量子保密通信網(wǎng)絡(luò)的動態(tài)路由及應(yīng)用接入研究
[Abstract]:With the continuous progress of science and technology and the continuous improvement of the degree of information information, the security of information becomes more and more important. Quantum communication technology is becoming mature, and more and more quantum communication networks have been built successfully. The absolute security of the quantum key distribution guarantee link communication has been verified. The quantum key distribution network based on trusted relay has been proved. Its extensibility is strong and the technology is increasingly mature, and it has gradually become the first choice of the quantum secure communication network. Therefore, how to efficiently utilize the highly secure quantum communication network is very important, and the routing problem in the communication network is an important problem to be solved in the application of the trusted relay quantum key distribution network. The focus of the study is divided into two aspects: the simple and convenient access to the existing quantum communication network and the routing problem of information transmission in the communication network based on quantum key distribution. The structure of this paper is as follows: firstly, this paper introduces the development and present situation analysis of the quantum communication technology; secondly, it introduces the guarantee of quantum communication. The relevant knowledge of quantum mechanics for information transmission security, including Heisenberg uncertainty principle, quantum state non clonability principle and typical quantum communication protocol, BB84 protocol and B92 protocol; the third chapter studies and analyzes the existing encryption method of the quantum key distribution network, and puts forward the square of the classical application to the quantum communication network. By analyzing the IP datagram sent by the classic application, the data that needs to be encrypted and decrypted is encrypted and decrypted to the quantum communication network and forwarded directly to the IP data that does not need to be encrypted and decrypted. So it does not need to redesign the different classical applications to access the quantum communication network. The efficiency of information transmission has been proved to reduce the consumption of quantum key. In this way, the existing technologies need to have a detailed understanding of various protocols when encrypting data in various applications, which can encapsulate the shortage of data in accordance with the protocol protocol, and can distinguish the received data from the quantum application. The service of terminal service or classic application terminal realizes the compatibility of quantum secure communication and classical communication in the network. Finally, the process of realizing this method is realized with Winsock simple simulation. On the basis of the analysis of game theory, the fourth chapter puts forward the method of dynamic routing of quantum communication network based on game theory. Transmission, the information sender and receiver are regarded as one party of the game, and the attacker who tries to steal information is regarded as the other party of the game. The two parties adopt different strategies to correspond to different benefits. The pure strategy of real meaning does not exist. Therefore, the mixed strategy of probability distribution is used to analyze the linear programming equation for security. The optimal strategy selection and the corresponding security coefficient can be obtained by the over solution equation. The concept of link residual key quantity is introduced. According to the difference of the remaining key amount of each link at different time, the link that can meet the requirements of the service is selected as an optional transmission path. This paper summarizes and looks forward to the next step. The method of applying the classical application to the quantum communication network is to simply process the received IP datagram to meet the requirements of encryption and decryption. In the future, different services can be distinguished from different encryption methods based on priority, service type, security and so on. Game based network The dynamic routing of the collaterals is based on the model of the attacker using the eavesdropping attack. When the QKD network faces different attacks, it also needs to analyze how to ensure the security of the network and select the optimal route for information transmission.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:O413;TN918
【相似文獻(xiàn)】
相關(guān)期刊論文 前6條
1 何建強(qiáng);屏幕廣播程序的設(shè)計(jì)[J];廣西民族學(xué)院學(xué)報(bào)(自然科學(xué)版);2002年S1期
2 周越;黃凌云;;可靠數(shù)據(jù)報(bào)協(xié)議通信模塊的設(shè)計(jì)[J];科技信息;2010年10期
3 李春玲;應(yīng)用IPX/SPX實(shí)現(xiàn)網(wǎng)絡(luò)通信[J];青海師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2000年01期
4 李春霞,孫魁明;IPv4向IPv6遷移的過渡策略[J];北京師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年04期
5 黃榕寧;從IPv4到IPv6的轉(zhuǎn)化及策略[J];福建師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年03期
6 ;[J];;年期
相關(guān)會議論文 前1條
1 洪燕;周健;李凱;;IPv4與IPv6的比較研究[A];全國第16屆計(jì)算機(jī)科學(xué)與技術(shù)應(yīng)用(CACIS)學(xué)術(shù)會議論文集[C];2004年
相關(guān)重要報(bào)紙文章 前4條
1 劉福浩 張宗瑛;UDP數(shù)據(jù)報(bào)傳輸端口由你定[N];電腦報(bào);2004年
2 ;五大難題拷問IP電話安全[N];計(jì)算機(jī)世界;2005年
3 王文彬;使用Java控制UDP協(xié)議[N];中國電腦教育報(bào);2002年
4 唐亦敏;RFID前景不明CIO該怎么用?[N];中國計(jì)算機(jī)報(bào);2006年
相關(guān)博士學(xué)位論文 前3條
1 徐建;TCP/IP的公平性研究[D];浙江大學(xué);2004年
2 樂德廣;下一代互聯(lián)網(wǎng)的移動性管理技術(shù)研究[D];廈門大學(xué);2006年
3 徐艷;移動互聯(lián)網(wǎng)的關(guān)鍵技術(shù)研究[D];華南理工大學(xué);2003年
相關(guān)碩士學(xué)位論文 前10條
1 蘇彬彬;無線網(wǎng)絡(luò)環(huán)境下未知協(xié)議語義分析與提取技術(shù)[D];電子科技大學(xué);2014年
2 王軒;量子保密通信網(wǎng)絡(luò)的動態(tài)路由及應(yīng)用接入研究[D];西安電子科技大學(xué);2014年
3 周璞;基于數(shù)據(jù)報(bào)的微通信元系統(tǒng)構(gòu)架路由器模型的設(shè)計(jì)與實(shí)現(xiàn)[D];電子科技大學(xué);2005年
4 朱晨;基于隧道和ⅠⅥ機(jī)制的IPv6過渡技術(shù)的研究[D];杭州電子科技大學(xué);2014年
5 張人清;虛擬網(wǎng)絡(luò)實(shí)驗(yàn)室實(shí)現(xiàn)原理研究[D];湘潭大學(xué);2001年
6 李京;IPv4向IPv6過渡中安全問題的研究[D];中南民族大學(xué);2009年
7 高小國;TCP/IP協(xié)議在傳統(tǒng)終端上的實(shí)現(xiàn)[D];南京理工大學(xué);2006年
8 夏斐斐;基于FPGA的嵌入式TCP/IP實(shí)現(xiàn)技術(shù)研究[D];廈門大學(xué);2002年
9 張勇;基于GPRS的嵌入式Internet研究與實(shí)現(xiàn)[D];電子科技大學(xué);2004年
10 肖鳴;分布式入侵檢測系統(tǒng)設(shè)計(jì)[D];電子科技大學(xué);2002年
,本文編號:2166588
本文鏈接:http://sikaile.net/kejilunwen/wltx/2166588.html