天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

量子保密通信網(wǎng)絡(luò)的動態(tài)路由及應(yīng)用接入研究

發(fā)布時(shí)間:2018-08-05 18:13
【摘要】:隨著科技的不斷進(jìn)步,社會信息化程度不斷提高,信息的安全變得越來越重要。量子通信技術(shù)日漸成熟,越來越多的量子通信網(wǎng)絡(luò)搭建成功,量子密鑰分發(fā)保證鏈路通信的絕對安全性已經(jīng)得到驗(yàn)證;诳尚胖欣^的量子密鑰分發(fā)網(wǎng)絡(luò)因其擴(kuò)展性強(qiáng)、技術(shù)日益成熟而逐漸成為量子保密通信組網(wǎng)的首選方案。因而如何高效的利用高度安全的量子通信網(wǎng)絡(luò)顯著至關(guān)重要,并且通信網(wǎng)絡(luò)中的路由選擇問題是可信中繼量子密鑰分發(fā)網(wǎng)絡(luò)應(yīng)用中實(shí)際需要解決的重要問題。本文研究的重點(diǎn)分為兩個(gè)方面:將現(xiàn)有的經(jīng)典應(yīng)用簡單方便的接入量子通信網(wǎng)絡(luò);基于量子密鑰分發(fā)的通信網(wǎng)絡(luò)中信息傳輸?shù)穆酚蛇x擇問題。本文的結(jié)構(gòu)如下:首先,本文介紹了量子通信技術(shù)的發(fā)展?fàn)顩r和現(xiàn)狀分析;其次,介紹了保證量子通信信息傳輸安全的量子力學(xué)的相關(guān)知識,包括海森堡不確定性原理、量子態(tài)不可克隆原理以及典型量子通信協(xié)議,BB84協(xié)議和B92協(xié)議;第三章研究分析了現(xiàn)有的量子密鑰分發(fā)網(wǎng)絡(luò)的加密方法,進(jìn)而提出將經(jīng)典應(yīng)用接入量子通信網(wǎng)絡(luò)的方法。通過對經(jīng)典應(yīng)用發(fā)送的IP數(shù)據(jù)報(bào)進(jìn)行分析,對需要加密解密的數(shù)據(jù)報(bào)進(jìn)行加密解密處理后轉(zhuǎn)發(fā)到量子通信網(wǎng)絡(luò)中,對不需要加密解密處理的IP數(shù)據(jù)報(bào)直接進(jìn)行轉(zhuǎn)發(fā)。這樣不需要對不同的經(jīng)典應(yīng)用重新設(shè)計(jì)來接入量子通信網(wǎng)絡(luò),既保證了信息傳輸?shù)母咝杂譁p少了量子密鑰的消耗。用這種方法,克服了現(xiàn)有技術(shù)在各種應(yīng)用中利用密鑰對數(shù)據(jù)加密時(shí)需要對各種協(xié)議有詳細(xì)的了解,才能按照報(bào)協(xié)議封裝要求封裝數(shù)據(jù)的不足,并且能夠區(qū)分接收到的數(shù)據(jù)屬于量子應(yīng)用終端的業(yè)務(wù)還是經(jīng)典應(yīng)用終端的業(yè)務(wù),實(shí)現(xiàn)了網(wǎng)絡(luò)中量子保密通信和經(jīng)典通信的兼容。最后用Winsock簡單模擬實(shí)現(xiàn)該方法的過程;第四章在研究分析博弈論的基礎(chǔ)上,提出基于博弈論的量子通信網(wǎng)絡(luò)動態(tài)選路的方法。在網(wǎng)絡(luò)中進(jìn)行信息傳輸,把信息發(fā)送者和接受者看做博弈的一方,把企圖竊取信息的攻擊者看做博弈的另一方,博弈雙方采用不同的策略對應(yīng)著不同的收益。真正意義的純策略不存在,因此采用概率分布的混合策略,分析得出求安全性的線性規(guī)劃方程,通過解方程可得出最優(yōu)的策略選擇以及相應(yīng)的安全性系數(shù)。引入鏈路剩余密鑰量這一概念,根據(jù)不同時(shí)刻各個(gè)鏈路的剩余密鑰量不同,選取剩余密鑰量能夠滿足業(yè)務(wù)要求的鏈路作為可選傳輸路徑,這樣實(shí)現(xiàn)了路由的動態(tài)選擇。最后,對全文總結(jié),展望下一步工作。將經(jīng)典應(yīng)用接入量子通信網(wǎng)絡(luò)的方法,只是將收到的IP數(shù)據(jù)報(bào)進(jìn)行簡單的處理從而達(dá)到加密解密的要求。今后還可以區(qū)分不同的業(yè)務(wù),根據(jù)優(yōu)先級、業(yè)務(wù)類型、安全性要求等采用不同的加密方式;诓┺恼摰木W(wǎng)絡(luò)的動態(tài)路由選擇,是建立在攻擊者采用的是竊聽攻擊的模型基礎(chǔ)上的,當(dāng)QKD網(wǎng)絡(luò)面臨不同的攻擊時(shí),還需分析如何保證網(wǎng)絡(luò)的安全性的同時(shí)選擇最優(yōu)的路由進(jìn)行信息傳輸。
[Abstract]:With the continuous progress of science and technology and the continuous improvement of the degree of information information, the security of information becomes more and more important. Quantum communication technology is becoming mature, and more and more quantum communication networks have been built successfully. The absolute security of the quantum key distribution guarantee link communication has been verified. The quantum key distribution network based on trusted relay has been proved. Its extensibility is strong and the technology is increasingly mature, and it has gradually become the first choice of the quantum secure communication network. Therefore, how to efficiently utilize the highly secure quantum communication network is very important, and the routing problem in the communication network is an important problem to be solved in the application of the trusted relay quantum key distribution network. The focus of the study is divided into two aspects: the simple and convenient access to the existing quantum communication network and the routing problem of information transmission in the communication network based on quantum key distribution. The structure of this paper is as follows: firstly, this paper introduces