Abstract
In the Internet Age, optical networks are vulnerable to numerous cyberattacks, and conventional key distribution methods suffer from the increased computational power. QKD can distribute information-theoretically secure secret keys between two parties based on the principles of quantum mechanics. Integrating QKD into optical networks can leverage existing fiber infrastructures with wavelength division multiplexing for the practical deployment of secret keys, and accordingly employ the secret keys for optical-layer security enhancement. Then, how to efficiently deploy and employ secret keys over QKD-integrated optical networks are emerging as two challenges. This article proposes a framework of key as a service (KaaS, i.e., providing secret keys as a service in a timely and accurate manner to satisfy the security requirements) to jointly overcome these two challenges. To enable the typical functions (i.e., secret-key deployment and employment) in KaaS, two secret-key virtualization steps, that is, key pool (KP) assembly and virtual key pool (VKP) assembly, are introduced. Also, we illustrate a new QKD-integrated optical network architecture from a holistic view, where the control layer is implemented by software defined networking for efficient network management. A time-shared KP assembly strategy and an on-demand VKP assembly strategy are presented for KaaS implementation. The success probabilities of KP assembly and VKP assembly are defined to evaluate the benefits of KaaS for efficiently deploying and employing secret keys as well as for security enhancement over QKD-integrated optical networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.