{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:25Z","timestamp":1767339505734,"version":"build-2065373602"},"reference-count":51,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Commonwealth Cyber Initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Quantum key distribution (QKD), a key application of quantum information technology and \u201cone-time pad\u201d (OTP) encryption, enables secure key exchange with information-theoretic security, meaning its security is grounded in the laws of physics rather than computational assumptions. However, in QKD networks, achieving long-distance communication often requires trusted relays to mitigate channel losses. This reliance introduces significant challenges, including vulnerabilities to compromised relays and the high costs of infrastructure, which hinder widespread deployment. To address these limitations, we propose a zero-trust spatiotemporal diversification framework for multipath\u2013multi-key distribution. The proposed approach enhances the security of end-to-end key distribution by dynamically shuffling key exchange routes, enabling secure multipath key distribution. Furthermore, it incorporates a dynamic adaptive path recovery mechanism that leverages a recursive penalty model to identify and exclude suspicious or compromised relay nodes. To validate this framework, we conducted extensive simulations and compared its performance against established multipath QKD methods. The results demonstrate that the proposed approach achieves a 97.22% lower attack success rate with 20% attacker pervasiveness and a 91.42% reduction in the attack success rate for single key transmission. The total security percentage improves by 35% under 20% attacker pervasiveness, and security enhancement reaches 79.6% when increasing QKD pairs. Additionally, the proposed scheme exhibits an 86.04% improvement in defense against interception and nearly doubles the key distribution success rate compared to traditional methods. The results demonstrate that the proposed approach significantly improves both security robustness and efficiency, underscoring its potential to advance the practical deployment of QKD networks.<\/jats:p>","DOI":"10.3390\/bdcc9040076","type":"journal-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:01:00Z","timestamp":1743073260000},"page":"76","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Quantum Key Distribution Routing Scheme for a Zero-Trust QKD Network System: A Moving Target Defense Approach"],"prefix":"10.3390","volume":"9","author":[{"given":"Esraa M.","family":"Ghourab","sequence":"first","affiliation":[{"name":"IoT and Cyber Security Lab, VT-Mena, Alexandria 21121, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9386-4726","authenticated-orcid":false,"given":"Mohamed","family":"Azab","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Virginia Military Institute, Lexington, VA 24450, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6831-2818","authenticated-orcid":false,"given":"Denis","family":"Gra\u010danin","sequence":"additional","affiliation":[{"name":"The Department of Computer Science, Virginia Tech, Blacksburg, VA 24060, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","article-title":"Quantum supremacy using a programmable superconducting processor","volume":"574","author":"Arute","year":"2019","journal-title":"Nature"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","article-title":"A single quantum cannot be cloned","volume":"299","author":"Wootters","year":"1982","journal-title":"Nature"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1038\/s41566-021-00928-2","article-title":"Twin-field quantum key distribution over 830-km fibre","volume":"16","author":"Wang","year":"2022","journal-title":"Nat. Photonics"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","article-title":"An integrated space-to-ground quantum communication network over 4600 kilometres","volume":"589","author":"Chen","year":"2021","journal-title":"Nature"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.91.052325","article-title":"Entanglement over global distances via quantum repeaters with satellite links","volume":"91","author":"Boone","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_7","unstructured":"James, P., Laschet, S., Ramacher, S., and Torresetti, L. (September, January 29). Key management systems for large-scale quantum key distribution networks. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Baskar, S., Roberts, M.K., and Sridhar, K. (2024, January 3\u20134). Long-Distance Secure Communication Based on Quantum Repeater Deployment with Quantum-Key Distribution. Proceedings of the 2024 3rd International Conference on Artificial Intelligence for Internet of Things (AIIoT), Vellore, India.","DOI":"10.1109\/AIIoT58432.2024.10574780"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/COMST.2022.3144219","article-title":"The evolution of quantum key distribution networks: On the road to the qinternet","volume":"24","author":"Cao","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","first-page":"1","article-title":"Quantum key distribution: A networking perspective","volume":"53","author":"Mehic","year":"2020","journal-title":"ACM Comput. Surv. CSUR"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","article-title":"Trojan-horse attacks on quantum-key-distribution systems","volume":"73","author":"Gisin","year":"2006","journal-title":"Phys. Rev. A\u2014At. Mol. Opt. Phys."