A Quantum Key Re?Transmission Mechanism for QKD?Based Optical Networks

来源 :ZTE Communications | 被引量 : 0次 | 上传用户:youlishi
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Due to the vulnerability of fibers in optical networks, physical?layer attacks targeting photon splitting, such as eavesdropping, can potentially lead to large information and revenue loss. To enhance the existing security approaches of optical networks, a new promising technology, quantum key distribution (QKD), can securely encrypt services in optical networks, which has been a hotspot of research in recent years for its characteristic that can let clients know whether information transmission has been eavesdropped or not. In this paper, we apply QKD to provide secret keys for optical networks and then introduce the architecture of QKD based optical network. As for the secret keys generated by QKD in optical networks, we propose a re?transmission mechanism by analyzing the security risks in QKD?based optical networks. Numerical results indicate that the proposed re?transmission mechanism can provide strong protection degree with enhanced attack protection. Finally, we illustrated some future challenges in QKD?based optical networks.
  optical networks; security; QKD; re?transmission
  1 Introduction
  he explosive growth of services has led to a growing demand for bandwidth and transmission quality, which poses a serious challenge to network operators. At the same time, operators need to manage both IP layer and optical layer in the optical networks, which results in a waste of time and energy overhead and rapidly increase in operating costs by repeating resource construction. The developed technology of IP over optical layer can solve this problem.
  However, because optical network is a communication infrastructure to support people’s daily life, it is widely recognized that the optical layer in IP over optical networks is crucial in supporting the rapidly growing traffic. Therefore, issues related to optical layer security become very important, which suffers more and more security incidents which are mainly by the method of eavesdropping information in optical networks to carry out harmful behavior. For instance, the world’s largest bit?maker trading platform was attacked in 2014 and the loss was estimated about $467 million, which was caused by eavesdropping information in the fiber. Hence, it is crucial to solve the security problem of the optical layer, which also means the security problem in optical networks.
  Caused by the weak defense of physical layer and the simplicity of logic layer in optical networks, services in transmission are vulnerable to security threats; the solution to this security issue depends on the encryption of services. Standard optical network encryption approaches typically utilize complex mathematical questions and decrypting them is not difficult but needs time only. This may be effective in the presence of failures under normal circumstances, but may fail to provide adequate protection for the services under deliberate eavesdropping.   To deal with this problem, an “absolutely safe” solution for the above problems in optical networks is quantum communication which could let the clients notice whether the quantum key has been eavesdropped based on the quantum mechanics inside itself [1]. The “absolutely safe” is guaranteed by quantum key distribution (QKD) over “one time padding” system [2]. Due to the above advantages, the topic about quantum communication in optical networks has been hot around the world. Quantum communication has been listed as the one of the top ten key technologies to promote the development of “13th five?year” plan in China. The National Institute of Standards Department of Defense and Technology of USA has regarded quantum as one of the key research directions. The Europe has invested billions of dollars in its quantum projects. Japan has proposed a long?term research strategy for quantum communication. The introduction of quantum communication into optical networks as a security support can effectively avoid the risk of unsafe communication and ensure the “absolute security” of optical networks, which has a very important innovative value and practical significance.
  2 QKD Fundamentals
  2.1 QKD Protocols and Networks
  QKD is a process which enables both sides in communication to share a secure key by encrypting and decrypting services, which needs corresponding protocols and networks to formulate the rules and realize the wide?spread confidential communication.
  A QKD protocol is used to arrange the behavior of both sides in communication to achieve the proposal of security. The BB84 protocol is the first international quantum key distribution protocol, which has been proposed since 1984 to increase the safety of communication distance, improve the security rate and improve the real system security. Fig. 1 shows the point?to?point quantum key communication procedure, where the sender (commonly known as Alice) and receiver (commonly known as Bob) use quantum channels to transmit quantum states, taking into account the possibility that both channels are eavesdropped by a third party (commonly known as Eve). Other related protocols include the B92 protocol, six?state protocol, and E91 protocol [3].
