DESIGN OF A QKD PROTOCOL RESISTANT TO INSIDER ATTACKS IN FULLY CONNECTED DECENTRALIZED NETWORKS


Begimbayeva Y. Zhaxalykov T. Akhtanov A. Pashkevich R. Ussatova O. Arshidinova M.
29 August 2025Technology Center

Eastern-European Journal of Enterprise Technologies
2025#4Issue 9-13643 - 50 pp.

This research focuses on enhancing the security of decentralized quantum key distribution (QKD) networks, where the absence of a central authority creates significant challenges such as malicious node infiltration, undetected key leakage, and unauthorized re-entry of revoked participants. Traditional authentication and trust models are insufficient for fully distributed QKD topologies, which remain highly vulnerable to insider threats and persistent compromise. To address these risks, let’s propose a layered security framework composed of three integrated components: Challenge-Response Authentication (CRA), Dynamic Trust Scoring (DTS), and Blockchain-Based Access Control (BBAC). CRA verifies node legitimacy through randomized quantum-state interactions, significantly reducing impersonation and quantum replay attacks. DTS implements real-time trust evaluation using anomaly detection to dynamically downgrade compromised nodes based on their behavioral deviations. BBAC maintains an immutable and tamper-proof trust ledger to block revoked nodes from re-entering under falsified identities and resists Sybil attacks using post-quantum cryptographic primitives. Simulation results confirm that the system improves detection rates of covert threats, ensures authentication latency under 10 ms, and reduces re-entry success to zero. The proposed architecture ensures long-term scalability and resilience, making it applicable to critical domains such as finance, national infrastructure, and military communication. This work contributes a novel, verifiable, and scalable solution to one of the most pressing open problems in distributed quantum networks Copyright

authentication , blockchain , cybersecurity , decentralization , insider , QKD , replay , superposition , sybil-resistance , trust-scoring

Text of the article Перейти на текст статьи

Department Head of the Cybersecurity Almaty University of Power Engineering and Telecommunications named after Gumarbek, Daukeyev Baitursynov str., 126/1, Almaty, 050013, Kazakhstan
School of Information Technology and Engineering, Kazakhstan
Institute of Information and Computational Technologies CS MSHE, RK Shevchenko str., 28, Almaty, 050010, Kazakhstan
Department Cybersecurity,, Information Processing and Storage Kazakh National Research Technical University, after K. I. Satbayev Satbayev str., 22A, Almaty, 050013, Kazakhstan
Kazakh British Technical University, Tole bi str., 59, Almaty, 050000, Kazakhstan

Department Head of the Cybersecurity Almaty University of Power Engineering and Telecommunications named after Gumarbek
School of Information Technology and Engineering
Institute of Information and Computational Technologies CS MSHE
Department Cybersecurity
Kazakh British Technical University

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026