Unpublished conference/Abstract (Scientific congresses, symposiums and conference proceedings)
Detecting Trojan-Horse Attacks in Practical QKD via Gaussian Mixture Modeling-Assisted QBER Goodness-of-Fit Analysis
Hongfu, Chou; PENG, Heyang; VU, Thang Xuan et al.
2025IEEE Global Communications Conference
Peer reviewed
 

Files


Full Text
a74-chou final.pdf
Author postprint (1.08 MB) Creative Commons License - Attribution
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Quantum key distribution; Gaussian mixture models; Risk analysis; Risk measurement; Quantum Hacking
Abstract :
[en] Quantum key distribution (QKD) offers exceptionally high levels of data security during transmission by using principles of quantum physics. It is renowned for its provable security features. However, a gap between theoretical models and real-world applications, known as quantum hacking, challenges the reliability of QKD networks. Trojan-horse attacks represent a significant threat to the Bob subsystem in QKD, allowing Eve to infer Alice’s basis choices through back-reflected pulses. This can compromise security without detection in severe cases, especially when quantum bit error rates (QBER) fall below the abort threshold. The proposed method combines a category-based Gaussian Mixture Model (GMM) with the Kolmogorov-Smirnov test to estimate the posterior QBER distribution and assess risks in practical QKD systems. By processing the QBER, the approach also evaluates the dependability of the QKD scenario. Numerical results are presented using a state-of-the-art point-to-point QKD device operating over optical quantum channels of 1 m, 1 km, and 30 km lengths. The results of the experimental analysis of a 30 km optical link suggest that the QKD device provided prior information to the proposed learner. Consequently, our proposed trustworthy monitor offers a defensive mechanism that identifies potential Eve attacks, effectively mitigating the risk of security vulnerabilities.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Hongfu, Chou
PENG, Heyang  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
VU, Thang Xuan  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
MAITY, Ilora  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Youssouf Drif
GARCES SOCARRAS, Luis Manuel  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Jorge L. Gonzales
MERLANO DUNCAN, Juan Carlos  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
CHATZINOTAS, Symeon  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
External co-authors :
yes
Language :
English
Title :
Detecting Trojan-Horse Attacks in Practical QKD via Gaussian Mixture Modeling-Assisted QBER Goodness-of-Fit Analysis
Publication date :
December 2025
Event name :
IEEE Global Communications Conference
Event date :
5/12/2025
Audience :
International
Peer reviewed :
Peer reviewed
Available on ORBilu :
since 28 November 2025

Statistics


Number of views
26 (4 by Unilu)
Number of downloads
17 (0 by Unilu)

Bibliography


Similar publications



Contact ORBilu