{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:28:33Z","timestamp":1776940113353,"version":"3.51.4"},"reference-count":111,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:00:00Z","timestamp":1674172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Smart Solutions in Ubiquitous Computing Environments","award":["UHK-FIM-SPEV-2023-2102"],"award-info":[{"award-number":["UHK-FIM-SPEV-2023-2102"]}]},{"name":"Smart Solutions in Ubiquitous Computing Environments","award":["2021R1A2C1010370"],"award-info":[{"award-number":["2021R1A2C1010370"]}]},{"name":"Smart Solutions in Ubiquitous Computing Environments\u201d and the NRF 440 grant funded by the Korea government (MIST)","award":["UHK-FIM-SPEV-2023-2102"],"award-info":[{"award-number":["UHK-FIM-SPEV-2023-2102"]}]},{"name":"Smart Solutions in Ubiquitous Computing Environments\u201d and the NRF 440 grant funded by the Korea government (MIST)","award":["2021R1A2C1010370"],"award-info":[{"award-number":["2021R1A2C1010370"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The deployment of optical network infrastructure and development of new network services are growing rapidly for beyond 5\/6G networks. However, optical networks are vulnerable to several types of security threats, such as single-point failure, wormhole attacks, and Sybil attacks. Since the uptake of e-commerce and e-services has seen an unprecedented surge in recent years, especially during the COVID-19 pandemic, the security of these transactions is essential. Blockchain is one of the most promising solutions because of its decentralized and distributed ledger technology, and has been employed to protect these transactions against such attacks. However, the security of blockchain relies on the computational complexity of certain mathematical functions, and because of the evolution of quantum computers, its security may be breached in real-time in the near future. Therefore, researchers are focusing on combining quantum key distribution (QKD) with blockchain to enhance blockchain network security. This new technology is known as quantum-secured blockchain. This article describes different attacks in optical networks and provides a solution to protect networks against security attacks by employing quantum-secured blockchain in optical networks. It provides a brief overview of blockchain technology with its security loopholes, and focuses on QKD, which makes blockchain technology more robust against quantum attacks. Next, the article provides a broad view of quantum-secured blockchain technology. It presents the network architecture for the future research and development of secure and trusted optical networks using quantum-secured blockchain. The article also highlights some research challenges and opportunities.<\/jats:p>","DOI":"10.3390\/s23031228","type":"journal-article","created":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T01:36:26Z","timestamp":1674437786000},"page":"1228","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Securing Optical Networks Using Quantum-Secured Blockchain: An Overview"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7945-7289","authenticated-orcid":false,"given":"Purva","family":"Sharma","sequence":"first","affiliation":[{"name":"Signals and Software Group, Department of Electrical Engineering, Indian Institute of Technology Indore, Indore 453552, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1755-0186","authenticated-orcid":false,"given":"Kwonhue","family":"Choi","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5992-2574","authenticated-orcid":false,"given":"Ondrej","family":"Krejcar","sequence":"additional","affiliation":[{"name":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, 500 03 Hradec Kralove, Czech Republic"},{"name":"Institute of Technology and Business in Ceske Budejovice, 370 01 Ceske Budejovice, Czech Republic"},{"name":"Malaysia Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0704-3989","authenticated-orcid":false,"given":"Pavel","family":"Blazek","sequence":"additional","affiliation":[{"name":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, 500 03 Hradec Kralove, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5148-6643","authenticated-orcid":false,"given":"Vimal","family":"Bhatia","sequence":"additional","affiliation":[{"name":"Signals and Software Group, Department of Electrical Engineering, Indian Institute of Technology Indore, Indore 453552, India"},{"name":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, 500 03 Hradec Kralove, Czech Republic"}]},{"given":"Shashi","family":"Prakash","sequence":"additional","affiliation":[{"name":"Photonics Laboratory, Department of Electronics and Instrumentation Engineering, Institute of Engineering and Technology, Devi Ahilya University, Indore 452017, India"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","article-title":"Physical-layer security in evolving optical networks","volume":"54","author":"Furdek","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Furdek, M., Skorin-Kapov, N., Zsigmond, S., and Wosinska, L. (2014, January 6\u201310). Vulnerabilities and security issues in optical networks. Proceedings of the 16th International Conference on Transparent Optical Networks (ICTON), Graz, Austria.","DOI":"10.1109\/ICTON.2014.6876451"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","article-title":"Software defined networking architecture, security and energy efficiency: A