Current network architectures are rapidly evolving towards more dynamic solutions, due to the ever-growing demand of resources from highly-heterogeneous new services. This forces network management systems and protocols to quickly adapt to support new capabilities and security is one of the main concerns. In this work, we define and demonstrate for the first time extensions for multi-protocol label switching (MPLS) networks using quantum key distribution (QKD) keys to secure end-to-end (E2E) network services. The proposed solution allows to synchronize key IDs between remote endpoints, as well as to transmit other parameters required for the encryption. Results show how these new services could be integrated in existing operators control plane architectures. NETWORK services are continuously evolving, moving from a traditional approach, based on proprietary devices performing a fixed function, to more flexible and open solutions, implemented in general purpose hardware and using open standards. Traditional services usually require several days (or even weeks) to be established, while new applications and services change their requirements much faster. This evolution, aiming to cope with this dynamicity, is possible thanks to novel network paradigms, such as software defined networking (SDN) [1]. SDN allows to decouple the control plane (the management of the network itself, traditionally running in the core of a network device) from the data plane (the actual transmission of the data). It manages network services from a logically centralized entity (network controller) that can be physically distributed. Security is an increasing concern in communications networks, as critical information travels across an entire infrastructure. However, network security has not been the result of a systematic effort, but more as a series of ad-hoc solutions. Today, networks are more complex and, especially with SDN, much more configurable. SDN networks, by boosting the interoperability character, are more sensitive to security breaches that can extend faster and reach more nodes. The security risks are correspondingly larger and, therefore, security in network infrastructures must be enhanced. QKD technology [2], [3] can be regarded as two sources of synchronized random numbers that are separated in space. It also allows to upper bound the maximum information that is leaked out of these two sources, hence they can be used as secret keys to cypher the communicatios. However, it is a delicate technology and dealing with the preparation and measurement of single quantum signals impose very stringent requirements on the physical implementation, specially in the maximum range achievable and in its tolerance to external noise (i.e. sharing the same media with classical communications signals). It is also intrinsically point to point. Two paradigms have been proposed to mitigate this restriction: one is the switched network, where uninterrupted and unamplified, point to point optical paths supporting a quantum channel are created in an optical passive network; the second is a trusted node network, where the end to end paths pass through intermediate nodes. Both paradigms have been implemented in practice [4]–[6]. However the difficulties, if properly implemented, the security of the symmetric keys produced by systems built around QKD can be very high. QKD is, by principle, immune to any algorithmic cryptanalysis and provides forward and backward security. In consequence, QKD can be seen as a new opportunity for operators and infrastructure providers as it can enable the provision of new, high security encryption in end-to-end (E2E) services. But bringing quantum encryption awareness and the capability of providing inline encryption into a logically centralized control plane will require a modification of the existing protocols and to develop some necessary extensions. This work describes the proposed solution for integrating QKD into network services via MPLS control plane (as its generalized version, GMPLS), initially presented in [7]. In order to provide such services in current communication networks, we must first define network nodes capable of providing this quantum encryption -QE(see Fig. 1). This type of node must: • Generate keys synchronized with remote peers to perform symmetric encryption (in our case, via QKD). • Encrypt the outcoming traffic utilizing those keys. • Be able of performing switching or routing (optional). • Communicate (northbound intarface) with a network controller. This set of capabilities will additionally bring certain requirements from the NBI and management perspective, as each of this nodes will need to be operated from the centralized controller. The main operations to be adapted will be: capabilities dissemination and device configuration (together with the key synchronization process). Fig. 1. Example of an SDN-enabled network node, providing encryption via QKD-generated keys. Our proposed workflow, including those operations and the main messages you be exchanged in a MPLS-enabled network, is shown in Fig. 2. Each step is as indicated below: • Initially, a