this paper are listed in Table 1.
Table 1.
Notations and Definitions.
The success probability (SPT(ti)) of the key service requests in the time slot ti can be defined as follows.
The success probability (SP) of the key service requests within the simulation time can be determined as follows (T is defined as the total simulation time).
The average number of relaying hops (AHT(ti)) for the successful key service requests in the time slot ti can be expressed as follows.
The average number of relaying hops (AH) for the successful key service requests within the simulation time can be calculated as follows.
The total number of secret keys (TKT(ti)) produced in the time slot ti can be described as follows.
The total number of secret keys (TK) produced within the simulation time can be calculated as follows.
5.1. GEO-Free Topology Abstraction-Based Routing Algorithm
The process of the GEO-free topology abstraction-based routing algorithm (GF-TAR) is detailed in Algorithm 1. This algorithm abstracts the topology of LEO satellites and ground stations for routing, where the LEO is used for QKD and the GEO is used for assisting the transmission of classic signals of the encrypted global keys. Line 1 is used for the initialization of the elements. Under the limitation lg, we make the LEO satellites establish the quantum channels with several of the closest ground stations in lines 2–11 to produce the max number of secret keys to the QKPs. In this process, we use the First-Fit (FF) algorithm to select the ground stations to be connected, which is efficient and normally used in resource allocation. In lines 12–20, we conduct the similar operation to establish the quantum channels between LEOs under the limitation lb. The secret keys produced in this time slot ti are provided to corresponding QKPs in lines 22–24. We update the abstracted topology according to the rest of the key resources on the link in lines 27–32. If the number of keys on the link cannot reach the minimum value of the set of secret keys required for the request Ks, we cut off this link on the abstracted topology until new enough keys are supplied to the QKP on this link. We route for the request on the abstracted topology to obtain the QKD relaying path in line 33. The minimum value of the rest of the key resources on the links along the relaying path is obtained in lines 35–40. In lines 41–47, the comparison between the required key resources and the minimum value of the rest of the key resources on the relaying path is conducted. If the required number of key resources is smaller, we allocate the key resources to implement the request; otherwise, the request fails.
| Algorithm 1: GF-TAR algorithm. | |
| Input: K(ti), R(ti), Vg, Vl, P(ti) | |
| Output: SPT(ti), AHT(ti), TKT(ti), P(ti+1) and solutions for the requests | |
| 1: | Initialize SPT(ti) ← 0, AHT(ti) ← 0, c(m, n, ti) ← 0, vs. ← Vg ∪ Vl; |
| 2: | for n ∈ Vl do |
| 3: | if do |
| 4: | χ ← lg; |
| 5: | else |
| 6: | ; |
| 7: | end if |
| 8: | Find the χ largest element in v(m, n, ti), m ∈ Vg, and record their m to the set Λ; |
| 9: | for m ∈ Λ do |
| 10: | c(m, n, ti) ← 1; |
| 11: | end for |
| 12: | if do |
| 13: | ; |
| 14: | else |
| 15: | ; |
| 16: | end if |
| 17: | , m ∈ Vl, and record their m to the set Λ; |
| 18: | for m ∈ Λ do |
| 19: | c(m, n, ti) ← 1; |
| 20: | end for |
| 21: | end for |
| 22: | for do |
| 23: | ; |
| 24: | end for |
| 25: | ; |
| 26: | for r(sr, dr, kr, ti) ∈ R(ti) do |
| 27: | flag ← 0, Es ← ∅; |
| 28: | for do |
| 29: | if do |
| 30: | ; |
| 31: | end if |
| 32: | end for |
| 33: | Pd ← routing from sr to dr in Gs(Vs, Es) with Dijkstra algorithm; |
| 34: | if do |
| 35: | μ ← ∞; |
| 36: | for (m, n) ∈ Pd do |
| 37: | if p(m, n) <μ do |
| 38: | μ ← p(m, n); |
| 39: | end if |
| 40: | end for |
| 41: | if μ >kr do |
| 42: | ; |
| 43: | Record the solutions for the request r(sr, dr, kr, ti); |
| 44: | for (m, n) ∈ Pd do |
| 45: | ; |
| 46: | end for |
| 47: | end if |
| 48: | end if |
| 49: | end for |
| 50: | return , TKT(ti), and solutions for the requests set R(ti). |
The time complexity of the GF-TAR algorithm is evaluated as follows. The worst-case time complexities in lines 2–21 and 22–24 are and , respectively. The time complexity in lines 28–48 is . The overall complexity in lines 26–49 is . Hence, the worst-case time complexity of the GF-TAR algorithm in a time slot is .