  QKD networks refer to the operability among multiple nodes in secure communication. The quantum network of Defense Advanced Research Projects Agency (DARPA), an agency of the United States Department of Defense, uses multi?optical switches and trusted relays in the backbone to connect multiple subnets [4]. The Secure Communication Based on Quantum Cryptography (SECOQC) network in the Europe and the QKD network in Tokyo, Japan use the trusted relay to build quantum networks [5], [6]. Moreover, University of Science and Technology of China has designed a full?time all?quantum router based on the wave division multiplexer, and used it as the core technology to build the “four?node star” QKD network in Beijing, China and “multi?level” quantum government network in Wuhu, Anhui Province of China [7]-[9], which is in the forefront of the world. Shandong Institute of Quantum Science and Technology in China took the application demonstration of quantum communication integrated in optical networks in 2015, which passed the testing and achieved the QKD network under a multi?user environment. To promote the QKD as the core technology of quantum network construction, China launched the world’s first quantum science experimental satellite “Micius” in 2017. Following it, a long?distance quantum communication backbone optical network in China is being completed between Beijing and Shanghai to achieve the backbone network QKD and promote wide area quantum communication [10].   2.2 Key Technologies of QKD in Optical Networks
  Nowadays, the main studies of quantum communication in optical networks are focused on the mixed transmission of quantum and classical light, deployment of quantum relay or trusted relay, quantum coding and quantum storage in optical networks, and other research directions. However, we mainly discuss the compatibility of quantum communication integrated with optical networks and the related transmission technology of mixing quantum signals and classical light.
  The compatibility of quantum communication in classical optical networks is one of the crucial factors that directly affect the performance of quantum optical network and cost of network construction. The energy in optical pulse of a single photon (quantum key) transmitted in a QKD channel is about 1.28×10?19 J at 1550 nm. In previous experiments, QKD systems used a single mode fiber to realize the longest transmitted distance of QKD, which up to 250 km with ultra?low loss [11]. In the case of point?to?point QKD connection in fiber, quantum can reach Mbit/s level rate [12]. Because of the high cost of laying and leasing fiber, the way that both quantum and classical light are multiplexed and transmitted in a fiber can effective save cost and improve fiber utilization, which is significant for the development of quantum communication. For the same reason, the research in transmission of mixing QKD channels and classic channels in a common single fiber with wavelength division multiplexing (WDM) technology is gradually increasing. The transmission of combined QKD and services using WDM technology was first demonstrated in 1997 [13]. Subsequently, the quantum channel is accurate to O?band (1260 nm-1360 nm) to achieve confidential communication [14], [15].
  In order to transmit weak quantum and dense classical light with WDM technology, we need solve two key problems: 1) Due to the large number of services, effective isolation is needed to prevent the quantum from being flooded by the classical light; 2) nonlinear noise is caused by the Raman scattering and the four?wave mixing effect, which would cause the quantum deteriorate seriously. Different solutions to the above problems have been proposed. A classical and quantum mixed transmit mechanism was proposed, which could effectively inhibit the four wavelengths and noisy filtering effect by non?uniform wavelength interval over C?band [16]. A multi?stage band?stop filter technique was developed then, which utilizes multi?stage filter to realize the effective isolation of quantum channel, synchronization channel and classical channel [17]. The wavelengths of quantum and synchronization signals are 1550.12 nm and 1556.55 nm, the quantum error rate is as low as 0.9% to 2%, which could achieve the optical transmission distance up to 45 km [18]. Classic channels and quantum channels cannot near the position of long wavelength was found, which could avoid the Raman noise, and working away from the optical fiber zero dispersion wavelength can effectively reduce the generation of four?wave mixing effect.   3 Security Analysis of QKD in Practical
  Optical Networks
  Today’s optical networks provide suitable infrastructure for kinds of services ranging from government networks, financial networks, military networks, social networks to communicating or trade online networks, which are supposed to be protected by at least one quantum key according to the security requirements of users; one key can only be used once. Therefore, a large number of quantum keys are transmitted in the optical network for real?time protecting services. While the “unconditional security” of QKD was proven, several practical security concerns in QKD integrated in optical networks are still need to be solved for compatibility. We analyze this complex security issue in a systematic way with respect to quantum key transmission failure, eavesdropping, and authentication failure.
  3.1 Quantum Key Transmission Failure
  With the development of computer technology, security requirements of data service users are also increasing. Therefore, it is necessary to transmit a large number of quantum keys in a limited amount of resources in the optical network. If there is no resource in the network that can be provided for the quantum key, or if the quantum key is distributed at the receiver, we believe that the quantum key transmission fails once the quantum bit error rate is higher than a certain threshold.
  3.2 The Security of Keys in Other Ways
  The behavior of eavesdropping is inevitable, which is inherent to the attacks in optical networks that need to be protected using quantum. Because practical QKD devices are immature and fibers are vulnerable, the keys generated by QKD are still vulnerable to some attacks since keys still have the risk of leakage [19]. In order to prevent service leakage, they still need to be encrypted with the permitted conditions.