QE node should expose its capabilities to the centralized controller. In our case, it will consist on a path computation element -PCEor more complex architectures (such as the applications-based network operations -ABNOarchitecture). • The request for an E2E QE service could come from the controller’s NBI or from the device itself. In our figure, the node 1 sends a path computation request, sending the encryption requirements encapsulated in metrics. • The path is returned to the source node, which will detect the QE requirements. Upon receipt, this node will extract the key and key ID pair from a QKD system (or key manager). • The key ID will be forwarded via RSVP path message to the destination node, which will extract the required key from the peer QKD system (or key manager). • This process will finalise when a RSVP Resv message arrives to the source node, acknowledging the configuration. Fig. 2. MPLS workflow for setting up a E2E QE service. A. Capabilities Dissemination Centralized control plane entities (controller/PCE) are required to gather basic information from the devices (statistics, system information) to build a graph of the existing network and compute and optimize network services to better use the available resources. Encryption services (if centrally managed by a controller/PCE) require at least a minimum information to be exposed from the network devices that can perform such process. The proposed extension to disseminate QE capabilities is based on the RFC7770 [], which defines OSPF extensions for optional router capabilities. This extension, implemented for OSPFv2, uses the router information (RI) opaque link state advertisement (LSA) within an OSPF update message. A single bit is exposed within an informational capabilities TLV, to let the PCE know that it can provide such encryption services to end users. B. Device and Service Configuration When a PCReply or a PCInitiate message arrives to a PCC of a network node, this node is in charge to start the signaling process by extracting the ERO from the PCEP message and transmitting it via an RSVP Path message down to the destination node. In our case, it is mandatory to synchronize the QKD-generated keys in both sides. This process can be easily done by exchanging IDs to be extracted in both endpoints. While doing this process through a non-standard channel could be done, RSVP is the best candidate to automate the key synchronization process using a standard protocol. It is capable of forwarding the encryption requirements across the path and return a confirmation (Resv message) if the resources (keys) have been reserved, while the signaling process traverses the network. To encapsulate the key ID together with other important information we have created an explicit route object -EROsubobject -SO-, as shown in Fig. 3. This structure contains encryption information, such as key lenght, encryption algorithm, key refresh values (if necessary) and layer of encryption. This structure is transmitted and modified on-the-fly between PCE and the network devices to synchronized both ends of the encrypted path. Fig. 3. ERO Subobject used to exchanged QE information between the two enpoints of the path and the PCE. C. Experimental Results The full set of the messages transmitted across the GMPLS control plane network is shown in Fig. 4. The first message is an OSPF update from the fifth node (others are omitted), which contains the router information opaque LSA, with the traffic engineering capable and que QE capable bits set to 1 within the informational capabilities TLV. The second and third messages are the PCRequest and PCReply messages, including the new metrics and the new QE ERO SO (Fig. 3). The remaining messages are the RSVP path and resv messages, used to forward the configuration from the ingress (source) to the engress (destination) nodes of the path. Finally, Fig. 5 shows how the QE ERO SO is modified by the source node, by including the valid key ID to be used by the encryption path. The interface used to retrived the keys from the QKD systems has been designed using the API specification described in [8]. Upon receipt, the destination node gets the valid key ID to retrieve a key from the corresponding QKD system for the encrypted channel. Fig. 4. Capture of the set of messages exchanged during the MPLS workflow.
[1]
Jesús Martínez-Mateo,et al.
GMPLS network control plane enabling quantum encryption in end-to-end services
,
2017,
2017 International Conference on Optical Network Design and Modeling (ONDM).
[2]
Xiongfeng Ma,et al.
Quantum key distribution and beyond: introduction
,
2019
.
[3]
David Elkouss,et al.
QKD in Standard Optical Telecommunications Networks
,
2009,
QuantumComm.
[4]
Nick McKeown,et al.
OpenFlow: enabling innovation in campus networks
,
2008,
CCRV.
[5]
A R Dixon,et al.
Field test of quantum key distribution in the Tokyo QKD Network.
,
2011,
Optics express.
[6]
H. Weinfurter,et al.
The SECOQC quantum key distribution network in Vienna
,
2009,
2009 35th European Conference on Optical Communication.
[7]
H. Bechmann-Pasquinucci,et al.
Quantum cryptography
,
2001,
quant-ph/0101098.