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"109246","DOI":"10.1016\/j.comnet.2022.109246","article-title":"Satellite-based communications security: A survey of threats, solutions, and research challenges","volume":"216","author":"Tedeschi","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_13","first-page":"23058046","article-title":"Quantum Hacking: Challenges and Countermeasures","volume":"5","author":"Suhail","year":"2023","journal-title":"Int. J. Multidiscip. Res."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"13984","DOI":"10.1038\/ncomms13984","article-title":"Chip-based quantum key distribution","volume":"8","author":"Sibson","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TNET.2021.3136943","article-title":"Quantum network: Security assessment and key management","volume":"30","author":"Zhou","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s11432-009-0001-4","article-title":"Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network","volume":"52","author":"Wen","year":"2009","journal-title":"Sci. China Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wang, J., Xue, W., Wang, C., and Wang, J. (2023, January 15\u201317). Research on Multi-path Quantum Key Distribution Scheme without Public Nodes Based on Trust Relaying. Proceedings of the 2023 5th International Conference on Information Technology and Computer Communications, Tianjin, China.","DOI":"10.1145\/3606843.3606845"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/MCOM.010.2200672","article-title":"A segment-based multipath distribution method in partially-trusted relay quantum networks","volume":"61","author":"Wang","year":"2023","journal-title":"IEEE Commun. Mag."},{"key":"ref_20","first-page":"2049","article-title":"Quantum key distribution secured optical networks: A survey","volume":"2","author":"Sharma","year":"2021","journal-title":"OJ-COMS"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"24260","DOI":"10.1364\/OE.26.024260","article-title":"Large scale quantum key distribution: Challenges and solutions","volume":"26","author":"Zhang","year":"2018","journal-title":"Opt. Express"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"15219","DOI":"10.1109\/JIOT.2024.3349476","article-title":"Routing with Minimum Activated Trusted Nodes in Quantum Key Distribution Networks for Secure Communications","volume":"11","author":"Kong","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11128-022-03825-x","article-title":"A quantum key distribution routing scheme for hybrid-trusted QKD network system","volume":"22","author":"Chen","year":"2023","journal-title":"Quantum Inf. Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"E36","DOI":"10.1364\/JOCN.526014","article-title":"DRL-based progressive recovery for quantum-key-distribution networks","volume":"16","author":"Li","year":"2024","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sharma, P., Bhatia, V., and Prakash, S. (2023, January 17\u201320). Routing Based on Deep Reinforcement Learning in Quantum Key Distribution-secured Optical Networks. Proceedings of the IEEE International Conference on ANTS, Jaipur, India.","DOI":"10.1109\/ANTS59832.2023.10469164"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3530","DOI":"10.1109\/JLT.2022.3153992","article-title":"Secret-key provisioning with collaborative routing in partially-trusted-relay-based quantum-key-distribution-secured optical networks","volume":"40","author":"Yu","year":"2022","journal-title":"J. Light. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Xu, S., Zhao, Y., Huang, L., and Qiao, C. (2024, January 20\u201323). Routing and Photon Source Provisioning in Quantum Key Distribution Networks. Proceedings of the IEEE INFOCOM, Vancouver, BC, Canada.","DOI":"10.1109\/INFOCOM52122.2024.10621389"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TQE.2023.3329714","article-title":"Multiuser entanglement distribution in quantum networks using multipath routing","volume":"4","author":"Sutcliffe","year":"2023","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kiktenko, E.O., Tayduganov, A., and Fedorov, A.K. (2024). Routing Algorithm Within the Multiple Non-Overlapping Paths\u2019 Approach for Quantum Key Distribution Networks. Entropy, 26.","DOI":"10.3390\/e26121102"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lin, X., Hou, G., Lin, W., and Chen, K. (2020, January 27\u201329). Quantum key distribution in partially-trusted QKD ring networks. Proceedings of the IEEE 3rd ICISCAE, Dalian, China.","DOI":"10.1109\/ICISCAE51034.2020.9236910"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"94753","DOI":"10.1109\/ACCESS.2024.3425350","article-title":"A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks","volume":"12","author":"Nahar","year":"2024","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Lin, J., Jiang, Q., Zhang, W., Lin, Z., and Du, X. (2024, January 1\u20133). Quantum-Enhanced Zero Trust Security: Evolution, Implementation, and Application. Proceedings of the 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC), Kanazawa, Japan.","DOI":"10.1109\/QCNC62729.2024.00040"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Peev, M., Martin, V., Brito, J.P., Ort\u00edz, L., Fred Fung, C.H., Brito M\u00e9ndez, R., Buruaga, J.S., Vicente, R.J., Sebastian-Lombrana, A.J., and Setien, J. (2024, January 1\u20133). Quantum Key Distribution Network Architectures. Proceedings of the 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC), Kanazawa, Japan.","DOI":"10.1109\/QCNC62729.2024.00056"},{"key":"ref_34","first-page":"1","article-title":"Quantum blockchain approach for security enhancement in cyberworld","volume":"Volume 3","author":"Kashyap","year":"2022","journal-title":"Multimedia Technologies in the Internet of Things Environment"},{"key":"ref_35","unstructured":"Vyas, N., and Mendes, P. (2024). Relaxing Trust Assumptions on Quantum Key Distribution Networks. arXiv."