Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
A Quantum Key Re-Transmission Mechanism for QKD-Based Optical Networks
WANG Hua, ZHAO Yongli, WANG Dajiang, WANG Jiayu, WANG Zhenyu
ZTE Communications    2018, 16 (3): 52-58.   DOI: 10.19729/j.cnki.1673-5188.2018.03.009
Abstract131)   HTML31)    PDF (528KB)(165)       Save

Due to the vulnerability of fibers in optical networks, physical-layer attacks targeting photon splitting, such as eavesdropping, can potentially lead to large information and revenue loss. To enhance the existing security approaches of optical networks, a new promising technology, quantum key distribution (QKD), can securely encrypt services in optical networks, which has been a hotspot of research in recent years for its characteristic that can let clients know whether information transmission has been eavesdropped or not. In this paper, we apply QKD to provide secret keys for optical networks and then introduce the architecture of QKD based optical network. As for the secret keys generated by QKD in optical networks, we propose a re-transmission mechanism by analyzing the security risks in QKD-based optical networks. Numerical results indicate that the proposed re-transmission mechanism can provide strong protection degree with enhanced attack protection. Finally, we illustrated some future challenges in QKD-based optical networks.

Table and Figures | Reference | Related Articles | Metrics
Cloud Storage Technology and Its Applications
Zhou Ke, Wang Hua, Li Chunhua
ZTE Communications    2010, 8 (4): 27-30.  
Abstract438)      PDF (521KB)(337)       Save
Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices. Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application—Backup Cloud (B-Cloud)—is examined and its software architecture, characteristics, and main research areas are discussed.
Related Articles | Metrics