survey","volume":"19","author":"Rawat","year":"2016","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hussain, M., Shah, N., Amin, R., Alshamrani, S.S., Alotaibi, A., and Raza, S.M. (2022). Software-Defined Networking: Categories, Analysis, and Future Directions. Sensors, 22.","DOI":"10.3390\/s22155551"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2232","DOI":"10.1109\/COMST.2017.2715220","article-title":"Comprehensive survey on T-SDN: Software-defined networking for transport networks","volume":"19","author":"Alvizu","year":"2017","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2013.6476863","article-title":"Extending software defined network principles to include optical transport","volume":"51","author":"Gringeri","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ndiaye, M., Hancke, G.P., and Abu-Mahfouz, A.M. (2017). Software defined networking for improved wireless sensor network management: A survey. Sensors, 17.","DOI":"10.3390\/s17051031"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Urrea, C., and Ben\u00edtez, D. (2021). Software-defined networking solutions, architecture and controllers for the industrial internet of things: A review. Sensors, 21.","DOI":"10.3390\/s21196585"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kou, S., Yang, H., Zheng, H., Bai, W., Zhang, J., and Wu, Y. (2017, January 10\u201313). Blockchain Mechanism Based on Enhancing Consensus for Trusted Optical Networks. Proceedings of the Asia Communications and Photonics Conference (ACP), Guangzhou, China.","DOI":"10.1364\/ACPC.2017.Su2A.61"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Luo, G., Han, Z., Lu, L., and Hussain, M.J. (2014, January 16\u201319). Real-time and passive wormhole detection for wireless sensor networks. Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan.","DOI":"10.1109\/PADSW.2014.7097858"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1109\/TNET.2008.923723","article-title":"Sybilguard: Defending against sybil attacks via social networks","volume":"16","author":"Yu","year":"2008","journal-title":"IEEE\/ACM Trans. Netwo."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","article-title":"Applications of blockchains in the Internet of Things: A comprehensive survey","volume":"21","author":"Ali","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Krichen, M., Ammi, M., Mihoub, A., and Almutiq, M. (2022). Blockchain for modern applications: A survey. Sensors, 22.","DOI":"10.3390\/s22145274"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.jnca.2019.06.018","article-title":"Blockchain for smart communities: Applications, challenges and opportunities","volume":"144","author":"Aggarwal","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.3390\/s22155733","article-title":"BEST\u2014Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment","volume":"22","author":"Kumar","year":"2022","journal-title":"Sensors"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rathod, T., Jadav, N.K., Alshehri, M.D., Tanwar, S., Sharma, R., Felseghi, R.A., and Raboaca, M.S. (2022). Blockchain for Future Wireless Networks: A Decade Survey. Sensors, 22.","DOI":"10.3390\/s22114182"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Rathore, H., Mohamed, A., and Guizani, M. (2020). A survey of blockchain enabled cyber-physical systems. Sensors, 20.","DOI":"10.3390\/s20010282"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.future.2022.01.017","article-title":"A survey on blockchain for big data: Approaches, opportunities, and future directions","volume":"131","author":"Deepa","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","article-title":"A systematic literature review of blockchain-based applications: Current status, classification and open issues","volume":"36","author":"Casino","year":"2019","journal-title":"Telemat. Inform."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"47615","DOI":"10.1109\/ACCESS.2019.2909924","article-title":"A survey on blockchain: A game theoretical perspective","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1109\/COMST.2019.2894727","article-title":"Integrated blockchain and edge computing systems: A survey, some research issues and challenges","volume":"21","author":"Yang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"42","DOI":"10.23919\/JCC.2019.06.004","article-title":"Blockchain-based secure distributed control for software defined optical networking","volume":"16","author":"Yang","year":"2019","journal-title":"IEEE China Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ismail, L., and Materwala, H. (2019). A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions. Symmetry, 11.","DOI":"10.20944\/preprints201908.0311.v1"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"79764","DOI":"10.1109\/ACCESS.2020.2988579","article-title":"Blockchain for industry 4.0: A comprehensive review","volume":"8","author":"Bodkhe","year":"2020","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Liu, G., Fan, N., Wu, C.Q., and Zou, X. (2022). On a blockchain-based security scheme for defense against malicious nodes in vehicular ad-hoc networks. Sensors, 22.","DOI":"10.3390\/s22145361"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Palaiokrassas, G., Skoufis, P., Voutyras, O., Kawasaki, T., Gallissot, M., Azzabi, R., Tsuge, A., Litke, A., Okoshi, T., and Nakazawa, J. (2021). Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case. Computers, 10.","DOI":"10.3390\/computers10100133"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jnca.2019.02.027","article-title":"Blockchain in healthcare applications: Research challenges and opportunities","volume":"135","author":"McGhin","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Taralunga, D.D., and Florea, B.C. (2021). A blockchain-enabled framework for mhealth systems. Sensors, 21.","DOI":"10.3390\/s21082828"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Abbas, A., Alroobaea, R., Krichen, M., Rubaiee, S., Vimal, S., and Almansour, F.M. (2021). Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers. Ubiquitous Comput., 1\u201314.","DOI":"10.1007\/s00779-021-01583-8"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"85493","DOI":"10.1109\/ACCESS.2022.3194319","article-title":"Blockchain Technology for Secure Supply Chain Management: A Comprehensive Review","volume":"10","author":"Agarwal","year":"2022","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zafar, S., Hassan, S.F.U., Mohammad, A.S., Al-Ahmadi, A.A., and Ullah, N. (2022). Implementation of a Distributed Framework for Permissioned Blockchain-Based Secure Automotive Supply Chain Management. Sensors, 22.","DOI":"10.3390\/s22197367"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Cai, Z., Liu, S., Han, Z., Wang, R., and Huang, Y. (2021). A Quantum Blind Multi-Signature Method for the Industrial Blockchain. Entropy, 23.","DOI":"10.3390\/e23111520"},{"key":"ref_34","unstructured":"Nakamoto, S. (2022, December 01). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_35","unstructured":"Swan, M. (2015). Blockchain: Blueprint for a New Economy, O\u2019Reilly Media. [1st ed.]."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","article-title":"Bitcoin and beyond: A technical survey on decentralized digital currencies","volume":"18","author":"Tschorsch","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_37","unstructured":"Marr, B. (2016). How Blockchain Technology Could Change The World. Forbes, 27, Available online: https:\/\/www.forbes.com\/sites\/bernardmarr\/2016\/05\/27\/how-blockchain-technology-could-change-the-world\/?sh=66f55186725b."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Fichera, S., Sgambelluri, A., Giorgetti, A., Cugini, F., and Paolucci, F. (2020, January 8\u201312). Blockchain-anchored Failure Responsibility Management in Disaggregated Optical Networks. Proceedings of the Optical Fiber Communications Conference and Exhibition (OFC), San Diego, CA, USA.","DOI":"10.1364\/OFC.2020.T3J.1"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"6357","DOI":"10.1109\/JLT.2021.3098851","article-title":"Blockchain-anchored disaggregated optical networks","volume":"39","author":"Fichera","year":"2021","journal-title":"IEEE J. Light. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Alemany, P., Vilalta, R., Mu\u00f1oz, R., Mart\u00ednez, R., and Casellas, R. (2020, January 6\u201310). Managing network slicing resources using blockchain in a multi-domain software defined optical network scenario. Proceedings of the European Conference on Optical Communications (ECOC), Brussels, Belgium.","DOI":"10.1109\/ECOC48923.2020.9333352"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/MNET.011.2000138","article-title":"Blockchain-assisted spectrum trading between elastic virtual optical networks","volume":"34","author":"Ding","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Yang, H., Wu, Y., Zhang, J., Zheng, H., Ji, Y., and Lee, Y. (2018, January 11\u201315). BlockONet: Blockchain-based trusted cloud radio over optical fiber network for 5G fronthaul. Proceedings of the Optical Fiber Communications Conference and Exposition (OFC), San Diego, CA, USA.","DOI":"10.1364\/OFC.2018.W2A.25"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1038\/nature18648","article-title":"Demonstration of a small programmable quantum computer with atomic qubits","volume":"536","author":"Debnath","year":"2016","journal-title":"Nature"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","article-title":"A one-way quantum computer","volume":"86","author":"Raussendorf","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"035004","DOI":"10.1088\/2058-9565\/aabc6b","article-title":"Quantum-secured blockchain","volume":"3","author":"Kiktenko","year":"2018","journal-title":"Quantum Sci. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2015.11","article-title":"Performance evaluations of quantum key distribution system architectures","volume":"13","author":"Mailloux","year":"2015","journal-title":"IEEE Secur. Priv."},{"key":"ref_48","unstructured":"Bennett, C., and Brassard, G. (1984, January 10\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India. Chapter 2."},{"key":"ref_49","unstructured":"Morozov, O.G. (2019). Quantum Cryptography in Advanced Networks, IntechOpen."},{"key":"ref_50","unstructured":"Wheeler, J.A., and Zurek, W.H. (1927). Quantum Theory and Measurement, Princeton University Press."},{"key":"ref_51","unstructured":"Heisenberg, W. (1930). Physical Principles of the Quantum Theory, Dover Publications, Inc."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","article-title":"A single quantum cannot be cloned","volume":"299","author":"Wootters","year":"1982","journal-title":"Nature"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Adu-Kyere, A., Nigussie, E., and Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors, 22.","DOI":"10.3390\/s22166284"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1109\/OJCOMS.2021.3106659","article-title":"Quantum key distribution secured optical networks: A survey","volume":"2","author":"Sharma","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"24260","DOI":"10.1364\/OE.26.024260","article-title":"Large scale quantum key distribution: Challenges and solutions","volume":"26","author":"Zhang","year":"2018","journal-title":"Opt. Express"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Gnatyuk, S. (2018). Advanced Technologies of Quantum Key Distribution, IntechOpen.","DOI":"10.5772\/65232"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photon."