GMPLS Network Control Plane Enabling Quantum Encryption in End-to-End Services

被引:0
|
作者
Aguado, A. [1 ]
Lopez, V. [2 ]
Martinez-Mateo, J. [1 ]
Peev, M. [3 ]
Lopez, D. [2 ]
Martin, V. [1 ]
机构
[1] Univ Politecn Madrid, Ctr Computat Simulat, E-28660 Madrid, Spain
[2] Telefon Invest & Desarrollo, Ronda Comunicac S-N, Madrid 28050, Spain
[3] Huawei Technol Duesseldorf GmbH, Riesstr 25, D-80992 Munich, Germany
来源
2017 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING (ONDM) | 2017年
关键词
Network Management; Quantum Key Distribution; Software Defined Networking; Generalized Multi-Protocol Label Switching; Path Computation Element;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum key distribution (QKD) is a novel technology that can be seen as a synchronized source of symmetric keys in two separated domains that is immune to any algorithmic cryptanalysis. This technology makes impossible to copy the quantum states exchanged between two endpoints. Therefore, if implemented properly, QKD generates keys of the highest security based on the fundamental laws of quantum physics. No algorithmic advance would force a change of technology, as opposed to current public key cryptographic protocols, that rely on the complexity of certain mathematical problems. These protocols are at risk due to the advances in quantum computing and should be changed. On the other hand, network services are increasingly requesting more flexibility and network resources. One of the most desired capabilities is having higher level of security for the transmission between remote premises. In this work, we propose a node architecture to provide QKD-enhanced security in end-to-end (E2E) services and analyze the control plane requirements in order to provide such services in transport networks. This work defines and demonstrates for the first time extensions for generalized multi-protocol label switching (GMPLS) networks. Results show how these new services could be integrated in existing operators' control plane architectures.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] End-to-end performance of web services
    Cremonesi, P
    Serazzi, G
    PERFORMANCE EVALUATION OF COMPLEX SYSTEMS: TECHNIQUES AND TOOLS: PERFORMANCE 2002 TUTORIAL LECTURES, 2002, 2459 : 158 - 178
  • [42] Implementing end-to-end encryption strategist for strengthening data security across network communication
    Balpande, Vijaya Parag
    Aher, Ujjwala Bal
    Borkar, Pradnya
    Bhanarkar, Parul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
  • [43] End-to-end neural network based optimal quadcopter control
    Ferede, Robin
    de Croon, Guido
    De Wagter, Christophe
    Izzo, Dario
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2024, 172
  • [44] End-to-end elasticity control of cloud-network slices
    Medeiros, Alisson
    Neto, Augusto
    Sampaio, Silvio
    Pasquini, Rafael
    Baliosian, Javier
    INTERNET TECHNOLOGY LETTERS, 2019, 2 (04)
  • [45] Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network
    Inam, Saba
    Kanwal, Shamsa
    Anwar, Anousha
    Mirza, Noor Fatima
    Alfraihi, Hessa
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [46] Hopf bifurcation of end-to-end network congestion control algorithm
    Yang, Hong-yong
    Zhang, Si-ying
    Yang, Hong-yong
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 298 - +
  • [47] Performance evaluation of an end-to-end rate control approach for ABR services
    Chen, JR
    Chen, YC
    Chan, CT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1998, E81B (12) : 2400 - 2412
  • [48] Performance evaluation of an end-to-end rate control approach for ABR services
    Natl Chiao Tung Univ, Hsinchu, Taiwan
    IEICE Trans Commun, 12 (2400-2412):
  • [49] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [50] Homomorphic Encryption as End-to-End Solution for Smart Devices
    Shanthala, P. T.
    Annapurna, D.
    Nittala, Sravanthi
    Bhat, Arpitha S.
    Aishwarya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62