ZTE Communications ›› 2018, Vol. 16 ›› Issue (3): 52-58.DOI: 10.19729/j.cnki.1673-5188.2018.03.009
• Research Paper • Previous Articles Next Articles
WANG Hua1, ZHAO Yongli1, WANG Dajiang2, WANG Jiayu2, WANG Zhenyu2
Online:
2018-08-25
Published:
2020-03-18
About author:
WANG Hua (Whua@bupt.edu.cn) is currently working toward her Ph.D. degree in information and communications engineering at Beijing University of Posts and Telecommunications (BUPT), China. Her research interests include software defined optical networking and quantum communication.|ZHAO Yongli (yonglizhao@bupt.edu.cn) is currently an associate professor of the Institute of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications (BUPT), China. He received the B.S. degree in communication engineering and Ph.D. degree in electromagnetic field and microwave technology from BUPT. During Jan. 2016 to Jan. 2017, he was a visiting associate professor at UC Davis, USA. He has published more than 300 international journal and conference papers. Since 2015, he has become a senior member of IEEE. His research focuses on software defined optical networking, elastic optical networks, datacenter networking, and optical network security.|WANG Dajiang (wang.dajiang@zte.com.cn) is an experienced senior engineer and product planning manager of intelligent optical networks with ZTE Corporation. With 12 years of R&D experience in the intelligent optical network field, he has many optical-oriented SDN patents and was the core researcher of two “863” national scientific research projects of China.|WANG Jiayu (Wang.jiayu@zte.com.cn) is an experienced senior engineer and product planning manager of intelligent optical networks with ZTE Corporation. His research interest is intelligent optical networking.|WANG Zhenyu (Wang.zhenyu@zte.com.cn) is an experienced senior engineer and product planning manager of intelligent optical networks with ZTE Corporation. His research interest is intelligent optical networking.
Supported by:
WANG Hua, ZHAO Yongli, WANG Dajiang, WANG Jiayu, WANG Zhenyu. A Quantum Key Re-Transmission Mechanism for QKD-Based Optical Networks[J]. ZTE Communications, 2018, 16(3): 52-58.
Figure 2. Point-to-point communication in quantum key distribution (QKD) based optical networks: a) point-to-point communication system; b) wavelength allocation in fiber [21].
[1] | D. J. Griffiths , Introduction to Quantum Mechanics. Cambridge, England: Cambridge University Press, 2016. |
[2] | S.S. Kute .and G. C. Desai, “Quantum cryptography: a review,” Indian Journal of Science and Technology, vol. 10, no. 3, 2017. doi: 10.17485/ijst/2017/v10i3/110635. |
[3] | W. K. Hong, M. O. Foong, J. T. Low , “Challenges in quantum key distribution: a review,” in Proc. ACM 4th International Conference on Information and Network Security, Kuala Lumpur, Malaysia, 2016, pp. 29-33. |
[4] | C. Elliott, A. Colvin, D. Pearson , et al., “Current status of the DARPA quantum network,” in Proc. SPIE 5815, Quantum Information and Computation III, Orlando, USA, 2005, pp. 138-149. doi: 10.1117/12.606489. |
[5] | M. Peev, C. Pacher, R. Alléaume , et al., “The SECOQC quantum key distribution network in Vienna,” New Journal of Physics, vol. 11, article no. 075001, Jul. 2009. doi: 10.1088/1367-2630/11/7/075001. |
[6] | M. Sasaki, M. Fujiwara, H. Ishizuka , et al., “Field test of quantum key distribution in the Tokyo QKD network,” Optics Express, vol. 19, no. 11, pp. 10387-10409, 2011. doi: 10.1364/OE.19.010387. |
[7] | S. Aleksic, D. Winkler, G. Franzi , et al., “Quantum key distribution over optical access networks,” in NOC/OC&I, Graz, Austria, 2013, pp. 11-18. doi: 10.1109/NOC-OCI.2013.6582861. |
[8] | F. X. Xu, W. Chen, S. Wang , et al., “Field experiment on a robust hierarchical metropolitan quantum cryptography network,” Chinese Science Bulletin, vol. 54, no.17,pp. 2991-2997, Sept. 2009. doi: 10.1007/s11434-009-0526-3. |
[9] | S. Wang W .Chen, Z.-Q. Yin, et al, “Field test of wavelength-saving quantum key distribution network,” Optics Letters, vol. 35, no.14,pp. 2454-2456, Jul. 2010. doi: 10.1364/OL.35.002454. |
[10] | S. Wang, W. Chen , Z.-Q. Yin, , et al, “Field and long-term demonstration of a wide area quantum key distribution network,” Optics Express, vol. 22, no.18,pp. 21739-21756, Sept. 2014. doi: 10.1364/OE.22.021739. |
[11] | S. Wang, W. Chen ,J.-F. Guo, et al, “2 GHz clock quantum key distribution over 260 km of standard telecom fiber,” Optics Letters, vol. 37, no.6,pp. 1008-1010, Mar. 2012. doi: 10.1364/OL.37.001008. |
[12] | A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, A. J. Shields , “Continuous operation of high bit rate quantum key distribution,” Applied Physics Letters, vol. 96, no.16, Mar. 2010. doi: 10.1063/1.3385293. |
