Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes.
Patrik BurdiakEmir DervisevicAmina TankovicFilip LauterbachJan RozhonLukas KapicakLibor MichalekDzana PivacMerima FehricEnio KaljicMirza HamzaMiralem MehicMiroslav VoznákPublished in: ICISSP (2023)
Keyphrases
- key distribution
- denial of service attacks
- key management
- security threats
- wireless ad hoc networks
- fault tolerant
- dos attacks
- authentication protocol
- secret key
- elliptic curve
- ad hoc networks
- intrusion detection system
- shortest path
- resource constrained
- key establishment
- signature scheme
- network structure
- security protocols
- network security
- intelligent agents