Abstract
Keywords
Introduction
The scale of Internet of Things (IoT) is growing rapidly with the development of information science and technology, and it is estimated that there will be 75 billion IoT devices operating by 2025.1,2 As increasingly sensitive and large amount of data is being transferred via IoT, its security problem emerges and has drawn a lot of attention.3–5 Due to the mobility, dynamicity, and flexibility of IoT devices, the traditional security paradigm based on perimeter is inevitably being threatened, and a zero trust hierarchy of IoT needs to be established. Classical solution for IoT security is typically based on asymmetric cryptosystems, where a public key is used for encryption and a private key for decryption. Thus, key distribution process can be avoided in these systems. 2 However, most of the public key algorithms, such as Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC), will be easily broken by quantum computing with Shor’s algorithm.2,6,7 Although there are a lot of studies on quantum-resistive public key cryptosystems,8–12 only a few researches for IoT systems have been carried out due to their constrained computational resources.13,14 Therefore, in this scenario, it is reasonable to resort to quantum cryptography (QC), whose security is based on the fundamental laws of quantum physics rather than on the complexity of computing.2–18
To implement the perfect secure one time pad (OTP) 19 with QC, one needs to generate a truly random raw key based on the random nature of quantum physics20,21 and distribute it with quantum key distribution QKD.22,23 Unlike the original QKD protocol based on modulation and detection of discrete variables of single photons, 22 an alternative continuous-variable (CV) QKD protocol is based on homodyne or heterodyne detection of the amplitude and phase of coherent optical fields. 23 Since this protocol is highly compatible with the classical coherent optical communication, 24 its application in IoT systems is quite convenient and straightforward. Moreover, due to the mode selection nature of homodyne and heterodyne detection, noise in modes other than the signal mode will be filtered out automatically, which leads to a high signal-to-noise ratio (SNR).
To perform homodyne and heterodyne detection, a local oscillator (LO) is required as a phase reference, which is a strong laser field coherent with the signal. Since the final secret key rate is extremely sensitive to the phase noise between the signal and the LO, 23 originally they are prepared from the same laser at the host (normally referred to as Alice).25–27 In addition, in order to reduce phase difference and cross talk in the channel, they are sent to the client (Bob) via the same fiber link using time and polarization multiplexing.27–29 However, this configuration has two main drawbacks. One is a potential loophole of exposing both the signal and LO to the eavesdropper (Eve). 30 The other is the need of a high-power LO due to the channel loss, especially for long-distance communication. 31 To avoid these problems, a scheme with “locally” generated LO has been proposed and demonstrated.31,32 In this scheme, the phase difference between the signal and LO is monitored and processed dynamically. Nevertheless, since the LO runs freely in this scheme, it may compromise the long-term stability and security of the system.
In this article, we propose a CV-QC scheme for IoT systems, where the LO is locked to the reference signal via a phase lock loop (PLL). By modulating the signal within a frequency region away from DC and performing heterodyne detection, the classical excess noise of the LO can be sufficiently suppressed. In this configuration, the phase tracking and data processing procedure are eliminated, so as to increase the communication speed and alleviate power and computation requirements on IoT controllers. In addition, in this scheme, the IoT controllers are capable of serving as either Alice or Bob, and generating quantum random numbers by measuring shot noise of vacuum states with the LO, which makes them more flexible for complex application scenarios.
Related works
The Gaussian-modulated CV-QKD protocol
Unlike the protocols based on non-classical states, such as single photons
22
and entangled states,33,34 Grangier’s group proposed a protocol where only optical coherent states are required.
28
In this protocol, Alice modulates the amplitude and phase of the laser field to generate a coherent state
where
In the security analysis of QKD, the eavesdropper Eve is supposed to be capable of making any operation so long as not to violate the physics principle. Thus, Eve can replace the normal channel with a perfect lossless and noiseless one, and an ancilla to interact with each state Alice sent. After eavesdropping, the state Bob receives becomes lossy and noisy, just the same as being transmitted through the normal channel. Since Eve can store the entangled state in a quantum memory, and perform the optimal measurement after reconciliation between Alice and Bob, the mutual information with Alice (Bob) she can extract is described by the Holevo bound
When the transmittance of the channel is less than 0.5,
When the channel is quite lossy, the SNR is quite low, leading to poor reconciliation efficiency and laborious computation. In classical communication, when the SNR is low, one can send the same signal several times to promote the effective SNR. However, this method cannot be applied to CV-QKD, since it will induce loopholes.
Discretely modulated CV-QKD
To extend CV-QKD to long-distance communication, in 2009, Grangier’s group proposed a sophisticated discretely modulated CV-QKD protocol 35 which can be implemented as an effective repetition code scheme without compromising the security. In this protocol, instead of Gaussian modulation, Alice randomly prepares one of the four coherent states
where
The real LO CV-QKD scheme
To avoid the loophole induced by sending the LO and alleviate the power required for the LO, in 2015, Qi’s group proposed a scheme to use a locally generated LO for CV-QKD.
31
To provide a phase reference, Alice inserts a pilot pulse between two signal pulses. At Bob’s site, the relative phase
Then, Alice and Bob can establish a relation between their variables as
In this scheme, the slow frequency drift of the LO is only monitored but not compensated, which means the drift will be accumulated and even run out of the bandwidth of the detector. It may lead to the breakdown of the system and compromise the long-term stability. In addition, high-frequency phase noise accumulated between the signal and pilot pulses is not taken into account and is fully mixed into the signal, leading to an underestimation of the channel noise and therefore resulting in loopholes of the security.
The CV-QC scheme with a locked LO
System configuration
A typical IoT system is illustrated in Figure 1. The server and the controller can perform QKD via quantum channels, which are usually fiber links. The classical information for reconciliation and privacy amplification is transferred via classical channels, which can be fiber links or wireless channels. While the sensors can only obtain keys from the controller via classical channels due to their size and power limitations. 17

