期刊文献+

基于PON网络的新型OVPN系统的研究

The New OVPN System Research Based on the PON Network
下载PDF
导出
摘要 无源光网络技术是打破"最后一公里"瓶颈的核心技术。但是由于在PON网络中ONU(Optical Network Unit)用户端共享一段光纤的问题,给PON(Passive Optical Network)中通信带来了很大的安全隐患。该文将量子密码通信技术引入到PON网络中,为PON网络安全通信提供了一种有效的解决方案,提出了一种新型OVPN(Optical Virtual Private Net work,OVPN)系统。 Passive optical network technology is the core technology to break the "last mile" bottleneck.However,due to to share some fiber PON network client ONU(Optical Network Unit,ONU) to the PON(Passive Optical Network PON) in communication brought a lot of security risks.Quantum cryptographic communication technology is introduced into the PON network,to provide an effective solution for the secure communication of the PON network,to propose a novel OVPN(Opti cal Virtual Private Network,OVPN) system.
作者 惠晨犇
机构地区 华北电力大学
出处 《电脑知识与技术(过刊)》 2013年第1X期242-244,共3页 Computer Knowledge and Technology
关键词 无源光网络(PON) 量子虚拟专网(OVPN) 量子密钥(Quantum Key) passive optical network(PON) the quantum virtual private network(OVPN) quantum key(Quantum Key)
  • 相关文献

参考文献4

  • 1吕锋,樊冰,吴丹雯.四种新型加密技术的比较研究[J].计算机应用研究,2002,19(11):5-7. 被引量:4
  • 2赵生妹,郑宝玉.量子加密算法及其安全性[J].通信技术,2001,34(9):100-102. 被引量:5
  • 3SUN X,CHAN C K,CHEN L K.A survivable WDM-PON architecturewith centralized alternative-path protection switching for traffic restoration[].IEEE Photonics Technology Letters.2006
  • 4Chae C J,Lee S T,Kim G Y,et al.A PON system suitable for internetworking optical network units using a fiber Bragg grating on the feeder fiber[].IEEE Photonics Technology Letters.1999

二级参考文献12

  • 1[1]Su Chihyuaug, Hwang Shiham, Chen Posong. An Improved Montgomery' s Algorithm for High-speed RSA Public-kev Cryptosystem [J]. IEEE Trans VLSI Systems, 1999,7(2) :280-284.
  • 2[2]Guo Dong-hui, Cheng L M, Cheng L L. A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks[J]. Applied Intelligence, 1999,10(1) :71-84.
  • 3[3]STAL100 Sralling. W Data and Computer Communications, 6th Edition[ M ]. Upper Saddle River, NJ:Prentice Hall, 2000.
  • 4[4]Kelber K N.Dimensional Uniform Probability Distri-bution in No~linear Auto- regressive Filter Structures[J]. IEEE Trans Circ & Syst 1,2000,47(9): 1413-1418.
  • 5[5]Rdeke E, Korzonnek J. Distributed Information Management in Virtual Engineering Enteqrise by GEN[A]. Proe of the 9th Int Workshop on Re Search Issues on Data Engineering Infomation Technology for Virtual Enterprises[C]. Sydney, 1999. 237-245.
  • 6[6]Y S Kim, W S Kang, J R Choi. Asvncbromous Implementation of 1024-bit Modular Proeessor for RSA Cryptosystem [C]. APASIC2000. Proceedings of the Second iEEE Asia Pacific Conference on, 2000.
  • 7王育民 刘建伟.通信网的安全--理论与技术[M].西安:西安电子科技大学出版社,2000..
  • 8曾贵华,王育民,王新梅.基于物理学的密码体制[J].通信学报,2000,21(1):49-54. 被引量:7
  • 9周芬,高志强.快速模幂算法及其硬件实现[J].微电子学,2000,30(6):391-394. 被引量:8
  • 10孟春岩,陶煌.基于网络安全的加密技术[J].电力学报,2000,15(3):167-171. 被引量:3

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部