Study on Practical Quantum-based Security for 6G RAN

Authors

  • Anjar Priyatna
  • Khoirul Anwar
  • Gelar Budiman

Abstract

Advancements in mobile network technologies have quickly led to the 6G era, increasing data rates and connectivity for future communications. However, implementing quantum security technology to existing devices is not straightforward, particularly in the area of Radio Access Networks (RAN). This paper studies on practical quantum-based security solutions for 6G RAN by exploring three key objectives: (i) analyzing various documents and standards for Quantum Key Distribution (QKD) in International Telecommunication Union (ITU), (ii) analyzing possible infrastructure and fronthaul system model of quantum-based security for 6G RAN, (iii) comparing different QKD protocols in terms of its strengths, weakness, security features and possible applications to identify whether it is possible for integration into 6G infrastructures and (iv) proposed scheme for QKD deployments for Indonesia case study. This paper aims to contribute to the development of a secure, quantumresistant RAN for 6G by incorporating insights from the latest standards in various documents.

Index Terms—Quantum Key Distribution, Security, Radio Access Network, Sixth-Generation Wireless Network (6G).

References

B. Bangerter, S. Talwar, R. Arefi, and K. Stewart, “Networks and devices for the 5g era,” IEEE Communications Magazine, vol. 52, no. 2, pp. 90–96, 2014.

S. P. et al., “Advances in quantum cryptography,” Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020.

S. Wehner, D. Elkouss, and R. Hanson, “Quantum internet: A vision for the road ahead,” Science, vol. 362, no. 6412, 2018.

C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984, pp. 175–179.

H.-K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nature Photonics, vol. 8, no. 8, pp. 595–604, 2014.

R. A. et al., “Using quantum key distribution for securing optical

networks,” in Proceedings of the 2014 European Conference on Optical Communication, 2014, pp. 1–3.

T. G. et al., “Implementation of continuous-variable quantum key distribution with composable and one-sided-deviceindependent security against coherent attacks,” Nature Communications, vol. 6, p. 8795, 2015.

E. Diamanti and I. Kerenidis, “Quantum cryptography: From theory to practice,” Advances in Physics: X, vol. 1, no. 1, pp. 1–24, 2016.

Z. Z. et al., “Experimental demonstration of entanglementbased continuous-variable quantum key distribution,” Physical Review Letters, vol. 124, no. 13, p. 130501, 2020.

F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, “Secure quantum key distribution with realistic devices,” Reviews of Modern Physics, vol. 92, no. 2, p. 025002, 2020.

V. S. et al., “The security of practical quantum key distribution,” Reviews of Modern Physics, vol. 81, no. 3, p. 1301, 2009.

L. O. Mailloux and Z. Tang, “Hybrid classical-quantum cryp-

tography for 6g networks,” IEEE Communications Magazine, vol. 59, no. 5, pp. 50–56, 2021.

S. W. et al., “Practical security analysis of quantum key distribution with minor device flaws,” Physical Review X, vol. 9, no. 4, p. 041012, 2019.

Published

2026-04-20

Issue

Section

Prodi S2 Teknik Elektro