The hierarchy of the IoT system with quantum channels (solid lines) and classical channels (dashed lines).
The setups of the server and the controller are depicted in Figure 2. Since the IoT controller is capable of working as either the host or the client, the IoT server can adopt the identical configuration. Therefore, for the sake of simplicity, we omit the details in the server. The optical signals are shown with solid lines and arrows indicating the propagation direction, while the electric signals are shown with dashed lines. At the controller site, there is a local laser with the linewidth of about 150 kHz. 32 Its output is splitted into 32 beams with a 1 × 32 beamsplitter. The first 30 beams are sent to a fiber-coupled photodiode array (FCPA) to perform 15 sets of homodyne detection. The measurement outputs are converted to digital signals with 15 analogue-to-digital converters (ADCs), and their least significant bits are stored as quantum random numbers.

The schematic of the locked LO CV-QC scheme.
When the controller works as a client, the server takes turns to send a weak signal pulse and a relatively strong reference pulse, with the pulse width of 30 ns, and the separation of 30 ns. The signal pulse has modulated information
When the controller works as a host, the optical switch at the controller site is turned to the lower route. The controller also takes turns to generate signal and reference pulses. The proportional integral derivative (PID) controller is disabled when the local laser works in a free running mode. A portion from the local laser is splitted by the beam splitter (BS) and modulated in amplitude and phase. To generate a reference pulse, the amplitude is not attenuated and the phase is set to 0. To generate a signal pulse, the amplitude is strongly attenuated, and the phase is randomly modulated to
Quantum random number generation with homodyne detection
Quantum random numbers can be generated by performing homodyne detection on vacuum states. 37 The Wigner function of a vacuum state can be written as 38
Since the function is isotropic in phase space, without loss of generality, we can suppose it is the
The homodyne detection in Figure 2 is equivalent of measuring a quadrature of a vacuum state, as shown in Figure 3.
where

The equivalent homodyne detection on the vacuum state. BS: 50/50 beam splitter; PD: photodiode.
However, besides the shot noise, the realistic measurement result also contains other classical noise, such as electric noise in the circuit and pickups from the environment. This noise source may alter the statistic property of the measurement result and make it less random. To get rid of the influence of the classical noise, we can use the least significant bit (LSB) of the output of the AD as the random number.
26
It is worth to notice that, although the truly random bits may be more than 1, for the sake of simplicity and compactness of the IoT devices, we prefer to keep only the LSB. Let
Then, the relationship of their LSB can be written as
where
Security analysis of the CV-QKD scheme with a locked LO
When the local laser is locked to the reference pulses with beat frequency locking, the low frequency noise is compensated all the time and the linewidth of the beat signal can be suppressed to sub-hertz level. However, the bandwidth of the locking module is usually at megahertz level. Only the noise within the locking bandwidth can be sufficiently suppressed. While outside the locking bandwidth, power spectrum density of the beat signal is still in Lorentzian lineshape, which can be written as
where

The power spectrum density curve of the beat signal between the signal and the LO, with LO unlocked (dashed line) and locked (solid line).
To decrease the influence of the uncompensated noise, the signal should be shifted from DC to where the noise is at an acceptable level. Suppose the frequency range of modulated signal ranges from

Illustration of the power spectrum density of the noise and frequency range of the signal, which starts from
For
The secret key rate of the discretely modulated CV-QKD under the collective attack can be calculated in the asymptotic limit.
25
When Alice sends the states defined in equation (4), the modulation variance is
where
with
Then, channel noise is
and a function
Therefore, the secret key rate is
where

The relation between the modulation variance
Conclusion
In this article, we proposed a flexible CV-QC scheme for IoT systems with zero-trust security. The IoT controller with a local laser can generate quantum random numbers for CV-QKD and share keys with related IoT sensors using traditional key distribution techniques. To perform CV-QKD, both the server and the controller can be configured as either the host or the client. When the controller works as a client, the local laser is locked to reference pulses from the server using beat frequency locking. In this way, the slow frequency drift of the local laser is compensated, ensuring the long-term stability of the system. Also, since dynamic phase difference monitoring and data processing are not needed, the complexity of the system can be reduced. The security of the scheme is analyzed taking into account the residual phase noise between the signal and LO. When the signal is modulated in 50 MHz away from DC, the excess noise of the signal can be sufficiently suppressed. A final key rate of 59 kb/s can be established over a 50-km fiber link with the modulation bandwidth of 100 MHz. Considering this scheme is highly compatible with the classical coherent optical communication system, it will offer a lot of potential applications for the IoT networks when information security is of concern.
