量子保密通信网络的动态路由及应用接入研究
[Abstract]:With the continuous progress of science and technology and the continuous improvement of the degree of information information, the security of information becomes more and more important. Quantum communication technology is becoming mature, and more and more quantum communication networks have been built successfully. The absolute security of the quantum key distribution guarantee link communication has been verified. The quantum key distribution network based on trusted relay has been proved. Its extensibility is strong and the technology is increasingly mature, and it has gradually become the first choice of the quantum secure communication network. Therefore, how to efficiently utilize the highly secure quantum communication network is very important, and the routing problem in the communication network is an important problem to be solved in the application of the trusted relay quantum key distribution network. The focus of the study is divided into two aspects: the simple and convenient access to the existing quantum communication network and the routing problem of information transmission in the communication network based on quantum key distribution. The structure of this paper is as follows: firstly, this paper introduces the development and present situation analysis of the quantum communication technology; secondly, it introduces the guarantee of quantum communication. The relevant knowledge of quantum mechanics for information transmission security, including Heisenberg uncertainty principle, quantum state non clonability principle and typical quantum communication protocol, BB84 protocol and B92 protocol; the third chapter studies and analyzes the existing encryption method of the quantum key distribution network, and puts forward the square of the classical application to the quantum communication network. By analyzing the IP datagram sent by the classic application, the data that needs to be encrypted and decrypted is encrypted and decrypted to the quantum communication network and forwarded directly to the IP data that does not need to be encrypted and decrypted. So it does not need to redesign the different classical applications to access the quantum communication network. The efficiency of information transmission has been proved to reduce the consumption of quantum key. In this way, the existing technologies need to have a detailed understanding of various protocols when encrypting data in various applications, which can encapsulate the shortage of data in accordance with the protocol protocol, and can distinguish the received data from the quantum application. The service of terminal service or classic application terminal realizes the compatibility of quantum secure communication and classical communication in the network. Finally, the process of realizing this method is realized with Winsock simple simulation. On the basis of the analysis of game theory, the fourth chapter puts forward the method of dynamic routing of quantum communication network based on game theory. Transmission, the information sender and receiver are regarded as one party of the game, and the attacker who tries to steal information is regarded as the other party of the game. The two parties adopt different strategies to correspond to different benefits. The pure strategy of real meaning does not exist. Therefore, the mixed strategy of probability distribution is used to analyze the linear programming equation for security. The optimal strategy selection and the corresponding security coefficient can be obtained by the over solution equation. The concept of link residual key quantity is introduced. According to the difference of the remaining key amount of each link at different time, the link that can meet the requirements of the service is selected as an optional transmission path. This paper summarizes and looks forward to the next step. The method of applying the classical application to the quantum communication network is to simply process the received IP datagram to meet the requirements of encryption and decryption. In the future, different services can be distinguished from different encryption methods based on priority, service type, security and so on. Game based network The dynamic routing of the collaterals is based on the model of the attacker using the eavesdropping attack. When the QKD network faces different attacks, it also needs to analyze how to ensure the security of the network and select the optimal route for information transmission.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:O413;TN918
【相似文献】
相关期刊论文 前6条
1 何建强;屏幕广播程序的设计[J];广西民族学院学报(自然科学版);2002年S1期
2 周越;黄凌云;;可靠数据报协议通信模块的设计[J];科技信息;2010年10期
3 李春玲;应用IPX/SPX实现网络通信[J];青海师范大学学报(自然科学版);2000年01期
4 李春霞,孙魁明;IPv4向IPv6迁移的过渡策略[J];北京师范大学学报(自然科学版);2001年04期
5 黄榕宁;从IPv4到IPv6的转化及策略[J];福建师范大学学报(自然科学版);2001年03期
6 ;[J];;年期
相关会议论文 前1条
1 洪燕;周健;李凯;;IPv4与IPv6的比较研究[A];全国第16届计算机科学与技术应用(CACIS)学术会议论文集[C];2004年
相关重要报纸文章 前4条
1 刘福浩 张宗瑛;UDP数据报传输端口由你定[N];电脑报;2004年
2 ;五大难题拷问IP电话安全[N];计算机世界;2005年
3 王文彬;使用Java控制UDP协议[N];中国电脑教育报;2002年
4 唐亦敏;RFID前景不明CIO该怎么用?[N];中国计算机报;2006年
相关博士学位论文 前3条
1 徐建;TCP/IP的公平性研究[D];浙江大学;2004年
2 乐德广;下一代互联网的移动性管理技术研究[D];厦门大学;2006年
3 徐艳;移动互联网的关键技术研究[D];华南理工大学;2003年
相关硕士学位论文 前10条
1 苏彬彬;无线网络环境下未知协议语义分析与提取技术[D];电子科技大学;2014年
2 王轩;量子保密通信网络的动态路由及应用接入研究[D];西安电子科技大学;2014年
3 周璞;基于数据报的微通信元系统构架路由器模型的设计与实现[D];电子科技大学;2005年
4 朱晨;基于隧道和ⅠⅥ机制的IPv6过渡技术的研究[D];杭州电子科技大学;2014年
5 张人清;虚拟网络实验室实现原理研究[D];湘潭大学;2001年
6 李京;IPv4向IPv6过渡中安全问题的研究[D];中南民族大学;2009年
7 高小国;TCP/IP协议在传统终端上的实现[D];南京理工大学;2006年
8 夏斐斐;基于FPGA的嵌入式TCP/IP实现技术研究[D];厦门大学;2002年
9 张勇;基于GPRS的嵌入式Internet研究与实现[D];电子科技大学;2004年
10 肖鸣;分布式入侵检测系统设计[D];电子科技大学;2002年
,本文编号:2166588
本文链接:https://www.wllwen.com/kejilunwen/wltx/2166588.html