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","article-title":"Practical challenges in quantum key distribution","volume":"2","author":"Diamanti","year":"2016","journal-title":"NPJ Quantum Inf."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","article-title":"Secure quantum key distribution with realistic devices","volume":"92","author":"Xu","year":"2020","journal-title":"Rev. Mod. Phys."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/MCOM.2018.1700656","article-title":"Resource allocation in optical networks secured by quantum key distribution","volume":"56","author":"Zhao","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"8606","DOI":"10.1038\/s41598-022-12412-0","article-title":"Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm","volume":"12","author":"Wang","year":"2022","journal-title":"Sci. Rep."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Sun, X., Sopek, M., Wang, Q., and Kulicki, P. (2019). Towards Quantum-Secured Permissioned Blockchain: Signature, Consensus, and Logic. Entropy, 21.","DOI":"10.3390\/e21090887"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/quantum1010002","article-title":"Quantum blockchain using entanglement in time","volume":"1","author":"Rajan","year":"2019","journal-title":"Quantum Rep."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"052110","DOI":"10.1103\/PhysRevA.79.052110","article-title":"Multiple-time states and multiple-time measurements in quantum mechanics","volume":"79","author":"Aharonov","year":"2009","journal-title":"Phys. Rev. A"},{"key":"ref_66","unstructured":"Brukner, C., Taylor, S., Cheung, S., and Vedral, V. (2004). Quantum entanglement in time. arXiv."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1038\/s41534-018-0086-y","article-title":"Multi-time quantum correlations with no spatial analog","volume":"4","author":"Ringbauer","year":"2018","journal-title":"NPJ Quantum Inf."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"39827","DOI":"10.1109\/ACCESS.2021.3064297","article-title":"MuReQua Chain: Multiscale Relativistic Quantum Blockchain","volume":"9","author":"Iovane","year":"2021","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"297","DOI":"10.22331\/q-2020-07-16-297","article-title":"A quantum money solution to the blockchain scalability problem","volume":"4","author":"Coladangelo","year":"2020","journal-title":"Quantum"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"102549","DOI":"10.1016\/j.ipm.2021.102549","article-title":"Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities","volume":"58","author":"Mehmood","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/s11128-020-02915-y","article-title":"A novel quantum blockchain scheme base on quantum entanglement and DPoS","volume":"19","author":"Gao","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1016\/j.ins.2022.09.028","article-title":"A quantum blockchain-enabled framework for secure private electronic medical records in Internet of Medical Things","volume":"612","author":"Qu","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"3796","DOI":"10.1109\/COMST.2019.2928178","article-title":"A Vademecum on Blockchain Technologies: When, Which, and How","volume":"21","author":"Belotti","year":"2019","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Park, J.H., and Park, J.H. (2017). Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry, 9.","DOI":"10.3390\/sym9080164"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1186\/s40854-016-0045-6","article-title":"A new proof-of-work mechanism for bitcoin","volume":"2","author":"Shi","year":"2016","journal-title":"Financ. Innov."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","article-title":"A survey on consensus mechanisms and mining strategy management in blockchain networks","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"209594","DOI":"10.1109\/ACCESS.2020.3039113","article-title":"Distb-condo: Distributed blockchain-based IoT-SDN model for smart condominium","volume":"8","author":"Rahman","year":"2020","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10922-022-09682-4","article-title":"On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives","volume":"30","author":"Rahman","year":"2022","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1364\/JOCN.9.000995","article-title":"Resource assignment strategy in optical networks integrated with quantum key distribution","volume":"9","author":"Cao","year":"2017","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"037902","DOI":"10.1103\/PhysRevLett.89.037902","article-title":"Differential phase shift quantum key distribution","volume":"89","author":"Inoue","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"022317","DOI":"10.1103\/PhysRevA.68.022317","article-title":"Differential-phase-shift quantum key distribution using coherent light","volume":"68","author":"Inoue","year":"2003","journal-title":"Phys. Rev. A"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"4238","DOI":"10.1103\/PhysRevA.59.4238","article-title":"Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography","volume":"59","author":"Gisin","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","article-title":"Quantum cryptography without Bell\u2019s theorem","volume":"68","author":"Bennett","year":"1992","journal-title":"Phys. Rev. Lett."