Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

June 2016, Volume 3, 1, pp 7-12

Generalized Quantum Key Distribution for WDM Router Applications

N. Djeffal

,

M. Benslama

,

I. Messaoudene

N. Djeffal 1 M. Benslama 1 I. Messaoudene 3


  1. Laboratoire d Electromagnetisme et de Telecommunication, Universite Freres Mentouri Constantine. Constantine Algerie 1

  2. Laboratoire d Electronique et des Telecommunications Avancees, Universite de Bordj Bou Arreridj Bordj Bou Arreridj Algerie 3

Pages: 7-12

DOI: 10.18488/journal.76/2016.3.1/76.1.7.12

Share :


Abstract:

In this paper, we study the ability of quantum networks to support both random and non-random data traffic single-photon quantum communications signals on a shared infrastructure. The effect of wave length on distance coverage with the quantum bit error rate (QBER) of a quantum key distribution (QKD) system is increasing. The results of random phase showed minimal distance coverage over non-random phase. For fluctuating amplitude of random show a change in system performance improved sending capabilities.  Hence, it is found that rare fluctuations should not degrade system performance significantly, but the data sending mode has a significant effect on channel integrity.

Contribution/ Originality
This study presents an original structure of generalized quantum key distribution suitable for wavelength division multiplexing (WDM) application.

Keywords:


Video:

Reference:

  1. V. Alipasha, W. Gregor, and Z. Anton, "Experimental two-photon, three-dimensional entanglement for quantum communication," Physical Review Letters, vol. 89, pp. 240401-240404, 2002.
  2. Y. Chen and W. Tang, "Reconfigurable asymmetric optical burst switching for concurrent DWDM multimode switching: Architecture and research directions topics in optical communications," Communications Magazine, IEEE, vol. 48, pp. 57 –65, 2010.
  3. G. V. Chowdhary and C. S. R. Murthy, "Dynamic multicast transfer engineering in WDM groomed mesh networks," Proc. BROADNETS'04, 2004.
  4. A. Khalil, C. Assi, A. Hadjiantonis, G. Ellinas, and M. A. Ali, "On multicast traf_c grooming in WDM networks," Proc. IEEE ISCC'04,Canadian Conf. Electrical and Comp. Eng. 2004 (IEEE Cat.No.04CH37513), vol. 2, pp. 785–788, 2004.
  5. T. Kiyoshi, C. Marcos, K. Go, L. Hoi-Kwong, and A. Koji, "Loss-tolerant quantum cryptography with imperfect sources," Phys. Rev., vol. A90, pp. 052314-052323, 2014.
  6. M. A. Nielsen and I. L. Chuang, Quantum information and quantum communication. Cambridge, U.K: Cambridge University Press, 2000.
  7. M. Oystein, L. Lars, and S. Johannes, "Security of quantum key distribution with arbitrary individual imperfections," Phys. Rev., vol. 3, pp. 032337-032343, 2009.
  8. N. Gisin and R. Thew, "Quantum communication," Nature Photonics, vol. 1, pp. 165– 171, 2007.
  9. D. M. Ignacio, V. Reinaldo, B. Alejandra, and D. J. Ramón, "Genetic algorithm for joint routing and dimensioning of dynamic WDM networks," Journal of Optical Communication Network, vol. 1, pp. 608-621, 2009.
  10. M. A. Juan and L. Norbert, "Quantum communication with coherent states and linear optics," Phys. Rev. A., vol. 90, pp. 042335-042335, 2014.
  11. N. Gisin and R. Thew, "Quantum communication technology," Electronics Letters, vol. 46, pp. 965-967, 2010.
  12. N. l. Singha and B. Mukherjee, "Protecting multicast sessions in WD moptical mesh networks," IEEE J. Lightwave Tech., vol. 21, pp. 884-892, 2003.
  13. M. Vadim, "Quantum cryptography and quantum cryptanalysis," PhD Thesis, Norwegian University of Science and Technology, 2007.
  14. K. Zhu, H. Zang, and B. Mukherjee, "A comprehensive study on nextgenerationoptical grooming switches," IEEE J. Select. Areas Commun., vol. 21, pp. 1173-1186, 2003.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

Competing Interests:

Acknowledgement:


Related Article

( 1 ) Generalized Quantum Key Distribution for WDM Router Applications
( 5 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 6 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 7 ) Feasibility of Chatbot for Mehran UET Examination Department
( 8 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 9 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 10 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 11 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 12 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 13 ) Information about Simulation Software for Testing of Wireless Network
( 14 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 15 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 16 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 17 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 18 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 19 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 21 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 22 ) Web Service Composition for E-Commerce Web Application
( 23 ) Role of Library and Information Science Professionals in the Knowledge Society
( 24 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 25 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 26 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 27 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 28 ) Perturbation Functions for Compact Database
( 29 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 30 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 31 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 32 ) Development Problems of Information Provision on the Management of High Technology Park
( 33 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 34 ) A Security Scheme for Protecting Agent Societies
( 35 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 36 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 37 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 38 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 39 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 40 ) Development of Web Application for University of Uyo Post UTME Examination Timetable
( 41 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment
( 42 ) A Structural Framework for Distributed Electronic Voters Register
( 43 ) A Review of Machine Learning Models for Software Cost Estimation
( 44 ) Speed Control of Induction Motor on C2000 DSP Platform
( 45 ) Application of Ant Algorithm for Software Optimization
( 46 ) Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
( 47 ) Smart Feature Fusion and Model for Human Detection
( 48 ) LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel
( 49 ) Study and Comparative Analysis of Programming Languages Used for Big Data
( 50 ) Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio