当前位置:主页 > 科技论文 > 网络通信论文 >

量子保密通信网络的动态路由及应用接入研究

发布时间:2018-08-05 18:13
【摘要】:随着科技的不断进步,社会信息化程度不断提高,信息的安全变得越来越重要。量子通信技术日渐成熟,越来越多的量子通信网络搭建成功,量子密钥分发保证链路通信的绝对安全性已经得到验证。基于可信中继的量子密钥分发网络因其扩展性强、技术日益成熟而逐渐成为量子保密通信组网的首选方案。因而如何高效的利用高度安全的量子通信网络显着至关重要,并且通信网络中的路由选择问题是可信中继量子密钥分发网络应用中实际需要解决的重要问题。本文研究的重点分为两个方面:将现有的经典应用简单方便的接入量子通信网络;基于量子密钥分发的通信网络中信息传输的路由选择问题。本文的结构如下:首先,本文介绍了量子通信技术的发展状况和现状分析;其次,介绍了保证量子通信信息传输安全的量子力学的相关知识,包括海森堡不确定性原理、量子态不可克隆原理以及典型量子通信协议,BB84协议和B92协议;第三章研究分析了现有的量子密钥分发网络的加密方法,进而提出将经典应用接入量子通信网络的方法。通过对经典应用发送的IP数据报进行分析,对需要加密解密的数据报进行加密解密处理后转发到量子通信网络中,对不需要加密解密处理的IP数据报直接进行转发。这样不需要对不同的经典应用重新设计来接入量子通信网络,既保证了信息传输的高效性又减少了量子密钥的消耗。用这种方法,克服了现有技术在各种应用中利用密钥对数据加密时需要对各种协议有详细的了解,才能按照报协议封装要求封装数据的不足,并且能够区分接收到的数据属于量子应用终端的业务还是经典应用终端的业务,实现了网络中量子保密通信和经典通信的兼容。最后用Winsock简单模拟实现该方法的过程;第四章在研究分析博弈论的基础上,提出基于博弈论的量子通信网络动态选路的方法。在网络中进行信息传输,把信息发送者和接受者看做博弈的一方,把企图窃取信息的攻击者看做博弈的另一方,博弈双方采用不同的策略对应着不同的收益。真正意义的纯策略不存在,因此采用概率分布的混合策略,分析得出求安全性的线性规划方程,通过解方程可得出最优的策略选择以及相应的安全性系数。引入链路剩余密钥量这一概念,根据不同时刻各个链路的剩余密钥量不同,选取剩余密钥量能够满足业务要求的链路作为可选传输路径,这样实现了路由的动态选择。最后,对全文总结,展望下一步工作。将经典应用接入量子通信网络的方法,只是将收到的IP数据报进行简单的处理从而达到加密解密的要求。今后还可以区分不同的业务,根据优先级、业务类型、安全性要求等采用不同的加密方式。基于博弈论的网络的动态路由选择,是建立在攻击者采用的是窃听攻击的模型基础上的,当QKD网络面临不同的攻击时,还需分析如何保证网络的安全性的同时选择最优的路由进行信息传输。
[Abstract]:With the continuous progress of science and technology and the continuous improvement of the degree of information information, the security of information becomes more and more important. Quantum communication technology is becoming mature, and more and more quantum communication networks have been built successfully. The absolute security of the quantum key distribution guarantee link communication has been verified. The quantum key distribution network based on trusted relay has been proved. Its extensibility is strong and the technology is increasingly mature, and it has gradually become the first choice of the quantum secure communication network. Therefore, how to efficiently utilize the highly secure quantum communication network is very important, and the routing problem in the communication network is an important problem to be solved in the application of the trusted relay quantum key distribution network. The focus of the study is divided into two aspects: the simple and convenient access to the existing quantum communication network and the routing problem of information transmission in the communication network based on quantum key distribution. The structure of this paper is as follows: firstly, this paper introduces the development and present situation analysis of the quantum communication technology; secondly, it introduces the guarantee of quantum communication. The relevant knowledge of quantum mechanics for information transmission security, including Heisenberg uncertainty principle, quantum state non clonability principle and typical quantum communication protocol, BB84 protocol and B92 protocol; the third chapter studies and analyzes the existing encryption method of the quantum key distribution network, and puts forward the square of the classical application to the quantum communication network. By analyzing the IP datagram sent by the classic application, the data that needs to be encrypted and decrypted is encrypted and decrypted to the quantum communication network and forwarded directly to the IP data that does not need to be encrypted and decrypted. So it does not need to redesign the different classical applications to access the quantum communication network. The efficiency of information transmission has been proved to reduce the consumption of quantum key. In this way, the existing technologies need to have a detailed understanding of various protocols when encrypting data in various applications, which can encapsulate the shortage of data in accordance with the protocol protocol, and can distinguish the received data from the quantum application. The service of terminal service or classic application terminal realizes the compatibility of quantum secure communication and classical communication in the network. Finally, the process of realizing this method is realized with Winsock simple simulation. On the basis of the analysis of game theory, the fourth chapter puts forward the method of dynamic routing of quantum communication network based on game theory. Transmission, the information sender and receiver are regarded as one party of the game, and the attacker who tries to steal information is regarded as the other party of the game. The two parties adopt different strategies to correspond to different benefits. The pure strategy of real meaning does not exist. Therefore, the mixed strategy of probability distribution is used to analyze the linear programming equation for security. The optimal strategy selection and the corresponding security coefficient can be obtained by the over solution equation. The concept of link residual key quantity is introduced. According to the difference of the remaining key amount of each link at different time, the link that can meet the requirements of the service is selected as an optional transmission path. This paper summarizes and looks forward to the next step. The method of applying the classical application to the quantum communication network is to simply process the received IP datagram to meet the requirements of encryption and decryption. In the future, different services can be distinguished from different encryption methods based on priority, service type, security and so on. Game based network The dynamic routing of the collaterals is based on the model of the attacker using the eavesdropping attack. When the QKD network faces different attacks, it also needs to analyze how to ensure the security of the network and select the optimal route for information transmission.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:O413;TN918

【相似文献】

相关期刊论文 前6条

1 何建强;屏幕广播程序的设计[J];广西民族学院学报(自然科学版);2002年S1期

2 周越;黄凌云;;可靠数据报协议通信模块的设计[J];科技信息;2010年10期

3 李春玲;应用IPX/SPX实现网络通信[J];青海师范大学学报(自然科学版);2000年01期

4 李春霞,孙魁明;IPv4向IPv6迁移的过渡策略[J];北京师范大学学报(自然科学版);2001年04期

5 黄榕宁;从IPv4到IPv6的转化及策略[J];福建师范大学学报(自然科学版);2001年03期

6 ;[J];;年期

相关会议论文 前1条

1 洪燕;周健;李凯;;IPv4与IPv6的比较研究[A];全国第16届计算机科学与技术应用(CACIS)学术会议论文集[C];2004年

相关重要报纸文章 前4条

1 刘福浩 张宗瑛;UDP数据报传输端口由你定[N];电脑报;2004年

2 ;五大难题拷问IP电话安全[N];计算机世界;2005年

3 王文彬;使用Java控制UDP协议[N];中国电脑教育报;2002年

4 唐亦敏;RFID前景不明CIO该怎么用?[N];中国计算机报;2006年

相关博士学位论文 前3条

1 徐建;TCP/IP的公平性研究[D];浙江大学;2004年

2 乐德广;下一代互联网的移动性管理技术研究[D];厦门大学;2006年

3 徐艳;移动互联网的关键技术研究[D];华南理工大学;2003年

相关硕士学位论文 前10条

1 苏彬彬;无线网络环境下未知协议语义分析与提取技术[D];电子科技大学;2014年

2 王轩;量子保密通信网络的动态路由及应用接入研究[D];西安电子科技大学;2014年

3 周璞;基于数据报的微通信元系统构架路由器模型的设计与实现[D];电子科技大学;2005年

4 朱晨;基于隧道和ⅠⅥ机制的IPv6过渡技术的研究[D];杭州电子科技大学;2014年

5 张人清;虚拟网络实验室实现原理研究[D];湘潭大学;2001年

6 李京;IPv4向IPv6过渡中安全问题的研究[D];中南民族大学;2009年

7 高小国;TCP/IP协议在传统终端上的实现[D];南京理工大学;2006年

8 夏斐斐;基于FPGA的嵌入式TCP/IP实现技术研究[D];厦门大学;2002年

9 张勇;基于GPRS的嵌入式Internet研究与实现[D];电子科技大学;2004年

10 肖鸣;分布式入侵检测系统设计[D];电子科技大学;2002年



本文编号:2166588

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2166588.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户b9206***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com