5.2. LEO-First Topology Abstraction-Based Routing Algorithm
The process of the LEO-first topology abstraction-based routing (LF-TAR) algorithm is depicted in Algorithm 2. In the LF-TAR algorithm, the requests are firstly routed on the abstracted topology of LEOs and ground stations. If the rest of the key resources on the abstracted topology cannot fulfill the requirements of the request, then we utilize the GEOs to establish corresponding quantum channels on the physical topology for QKD to fulfill the requirements. The GEO-based QKD is used as an alternative plan for the LEO-based QKD. The abstracted topology of GEOs and ground stations is not established, while the GEOs establish the quantum channels for QKD according to the requests. Lines 1–2 serve as the same function in the GF-TAR algorithm. The time resources of the links on the physical topology of GEOs and ground stations are initialized in line 3. It should be noted that one GEO can establish lh quantum channels to the ground stations. Hence, the time resources of links from the GEO to the ground station is Δ·lh in numerical terms. Line 5 serves as the same function of the GF-TAR algorithm, i.e., to firstly try to fulfill the requirements of the requests on the abstracted topology of LEOs and ground stations. If it failed to fulfill the requirements in line 5, we try to implement the requests by the GEO-based QKD. In lines 6–16, we update the physical topology of GEOs and ground stations based on the rest of the time resources of the links. If the rest of the time resources cannot fulfill the minimum requirements of the set of secret keys required, we remove this link from the physical topology. The QKD relaying path is obtained by routing on the physical topology Gc(Vc, Ec) of GEOs and ground stations in line 17. If the time resources are sufficient on the links along the QKD relaying path, we allocate the time resources to the request in lines 18–32.
| Algorithm 2: LF-TAR algorithm. | |
| Input: K(ti), R(ti), Vg, Vl, Vh, P(ti), Eε, EΩ | |
| Output: SPT(ti), AHT(ti), TKT(ti), P(ti+1), and solutions for the requests | |
| 1: | Initialize SPT(ti)← 0, AHT(ti) ← 0, c(m, n, ti) ← 0, vs. ← Vg ∪ Vl, Vc ← Vg ∪ Vh; |
| 2: | Execute lines 2–25 in GF-TAR algorithm; |
| 3: | ; |
| 4: | for r(sr, dr, kr, ti) ∈ R(ti) do |
| 5: | Execute lines 27–48 in GF-TAR algorithm; |
| 6: | if flag = 0 then |
| 7: | for (m, n) ∈ Ec do |
| 8: | if (m, n) ∈ EΩ do |
| 9: | if do |
| 10: | ; |
| 11: | end if |
| 12: | else |
| 13: | if do |
| 14: | ; |
| 15: | end if |
| 16: | end for |
| 17: | Pd ← routing from sr to dr in Gc(Vc, Ec) with Dijkstra algorithm; |
| 18: | if do |
| 19: | ξ ← 1; |
| 20: | for (m, n) ∈ Pd do |
| 21: | if do |
| 22: | ξ ← 0; |
| 23: | elseif do |
| 24: | ξ ← 0; |
| 25: | end if |
| 26: | end for |
| 27: | if ξ = 1 do |
| 28: | , and update the fα(m, n, ti) and fβ(m, n, ti) to all the (m, n) ∈ Pd; |
| 29: | Record the solutions for the request r(sr, dr, kr, ti); |
| 30: | end if |
| 31: | end if |
| 32: | end if |
| 33: | end for |
| 34: | return , TKT(ti), and solutions for the requests set R(ti). |
The time complexities of lines 2 and 5 have been evaluated in the GF-TAR algorithm. The time complexity in lines 7–31 is . The overall time complexity of the LF-TAR algorithm in a time slot is .
