2018
DOI: 10.1109/mcom.2018.1700656
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation in Optical Networks Secured by Quantum Key Distribution

Abstract: Optical-network security is attracting increasing research attention, as loss of confidentiality of data transferred through an optical network could impact a huge number of users and services. Data encryption is an effective way to enhance optical network security. In particular, quantum key distribution (QKD) is being investigated as a secure mechanism to provide keys for data encryption at the end-points of an optical network. In a QKD-enabled optical network, apart from traditional data channels (TDChs), t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 83 publications
(63 citation statements)
references
References 14 publications
0
63
0
Order By: Relevance
“…In order to improve the physical-layer performance such as secret-key rate and achievable distance, a number of analytical studies [30], [43], system experiments [31], [34], [36], and field trials [33], [44] have been carried out. On the other hand, several resource assignment strategies have been proposed to optimize the network-layer performance such as blocking probability and resource utilization when QKD coexists with the classical networks [32], [35]. In [45], [46], the protection and recovery schemes were described for resilient QKD-integrated classical networks.…”
Section: A Qkd Network Deploymentmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to improve the physical-layer performance such as secret-key rate and achievable distance, a number of analytical studies [30], [43], system experiments [31], [34], [36], and field trials [33], [44] have been carried out. On the other hand, several resource assignment strategies have been proposed to optimize the network-layer performance such as blocking probability and resource utilization when QKD coexists with the classical networks [32], [35]. In [45], [46], the protection and recovery schemes were described for resilient QKD-integrated classical networks.…”
Section: A Qkd Network Deploymentmentioning
confidence: 99%
“…In [51], a new concept of QKD as a service was proposed where multiple users can obtain their required secret-key rates from the same QKD network infrastructure by applying for their dedicated QKD services. On the other hand, QKD can be adopted in several use cases, e.g., data service security enhancement [35], [40], physical-layer attack mitigation [49], security enhancement of SDN control [52], energy efficiency improvement for Internet of things [53], and virtual network security enhancement [54], [55].…”
Section: Qkd Network Operationmentioning
confidence: 99%
“…In 2016, Alejandro et al discussed the impact of SDN on QKD-device deployment, and proposed a quantum sensing SDN architecture by dividing the network into three layers, i.e., application layer, control layer, and infrastructure layer [16]. In 2017, Aguado et al proposed a distributed NFV MANO architecture by combining NFV orchestration with QKD technology through the scheduling of SDN controller, and integrating IDQ QKD system with experiments [10]. In the same year, as shown in Figure 1a, Yu et al proposed a three-layer architecture of QKD networks named software-defined QKD network to solve the problem of complex management caused by excessive resource consumption [17].…”
Section: Researches On Architecture Of the Networkmentioning
confidence: 99%
“…In the same year, as shown in Figure 1a, Yu et al proposed a three-layer architecture of QKD networks named software-defined QKD network to solve the problem of complex management caused by excessive resource consumption [17]. In addition, as shown in Figure 1b, Zhao et al proposed a four-layer architecture from the perspective of how to use QKD to enhance the security of SDONs, including application layer, control layer, QKD layer, and data layer [10]. and upgrade the network efficiently.…”
Section: Researches On Architecture Of the Networkmentioning
confidence: 99%
See 1 more Smart Citation