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1800011","DOI":"10.1002\/qute.201800011","article-title":"Continuous-variable quantum key distribution with Gaussian modulation\u2014The theory of practical implementations","volume":"1","author":"Laudenbach","year":"2018","journal-title":"Adv. Quantum Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1287\/mnsc.17.11.712","article-title":"Finding the k shortest loopless paths in a network","volume":"17","author":"Yen","year":"1971","journal-title":"Manag. Sci."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Miao, M., Fang, S., Wu, W., Yuan, X., and Bi, L. (2023, January 23\u201325). Minimum Path Cost Multi-path Routing Algorithm with No Intersecting Links in Quantum Key Distribution Networks. Proceedings of the 2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China.","DOI":"10.1109\/ICISCAE59047.2023.10393549"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Kumar, P., Kundu, N.K., and Kar, B. (2024). Quantum Key Distribution Routing Protocol in Quantum Networks: Overview and Challenges. arXiv.","DOI":"10.36227\/techrxiv.173532206.69862449\/v1"},{"key":"ref_40","unstructured":"Al Zoobi, A., Coudert, D., and Nisse, N. (2020, January 16\u201318). Space and time trade-off for the k shortest simple paths problem. Proceedings of the SEA 2020\u201418th International Symposium on Experimental Algorithms, Catania, Italy."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2281","DOI":"10.1109\/TNET.2023.3246114","article-title":"Fast and Secure Routing Algorithms for Quantum Key Distribution Networks","volume":"31","author":"Akhtar","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Bi, L., Miao, M., and Di, X. (2023). A dynamic-routing algorithm based on a virtual quantum key distribution network. Appl. Sci., 13.","DOI":"10.3390\/app13158690"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1364\/JOCN.509269","article-title":"Comparison and optimization of different routing methods for meshed QKD networks using trusted nodes","volume":"16","author":"Johann","year":"2024","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-021-03246-2","article-title":"ADA-QKDN: A new quantum key distribution network routing scheme based on application demand adaptation","volume":"20","author":"Chen","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Li, X. (2023, January 13\u201316). Dynamic Link State Routing Scheme for Quantum Key Distribution Network. Proceedings of the 2023 IEEE 15th International Conference on Advanced Infocomm Technology (ICAIT), Hefei, China.","DOI":"10.1109\/ICAIT59485.2023.10367382"},{"key":"ref_46","unstructured":"van Duijn, T., Verschoor, S.R., Rommel, S., and Monroy, I.T. (2024, January 6\u20139). Routing Strategies for Quantum Key Distribution Networks based on Trusted Relay Nodes. Proceedings of the 2024 International Conference on Optical Network Design and Modeling (ONDM), Madrid, Spain."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s42484-024-00199-4","article-title":"A cluster-based quantum key distribution with dynamic node selection: An improved approach for scalability and security in quantum communication","volume":"6","author":"Biswas","year":"2024","journal-title":"Quantum Mach. Intell."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1364\/JOCN.530575","article-title":"Distributed information-theoretical secure protocols for quantum key distribution networks against malicious nodes","volume":"16","author":"Luo","year":"2024","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Lella, E., and Schmid, G. (2023). On the Security of Quantum Key Distribution Networks. Cryptography, 7.","DOI":"10.2139\/ssrn.4348222"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Barnett, S.M., and Phoenix, S.J. (2011, January 19\u201322). Securing a quantum key distribution relay network using secret sharing. Proceedings of the IEEE GCC Conference and Exhibition (GCC), Dubai, United Arab Emirates.","DOI":"10.1109\/IEEEGCC.2011.5752491"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Ma, C., Guo, Y., and Su, J. (2017, January 25\u201326). A multiple paths scheme with labels for key distribution on quantum key distribution network. Proceedings of the IAEAC, Chongqing, China.","DOI":"10.1109\/IAEAC.2017.8054476"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/4\/76\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:00:21Z","timestamp":1760029221000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/4\/76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,26]]},"references-count":51,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["bdcc9040076"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9040076","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2025,3,26]]}}}