5.3. Mixed Satellite Topology Abstraction-Based Routing Algorithm
In Algorithm 3, the detail process of the mixed satellite topology abstraction-based routing (MS-TAR) algorithm is depicted. In this algorithm, the GEOs are also included in the abstracted topology with the LEOs and ground stations for routing. The GEO plays the same role as the LEO on the abstracted topology. Lines 1–2 perform the same function in the GF-TAR algorithm. In lines 3–5, we establish the quantum channels between GEOs. The GEOs are connected with each other due to the large coverage of GEOs. In lines 6–22, the GEO establishes the quantum channels for QKD to several closest sites (including LEOs and ground stations) under the limitation of lh. Line 23 performs the same operations in the GF-TAR algorithm to update the QKPs and route for the requests on the abstracted topology.
| Algorithm 3: MS-TAR algorithm. | |
| Input: K(ti), R(ti), Vg, Vl, Vh, P(ti), Eτ | |
| Output: SPT(ti), AHT(ti), TKT(ti), P(ti+1), and solutions for the requests | |
| 1: | Initialize SPT(ti)← 0, AHT(ti) ← 0, c(m, n, ti) ← 0, vs. ← Vg ∪ Vl ∪ Vh; |
| 2: | Execute lines 2–21 in GF-TAR algorithm; |
| 3: | for do |
| 4: | c(m, n, ti) ← 1; |
| 5: | end for |
| 6: | for n ∈ Vh do |
| 7: | if do |
| 8: | χ ← lh; |
| 9: | else |
| 10: | ; |
| 11: | end if |
| 12: | Ψ ←∅; |
| 13: | for m ∈ Vg ∪ Vl do |
| 14: | if do |
| 15: | ; |
| 16: | end if |
| 17: | end for |
| 18: | Find the χ largest v(m, n, ti) in the set Ψ, and record their m to the set Λ; |
| 19: | for m ∈ Λ do |
| 20: | c(m, n, ti) ← 1; |
| 21: | end for |
| 22: | end for |
| 23: | Execute lines 22–49 in GF-TAR algorithm; |
| 24: | return , TKT(ti), and solutions for the requests set R(ti). |
The worst-case time complexities in lines 2 and 3–22 are and , respectively. The time complexity in line 23 is . The overall time complexity of the MS-TAR algorithm in a time slot is .
6. Evaluation and Analysis
To evaluate the performance of the GF-TAR, LF-TAR, and MS-TAR algorithms, we perform the simulations with four satellite network topologies. All the topologies consist of 25 ground stations randomly chosen from the major ground stations around the world, as shown in Figure 3. Three GEOs in the Walker constellation with one orbital plane are also included in all the topologies. In the six-plane Star topology and seven-plane Star topology, we construct a Walker Star constellation with six and seven orbital planes, respectively. In the six-plane Delta topology and seven-plane Delta topology, we construct a Walker Delta constellation with six and seven orbital planes, respectively. The Walker Star and Walker Delta are two typical constellations [,]. Each of the LEO orbital planes has 11 LEO satellites. Figure 3 shows the distribution of ground stations and satellites on the six-plane Star topology as an example of topologies. The LEO satellite has an orbit altitude of 500 km, an inclination of 90 degrees, and an orbital period of 5677 s. The GEO satellite has an orbit altitude of 35788.1 km, an inclination of 0 degrees, and an orbital period of 86170.5 s (approximately equal to 24 h). Due to the ground coverage time of LEO being commonly up to 5 min, we set the duration of the physical discrete topology to 1 min (i.e., Δ is equal to 1 min). We set the simulation time T to 48 h and then obtain 2881 physical topologies for different moments. We jointly use the STK 11.6 and MATLAB 2018b to obtain the related access and distance information of the satellites as well as process the dates to obtain the physical topology matrixes. Then, we use the MATLAB for the simulations of the proposed algorithms and the benchmark algorithms. The simulations are performed on a computer with 2.3 GHz Intel Core i7–10875H CPU and 16 GB RAM.
