{"id":56885,"date":"2023-08-29T23:14:49","date_gmt":"2023-08-29T22:14:49","guid":{"rendered":"https:\/\/www.tk.etf.unsa.ba\/?p=56885"},"modified":"2026-02-26T22:28:55","modified_gmt":"2026-02-26T21:28:55","slug":"new-article-published-in-ieee-communications-surveys-tutorials","status":"publish","type":"post","link":"https:\/\/www.tk.etf.unsa.ba\/bs\/2023\/08\/new-article-published-in-ieee-communications-surveys-tutorials\/","title":{"rendered":"Objavljen rad u \u010dasopisu IEEE Communications Surveys &#038; Tutorials"},"content":{"rendered":"<p><\/p>\n<section id=\"Abs1\" class=\"Abstract\" lang=\"en\" tabindex=\"-1\">\n<h1 class=\"document-title text-2xl-md-lh\">Quantum Cryptography in 5G Networks: A Comprehensive Overview<\/h1>\n<p><!--more--><\/p>\n<section id=\"Abs1\" class=\"Abstract\" lang=\"en\" tabindex=\"-1\">\n<h4 lang=\"en\"><a href=\"https:\/\/www.nato.int\/science\/index.html\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-3730\" src=\"https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor-1024x147.jpg\" alt=\"NATO SPS\" width=\"960\" height=\"138\" srcset=\"https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor-1024x147.jpg 1024w, https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor-300x43.jpg 300w, https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor-768x111.jpg 768w, https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor-1536x221.jpg 1536w, https:\/\/www.tk.etf.unsa.ba\/wp-content\/uploads\/2021\/02\/4_SPrg-EN-Hor.jpg 1945w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/h4>\n<h4 lang=\"en\">Autori<\/h4>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><a href=\"https:\/\/www.tk.etf.unsa.ba\/bs\/osoblje\/mehic-miralem\/\"><span class=\"authors__name\"><strong>Miralem Mehic<\/strong><\/span><\/a>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Libor Michalek\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"authors__name\">Emir Dervi\u0161evi\u0107<\/span><span class=\"authors__name\"><strong><br \/>\n<\/strong><\/span><\/p>\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Patrik Burdiak\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"authors__name\">Matej Plakalovi\u0107<\/span><span class=\"authors__name\"><strong><br \/>\n<\/strong><\/span><\/p>\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Jan Rozhon\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"authors__name\">Nerman Mahovac<\/span><span class=\"authors__name\"><strong><br \/>\n<\/strong><\/span><\/p>\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Filip Richter\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__city\">Deutsche Telekom Security, T-Mobile CZ, Prague, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><a href=\"https:\/\/www.tk.etf.unsa.ba\/people\/enio-kaljic\/\"><span class=\"authors__name\"><strong>Enio Kalji\u0107<\/strong><\/span><\/a>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Filip Lauterbach\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><a href=\"https:\/\/www.tk.etf.unsa.ba\/people\/pamela-begovic-njemcevic\/\"><span class=\"authors__name\"><strong>Pamela Njem\u010devi\u0107<\/strong><\/span><\/a>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><a href=\"https:\/\/www.tk.etf.unsa.ba\/people\/almir-maric\/\"><span class=\"authors__name\"><strong>Almir Mari\u0107<\/strong><\/span><\/a>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><a href=\"https:\/\/www.tk.etf.unsa.ba\/people\/mirza-hamza\/\"><span class=\"authors__name\"><strong>Mirza Hamza<\/strong><\/span><\/a>\n<ul class=\"test-contributor-names\">\n<li class=\"u-mb-2 u-pt-4 u-pb-4\"><span class=\"authors__name\"><span class=\"affiliation__country\">Odsjek za telekomunikacije, Univerzitet u Sarajevu, Sarajevo, Bosna i Hercegovina<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Peppino Fazio\n<ul class=\"test-contributor-names\">\n<li>DSMN, <span dir=\"ltr\" role=\"presentation\">Ca\u2019 Foscari University, Venice, Italy<\/span><\/li>\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li>Miroslav Voznak\n<ul class=\"test-contributor-names\">\n<li><span class=\"authors__name\"><span class=\"affiliation__name\">VSB Tehni\u010dki unvierzitet u Ostravi, <\/span><span class=\"affiliation__city\">Ostrava-Poruba, <\/span><span class=\"affiliation__country\">\u010ce\u0161ka Republika<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 class=\"Heading\">Sa\u017eetak<\/h4>\n<p id=\"Par1\" class=\"Para\">Svaki pristup Internetu putem web pretra\u017eiva\u010da, e-po\u0161te, VPN veze, VoIP poziva, instant poruka ili druge upotrebe telekomunikacionih sistema uklju\u010duje kriptografske tehnike. Naj\u010de\u0161\u0107e primijenjena tehnika je asimetri\u010dna kriptografija, koja se uglavnom izvr\u0161ava u pozadini, a da korisnik toga nije ni svjestan. On uspostavlja kriptografski kod zasnovan na ra\u010dunskoj slo\u017eenosti matemati\u010dkih problema. Me\u0111utim, ova vrsta kriptografije, koja se \u0161iroko koristi u dana\u0161njim telekomunikacijskim sistemima, ugro\u017eena je kako se elektronika i ra\u010dunarstvo brzo