Loading…

Quantum key distribution over optical access networks

It is well known that optical access networks are able to provide high data rates over long distances and to a reasonable number of users. Security and privacy are always a challenge for public accessible network infrastructures. Especially in time-division multiplexing passive optical networks (TDM...

Full description

Saved in:
Bibliographic Details
Main Authors: Aleksic, Slavisa, Winkler, Dominic, Franzl, Gerald, Poppe, Andreas, Schrenk, Bernhard, Hipp, Florian
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:It is well known that optical access networks are able to provide high data rates over long distances and to a reasonable number of users. Security and privacy are always a challenge for public accessible network infrastructures. Especially in time-division multiplexing passive optical networks (TDM-PONs), in which the downstream signal is broadcasted to all users connected via the same wavelength channel in a shared fiber link, privacy can be a critical concern. Although encryption at the application layer can provide a high level of security, this can be achieved only if the encryption key distribution is perfectly save. On the other hand, encryption on the physical layer such as quantum cryptography or, more precisely, quantum key distribution (QKD) is a very promising approach to achieve secure communication. However, there remain several issues that have to be solved before the quantum cryptography reaches the maturity level needed for a cost effective implementation in practical networks. In this paper, we address quantum key distribution (QKD) over passive optical access networks, which is an enabling technology required to cost efficiently deploy practical quantum encrypted data communication in the access area. We study different methods to integrate QKD systems in conventional optical access networks and quantitatively evaluate their suitability for a potential implementation.
DOI:10.1109/NOC-OCI.2013.6582861