With the rapid advancement of quantum computing, traditional cryptographic techniques are at risk of devolution, necessitating quantum-resilient alternatives for future communication networks. This systematic literature review evaluates the role of Quantum Key Distribution (QKD) in enhancing the security of sixth-generation (6G) wireless communications. Employing the PRISMA methodology, 48 peer-reviewed studies published between 2016 and May 2025 were identified and analyzed. The review addresses three key research questions: the identification of QKD protocols applicable to 6G, challenges in their integration, and proposed solutions for seamless deployment. Findings reveal that protocols such as BB84, E91, CV-QKD, and MDI-QKD, transmitted via optical fiber and satellite channels, offer promising security guarantees. This review concludes that while QKD can significantly strengthen 6G communications against quantum threats, further interdisciplinary efforts in hardware development, standardization, and pilot implementations are essential. The study offers valuable insights for researchers, engineers, and policymakers working toward secure, quantum-resistant future networks. The study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to ensure transparency, rigor, and reproducibility. A comprehensive search was conducted across major scientific databases, including IEEE Xplore, SpringerLink, ScienceDirect, and arXiv, using well-defined keywords and Boolean search strategies related to QKD, 6G networks, and quantum communication security. After removing duplicates and applying predefined inclusion and exclusion criteria, a total of 48 peer-reviewed studies published between 2016 and May 2025 were selected for detailed analysis. The selected literature was systematically classified to address three primary research questions: (i) identification of QKD protocols and technologies applicable to 6G networks, (ii) challenges hindering the integration of QKD into 6G architectures, and (iii) solutions and frameworks proposed to facilitate practical deployment. The findings reveal that prominent QKD protocols, including BB84, E91, Continuous-Variable QKD (CV-QKD), and Measurement-Device-Independent QKD (MDI-QKD), demonstrate strong potential for securing 6G communications when deployed over optical fiber and satellite-based channels. However, practical integration faces significant challenges such as scalability limitations, synchronization issues, quantum channel coexistence with classical networks, hardware complexity, and high deployment costs. The review further highlights emerging solutions that leverage Software-Defined Networking (SDN), Network Function Virtualization (NFV), blockchain-based key management, and hybrid classical-quantum security architectures to overcome these obstacles. Ongoing standardization efforts by organizations such as NIST, ETSI, and ITU-T are also identified as critical enablers for real-world adoption .
| Published in | Science Discovery Physics (Volume 1, Issue 1) |
| DOI | 10.11648/j.sdp.20260101.12 |
| Page(s) | 29-35 |
| Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
| Copyright |
Copyright © The Author(s), 2026. Published by Science Publishing Group |
Quantum Key Distribution (QKD), 6G Communication Security, Post-Quantum Cryptography, Quantum-Resilient Networks
| [1] | Diamanti, E., Lo, H.-K., Qi, B., & Yuan, Z. (2016).Practical challenges in quantum key distribution. npj Quantum Information, 2, 16025. |
| [2] | Primaatmaja, I. W., Curty, M., & Lim, C. C. W. (2022).Security of device-independent quantum key distribution protocols: A review. arXiv preprint, arXiv:2206.04960. |
| [3] | Huawei Technologies Co., Ltd. (2024).6G native trustworthiness. White paper / technology report. |
| [4] | Zeydan, E., Yanikomeroglu, H., & Oktug, S. (2025).Quantum technologies for beyond 5G and 6G networks. arXiv preprint, arXiv:2504.17133. |
| [5] | Centre Tecnològic de Telecomunicacions de Catalunya (CTTC). (2025).Quantum key distribution for security in open and disaggregated 6G networks. Project report. |
| [6] | International Telecommunication Union – Telecommunication Standardization Sector (ITU-T). (2020).Recommendation ITU-T Y.3800: Overview on networks supporting quantum key distribution. |
| [7] |
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., et al. (2019).Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.DOI:
https://doi.org/10.1364/AOP.361502(Originally circulated as arXiv:1906.01645) |