  3.3 Quantum Key Authentication Failure
  The quantum key is used for secure encryption of data information in multi?side quantum communication. The related protocols ensure a secure key reaches the receiver, while the identity of both sides in communication cannot be guaranteed and building a fade receiver could make the information eavesdropped. Thus, the communication sides need to be authenticated before the data transmission.
  4 Quantum Key Re?Transmission
  Mechanism
  4.1 Architecture of QKD?Based Optical Networks
  Optical networks are important infrastructure of communication systems. With the continuous improvement in flexibility and intelligence of optical networks, the concept of using quantum communication to enhance its security has been put forward [4]. Quantum keys are generated by QKD technology to encrypt the services, following which the network administrator selects paths and allocate resources for the keys.   The point?to?point communication in QKD?based optical networks is shown in Fig. 2. The architecture has the application plane, management plane, QKD plane and data plane from top to bottom. To realize point?to?point protection for services, QKD communication is realized by sharing a quantum key between quantum transmitter and receiver through quantum key channel (QKCh) and measurable basis channel (MBCh) (Fig. 2a). QKCh and MBCh can share the same fiber with data channel (DCh) over C?band (Fig. 2b) by WDM technology to save fiber resources and reduce costs [20]. Optical cross?connect devices (OXCs) are deployed at the data plane and QKD plane using trusted?nodes.
  Fig. 3 shows the architecture of QKD?based optical networks. To realize end?to?end protection for services, secure communication requests are first generated from clients. Then this would be received by the management plane which is responsible for route forwarding and resource allocation at the QKD and data planes. The QKD plane is logically separated from the data plane but in the same physical entity. The QKD plane provides quantum keys to protect the services at the data plane, which includes the management of quantum keys and the service encryption process, such as update of quantum keys and the process of quantum key distribution. The management of quantum keys becomes flexible and intelligent for the network administrator, and the administrator is able to adaptively change the keys to effectively guarantee the whole network security.
  4.2 Quantum Key Re?Transmission Mechanism
  In response to the above analysis, we propose a quantum key re?transmission mechanism, analogous to the Advanced Encryption Standard (AES) in classical optical networks [22].
  As shown in Fig. 4 and Algorithm 1, the mechanism is a re?transmission process of failed quantum keys. As there are lots of services transmitted in a QKD?based optical network, the start of re?transmission of the failed quantum key is always caused by the limited optical network resource. When one of these cases occurs, the failed quantum key needs to formulate a re?transmission time window, which could try many times within a range. The re?transmission time window depends on the security degree required by users. A high secure degree service needs a large re?transmission time window to try many times for safely reaching the receiver, just like the third axis. A low secure degree service re?transmits within a short time window. For example, there are six wavelengths in one fiber used for services, quantum keys and measurable basis information, respectively. When all the quantum key channels are occupied, the quantum keys need wait a certain time to re?transmit.   Algorithm 1: quantum key re?transmission
  1. For each quantum key {
  2. While (failed quantum key been detected) {
  3. Select random distribution;
  4. Set the range of [Δt];
  5. Do {
  6. Generate tri in the range of time window
  7. utilizing the distribution;
  8. } While ( tri < Tei ) tsi
  9. }
  10. While ( clock comes to[tri]) {
  11. Compute one path d utilizing Dijkstra
  12. algorithm;
  13. If d ≠?[?], Then First Fit algorithm for
  14. time?slot assignment;
  15. Else the quantum key failed to transmit;
  16. }
  17. }
  We give specific quantum key re?transmission algorithms for users in need of different secure requirements. A quantum key in the algorithm is denoted as qr (s, d, ts, th, tr, ?t), where u is the number of quantum keys, s and d represent sources and destination nodes, ts and th are its start time and hold time respectively, and ?t is the time window width. The arrival time of each update key is denoted as tsi, which should be generated before the leaves of data service Tei. The hold time of each re?transmission quantum key is a fixed value of 1s. Firstly, once a quantum key transmission failure is detected, the secure degree of the service is judged and a re?transmission time window is set. If the secure requirement is in a high degree, we set a long range for the time window and vice versa. The range values are designed according to the simulation results. Then, when the clock goes to tsi, the network administrator computes one shortest path among several available paths by the Dijkstra algorithm with the same source node and destination node with the services. If there is no available path or time slot, this quantum key is failed to be transmitted and then would be thrown away.