the development and present situation analysis of the quantum communication technology; secondly, it introduces the guarantee of quantum communication. The relevant knowledge of quantum mechanics for information transmission security, including Heisenberg uncertainty principle, quantum state non clonability principle and typical quantum communication protocol, BB84 protocol and B92 protocol; the third chapter studies and analyzes the existing encryption method of the quantum key distribution network, and puts forward the square of the classical application to the quantum communication network. By analyzing the IP datagram sent by the classic application, the data that needs to be encrypted and decrypted is encrypted and decrypted to the quantum communication network and forwarded directly to the IP data that does not need to be encrypted and decrypted. So it does not need to redesign the different classical applications to access the quantum communication network. The efficiency of information transmission has been proved to reduce the consumption of quantum key. In this way, the existing technologies need to have a detailed understanding of various protocols when encrypting data in various applications, which can encapsulate the shortage of data in accordance with the protocol protocol, and can distinguish the received data from the quantum application. The service of terminal service or classic application terminal realizes the compatibility of quantum secure communication and classical communication in the network. Finally, the process of realizing this method is realized with Winsock simple simulation. On the basis of the analysis of game theory, the fourth chapter puts forward the method of dynamic routing of quantum communication network based on game theory. Transmission, the information sender and receiver are regarded as one party of the game, and the attacker who tries to steal information is regarded as the other party of the game. The two parties adopt different strategies to correspond to different benefits. The pure strategy of real meaning does not exist. Therefore, the mixed strategy of probability distribution is used to analyze the linear programming equation for security. The optimal strategy selection and the corresponding security coefficient can be obtained by the over solution equation. The concept of link residual key quantity is introduced. According to the difference of the remaining key amount of each link at different time, the link that can meet the requirements of the service is selected as an optional transmission path. This paper summarizes and looks forward to the next step. The method of applying the classical application to the quantum communication network is to simply process the received IP datagram to meet the requirements of encryption and decryption. In the future, different services can be distinguished from different encryption methods based on priority, service type, security and so on. Game based network The dynamic routing of the collaterals is based on the model of the attacker using the eavesdropping attack. When the QKD network faces different attacks, it also needs to analyze how to ensure the security of the network and select the optimal route for information transmission.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:O413;TN918

