As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall architecture, related interfaces, and protocols. Then, three-use cases are provided as important paradigms with their corresponding schemes and simulation performances.
Quantum cryptography (QC) is currently under investigation to build highly secure optical communication networks. QC requires distribution of quantum keys (also called “secret” keys) on separate wavelength channels than those used to transmit the encrypted data. Hence, we propose a quantum-secured passive optical network (QS-PON) that supports both i) the traditional wavelength channels for secured data transmission, and ii) a quantum key distribution network (QKDN) running on separate dedicated wavelengths. The QKDN generates and stores secret keys that are then assigned to users’ demands served on traditional PON channels. To generate secret keys, quantum transmitters at the optical network units (ONUs) exchange qubits with a quantum receiver at the optical line terminal (OLT). Then, the generated secret keys are stored in quantum key pools (QKPs) installed at both OLT and the ONUs and assigned to users’ demands. Point-to-multipoint QKD systems have been experimentally demonstrated over various forms of quantum access networks (QANs), showing that an efficient mechanism to generate and assign quantum keys based on traffic requests is a critical component of QANs. In this study, we present a new QS-PON architecture, and we propose a dynamic secret-key provisioning (DSKP) algorithm that effectively generates and assigns secret keys from users’ demands. Our proposed DSKP algorithm features two phases, the lowest-first secret-key generation (LF-SKG) phase and the hierarchical-clustering secret-key consumption (HC-SKC) phase. In this study, we also provide an analytical model that describes how secret keys are generated and consumed in QKPs. In our illustrative numerical evaluation, we compare our algorithm for secret-key provisioning with a baseline IPACT-based solution in terms of service-rejection ratio, time-slot utilization, and guard- and relay-time saving. Results show that DSKP reduces service-rejection ratio and guard- and relay-time of about 16% and 39.54%, respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.