Figure 3.
An example of the 6-plane Star topology with 25 ground stations, 3 GEOs, and a Walker Star constellation containing 66 LEOs.
In the simulation, each LEO can create quantum links to four ground stations (i.e., lg is equal to four) and each LEO can establish quantum links with four LEOs (i.e., lb is equal to four). Each GEO can establish quantum links to eight LEOs or ground stations (i.e., lh is equal to eight) and each LEO can establish the quantum link with one GEO. The keys required for the request kr are randomly chosen from the set Ks = {0.8ϖ, ϖ, 1.2ϖ}. The QKD key rates are set according to the key rate data in [,]. Given that there is little research on the hybrid GEO/LEO quantum satellite network, we use four simple benchmark algorithms in this paper. The GEO-free benchmark with non-adaptive topology (Benchmark-GFN) and GEO-free benchmark with topology updating (Benchmark-GFU) use only LEOs for QKD. The LEO-first benchmark with non-adaptive topology (Benchmark-LFN) and LEO-first benchmark with topology updating (Benchmark-LFU) use both GEOs and LEOs for QKD, where the GEO-based QKD is used as an alternative plan for the LEO-based QKD. The Benchmark-GFN and Benchmark-LFN route on the physical topology without updating according to the rest of the time resources on the link. The Benchmark-GFU and Benchmark-LFU route on the physical topology with updating according to the rest of the time resources on the link. In Section 6.1, we will analyze the success probability and the max traffic supported on different topologies. In Section 6.2, we will compare the average number of relaying hops for the successful requests. The analysis of the total number of secret keys produced is conducted in Section 6.3.
6.1. Performance Evaluation on the Success Probability and the Max Traffic Supported
The results of success probability (SP) versus the number of requests per minute on different topologies are depicted in Figure 4a–d. We set the average keys for one request (ϖ) as 100 kbits. The SP on the topology with seven-plane constellation is higher than that on the topology with six-plane constellation, since there are more satellites for QKD on the topology with seven-plane constellation. Obviously, the proposed algorithms perform better than the benchmark algorithms in terms of the success probability. For example, the GF-TAR and LF-TAR algorithms increase the SP by 44.6% and 47.4%, respectively, compared to the Benchmark-LFU on the six-plane Star topology. This is because the topology abstraction-based routing scheme can fully save the secret keys in the QKP of the link on the abstracted topology. The quantum links are established for immediate requests in benchmark algorithms, and the free time resources are wasted due to the lack of key management. Meanwhile, the proposed algorithms establish the shortest quantum link to ensure the largest number of keys provided to QKPs, which contributes to the success of requests. In addition, on the abstracted topology, the links are increased compared to the physical topology. Hence, the number of relaying hops will decrease, and fewer keys are wasted due to the relaying operation. It can also create more possible paths for the request to increase the SP.
Figure 4.
Success probability versus number of requests per minute on the (a) 6-plane Star topology, (b) 6-plane Delta topology, (c) 7-plane Star topology and (d) 7-plane Delta topology.
