Effects of Weather on Drone to IoT QKD

  • Shlomi ArnonEmail author
  • Judy Kupferman
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11527)


The Internet of Things (IoT) is playing a growing role in society, and includes control over a range from household appliances to municipal power grids and nationwide assets. As a result, hackers from a national level down to low level criminals are looking to take advantage of important IoT infrastructures. These present an immediate target for cyber-terrorists as well as more mundane attacks by thieves and personal enemies, and it is imperative to devise defensive measures. In this work, we describe potential possible attacks on several IoT systems. As a result, vendors of the IoT infrastructure employ conventional encryption which is based on complexity to fight against hackers. However the emerging technology of quantum computing will make deciphering of the conventional encryption an easy task. This leads us to propose a scheme for use of QKD (quantum key distribution) which could be effective as a countermeasure. In this paper we will describe the feasibility study of weather effect design guidelines for a small, short range, mobile QKD system from drone to IoT on the ground.


Internet of Things Quantum Key Distribution Free Space Optics 


  1. 1.
  2. 2.
  3. 3.
  4. 4.
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10.
    Liao, S.-K., et al.: Satellite-relayed intercontinental quantum network. Phys. Rev. Lett. 120(3), 030501 (2018)CrossRefGoogle Scholar
  11. 11.
    Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 1–14. Springer, Berlin (2009). Scholar
  12. 12.
    Hill, A.D., Chapman, J., Herndon, K., Chopp, C., Gauthier, D.J., Kwiat, P.: Drone-based quantum key distribution. Urbana 51, 61801–63003 (2017)Google Scholar
  13. 13.
    Chun, H., et al.: Handheld free space quantum key distribution with dynamic motion compensation. Optics Express 25(6), 6784–6795 (2017)CrossRefGoogle Scholar
  14. 14.
    Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, p. 8, New York (1984)Google Scholar
  15. 15.
    Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Tentrup, T.B.H., et al.: Large-alphabet Quantum Key Distribution using spatially encoded light. arXiv preprint arXiv:1808.02823 (2018)
  17. 17.
    Arnon, S., Kopeika, N.S.: Laser satellite communication network-vibration effect and possible solutions. Proc. IEEE 85(10), 1646–1661 (1997)CrossRefGoogle Scholar
  18. 18.
    Arnon, S.: Effects of atmospheric turbulence and building sway on optical wireless-communication systems. Opt. Lett. 28(2), 129–131 (2003)CrossRefGoogle Scholar
  19. 19.
    Yang, F., Cheng, J., Tsiftsis, T.A.: Free-space optical communication with nonzero boresight pointing errors. IEEE Trans. Commun. 62(2), 713–725 (2014)CrossRefGoogle Scholar
  20. 20.
    Chen, C.-C., Gardner, C.S.: Impact of random pointing and tracking errors on the design of coherent and incoherent optical intersatellite communication links. IEEE Trans. Commun. 37(3), 252–260 (1989)CrossRefGoogle Scholar
  21. 21.
    Kopeika, N.: A System Engineering Approach to Imaging, 700 p. SPIE Press (1998). (2nd printing. April 2000)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Ben-Gurion University of the NegevBeer ShevaIsrael

Personalised recommendations