Quantum encrypted signals on multiuser optical fiber networks:Simulation analysis of next generation services and technologies

Asif, Rameez (2017) Quantum encrypted signals on multiuser optical fiber networks:Simulation analysis of next generation services and technologies. In: Proceedings of the 2017 8th International Conference on the Network of the Future, NOF 2017. Proceedings of the 2017 8th International Conference on the Network of the Future, NOF 2017 . The Institute of Electrical and Electronics Engineers (IEEE), GBR, pp. 159-164. ISBN 9781538605547

Full text not available from this repository. (Request a copy)

Abstract

Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home (FTTH)' networks and data centers. It is important that the newly designed encrypted networks are fully functional, reconfigurable, compatible, flexible and scalable with the existing deployed optical fiber networks around the globe. The prime benefit of having FTTH networks is the optical end-to-end data encryption that can best be implemented by quantum-keydistribution (QKD) protocols using state-of-the-art telecommunication components, i.e. continuous-variable quantum key distribution (CV-QKD). In this paper, we numerically investigate the quadrature phase shift keying (QPSK) based CV-QKD network that is compatible with the next generation (NG) services such as point-to-point (P2P) transmission and multicast overlay (MCO) traffic for audio/video signalling. We have further investigated the performance of quantum signals on multi-user fibers by emulating 7-, 12- A nd 19-core multi-core fibers (MCF). 100 Mbits/s secure key rates (SKRs) can be generated for inter-core crosstalk (XT) values of <-20 dB. These results and theoretical framework will allow the telecommunication industry to extend these scenarios not only to accommodate more complex trust constraints, but also to take into account the robustness and resiliency of a complex encrypted network.

Item Type: Book Section
Additional Information: Publisher Copyright: © 2017 IEEE.
Uncontrolled Keywords: computer networks and communications,hardware and architecture,safety, risk, reliability and quality,information systems and management ,/dk/atira/pure/subjectarea/asjc/1700/1705
Faculty \ School: Faculty of Science > School of Computing Sciences
UEA Research Groups: Faculty of Science > Research Groups > Smart Emerging Technologies
Faculty of Science > Research Groups > Cyber Security Privacy and Trust Laboratory
Related URLs:
Depositing User: LivePure Connector
Date Deposited: 23 Aug 2022 13:30
Last Modified: 14 Mar 2023 08:38
URI: https://ueaeprints.uea.ac.uk/id/eprint/87571
DOI: 10.1109/NOF.2017.8251243

Actions (login required)

View Item View Item