razvijaju. Razvoj celularnih mre\u017ea pete generacije (5G) uzima sve vi\u0161e maha, a s obzirom na \u0161iroko polje primjene, sigurnost zahtijeva posebnu pa\u017enju. Ovo se posebno odnosi na razvoj kvantnih kompjutera. Jedno rje\u0161enje za ovaj sigurnosni izazov je kori\u0161tenje naprednijih tehnika za uspostavljanje kriptografskih klju\u010deva koji nisu podlo\u017eni napadima. Bitan dio kvantne kriptografije, kvantna distribucija klju\u010deva (QKD) koristi principe kvantne fizike za uspostavljanje i distribuciju simetri\u010dnih kriptografskih klju\u010deva izme\u0111u dva geografski udaljena korisnika. QKD uspostavlja informacijski teoretski sigurne kriptografske klju\u010deve koji su otporni na prislu\u0161kivanje kada su kreirani. U ovom radu istra\u017eujemo sigurnosne izazove i pristupe u 5G mre\u017eama koji se ti\u010du mre\u017enih protokola, interfejsa i upravlja\u010dkih organizacija. Po\u010dinjemo ispitivanjem osnova QKD-a i raspravljamo o stvaranju QKD mre\u017ea i njihovim primjenama. Zatim opisujemo QKD mre\u017enu arhitekturu i njene komponente i standarde, prate\u0107i sa\u017eetak QKD i post-kvantnih tehnika distribucije klju\u010deva i pristupa za njihovu integraciju u postoje\u0107e sigurnosne okvire kao \u0161to su VPN (IPsec i MACsec). Tako\u0111er raspravljamo o zahtjevima, arhitekturi i metodama za implementaciju FPGA baziranih enkriptora potrebnih za izvr\u0161avanje kriptografskih algoritama sa sigurnosnim klju\u010devima. Razmatramo performansame i pristupe post-kvantne kriptografije, te razmatramo 5G mre\u017ene demonstracije koje koriste kvantne tehnologije, nagla\u0161avaju\u0107i budu\u0107e smjerove istra\u017eivanja.<\/p>\n<\/section>\n<div class=\"KeywordGroup\" lang=\"en\">\n<h4 class=\"Heading\">Klju\u010dne rije\u010di<\/h4>\n<div class=\"KeywordGroup\" lang=\"en\">\n<div id=\"kwrd0010\" class=\"keyword\">\u00a0Security , Cryptography , Surveys , Quantum computing , 5G mobile communication , Tutorials , Protocols<\/div>\n<\/div>\n<h4>DOI<\/h4>\n<p><i><a href=\"https:\/\/doi.org\/10.1109\/COMST.2023.3309051\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1109\/COMST.2023.3309051<\/a><\/i><\/p>\n<h4><strong>URL<\/strong><\/h4>\n<p id=\"Abs1\" class=\"Abstract\" lang=\"en\" tabindex=\"-1\"><span class=\"eissn\">Article is available via url: <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10231341\">https:\/\/ieeexplore.ieee.org\/document\/10231341<\/a><\/span><\/p>\n<h4 class=\"Abstract\" lang=\"en\" tabindex=\"-1\">Citation<\/h4>\n<p class=\"Abstract\" lang=\"en\" tabindex=\"-1\"><span dir=\"ltr\" role=\"presentation\">M.Mehic et al. &#8220;Quantum Cryptography in 5G Networks: A Comprehensive Overview&#8221; <\/span><span dir=\"ltr\" aria-owns=\"pdfjs_internal_id_9R pdfjs_internal_id_10R\">IEEE Communications Surveys &amp; Tutorials, 2023. doi: <\/span><span dir=\"ltr\" role=\"presentation\"><a href=\"https:\/\/doi.org\/10.1109\/COMST.2023.3309051\">https:\/\/doi.org\/10.1109\/COMST.2023.3309051<\/a> SCIE Impact Factor: 35.6 (Q1\/2022<\/span><\/p>\n<h4><i><\/i><span class=\"eissn\">Journal Title<br \/>\n<\/span><\/h4>\n<p><span class=\"eissn\"><span dir=\"ltr\" aria-owns=\"pdfjs_internal_id_9R pdfjs_internal_id_10R\">IEEE Communications Surveys &amp; Tutorials<\/span><\/span><\/p>\n<h4><span class=\"eissn\">Publisher<\/span><\/h4>\n<p><span class=\"eissn\">IEEE<\/span><\/p>\n<h4><span class=\"eissn\">Impact Factor<br \/>\n<\/span><\/h4>\n<p><span class=\"eissn\">35.6 (2022)<\/span><\/p>\n<p><a title=\"SCImago Journal &amp; Country Rank\" href=\"https:\/\/www.scimagojr.com\/journalsearch.php?q=17900156715&amp;tip=sid&amp;exact=no\"><img decoding=\"async\" src=\"https:\/\/www.scimagojr.com\/journal_img.php?id=17900156715\" alt=\"SCImago Journal &amp; Country Rank\" border=\"0\" \/><\/a><\/p>\n<\/div>\n<\/section>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Objavljen rad u \u010dasopisu IEEE Communications Surveys &#038; Tutorials,<\/p>\n","protected":false},"author":2,"featured_media":56886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3,11,183,5],"tags":[9,8],"class_list":["post-56885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage-slides-english","category-naslovna-najavna-listanews-announcements","category-quantum_lab","category-research","tag-publications","tag-research"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/posts\/56885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/comments?post=56885"}],"version-history":[{"count":3,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/posts\/56885\/revisions"}],"predecessor-version":[{"id":56889,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/posts\/56885\/revisions\/56889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/media\/56886"}],"wp:attachment":[{"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/media?parent=56885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/categories?post=56885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tk.etf.unsa.ba\/bs\/wp-json\/wp\/v2\/tags?post=56885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}