The evolution of quantum computing is a serious threat to the currently-used public-key cryptosystems (e.g., RSA, ECDSA, ECDH, etc.). They have been shown to be insecure in post-quantum era. This is indeed a big concern since public-key schemes are basis in the generation of shared symmetric keys used for data encryption/decryption. One possible approach to address this issue is to use Quantum Key Distribution (QKD) for the ultra-secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g., AES) to encrypt data over classical channels. However, due to its inherent characteristics, the implementation of QKD has been mostly considered in particular contexts only (e.g., backhaul networks, point-to-point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of use cases. In this paper, we propose a model that enables SDN-based networks to provide QKD security service to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves efficiency of the employed QKD mechanisms in terms of key generation rate. 1 Introduction Public-key cryptosystems are an essential component of the currently used security protocols (e.g., SSL, TLS, SSH, digital signatures , etc). They are mostly used for the secure exchange of symmetric keys between two communicating parties, thus, play a critical role in network security. However, it has been proven that the commonly used public-key cryptosystems are insecure in the post-quantum era [1-4]. This is indeed a serious threat to the security of the internet. In this regard, the research community has been working on two separate approaches to address this issue. In the first approach, a lot of effort has been made to develop quantum-safe public-key and key exchange/encapsulation mechanisms [5-10]. These schemes will replace the currently-used public-key cryptosystems in the future [11]. For instance, the National Institute of Standards and Technology (NIST) is currently undertaking a standardization project on post-quantum cryptography (PQC) to standardize cryp-tosystems and key exchange mechanisms (KEM) that are secure against quantum-enabled attacks [12, 13]. The second approach, on the other hand, attempts to utilize the laws of quantum physics to establish symmetric keys between two communicating parties in an ultra-secure way. This approach is based on quantum key distribution (QKD) which is in fact one application of quantum communication (QC) in the field of quantum cryptography [14, 15]. In simple words, QKD is deployed to support classical communications in terms of security, i.e., the symmetric encryption key is regularly updated over ultra-secure quantum channels (e.g., once in a few second). The updated key is used to encrypt the data using a symmetric encryption scheme (e.g., AES). The encrypted data is then transmitted over a classical channel (see Fig. 1). Note that with some increase in the key length, symmetric encryption schemes are quantum-safe. Thus, the whole package will be secure against quantum-enabled attacks. Fig. 1: Simple illustration of quantum key distribution (QKD). The unique advantage of QKD is that if an adversary attempts to eavesdrop the quantum information in transit, their fragile quantum state collapses. This can be effectively detected by the receiver terminal, meaning that QKD is inherently secure against eavesdropping [16-18]. This is indeed a precious advantage that makes QKD a promising alternative of the currently used public-key cryptosystems. However, there are two main restrictions that limit the adoption of QKD technology to particular scenarios only. Firstly, in QKD-based symmetric key generation, the two communicating parties need to be equipped with an optical interface to transmit and receive quantum information. This is because in quantum communications, the standard carriers are light photons that are transferred through either optical fibres or free space line-of-sight optical links (using laser interfaces). Secondly, the two parties must communicate over a point-to-point quantum channel in order to generate the secret key. Although deployment of quantum repeaters (QRs) can mitigate the second IET Research Journals, pp. 1-4