  4.3 Simulation Results
  Simulations were conducted to evaluate the proposed mechanism and ensure the feasibility of the re?transmission mechanism. In the simulation, the topology is a national science fund network (NSFNET) with 14 nodes and 21 links. The number of services is 100,000. The wavelength numbers of DCh, QKCh and MBCh are set as 28, 4, and 4, respectively. The simulations were carried out in the software virtual studio that is based on C++ language. We studied the performance of QKD?based optical networks in terms of blocking probability, resource utilization probability, re? transmission protection degree and re?transmission successful probability.   We simulated re?transmission of quantum keys random generated from different size time windows (Fig. 5). The quantum key was re?tried from the current failure time, and the time window is increased by 1 s each time until the data service transmission time ends. It can be seen that the blocking rate of a re?transmission quantum key becomes stable gradually as the traffic load increases. We found that larger key re?transmission time windows could result in lower blocking probability by comparing the time windows with different sizes. This is because more time is given to make the failed quantum key have more chances to try re?transmission. This could increase the security of data services.
  Fig. 6 shows the protection degrees of data services after re?transmission compared with no re?transmission. The abscissa indicates the types of re?transmission time window in the order which are no re?transmission (type 1), [0, 1] (type 2), [0, 2] (type 3), [0, 3] (type 4), [0, 4] (type 5), [0, all] (type 6). The re?transmission has a certain increase in full?protect data services which are suitable for the high security level services compared with no re?transmission. The number of part?protect data services after re?transmission is reduced while the number of none?protect data services is slightly higher. The overall security level of the full?protect and part?protect data services is increased compared to the services with no re?transmission.
  The successful probability of key re?transmission in different sizes of time window is shown in Fig. 7. With the increase in traffic load (the density of data services), the overall trend of successful re?transmission is gradually small. The higher successful re?transmission probability is always with bigger time windows, which could reduce the blocking probability in a big degree (Fig. 4) to enhance the network security. Therefore, bigger re?transmission time windows can result in lower blocking probability, higher resource utilization and bigger numbers of successful re?transmission.
  5 Main Research Challenges
  With optical networks becoming more virtualized and intelligent, they are facing with various security risks. For these security problems, quantum communication can provide a reliable and secure scheme for optical networks, helping guarantee the backbone security of telecommunication networks and reduce the complexity of management. QKD?based optical networks are developing from point?to?point application to multi?node application. However, further research is needed, especially on the important issues shown in Fig. 8.   5.1 Quantum Key Management
  In recent years, quantum communication in optical networks has made great progress and entered the trial stage, in which the quantum nodes achieve receive and forwarding function both for quantum and classical light signals. It has become a consensus that quantum can be used for the medium that carries critical information, so the management of quantum keys has attracted much research attention because it is the basis for secure optical networks. Storing quantum keys at a node, updating quantum keys to ensure key security, and allocating resources for a large number of quantum keys are hot topics in the research of quantum key management.
  5.2 Quantum Key Survivability
  Survivability is an issue every network has to take into consideration, and QKD?based optical networks are no exception. It also means the disaster resistance of quantum keys in the network. In order to achieve the protection of services in optical networks, we should study protection and recovery measures of QKD?based optical networks, as well as the collaborative protection of quantum keys and services.
  5.3 Network Construction Cost Reduction
  Cost reduction plays a decisive role in the development and practical application of QKD?based optical networks. The high cost of network construction is always caused by the high cost of hardware equipment. The transmission of quantum combined with classic signal can not only ensure “absolute security” of services in optical networks, but also help to reduce the laying cost of fiber and that of its management and maintenance. The following issues are crucial for the cost reduction: how to select wavelength for quantum keys to reduce crosstalk with classical channels; how to make a long?distance safe transmission for reducing the use of hardware devices; how to deploy hardware devices at a minimum cost.
  6 Conclusions
  With the development of quantum networks in metro areas, quantum communication is becoming a key technology to support optical security in the future. In this paper, we describe quantum communication as part of a secure communications solution, and specifically introduce the architecture of QKD?based optical networks for flexibly and dynamically protecting services. A more secure quantum key re?transmission mechanism is proposed to solve the security risk issue in QKD?based optical networks. The numerical simulation results show the good performance of the mechanism. Our future work will focus on quantum management, quantum survivability, and the cost reduction of network construction in QKD?based optical networks.