| [8] | Al-Ghamdi, A., Al-Dhaifallah, M., & Al-Qahtani, S. (2020). On the security and confidentiality of quantum key distribution. Security and Privacy, 3(5), e111. |
| [9] | Bedington, R., Arrazola, J. M., & Ling, A. (2017).Progress in satellite quantum key distribution. npj Quantum Information, 3, 30. |
| [10] | Kjwan, A. A. H. (2024).Adaptive covert communication framework for 6G networks. International Journal of Computational and Electronic Aspects in Engineering, 5(4), 203–213. |
| [11] | Trinh, P. V., Nguyen, D. H., & Dang, T. K. (2023).The quantum internet. IET Quantum Communication. |
| [12] | Sun, S., Zhang, Y., & Wang, X. (2019).A blockchain-based framework for secure quantum key distribution communications in 6G networks. Future Networks, 12(1), 45–60. |
| [13] | Primaatmaja, I. W., Curty, M., & Lim, C. C. W. (2022).Security of device-independent quantum key distribution protocols: A review. arXiv preprint, arXiv:2206.04960. |
| [14] | Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., et al. (2019).Advances in quantum cryptography. arXiv preprint, arXiv:1906.01645. |
| [15] | Bedington, R., Arrazola, J. M., & Ling, A. (2017).Progress in satellite quantum key distribution. arXiv preprint, arXiv:1707.03613. |
| [16] | [Wang, Y. (2025).Research on the design and application of 6G communication network architecture based on quantum key encryption. Applied and Computational Engineering, 119, 1–8. |
| [17] | Centre Tecnològic de Telecomunicacions de Catalunya (CTTC). (2025).Quantum key distribution for security in open and disaggregated 6G networks. Technical Report. |
| [18] | Kjwan, A. A. H. (2024).Adaptive covert communication framework for 6G networks integrating quantum cryptography and AI-augmented physical layer security. International Journal of Computational and Electronic Aspects in Engineering, 5(4), 203–213. |
| [19] | Trinh, P. V., Nguyen, D. H., & Dang, T. K. (2023).The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quantum Communication. |
| [20] | Nguyen, V.-L., Lin, X., & Nguyen, D.-T. (2021).Security and privacy for 6G: A survey on prospective technologies and challenges. arXiv preprint, arXiv:2108.11861. |
| [21] | Bhatt, S., Mishra, D., & Verma, A. (2024).Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions. Future Generation Computer Systems, 160, 1–15. |
| [22] | Yaacoub, E., & Alouini, M. S. (2019).A key 6G challenge and opportunity—Connecting the remaining 4 billions: A survey on rural connectivity. arXiv preprint, arXiv:1906.11541. |
| [23] | Sun, Y., Zhang, L., Feng, G., Yang, B., Cao, B., & Imran, M. A. (2019).Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment. IEEE Internet of Things Journal, 6(5), 5791–5802. |
| [24] | Dorri, A., Kanhere, S. S., & Jurdak, R. (2016).Blockchain in Internet of Things: Challenges and solutions. arXiv preprint, arXiv:1608.05187. |
| [25] | National Institute of Standards and Technology (NIST). (2017). Post-quantum cryptography. NISTIR 8105. |
| [26] | Bernardo, L., Malta, S., & Magalhães, J. P. (2025).An evaluation framework for cybersecurity maturity aligned with the NIST cybersecurity framework. Electronics, 14(7), 1364. |
| [27] | European Telecommunications Standards Institute (ETSI). (2017). ETSI GR QSC 006 V1.1.1: Quantum-safe cryptography; Limits to quantum computing applied to symmetric key sizes. |
| [28] | McNeely, D. (2024).Transitioning to quantum-safe encryption. Delinea White Paper. |
| [29] | Open Quantum Safe. (2024).Software for the transition to quantum-resistant cryptography. |
| [30] | Clancy, T. C., et al. (2019).Post-quantum cryptography and 5G security: Tutorial. Proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. |
| [31] | Toshiba Europe. (2025).Secure ‘quantum messages’ sent over telecoms network in breakthrough. Financial Times. |
| [32] | Liao, S.-K., et al. (2017).Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nature Photonics, 11(8), 509–513. |
| [33] | Wang, J.-Y., et al. (2013).Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nature Photonics, 7(5), 387–393. |
| [34] | Bouchard, F., et al. (2018).Experimental investigation of high-dimensional quantum key distribution protocols with twisted photons. Quantum, 2, 111. |
| [35] | Heim, B., et al. (2014).Atmospheric continuous-variable quantum communication. New Journal of Physics, 16(11), 113018. |
| [36] | Guo, H., et al. (2021).A survey on space-air-ground-sea integrated network security in 6G. IEEE Communications Surveys & Tutorials, 24(1), 53–87. |
