{"id":"https://openalex.org/W4402129631","doi":"https://doi.org/10.1109/icton62926.2024.10648102","title":"Exploring Quantum Key Distribution for Secure Communication in High-Altitude Platforms","display_name":"Exploring Quantum Key Distribution for Secure Communication in High-Altitude Platforms","publication_year":2024,"publication_date":"2024-07-14","ids":{"openalex":"https://openalex.org/W4402129631","doi":"https://doi.org/10.1109/icton62926.2024.10648102"},"language":"en","primary_location":{"id":"doi:10.1109/icton62926.2024.10648102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton62926.2024.10648102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 24th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067086865","display_name":"Nancy Alshaer","orcid":"https://orcid.org/0000-0002-2678-7273"},"institutions":[{"id":"https://openalex.org/I21376657","display_name":"Tanta University","ror":"https://ror.org/016jp5b92","country_code":"EG","type":"education","lineage":["https://openalex.org/I21376657"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Nancy Alshaer","raw_affiliation_strings":["Tanta University,Faculty of Engineering,Department of EEC,Gharbiya,Egypt"],"affiliations":[{"raw_affiliation_string":"Tanta University,Faculty of Engineering,Department of EEC,Gharbiya,Egypt","institution_ids":["https://openalex.org/I21376657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048808444","display_name":"Tawfik Ismail","orcid":"https://orcid.org/0000-0002-0109-5545"},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Tawfik Ismail","raw_affiliation_strings":["Taibah University,College of Engineering,Madinah,Saudi Arabia,42353"],"affiliations":[{"raw_affiliation_string":"Taibah University,College of Engineering,Madinah,Saudi Arabia,42353","institution_ids":["https://openalex.org/I23075662"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067086865"],"corresponding_institution_ids":["https://openalex.org/I21376657"],"apc_list":null,"apc_paid":null,"fwci":0.9172,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7178863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13052","display_name":"Molecular Communication and Nanonetworks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13052","display_name":"Molecular Communication and Nanonetworks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10851","display_name":"Optical Wireless Communication Technologies","score":0.9580000042915344,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.839229941368103},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6875369548797607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5975358486175537},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4740062654018402},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4401853680610657},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34389734268188477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31517294049263},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2848941683769226},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2018110752105713},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10995063185691833},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1002415120601654},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.09123674035072327}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.839229941368103},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6875369548797607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5975358486175537},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4740062654018402},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4401853680610657},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34389734268188477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31517294049263},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2848941683769226},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2018110752105713},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10995063185691833},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1002415120601654},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.09123674035072327},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icton62926.2024.10648102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton62926.2024.10648102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 24th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2065061278","https://openalex.org/W2074731985","https://openalex.org/W2085405203","https://openalex.org/W2775936334","https://openalex.org/W2798255646","https://openalex.org/W2889146231","https://openalex.org/W3006860150","https://openalex.org/W3016298255","https://openalex.org/W3026579205","https://openalex.org/W3103112554","https://openalex.org/W3105035909","https://openalex.org/W3105229315","https://openalex.org/W3156195074","https://openalex.org/W4206598149","https://openalex.org/W4211243246","https://openalex.org/W4226292258","https://openalex.org/W4296425736","https://openalex.org/W4312775583","https://openalex.org/W4313163153"],"related_works":["https://openalex.org/W4312132309","https://openalex.org/W2916069885","https://openalex.org/W4221147165","https://openalex.org/W4240944159","https://openalex.org/W2147369345","https://openalex.org/W4321151520","https://openalex.org/W3196822321","https://openalex.org/W2105140999","https://openalex.org/W4226054070","https://openalex.org/W2374628129"],"abstract_inverted_index":{"In":[0,58],"the":[1,6,31,42,63,84,101,122,126,132,164,217],"contemporary":[2],"digital":[3],"era,":[4],"ensuring":[5],"security":[7],"of":[8,14,45,65,83,103,121,145,174,181,189,219],"sensitive":[9],"data":[10,25,56],"and":[11,131,143,160,184,202,210],"communication":[12,97,225],"is":[13,90,194],"paramount":[15],"significance.":[16],"Encryption":[17],"methods":[18],"have":[19],"been":[20],"widely":[21],"employed":[22],"to":[23,39,55,60,79,106,230],"safeguard":[24],"transmission":[26],"over":[27],"public":[28],"channels.":[29],"However":[30],"exponential":[32],"growth":[33],"in":[34,87,222],"computational":[35],"power":[36],"has":[37,68],"led":[38],"concerns":[40],"regarding":[41],"potential":[43,218],"vulnerability":[44],"encryption":[46,50,108],"methods.":[47],"Consequently,":[48],"breaking":[49],"poses":[51],"a":[52,71,75,140,167,171,178,185],"significant":[53],"threat":[54],"privacy.":[57],"response":[59],"these":[61],"challenges,":[62],"field":[64],"quantum":[66,88,91,104,123,220],"cryptography":[67,89,221],"emerged":[69],"as":[70,150],"promising":[72],"solution,":[73],"offering":[74],"fundamentally":[76],"unbreakable":[77],"approach":[78],"secure":[80,96,111,224],"communication.":[81],"One":[82],"key":[85,92,153],"advancements":[86],"distribution":[93],"(QKD).":[94],"This":[95,116,214],"mechanism":[98],"relies":[99],"on":[100,119],"principles":[102],"mechanics":[105],"generate":[107],"keys,":[109],"enabling":[110],"information":[112,215],"exchange":[113],"between":[114,125],"parties.":[115],"paper":[117],"focuses":[118],"analysis":[120],"channel":[124],"optical":[127],"ground":[128],"station":[129],"(OGS)":[130],"high-altitude":[133],"platform":[134],"System":[135],"(HAPS).":[136],"The":[137],"research":[138],"involves":[139],"meticulous":[141],"examination":[142],"optimization":[144],"various":[146],"system":[147],"parameters":[148],"such":[149],"performance":[151],"secret":[152],"rate":[154,188],"(SKR),":[155],"electronic":[156],"noise,":[157],"modulation":[158],"variance,":[159],"zenith":[161,179],"angle.":[162],"Remarkably,":[163],"SKR":[165],"for":[166,208],"HAPS":[168],"operating":[169],"at":[170],"vertical":[172],"altitude":[173],"20":[175,182],"km,":[176],"with":[177],"angle":[180],"degrees":[183],"pulse":[186],"generation":[187],"$500":[190],"\\mathbf{M":[191],"H":[192],"z}$,":[193],"approximately":[195],"$84":[196],"\\mathbf{~":[197],"M":[198],"b}":[199,205],"/":[200,206],"\\mathbf{s}$":[201,207],"44.5":[203],"$\\mathbf{M":[204],"homodyne":[209],"heterodyne":[211],"detection,":[212],"respectively.":[213],"highlights":[216],"providing":[223],"channels":[226],"that":[227],"are":[228],"resilient":[229],"cryptographic":[231],"attacks.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