The Benchmark-GFU and Benchmark-LFU have a higher SP than the Benchmark-GFN and Benchmark-LFN, respectively. This is because the former two benchmark algorithms update the physical topology according to the rest time resources, which can initially prevent the QKD relaying path including some links lacking resources. The Benchmark-LFN and Benchmark-LFU perform better than the Benchmark-GFN and Benchmark-GFU, respectively, since the GEO-based QKD is utilized in the former two benchmark algorithms. Furthermore, the LF-TAR and MS-TAR algorithms perform better than the GF-TAR algorithm, since the GF-TAR does not utilize the GEO satellites for QKD, which decreases the number of secret keys produced. The LF-TAR has a better performance than the MS-TAR in terms of the SP. This is because in the MS-TAR algorithm, the GEO is also included in the abstracted topology, which serves as the same role with the LEO. In this scheme, the GEO actually serves as an LEO with a low secret key rate, which cannot utilize the characteristic of the GEO that has a large coverage. Due to the large coverage of GEO, it can establish quantum links with many sites. However, owing to the limitation of quantum transmitters/receivers that can be carried by a GEO satellite, the number of quantum links established cannot exceed lh. If we fix the GEO to link with the closest sites, it is not efficient to improve the SP. Furthermore, since the number of secret keys produced by the GEO is relatively low, it does not urgently need the secret key management based on the topology abstraction scheme. In the LF-TAR algorithm, we make the GEO-based QKD as an alternative plan for the LEO-based QKD. It can accurately fulfill the requirements of the requests failed to be fulfilled by the LEO-based QKD. This can effectively utilize the characteristic of GEO that has a large coverage.
We also evaluate the max traffic supported on different topologies. Figure 5a shows the results of the max average key volume supported (MAK) for different algorithms on the four topologies, where the number of requests per minute is fixed as 300 (i.e., |R(ti)| = 300) and the success probability is required to exceed 80%. The MAK refers to the max average keys for one request, which can be supported by the resources. The results of the max number of requests supported per minute (MNR) for different algorithms on the four topologies are depicted in Figure 5b, where the ϖ is fixed as 100 kbits and the success probability is required to exceed 80%. The proposed algorithms are superior to the benchmark algorithms in terms of MAK and MNR. For example, the MS-TAR algorithm can increase the MAK by 70.1% compared to Benchmark-LFU on the six-plane Star topology. The LF-TAR algorithm can increase the MNR by 69.5% compared to the Benchmark-LFU on the eight-plane Delta topology. This is because the proposed algorithms can save the secret keys in the QKPs of links on the abstracted topology as well as can reduce the key wastage both in the key processing stage and in the key relaying stage. It should be noted that the MAK and MNR are equal to 0 for Benchmark-GFN and Benchmark-GFU on the six-plane Delta topology. The reason is that the routing success probability is less than 80% on the six-plane Delta physical topology without GEOs, where some ground stations cannot be linked with quantum channels at certain moments. The proposed algorithms will not face this problem due to the existence of the abstracted topology and the utilization of the classical channels. The proposed algorithms have a stronger improvement effect on the Delta constellation compared to the benchmark algorithms. This is because the Delta constellation is poor in the coverage of the selected ground stations. In this situation, the benchmark algorithms are extremely weak, because it cannot save the keys in QKPs of links on the abstracted topology, resulting in the failure of requests for the ground stations connected to few or no satellites at certain moments. The LF-TAR algorithm performs similarly to the MS-TAR algorithm in terms of the MAK and MNR, and they perform better than the GF-TAR algorithm due to the existence of GEO-based QKD.
Figure 5.
(a) Max average key volume supported and (b) max number of requests supported per minute for different algorithms on the four satellite network topologies.
Hence, our proposed algorithms perform superior to the benchmark algorithms in terms of the success probability and the max traffic supported. The LF-TAR algorithm is the best compared to other proposed algorithms, which can fully utilize the characteristics of both LEO and GEO.
6.2. Performance Evaluation on the Average Number of Relaying Hops
In Figure 6a–d, the results of the average number of relaying hops (AH) versus the number of requests per minute on different topologies are depicted, where the ϖ is set as 100 kbits. The proposed algorithms achieve a lower average number of relaying hops compared to the benchmark algorithms, which can save the precious key resources by decreasing the key wastage for relaying. This is because our proposed algorithms implement routing on the abstracted topology, which has far more links than the physical topology. This can be beneficial to find the shortest path with a lower number of hops for the request. The AH values for the Benchmark-LFN and Benchmark-LFU are relatively lower than those for the Benchmark-GFN and Benchmark-GFU, respectively. This is because the number of relaying hops for GEO-based QKD is normally two or three, which can pull down the value of AH. The Benchmark-GFU and Benchmark-LFU have relatively higher AH values than the Benchmark-GFN and Benchmark-LFN, respectively, since the topology-updating process can increase the success probability at the cost of increasing the number of relaying hops. The GF-TAR algorithm and LF-TAR algorithm show similar performance in terms of the AH, since the number of relaying hops for GEO-based QKD is normally two or three, which can hardly influence TAR algorithms, where the AH approaches two. Among the proposed algorithms, the MS-TAR algorithm shows the best AH performance. This is because the abstracted topology has more links for the MS-TAR algorithm compared to that for the GF-TAR and LF-TAR algorithms thanks to the adding of GEO nodes and related links to the abstracted topology for the MS-TAR algorithm.