| [37] | Inoue, K. (2006).Quantum key distribution technologies. IEEE Journal of Selected Topics in Quantum Electronics, 12(4), 888–896. |
| [38] | Tarantino, S., et al. (2018).Feasibility of quantum communications in aquatic scenario. IEEE Photonics Conference Proceedings, 1–2. |
| [39] | Zhang, Y. H., et al. (2019).Robust and universal seamless handover authentication in 5G HetNets. IEEE Transactions on Dependable and Secure Computing. |
| [40] | Fernández-Caramés, T. M. (2019).From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet of Things Journal, 7(7), 6457–6480. |
| [41] | Mao, Q., et al. (2018). Deep learning for intelligent wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 20(4), 2595–2621. |
| [42] | Ye, N., et al. (2019).Deep learning aided grant-free NOMA toward reliable low-latency access in tactile Internet of Things. IEEE Transactions on Industrial Informatics, 15(5), 2995–3005. |
| [43] | Kim, W., et al. (2020). Deep neural network-based active user detection for grant-free NOMA systems. IEEE Transactions on Communications, 68(4), 2143–2155. |
| [44] | Liu, Y.-J., et al. (2020). Device association for RAN slicing based on hybrid federated deep reinforcement learning. IEEE Transactions on Vehicular Technology, 69(12), 15731–15745. |
| [45] | Gundu, S. R., et al. (2022).Sixth-generation (6G) mobile cloud security and privacy risks for AI systems using high-performance computing. Wireless Communications and Mobile Computing, 2022, 4397610. |
| [46] | 3GPP. (2024).TS 33.210 V18.1.0: Network Domain Security (NDS); IP Network Layer Security (Release 18). |
APA Style
Demeke, A. C. (2026). A Systematic Literature Review: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Science Discovery Physics, 1(1), 29-35. https://doi.org/10.11648/j.sdp.20260101.12
ACS Style
Demeke, A. C. A Systematic Literature Review: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Sci. Discov. Phys. 2026, 1(1), 29-35. doi: 10.11648/j.sdp.20260101.12
AMA Style
Demeke AC. A Systematic Literature Review: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Sci Discov Phys. 2026;1(1):29-35. doi: 10.11648/j.sdp.20260101.12
@article{10.11648/j.sdp.20260101.12,
author = {Abel Channie Demeke},
title = {A Systematic Literature Review: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security},
journal = {Science Discovery Physics},
volume = {1},
number = {1},
pages = {29-35},
doi = {10.11648/j.sdp.20260101.12},
url = {https://doi.org/10.11648/j.sdp.20260101.12},
eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.sdp.20260101.12},
abstract = {With the rapid advancement of quantum computing, traditional cryptographic techniques are at risk of devolution, necessitating quantum-resilient alternatives for future communication networks. This systematic literature review evaluates the role of Quantum Key Distribution (QKD) in enhancing the security of sixth-generation (6G) wireless communications. Employing the PRISMA methodology, 48 peer-reviewed studies published between 2016 and May 2025 were identified and analyzed. The review addresses three key research questions: the identification of QKD protocols applicable to 6G, challenges in their integration, and proposed solutions for seamless deployment. Findings reveal that protocols such as BB84, E91, CV-QKD, and MDI-QKD, transmitted via optical fiber and satellite channels, offer promising security guarantees. This review concludes that while QKD can significantly strengthen 6G communications against quantum threats, further interdisciplinary efforts in hardware development, standardization, and pilot implementations are essential. The study offers valuable insights for researchers, engineers, and policymakers working toward secure, quantum-resistant future networks. The study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to ensure transparency, rigor, and reproducibility. A comprehensive search was conducted across major scientific databases, including IEEE Xplore, SpringerLink, ScienceDirect, and arXiv, using well-defined keywords and Boolean search strategies related to QKD, 6G networks, and quantum communication security. After removing duplicates and applying predefined inclusion and exclusion criteria, a total of 48 peer-reviewed studies published between 2016 and May 2025 were selected for detailed analysis. The selected literature was systematically classified to address three primary research questions: (i) identification of QKD protocols and technologies applicable