其他文献
抗精子抗体的存在是造成不孕不育的主要的主要免疫因素之一,其病因是由于精子作为抗原在男女体内引起免疫反应,产生相应的抗体所致,中医理论认为,是阴阳失调所致。故治疗应消除抗体,调节免疫及阴阳平衡为原则。六味地黄汤能调节人体阴阳,提高免疫功能。  关键词:不育不孕症;六味地黄汤;中西医结合疗法  中图分类号:R256.56;R271.14 文献标识码:B 文章编号:1007-2349(2004)0
期刊
子宫内膜组织生长在子宫腔以外的异常位置而出现的病变和症状,称为子宫内膜异位症。它以痛经、月经不凋或不孕为主要临床表现,属祖国医学“癥瘕”和“痛经”的范畴,多因剖腹产及人流术后离经之血形成瘀血,瘀血内阻,冲任失调故月经量多或经期延后;瘀血阻滞胞脉,两精不能结合故不孕。  关键词:子宫内膜异位症;失笑散;中医药疗法  中图分类号:R711.71 文献标识码:B 文章编号:1007-2349(200
期刊
Internet of Things (IoT) applications such as environmental monitoring, healthcare, surveillance, event recognition and traffic control are amongst the most commonly deployed applications over the Int
期刊
Dynamic adaptive streaming over HTTP (DASH) has been widely deployed. However, large latency in HTTP/1.1 cannot meet the requirements of live streaming. Data?pushing in HTTP/2 is emerging as a promisi
期刊
荨麻疹是皮肤科常见的过敏性皮肤疾病。中医称之为“瘾疹”。中医认为荨麻疹多因禀赋不足,又食鱼虾等腥荤动风之物,或因饮食不节,胃肠积热,或因平素体虚卫表不固,风热、风寒之邪侵袭皮毛肌腠之间而发病;或因情志不遂,伤及五脏,五脏失调,肝郁不舒,气机壅滞,郁而化火,灼伤阴血,血虚化燥,肌肤失濡,复感风邪可诱发本病。  关键词:荨麻疹;中医药治疗;脱敏汤  中图分类号:R758.24 文献标识码:B 文章
期刊
按《中药新药临床研究指导原则》制定。临床痊愈:临床症状体征消失,胃镜复查粘膜慢性炎症明显好转,病理检查证实腺体萎缩,肠上皮化生和异型增生恢复正常或消失;显效:临床主要症状、体征消失胃镜复查粘膜慢性炎症好转,病理检查证实腺体萎缩、肠化生和异型增生恢复正常或减轻2度。  关键词:萎缩性胃炎;旋复代赭汤;疗效  中图分类号:R573.3+2 文献标识码:B 文章编号:1007-2349(2004
期刊
24例均为门诊就诊病人,其中青春期功能性子宫出血10例,年龄12~17岁,更年期功能性子宫出血14例,年龄40~50岁,更年期组中子宫内膜增生3例,有1例曾行清宫术止血未效,仍有子宫流血不止,再继续使用黄体酮片止血进行人工周期治疗也无效。  关键词:补中益气汤;功能性子宫出血;中医药疗法  中图分类号:R711.52 文献标识码:B 文章编号:1007-2349(2004)03-0016-01
期刊
泌尿系结石属中医石淋范畴。巢元方在《诸病源候论.诸淋病候》中提出“石淋者,肾主水,水结则化为石,故肾客砂石,肾虚为热所乘。”其病因病机为肾虚及下焦湿热,蕴积日久,煎熬成石,石阻尿路而见腰腹疼痛,小便艰涩,血尿等。  关键词:泌尿系结石;三金益肾汤;中医药疗法  中图分类号:R256.52 文献标识码:B 文章编号:1007-2349(2004)03-0020-01
期刊
诊断标准 WHO糖尿病诊断标准,确认并发周围神经病变32例糖尿病有下列表现之一者可以诊断为糖尿病周围神经病变。肢体感觉,运动神经病变表现为蚁走感、麻木、发凉、烧灼样、撕裂样或针刺样疼痛,肌无力等;深浅感觉明显减速,跟腱反射,膝反射明显减退或消失。  关键词:糖尿病神经病变;中医药疗法;灯盏细辛注射液  中图分类号:R587.2 文献标识码:B 文章编号:1007-2349(2004)03-00
期刊
功能性消化不良(functional dyspepsia FD)是指非器质性病变引起的以餐后胃胀满隐痛,暖气恶心、纳呆食少等为主要症状的临床综合征,在人群中发病率高达20~30%,占消化门诊的50%左右,由于其病因、病理机制涉及多种因素,现无特异性治疗,笔者运用逍遥散加减治疗FD患者75例,并与用吗丁啉治疗50例作对照,现将结果报告如下。  关键词:功能性消化不良;逍遥散;中医药疗法  中图分类号
期刊