Figure 6.
Average number of relaying hops versus number of requests per minute on the (a) 6-plane Star topology, (b) 6-plane Delta topology, (c) 7-plane Star topology and (d) 7-plane Delta topology.
6.3. Performance Evaluation on the Total Number of Secret Keys Produced
Figure 7 demonstrates the total number of secret keys produced (TK) versus the number of requests per minute on different topologies, where our proposed algorithms show much higher value than the benchmark algorithms. From Figure 7a, we can see that the TK for the MS-TAR algorithm is 11.8 times larger than that for the Benchmark-LFU. The reason is that the topology abstraction-based routing scheme can fully utilize the time to produce and inject keys into the QKPs without wastage. Meanwhile, it establishes the quantum link for each pair of sites with the lowest distance to generate the highest key rate. We can observe that the relationship of TK for benchmark algorithms is the same with that of SP for benchmark algorithms. This is because the keys in the benchmark algorithms are produced based on the requirements of the requests. Hence, the higher the number of successful requests for the benchmark algorithm, the more keys will be produced throughout the entire process. In addition, the LF-TAR and MS-TAR algorithms can produce more keys than the GF-TAR algorithm, which can be attributed to the extra keys produced by GEO-based QKD in the former two algorithms. It can also be observed that the TK of MS-TAR is higher than that of LF-TAR. This is due to the fact that the GEOs are linked to the closest sites for achieving a higher key rate in the MS-TAR algorithm. However, in the LF-TAR algorithm, the GEO-based QKD is used as an alternative plan to produce keys for the requirements of the requests which are not fulfilled by LEO-based QKD. The time resource wastage of the GEO satellites for QKD is the major reason for a relatively lower TK of the LF-TAR algorithm compared to that of the MS-TAR algorithm.
Figure 7.
Total number of secret keys produced versus number of requests per minute on the (a) 6-plane Star topology, (b) 6-plane Delta topology, (c) 7-plane Star topology and (d) 7-plane Delta topology.
7. Conclusions
This paper proposes a novel topology abstraction-based routing scheme, which can abstract the dynamic physical topology into a quasi-static abstracted topology for achieving a high success probability of requests. We present three heuristic algorithms based on the topology abstraction scheme, namely GF-TAR, LF-TAR, and MS-TAR. Simulation results indicate that our proposed algorithms have a better performance in terms of the success probability, the max traffic supported, the average number of relaying hops, and the total number of keys produced. The LF-TAR algorithm stands out in the hybrid GEO/LEO quantum satellite network scenario, which exhibits the best performance by collaborating GEOs with LEOs relying on the proposed routing scheme. In future work, we will conduct more research on a hybrid GEO/LEO quantum satellites network to facilitate their construction in the real world.
Author Contributions
Conceptualization, M.G. and Y.C.; Methodology, M.G. and J.Z. (Jiali Zhu); Software, M.G., X.H. and X.Y.; Validation, M.G., X.Z. and C.Z.; Resources, Y.C., Y.Z., J.Z. (Jie Zhang) and Q.W.; Writing—Original Draft Preparation, M.G.; Writing—Review and Editing, Y.C., X.Z., C.Z., X.H. and X.Y.; Supervision, Y.C. and Q.W.; Funding Acquisition, Y.C., Y.Z., J.Z. (Jie Zhang) and Q.W. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China (62201276, 62101285, 12104240, 12074194, 62021005), the Natural Science Foundation of Jiangsu Province (BK20192001, BE2022071, BK20210582), the Natural Science Research Project of Jiangsu Higher Education Institutions (21KJB140014, 22KJB510007), the Open Fund of IPOC (BUPT), and the Natural Science Research Start-Up Foundation of Recruiting Talents of NUPT (NY221114).