to 6G networks, (ii) challenges hindering the integration of QKD into 6G architectures, and (iii) solutions and frameworks proposed to facilitate practical deployment. The findings reveal that prominent QKD protocols, including BB84, E91, Continuous-Variable QKD (CV-QKD), and Measurement-Device-Independent QKD (MDI-QKD), demonstrate strong potential for securing 6G communications when deployed over optical fiber and satellite-based channels. However, practical integration faces significant challenges such as scalability limitations, synchronization issues, quantum channel coexistence with classical networks, hardware complexity, and high deployment costs. The review further highlights emerging solutions that leverage Software-Defined Networking (SDN), Network Function Virtualization (NFV), blockchain-based key management, and hybrid classical-quantum security architectures to overcome these obstacles. Ongoing standardization efforts by organizations such as NIST, ETSI, and ITU-T are also identified as critical enablers for real-world adoption .},
year = {2026}
}
TY - JOUR T1 - A Systematic Literature Review: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security AU - Abel Channie Demeke Y1 - 2026/02/09 PY - 2026 N1 - https://doi.org/10.11648/j.sdp.20260101.12 DO - 10.11648/j.sdp.20260101.12 T2 - Science Discovery Physics JF - Science Discovery Physics JO - Science Discovery Physics SP - 29 EP - 35 PB - Science Publishing Group UR - https://doi.org/10.11648/j.sdp.20260101.12 AB - With the rapid advancement of quantum computing, traditional cryptographic techniques are at risk of devolution, necessitating quantum-resilient alternatives for future communication networks. This systematic literature review evaluates the role of Quantum Key Distribution (QKD) in enhancing the security of sixth-generation (6G) wireless communications. Employing the PRISMA methodology, 48 peer-reviewed studies published between 2016 and May 2025 were identified and analyzed. The review addresses three key research questions: the identification of QKD protocols applicable to 6G, challenges in their integration, and proposed solutions for seamless deployment. Findings reveal that protocols such as BB84, E91, CV-QKD, and MDI-QKD, transmitted via optical fiber and satellite channels, offer promising security guarantees. This review concludes that while QKD can significantly strengthen 6G communications against quantum threats, further interdisciplinary efforts in hardware development, standardization, and pilot implementations are essential. The study offers valuable insights for researchers, engineers, and policymakers working toward secure, quantum-resistant future networks. The study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to ensure transparency, rigor, and reproducibility. A comprehensive search was conducted across major scientific databases, including IEEE Xplore, SpringerLink, ScienceDirect, and arXiv, using well-defined keywords and Boolean search strategies related to QKD, 6G networks, and quantum communication security. After removing duplicates and applying predefined inclusion and exclusion criteria, a total of 48 peer-reviewed studies published between 2016 and May 2025 were selected for detailed analysis. The selected literature was systematically classified to address three primary research questions: (i) identification of QKD protocols and technologies applicable to 6G networks, (ii) challenges hindering the integration of QKD into 6G architectures, and (iii) solutions and frameworks proposed to facilitate practical deployment. The findings reveal that prominent QKD protocols, including BB84, E91, Continuous-Variable QKD (CV-QKD), and Measurement-Device-Independent QKD (MDI-QKD), demonstrate strong potential for securing 6G communications when deployed over optical fiber and satellite-based channels. However, practical integration faces significant challenges such as scalability limitations, synchronization issues, quantum channel coexistence with classical networks, hardware complexity, and high deployment costs. The review further highlights emerging solutions that leverage Software-Defined Networking (SDN), Network Function Virtualization (NFV), blockchain-based key management, and hybrid classical-quantum security architectures to overcome these obstacles. Ongoing standardization efforts by organizations such as NIST, ETSI, and ITU-T are also identified as critical enablers for real-world adoption . VL - 1 IS - 1 ER -