DAS system performance improvement algorithm based on quantum technology

Document Type : Original Article

Authors

1 PhD student, Malek Ashtar University of Technology, Tehran, Iran

2 Associate Professor, Imam Hossein ، University, Tehran, Iran

Abstract

Fiber optic eavesdropping has always been and will be the focus of various sectors of electronic and cyber warfare in the defense and security sector. So far, many efforts have been made at the global level to monitor the performance of the fiber optic communication link, the results of which can be expressed in the form of DAS and OTDR technologies. Unfortunately, both methods are unable to distinguish the listening systems from the fiberoptics in front of the advanced fever and listening techniques.In this article, the properties of quantum technology in the field of quantum key distribution are used to improve the performance of DAS, and an algorithm is proposed that is capable of detecting the fiber listening system with high accuracy in addition to monitoring the losses in the optical fiber communication link. specifies The results of the proposed algorithm indicate that this algorithm is able to detect the presence of a listening device with 98% accuracy, detect people within a radius of 2 meters with an accuracy of over 70%, and detect a motorcycle within a radius of 20 meters with an accuracy of over 72%. More than 75% of light vehicle detection in a radius of 120 meters and more than 76% accuracy of heavy vehicle detection in a radius of 180 meters of optical fiber.

Keywords: Tapping , DAS, OTDR, VOTDR, ,Quantum key, QKD DV, QKD CV

Keywords

Main Subjects


Smiley face

 [1]"Electical & Computer Technical Website", http://microrf.ir, 2023.
[2] "Distributed sound and vibration sensor" project reports, Sharif University of Technology, Photonics and Quantum Center, Abolfazl Bahrampur, 2018.
 
 [3] Y. Gong1, R. Kumar2, A. Wonfor, "Secure optical communication using a quantum alarm", Official journal of the CIOMP 2047-7538 , pp 180-192, 2020.
[4]The first report of the project "Performance Comparison of Discrete Quantum Key Distribution Protocols", Sharif University of Technology, Photonics and Quantum Center, Morteza Nikayin, 2018.
 
[5] Project "Map of entry into the field of communication and quantum cryptography", the detailed political document of the Kausar Thought Center, Hossein Taleb, 1400.
 [6] Bruss, D., Erdelyti, G., Meyer, T., Riege, T., Rothe, J., "Quantum Cryptography: A Survey", ACM Computing Surveys, Vol. 39, No. 2, Article 6, 2007.
[7] A. Shamir, Communications of the ACM 22, 612, 1979.
[8] G. J. Simmons, in Workshop on the Theory and Application of of Cryptographic Techniques pp. 436–467, 1989.
[9] M. Hillery, V. Buˇzek, and A. Berthiaume," Quantum secret sharin",  Physical Review. A 59, 1829 , 1999.
[10] Jie Gu, Xiao-Yu Cao, Hua-Lei Yin, Zeng-Bing Chen, "Differential phase shift quantum secret sharing using twin field", Opt. Express 29, 9165, 2021.
[11] C. H. Bennett and G. Brassard. "Quantum cryptography: Public key distribution and coin tossing". In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, page 8. New York,,1984.
[12] 2 M. Lucamarini, K. A. Patel, J. F. Dynes, B. Fröhlich, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, "Efficient decoystate quantum key distribution with quantified security", Opt. Express 21, 24550-24565,2013.
[13] Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen, "Decoy State Quantum Key Distribution" Physical Review Letters. 94, 230504, 2005.
[14] Scarani, Valerio & Acín, Antonio & Ribordy, Grégoire & Gisin, Nicolas. "Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations". Physical review letters. 92. 057901. 2004.
[15] Bruss, Dagmar "Optimal Eavesdropping in Quantum Cryptography with Six States", Physical Review Letters, 81. 10.1103/PhysRevLett.81.3018 (1998).
[16] A. K. Ekert, "Quantum cryptography based on bell’s theorem", Physical Review Letters. 67, pp. 661–663, 1991.
[17] C. Bennett, "Quantum cryptography using any two nonorthoganol states", Physical Review Letters. 68, pp. 3121-3124,1992.
[18] R. Etengu, F. M. Abbou, H. Y. Wong, A. Abid, N. Nortiza, A.Setharaman," Performance Comparison of BB84 and B92 Satellite-Based Free Space Quantum Optical Communication Systems in the Presence of Channel Effects" Journal of Optical Communications, Volume 32, Issue 1, pp.37-47, 2011.
[19] C. H. Bennet, G. Brassard, and N. D. Mermin, "Quantum cryptography without Bell's theorem", Physical Review Letters. 68, pp. 557-559, 1992.
[20] S.-K. Liao, W.-Q. Cai, J. Handsteiner, B. Liu, J. Yin, L. Zhang,, … J.-W. Pan, "Satellite-Relayed Intercontinental Quantum Network", Physical Review Letters, 120(3), 2018.
[21] Mu, Yi; Seberry, Jennifer; Zheng, Yuliang, "Shared cryptographic bits via quantized quadrature phase amplitudes of light" Optics Communications. pp. 344–352,1996.

 [22] D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden: "Fast and simple one-way quantum key distribution" Applied Physics Letters. 87(19); 194108, 2005.
[23] K. Noue, E.Waks, & Y. Yamamoto, "Differential Phase Shift Quantum Key Distribution" Physical Review Letters, 89(3), 2002.
[24] A. Fichtner, A. Bogris, T. Nikas, Theory of phase transmission fibre-optic deformation sensing, Geophysical Journal International, Volume 231, Issue 2, Pages 1031–1039, 2022.
[25] Project No. 2 "Performance Comparison of Discrete Quantum Key Distribution Protocols", Sharif University of Technology, Photonics and Quantum Center, Morteza Nik Ayin, 2018.
 [26] Project reports "Reviewing the Principles and Basics of Quantum Communication Technology", Imam Hossein University (AS), Faculty and Research Institute of Fawa, Communication and Network Science and Technology Center, Ali Naseri, 2018.
Volume 12, Issue 2 - Serial Number 46
September 2024
Pages 85-97
  • Receive Date: 27 April 2024
  • Revise Date: 08 July 2024
  • Accept Date: 03 August 2024
  • Publish Date: 31 August 2024