【相似文獻(xiàn)】

相關(guān)期刊論文 前6條

1 何建強(qiáng);屏幕廣播程序的設(shè)計(jì)[J];廣西民族學(xué)院學(xué)報(bào)(自然科學(xué)版);2002年S1期

2 周越;黃凌云;;可靠數(shù)據(jù)報(bào)協(xié)議通信模塊的設(shè)計(jì)[J];科技信息;2010年10期

3 李春玲;應(yīng)用IPX/SPX實(shí)現(xiàn)網(wǎng)絡(luò)通信[J];青海師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2000年01期

4 李春霞,孫魁明;IPv4向IPv6遷移的過渡策略[J];北京師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年04期

5 黃榕寧;從IPv4到IPv6的轉(zhuǎn)化及策略[J];福建師范大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年03期

6 ;[J];;年期

相關(guān)會議論文 前1條

1 洪燕;周健;李凱;;IPv4與IPv6的比較研究[A];全國第16屆計(jì)算機(jī)科學(xué)與技術(shù)應(yīng)用(CACIS)學(xué)術(shù)會議論文集[C];2004年

相關(guān)重要報(bào)紙文章 前4條

1 劉福浩 張宗瑛;UDP數(shù)據(jù)報(bào)傳輸端口由你定[N];電腦報(bào);2004年

2 ;五大難題拷問IP電話安全[N];計(jì)算機(jī)世界;2005年

3 王文彬;使用Java控制UDP協(xié)議[N];中國電腦教育報(bào);2002年

4 唐亦敏;RFID前景不明CIO該怎么用?[N];中國計(jì)算機(jī)報(bào);2006年

相關(guān)博士學(xué)位論文 前3條

1 徐建;TCP/IP的公平性研究[D];浙江大學(xué);2004年

2 樂德廣;下一代互聯(lián)網(wǎng)的移動性管理技術(shù)研究[D];廈門大學(xué);2006年

3 徐艷;移動互聯(lián)網(wǎng)的關(guān)鍵技術(shù)研究[D];華南理工大學(xué);2003年

相關(guān)碩士學(xué)位論文 前10條

1 蘇彬彬;無線網(wǎng)絡(luò)環(huán)境下未知協(xié)議語義分析與提取技術(shù)[D];電子科技大學(xué);2014年

2 王軒;量子保密通信網(wǎng)絡(luò)的動態(tài)路由及應(yīng)用接入研究[D];西安電子科技大學(xué);2014年

3 周璞;基于數(shù)據(jù)報(bào)的微通信元系統(tǒng)構(gòu)架路由器模型的設(shè)計(jì)與實(shí)現(xiàn)[D];電子科技大學(xué);2005年

4 朱晨;基于隧道和ⅠⅥ機(jī)制的IPv6過渡技術(shù)的研究[D];杭州電子科技大學(xué);2014年

5 張人清;虛擬網(wǎng)絡(luò)實(shí)驗(yàn)室實(shí)現(xiàn)原理研究[D];湘潭大學(xué);2001年

6 李京;IPv4向IPv6過渡中安全問題的研究[D];中南民族大學(xué);2009年

7 高小國;TCP/IP協(xié)議在傳統(tǒng)終端上的實(shí)現(xiàn)[D];南京理工大學(xué);2006年

8 夏斐斐;基于FPGA的嵌入式TCP/IP實(shí)現(xiàn)技術(shù)研究[D];廈門大學(xué);2002年

9 張勇;基于GPRS的嵌入式Internet研究與實(shí)現(xiàn)[D];電子科技大學(xué);2004年

10 肖鳴;分布式入侵檢測系統(tǒng)設(shè)計(jì)[D];電子科技大學(xué);2002年

,

本文編號:2166588

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2166588.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶b9206***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com