Asia Communications and Photonics Conference 2017
DOI: 10.1364/acpc.2017.su2a.66
|View full text |Cite
|
Sign up to set email alerts
|

Soft-Reservation based Resource Allocation in Optical Networks Secured by Quantum Key Distribution (QKD)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In order to improve resource utilization for QKD integration into a classical telecommunication network, WDM can be combined with TDM by seating multiple time slots for accommodating the quantum channels [205], [207]. A static routing, wavelength, and time-slot assignment (RWTA) problem has been addressed using the classic integer linear programming (ILP) model and a heuristic algorithm in [205], [377], whereas a dynamic RWTA problem has been solved with the aid of heuristic algorithms [207], [211], [379], [380]. To improve the achievable secret-key rates in a hybrid quantum-classical network, several low-complexity yet near-optimal wavelength assignment methods have been presented in [381], [382].…”
Section: Resource Allocationmentioning
confidence: 99%
“…In order to improve resource utilization for QKD integration into a classical telecommunication network, WDM can be combined with TDM by seating multiple time slots for accommodating the quantum channels [205], [207]. A static routing, wavelength, and time-slot assignment (RWTA) problem has been addressed using the classic integer linear programming (ILP) model and a heuristic algorithm in [205], [377], whereas a dynamic RWTA problem has been solved with the aid of heuristic algorithms [207], [211], [379], [380]. To improve the achievable secret-key rates in a hybrid quantum-classical network, several low-complexity yet near-optimal wavelength assignment methods have been presented in [381], [382].…”
Section: Resource Allocationmentioning
confidence: 99%
“…In the 2017 China Dance Development Research Report, it talks about how "the innovative ability of the national dance drama is not yet strong enough," and "most of the works that are indeed innovative are mostly the ones that come out of a thousand hammers." [4] In the face of insufficient innovation in dance drama creation and the problem that the creation of dance drama masterpieces is a continuous process, China Dance Drama Data Resource Bank exists as a kind of scientific and technological supply in the process of innovation in dance drama and directly serves in the creation of dance drama, exchange of talents, management decisionmaking and publicity and education, so that it can provide the creation of practical guidance and analysis of creative trends which are based on the evidence and can be traced back and analyzed in quantitative way, and break the established creative mode at the level of creative concept, so that it can really create works with characteristics, innovation and cultural value. In order to break the existing creation mode from the level of creation concept, it can really create works with characteristics, both innovation and cultural value.…”
Section: Promoting Changes In the Mode Of Creating Dance Dramasmentioning
confidence: 99%
“…Fig. 21: An example of a hybrid trusted/untrusted relay QKD chain [165] Various strategies have been proposed in the literature to solve the RWTA problem [173], [174], [175], [176], [177]. Initially, the RWTA problem was investigated in [12], and an RWTA strategy for resource allocation in a static traffic scenario was proposed.…”
Section: A Routing Wavelength and Time-slot Assignmentmentioning
confidence: 99%
“…China started to build the longest QKD network over a distance of 2000km from Beijing to Shanghai based on trusted relay in 2013 and successfully established it in 2018 [15], [77], [206]. To circumvent the trust issues involved in the TRN based approach, an MDI-QKD (discussed in Section II.C.2(b)) based network was developed and demonstrated in a real field envi- [12] Develops an ILP model and a heuristic for RWTA with two security-level providing solutions 2017, [127] Introduces a novel concept of KoD for efficient provisioning of network resources with QKP technique 2017, [173] Proposes a soft-reservation strategy to avoid time-conflict based on resource allocation 2018, [178] Develops RWTA algorithm with flexible key updation period in a dynamic traffic scenario and introduces the concept of TSW to reduce time conflicting 2018, [126] Proposes a new time-scheduled scheme to assign resources efficiently for three types of channels with QKP technique 2018, [199] Proposes a secret key generation scheme to provide security in the physical layer based on feature extraction of the optical channel and experimentally verified the proposed scheme over 200 km fiber loop 2019, [162] Presents the concept of KaaS that provides sufficient secret keys in proper time to satisfy the lightpath requests 2019, [175] Proposes an auxiliary graph-based RWTA (AG-RWTA) algorithm to save quantum key resources 2019, [176] A new node structure was designed for the distribution of global quantum keys to secure multicast services 2020, [192] Proposes a novel KRT-RKA scheme based on the MRN node structure for efficient distribution of quantum keys as per the user demands in a multicast service scenario 2020, [184] Two RWTA schemes was designed based on auxiliary graph in MQON with new node structure 2020, [197] A novel distributed DSKRT-RKA algorithm was proposed based on DSKRT-SM scheme for efficient distribution of secret keys for multicast services Multi tenant provisioning problem 2019, [163] Introduces a new concept of QaaS and develop routing and SKR assignment strategy for multiple users 2019, [179] Develops a multi-tenant QKD network in which multiple users can use the same network infrastructure for securing their lightpath requests, proposes a MTKA strategy and experimentally verified the proposed strategy 2019, [180] Demonstrates the multi-tenant provisioning over SDN-based metropolitan area network and design an ondemand secret key resource allocation strategy for providing access to multiple users 2019, [182] and 2020, [183] The On-MTP problem was addressed and a h...…”
Section: E Quantum Key Recyclingmentioning
confidence: 99%