Institutional Review Board Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Yang, Z.; Zolanvari, M.; Jain, R. A Survey of Important Issues in Quantum Computing and Communications. IEEE Commun. Surv. Tutor. 2023, 25, 1059–1094. [Google Scholar] [CrossRef]
- Gill, S.S.; Kumar, A.; Singh, H.; Singh, M.; Kaur, K.; Usman, M.; Buyya, R. Quantum computing: A taxonomy, systematic review and future directions. Softw.-Pract. Exp. 2022, 52, 66–114. [Google Scholar] [CrossRef]
- Lo, H.-K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photonics 2014, 8, 595–604. [Google Scholar] [CrossRef]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
- Lo, H.-K.; Chau, H.F. Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef] [PubMed]
- Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984. [Google Scholar]
- Li, W.; Zhang, L.; Tan, H.; Lu, Y.; Liao, S.-K.; Huang, J.; Li, H.; Wang, Z.; Mao, H.-K.; Yan, B.; et al. High-rate quantum key distribution exceeding 110 Mb s−1. Nat. Photonics 2023, 17, 416–421. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, W.-J.; Jiang, C.; Chen, J.-P.; Zhang, C.; Pan, W.-X.; Ma, D.; Dong, H.; Xiong, J.-M.; Zhang, C.-J.; et al. Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance. Phys. Rev. Lett. 2023, 130, 210801. [Google Scholar] [CrossRef]
- Vallone, G.; Bacco, D.; Dequal, D.; Gaiarin, S.; Luceri, V.; Bianco, G.; Villoresi, P. Experimental Satellite Quantum Communications. Phys. Rev. Lett. 2015, 115, 040502. [Google Scholar] [CrossRef]
- Liao, S.-K.; Cai, W.-Q.; Liu, W.-Y.; Zhang, L.; Li, Y.; Ren, J.-G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.-P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef]
- Liao, S.-K.; Cai, W.-Q.; Handsteiner, J.; Liu, B.; Yin, J.; Zhang, L.; Rauch, D.; Fink, M.; Ren, J.-G.; Liu, W.-Y.; et al. Satellite-Relayed Intercontinental Quantum Network. Phys. Rev. Lett. 2018, 120, 030501. [Google Scholar] [CrossRef] [PubMed]
- Simon, C. Towards a global quantum network. Nat. Photonics 2017, 11, 678–680. [Google Scholar] [CrossRef]
- Bedington, R.; Arrazola, J.M.; Ling, A. Progress in satellite quantum key distribution. Npj Quantum Inf. 2017, 3, 30. [Google Scholar] [CrossRef]
- Vergoossen, T.; Loarte, S.; Bedington, R.; Kuiper, H.; Ling, A. Modelling of satellite constellations for trusted node QKD networks. Acta Astronaut. 2020, 173, 164–171. [Google Scholar] [CrossRef]
- Calderaro, L.; Agnesi, C.; Dequal, D.; Vedovato, F.; Schiavon, M.; Santamato, A.; Luceri, V.; Bianco, G.; Vallone, G.; Villoresi, P. Towards quantum communication from global navigation satellite system. Quantum Sci. Technol. 2018, 4, 015012. [Google Scholar] [CrossRef]
- Cao, Y.; Zhao, Y.; Wang, Q.; Zhang, J.; Ng, S.X.; Hanzo, L. The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Commun. Surv. Tutorials 2022, 24, 839–894. [Google Scholar] [CrossRef]
- Hosseinidehaj, N.; Babar, Z.; Malaney, R.; Ng, S.X.; Hanzo, L. Satellite-Based Continuous-Variable Quantum Communications: State-of-the-Art and a Predictive Outlook. IEEE Commun. Surv. Tutor. 2018, 21, 881–919. [Google Scholar] [CrossRef]