[13] | D. P. Townsend , “Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fiber using wavelength-division multiplexing,” Electronics Letters, vol. 33, no.3,pp. 188-190, Jan. 1997. |
[14] | J. R. Runser, T. E. Chapuran, P. Toliver , et al., “Demonstration of 1.3 μm quantum key distribution (QKD) compatibility with 1.5 μm metropolitan wavelength division multiplexed (WDM) systems,” in OFC/NFOEC, Anaheim, USA, 2005. |
[15] | N. I. Nweke, R. J. Runser, S.R. McNown . , et al., “EDFA bypass and filtering architecture enabling QKD+WDM coexistence on mid-span amplified links,” in Conference on Lasers and Electro-Optics/Quantum Electronics and Laser Science Conference, Long Beach, USA, 2006. |
[16] | L. He, J. Niu, Y. Sun, Y. Ji , “The four wave mixing effects in quantum key distribution based on conventional WDM network,” in 12th International Conference on Optical Internet, Jeju, South Korea, 2014. |
[17] | L. Wang ,L.-K. Chen,L. Ju, et al., “Experimental multiplexing of quantum key distribution with classical optical communication,” Applied Physics Letters, vol. 106, no. 8, Feb. 2015. doi: 10.1063/1.4913483. |
[18] | T. F. da Silva, G. B. Xavier, G. P. Temporao , et al., “Impact of raman scattered noise from multiple telecom channels on fiber-optic quantum key distribution systems,” Journal of Lightwave Technology, vol. 32, no.13,pp. 2332-2339, Jul. 2014. doi: 10.1109/JLT.2014.2322108. |
[19] | H. Wang, Y. Zhao, Y. Li , et al., “A flexible key update method for software-defined optical networks (SDON) secured by quantum key distribution,” Optical Fiber Technology, vol. 45, pp. 195-200, Nov. 2018. doi: 10.1016/j.yofte.2018.07.005. |
[20] | I. Choi, R. J. Young, P. D. Townsend , “Quantum key distribution on a 10Gb/s WDM-PON,” Optics Express, vol. 18, no. 9, pp. 9600-9612, 2010. doi: 10.1364/OE.18.009600. |
[21] | Y. Cao, Y. Zhao, X. Yu , et al., “Resource allocation in software-defined optical networks secured by quantum key distribution,” in 2017 Opto-Electronics and Communications Conference (OECC) and Photonics Global Conference (PGC), Singapore, Singapore, 2017. doi: 10.1109/OECC.2017.8114769. |
[22] | F. P. Miller, A. F. Vandome, J. McBrewster , Advanced Encryption Standard. South San Francisco, USA: Alpha Press, 2009. |
[1] | LI Zhongya, CHEN Rui, HUANG Xingang, ZHANG Junwen, NIU Wenqing, LU Qiuyi, CHI Nan. SVM for Constellation Shaped 8QAM PON System [J]. ZTE Communications, 2022, 20(S1): 64-71. |
[2] | CAO Yinfeng, CAO Jiannong, WANG Yuqin, WANG Kaile, LIU Xun. Security in Edge Blockchains: Attacks and Countermeasures [J]. ZTE Communications, 2022, 20(4): 3-14. |
[3] | LU Haitao, YAN Xincheng, ZHOU Qiang, DAI Jiulong, LI Rui. Key Intrinsic Security Technologies in 6G Networks [J]. ZTE Communications, 2022, 20(4): 22-31. |
[4] | HE Miao, LI Xiangman, NI Jianbing. Physical Layer Security for MmWave Communications: Challenges and Solutions [J]. ZTE Communications, 2022, 20(4): 41-51. |
[5] | YAN Xincheng, TENG Huiyun, PING Li, JIANG Zhihong, ZHOU Na. Study on Security of 5G and Satellite Converged Communication Network [J]. ZTE Communications, 2021, 19(4): 79-89. |
[6] | ZHANG Weiliang, YUAN Liquan. Higher Speed Passive Optical Networks for Low Latency Services [J]. ZTE Communications, 2021, 19(2): 61-66. |
[7] | YANG Howard H., ZHAO Zhongyuan, QUEK Tony Q. S.. Enabling Intelligence at Network Edge:An Overview of Federated Learning [J]. ZTE Communications, 2020, 18(2): 2-10. |
[8] | TANG Kai. Risk Analysis of Industrial InternetIdentity System [J]. ZTE Communications, 2020, 18(1): 44-48. |
[9] | MA Baoluo, CHEN Wenqu, CHI Cheng. Security Risk Analysis Model for Identification and Resolution System of Industrial Internet [J]. ZTE Communications, 2020, 18(1): 49-54. |
[10] | ZHANG Yunyong, XU Lei, TAO Ye. SDN Based Security Services [J]. ZTE Communications, 2018, 16(4): 9-14. |
[11] | HU Baiqing, WANG Wenjie, Chi Harold Liu. Open Source Initiatives for Big Data Governance and Security: A Survey [J]. ZTE Communications, 2018, 16(2): 55-66. |
[12] | Alexander A. Okandeji, Muhammad R. A. Khandaker, WONG Kai-Kit, ZHANG Yangyang, ZHENG Zhongbin. Secure Beamforming Design for SWIPT in MISO Full-Duplex Systems [J]. ZTE Communications, 2018, 16(1): 38-46. |
[13] | MENG Ziqian, GUAN Zhi, WU Zhengang, LI Anran, CHEN Zhong. Security Enhanced Internet of Vehicles with Cloud-Fog-Dew Computing [J]. ZTE Communications, 2017, 15(S2): 47-51. |
[14] | XU Xiaoqiong, YU Hongfang, YANG Kun. DDoS Attack in Software Defined Networks: A Survey [J]. ZTE Communications, 2017, 15(3): 13-19. |
[15] | WU Chunming, LIU Qianjun, LI Yuwei, CHENG Qiumei, ZHOU Haifeng. A Survey on Cloud Security [J]. ZTE Communications, 2017, 15(2): 42-47. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||