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1109\/JLT.2018.2834949","article-title":"Time-scheduled quantum key distribution (QKD) over WDM networks","volume":"36","author":"Cao","year":"2018","journal-title":"IEEE\/OSA J. Lightw. Technol."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"012318","DOI":"10.1103\/PhysRevA.81.012318","article-title":"Practical issues in quantum-key-distribution postprocessing","volume":"81","author":"Fung","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"012081","DOI":"10.1088\/1742-6596\/741\/1\/012081","article-title":"Post-processing procedure for industrial quantum key distribution systems","volume":"741","author":"Kiktenko","year":"2016","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_90","first-page":"109","article-title":"Cipher printing telegraph systems: For secret wire and radio telegraphic communications","volume":"45","author":"Vernam","year":"1926","journal-title":"IEEE J. AIEE"},{"key":"ref_91","unstructured":"Dworkin, M., Barker, E., Nechvatal, J., Foti, J., Bassham, L., Roback, E., and JFD, J. (2001). Advanced encryption standard (AES). Fed. Inf. Process. Stds. (NIST FIPS), 197."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_93","unstructured":"Schneier, B. (1996). Applied Cryptography, Wiley."},{"key":"ref_94","unstructured":"Toudeh-Fallah, F., Pistoia, M., Kawakura, Y., Moazzami, N., Kramer, D.H., Woodward, R.I., Sysak, G., John, B., Amer, O., and Polychroniadou, A.O. (2022). Paving the Way towards 800 Gbps Quantum-Secured Optical Channel Deployment in Mission-Critical Environments. arXiv."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1038\/d41586-018-07449-z","article-title":"Quantum computers put blockchain security at risk","volume":"563","author":"Fedorov","year":"2018","journal-title":"Nature"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1117\/12.606489","article-title":"Current status of the DARPA quantum network","volume":"Volume 5815","author":"Donkor","year":"2005","journal-title":"Proceedings of the Quantum Information and Computation III"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","article-title":"The SECOQC quantum key distribution network in Vienna","volume":"11","author":"Peev","year":"2009","journal-title":"New J. Phys."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","article-title":"Field test of quantum key distribution in the Tokyo QKD network","volume":"19","author":"Sasaki","year":"2011","journal-title":"Opt. Express"},{"key":"ref_99","first-page":"11","article-title":"China\u2019s 2000-km quantum link is almost complete [News]","volume":"53","author":"Courtland","year":"2016","journal-title":"IEEE Spectr."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"46.1","DOI":"10.1088\/1367-2630\/4\/1\/346","article-title":"Building the quantum network","volume":"4","author":"Elliott","year":"2002","journal-title":"N. J. Phys."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"QKD1","DOI":"10.1364\/JOSAB.36.00QKD1","article-title":"Quantum key distribution and beyond: Introduction","volume":"36","author":"Razavi","year":"2019","journal-title":"JOSA B"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Toward global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the photon-number-splitting attack in practical quantum cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_104","unstructured":"Lo, H.-K. (July, January 27). Quantum key distribution with vacua or dim pulses as decoy states. Proceedings of the International Symposium onInformation Theory, ISIT, Chicago, IL, USA."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_106","first-page":"011024","article-title":"Measurement-device-independent quantum key distribution over untrustful metropolitan network","volume":"6","author":"Tang","year":"2016","journal-title":"Phys. Rev. X"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_108","unstructured":"Krawczyk, H. New hash functions for message authentication. Proceedings of the EUROCRYPT."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"26453","DOI":"10.1364\/OE.25.026453","article-title":"Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD)","volume":"25","author":"Cao","year":"2017","journal-title":"Opt. Express"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"6892","DOI":"10.1364\/OE.27.006892","article-title":"SDQaaS: Software defined networking for quantum key distribution as a service","volume":"27","author":"Cao","year":"2019","journal-title":"Opt. Express"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Liang, Y., Yang, H., Yao, Q., Guo, S., Yu, A., and Zhang, J. (2019, January 3\u20137). Blockchain-based efficient recovery for secure distributed control in software defined optical networks. Proceedings of the Optical Fiber Communications Conference and Exhibition (OFC), San Diego, CA, USA.","DOI":"10.1364\/OFC.2019.Th1G.1"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1228\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:12:24Z","timestamp":1760119944000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,20]]},"references-count":111,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031228"],"URL":"https:\/\/doi.org\/10.3390\/s23031228","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,20]]}}}