Adversarial Learning Game for Intrusion Detection in Quantum Key Distribution
- URL: http://arxiv.org/abs/2603.03502v1
- Date: Tue, 03 Mar 2026 20:21:06 GMT
- Title: Adversarial Learning Game for Intrusion Detection in Quantum Key Distribution
- Authors: Noureldin Mohamed, Saif Al-Kuwari,
- Abstract summary: This paper presents a high-fidelity simulation framework for intrusion detection in decoy-state Quantum Key Distribution (QKD)<n>The framework is modeled as a minimax game between a learning-based defender and an adaptive adversary.<n>Under adaptive attack scenarios, the system preserves $82text--92%$ of the honest finite-key rate while discarding only approximately $1.2%$ of traffic.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: While Quantum Key Distribution (QKD) provides information-theoretic security, the transition from theory to physical hardware introduces side-channel vulnerabilities that traditional error metrics often fail to characterize. This paper presents a high-fidelity simulation framework for intrusion detection in decoy-state QKD, modeled as a minimax game between a learning-based defender and a physically constrained, adaptive adversary. The defender utilizes block-level telemetry (comprising decoy-state residuals, timing-histogram moments, and detector imbalances) to trigger alarms that gate key distillation . Unlike heuristic thresholds, our optimization objective is strictly operational: missed detections are penalized based on the resulting degradation of the finite-key secret fraction calculated via three-intensity decoy estimators and entropy-accumulation (EAT) penalties. The emulated adversary performs an automated search over time-shift, detector-blinding, photon number splitting (PNS), and Trojan-horse families, subject to hardware-limited feasibility bands. Concurrently, the defender co-trains one-class and temporal detectors (LSTM/TCN) using hard-negative mining to minimize the missed-attack rate at a calibrated false-alarm rate ($\text{FAR}$). Under adaptive attack scenarios, the system preserves $82\text{--}92\%$ of the honest finite-key rate while discarding only approximately $1.2\%$ of traffic, representing a net gain of $+20\text{--}35$ percentage points in usable secret bits over non-adversarial baselines. These results demonstrate that optimizing detection directly for secret-bit retention provides a robust, physically grounded layer of defense against adaptive side-channel strategies in practical QKD deployments.
Related papers
- Time Is All It Takes: Spike-Retiming Attacks on Event-Driven Spiking Neural Networks [87.16809558673403]
Spiking neural networks (SNNs) compute with discrete spikes and exploit temporal structure.<n>We study a timing-only adversary that retimes existing spikes while preserving spike counts and amplitudes in event-driven SNNs.
arXiv Detail & Related papers (2026-02-03T09:06:53Z) - UAV-Deployed OAM-BB84 QKD: Turbulence- and Misalignment-Resilient Decoy-State Finite-Key Security with AI-Assisted Calibration [0.0]
We present a theoretical framework for quantum key distribution (QKD) using orbital angular momentum encoded BB84 on an unmanned aerial vehicle (UAV) platform.<n>We derive composable finite key lower bounds on the secret key rate that incorporate statistical fluctuations, detector dark counts, efficiency mismatch, and error correction leakage.<n>We outline a complete evaluation pipeline including UAV system architecture, turbulence driven QBER maps, decoy optimization, finite key scaling, and AI calibration metrics.
arXiv Detail & Related papers (2026-01-16T09:23:33Z) - Attack-Aware Deepfake Detection under Counter-Forensic Manipulations [0.30586855806896035]
This work presents an attack-aware deepfake and image-forensics detector designed for robustness, well-calibrated probabilities, and transparent evidence under realistic deployment conditions.<n>The method combines red-team training with randomized test-time defense in a two-stream architecture.<n>Results demonstrate near-perfect ranking across attacks, low calibration error, minimal abstention risk, and controlled tamper under regrain.
arXiv Detail & Related papers (2025-12-26T04:05:52Z) - Pulse-to-Circuit Characterization of Stealthy Crosstalk Attack on Multi-Tenant Superconducting Quantum Hardware [0.14323566945483496]
Hardware crosstalk in superconducting quantum computers constitutes a significant security threat.<n>We present the first end-to-end framework for mapping physical pulse-level attacks to interpretable logical error channels.<n>We propose a protocol-level detection strategy based on observable attack signatures, showing that stealthy attacks can be exposed through targeted monitoring.
arXiv Detail & Related papers (2025-09-14T19:48:46Z) - Hybrid Cryptographic Monitoring System for Side-Channel Attack Detection on PYNQ SoCs [0.0]
AES-128 encryption is theoretically secure but vulnerable in practical deployments due to timing and fault injection attacks on embedded systems.<n>This work presents a lightweight dual-detection framework combining statistical thresholding and machine learning (ML) for real-time anomaly detection.
arXiv Detail & Related papers (2025-08-29T13:13:43Z) - R-Stitch: Dynamic Trajectory Stitching for Efficient Reasoning [80.104336426172]
Chain-of-thought (CoT) enhances problem-solving ability of large language models.<n>CoT incurs substantial inference cost due to long autoregressive trajectories.<n>We introduce R-Stitch, a training-free hybrid decoding framework.
arXiv Detail & Related papers (2025-07-23T08:14:36Z) - A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example Detection [13.109309606764754]
We introduce a plug-in detection framework that leverages internal layer-wise inconsistencies within the target model itself.<n>Our method achieves state-of-the-art detection performance with negligible computational overhead.
arXiv Detail & Related papers (2025-05-19T00:48:53Z) - FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning
Attacks in Federated Learning [98.43475653490219]
Federated learning (FL) is susceptible to poisoning attacks.
FreqFed is a novel aggregation mechanism that transforms the model updates into the frequency domain.
We demonstrate that FreqFed can mitigate poisoning attacks effectively with a negligible impact on the utility of the aggregated model.
arXiv Detail & Related papers (2023-12-07T16:56:24Z) - Spatial-Frequency Discriminability for Revealing Adversarial Perturbations [53.279716307171604]
Vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community.
Current algorithms typically detect adversarial patterns through discriminative decomposition for natural and adversarial data.
We propose a discriminative detector relying on a spatial-frequency Krawtchouk decomposition.
arXiv Detail & Related papers (2023-05-18T10:18:59Z) - Policy Smoothing for Provably Robust Reinforcement Learning [109.90239627115336]
We study the provable robustness of reinforcement learning against norm-bounded adversarial perturbations of the inputs.
We generate certificates that guarantee that the total reward obtained by the smoothed policy will not fall below a certain threshold under a norm-bounded adversarial of perturbation the input.
arXiv Detail & Related papers (2021-06-21T21:42:08Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - SADet: Learning An Efficient and Accurate Pedestrian Detector [68.66857832440897]
This paper proposes a series of systematic optimization strategies for the detection pipeline of one-stage detector.
It forms a single shot anchor-based detector (SADet) for efficient and accurate pedestrian detection.
Though structurally simple, it presents state-of-the-art result and real-time speed of $20$ FPS for VGA-resolution images.
arXiv Detail & Related papers (2020-07-26T12:32:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.