- Khan, I.; Heim, B.; Neuzner, A.; Marquardt, C. Satellite-based QKD. Opt. Photonics News 2018, 29, 26–33. [Google Scholar] [CrossRef]
- Takenaka, H.; Carrasco-Casado, A.; Fujiwara, M.; Kitamura, M.; Sasaki, M.; Toyoshima, M. Satellite-to-ground quantum-limited communication using a 50-kg-class microsatellite. Nat. Photonics 2017, 11, 502–508. [Google Scholar] [CrossRef]
- Grieve, J.A.; Bedington, R.; Tang, Z.; Chandrasekara, R.C.; Ling, A. SpooQySats: CubeSats to demonstrate quantum key distribution technologies. Acta Astronaut. 2018, 151, 103–106. [Google Scholar] [CrossRef]
- Liao, S.-K.; Yong, H.-L.; Liu, C.; Shentu, G.-L.; Li, D.-D.; Lin, J.; Dai, H.; Zhao, S.-Q.; Li, B.; Guan, J.-Y.; et al. Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 2017, 11, 509–513. [Google Scholar] [CrossRef]
- Gündoğan, M.; Sidhu, J.S.; Oi, D.K.L.; Krutzik, M. Time-delayed single quantum repeater node for global quantum communications with a single satellite. arXiv 2023, arXiv:2303.04174. [Google Scholar]
- De Grossi, F.; Alberico, S.; Circi, C. Orbit Design of Satellite Quantum Key Distribution Constellations in different Ground Stations Networks. Adv. Space Res. 2023, in press. [Google Scholar] [CrossRef]
- He, X.; Li, L.; Han, D.; Zhao, Y.; Nag, A.; Wang, W.; Wang, H.; Cao, Y.; Zhang, J. Routing and secret key assignment for secure multicast services in quantum satellite networks. J. Opt. Commun. Netw. 2022, 14, 190–203. [Google Scholar] [CrossRef]
- Wang, J.; Chen, H.; Zhu, Z. Modeling research of satellite-to-ground quantum key distribution constellations. Acta Astronaut. 2021, 180, 470–481. [Google Scholar] [CrossRef]
- Günthner, K.; Khan, I.; Elser, D.; Stiller, B.; Bayraktar, Ö.; Müller, C.R.; Saucke, K.; Tröndle, D.; Heine, F.; Seel, S.; et al. Quantum-limited measurements of optical signals from a geostationary satellite. Optica 2017, 4, 511–616. [Google Scholar] [CrossRef]
- Huang, D.; Zhao, Y.; Yang, T.; Rahman, S.; Yu, X.; He, X.; Zhang, J. Quantum Key Distribution Over Double-Layer Quantum Satellite Networks. IEEE Access 2020, 8, 16087–16098. [Google Scholar] [CrossRef]
- Aguado, A.; Hugues-Salas, E.; Haigh, P.A.; Marhuenda, J.; Price, A.B.; Sibson, P.; Kennard, J.E.; Erven, C.; Rarity, J.G.; Thompson, M.G.; et al. Secure NFV Orchestration Over an SDN-Controlled Optical Network with Time-Shared Quantum Key Distribution Resources. J. Light. Technol. 2017, 35, 1357–1362. [Google Scholar] [CrossRef]
- Picchi, R.; Chiti, F.; Fantacci, R.; Pierucci, L. Towards Quantum Satellite Internetworking: A Software-Defined Networking Perspective. IEEE Access 2020, 8, 210370–210381. [Google Scholar] [CrossRef]
- Su, Y.; Liu, Y.; Zhou, Y.; Yuan, J.; Cao, H.; Shi, J. Broadband LEO Satellite Communications: Architectures and Key Technologies. IEEE Wirel. Commun. 2019, 26, 55–61. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).