2022
DOI: 10.1049/qtc2.12039
|View full text |Cite
|
Sign up to set email alerts
|

Hardware routed quantum key distribution networks

Abstract: Quantum communication networks pose immense potential for revolutionising secure communications for several applications such as banking, defence, etc. The majority literature on quantum networks deals with the problems of networking and resource allocation using Software Defined Networks (SDNs). SDNs, however, introduce several issues, such as app manipulation attacks and scalability issues. We propose a novel scheme of implementing quantum communication networks that are hardware routed rather than software … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 32 publications
(40 reference statements)
0
2
0
Order By: Relevance
“…Moreover, ref. 15 has investigated using leading classical signals to make routing decisions in a QKD network, although packet switching is not considered in their approach. In our previous work 3 , we presented a proof-of-concept for QKD in a packet-switched tandem network, and considered a basic model for a two-user scenario where the routers had no optical storage capacity.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, ref. 15 has investigated using leading classical signals to make routing decisions in a QKD network, although packet switching is not considered in their approach. In our previous work 3 , we presented a proof-of-concept for QKD in a packet-switched tandem network, and considered a basic model for a two-user scenario where the routers had no optical storage capacity.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum communication can be classified into two areas. The first is data transfer and quantum communication network architecture [20][21][22]. The second is cybersecurity with data encryption with quantum key distribution [23][24][25].…”
Section: Introductionmentioning
confidence: 99%