Laser & Optoelectronics Progress, Volume. 62, Issue 9, 0927001(2025)

Priority-Based Flexible Security Level Quantum Key Resource Allocation Scheme

Junhai Yao1、*, Min Nie1, Guang Yang1, Huanyao Jiang1, Aijing Sun1, and Changxing Pei2
Author Affiliations
  • 1School of Communications and Information Engineering & School of Artificial Intelligence, Xi'an University of Posts &Telecommunications, Xi'an 710121, Shaanxi , China
  • 2State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, Shaanxi , China
  • show less
    Figures & Tables(20)
    Quantum key distribution optical network transmission architecture model
    Fixed/flexible key updating period security configuration strategy
    Resource usage for specific/flexible security level classification methods
    Flowchart of priority-based flexible security level key resource allocation
    A network topology with 5 nodes and 7 links
    Time slot allocation of link BD at high security level wavelength. (a) PFSL-RA; (b) SSL-RA/NPOB-RA
    Time slot allocation of link BD at low security level wavelength. (a) PFSL-RA; (b) NPOB-RA
    Flowchart of PFSL-RWTA algorithm
    Simulated network topology. (a) NSFNET; (b) USNET
    Comparison of algorithm feasibility. (a) Running time; (b) number of occupied wavelengths and time slots; (c) success rate of service requests
    Success probability of QKD lightpath requests with different number of wavelengths. (a) NSFNET; (b) USNET
    Success probability of QKD lightpath requests with different security level proportions. (a) NSFNET; (b) USNET
    Time slot utilization ratio of each algorithm under different traffic loads. (a) NSFNET; (b) USNET
    Time slot utilization ratio of PFSL-RWTA algorithm under different wavelengths and key requirements. (a) NSFNET; (b) USNET
    Resource balance of each algorithm under different traffic loads. (a) NSFNET; (b) USNET
    • Table 1. Sets and variables definition

      View table

      Table 1. Sets and variables definition

      ParameterDescriptionParameterDescription
      Vthe set of nodes in QKD networktrinitial key update period of request r
      Ethe set of QKD linkstumodified key update period of request r
      Rthe set of QKD lightpath requeststkminimum key synchronization time
      WQthe set of specific wavelength for QSChnrnumber of modifications to key updates
      WTthe set of specific wavelength for TDChlslsecurity level of request r
      Pthe set of QKD lightpathsλQquantum signal specific wavelength
      Prthe set of working paths for single requesturtime slot utilization
      Tkthe set of time slots in single wavelengthZ(i,j),λQrboolean variable that equals 1 if wavelength λQ on link (ij) is allocated for request r, otherwise equals 0
      rQKD lightpath request
      ssource node of request rK(i,j),λQ,tkrboolean variable that equals 1 if time slot tk in wavelength λQ of link (ij) is allocated for request r, otherwise equals 0

      d

      Dr

      destination node of request r

      time slots requirement of request r

    • Table 2. Parameters for QKD lightpath service requests

      View table

      Table 2. Parameters for QKD lightpath service requests

      Service request/source-destinationRouting pathInitial time slot needsSecurity level/nrModified time slot needs
      QLR1/ADA-B-D2High/24,3
      QLR2/BEB-D-E3High/22,3
      QLR3/BDB-D2High/31,3,2
      QLR4/BDB-D3Low/14
    • Table 3. Resource allocation results of each scheme at high security wavelength

      View table

      Table 3. Resource allocation results of each scheme at high security wavelength

      Service request/ security level

      Priority order

      (PFSL-RA)

      Priority order (SSL-RA/NPOB-RA)Initial request acceptance statusUpdated request acceptance status
      QLR1/highQLR3QLR1Accepted/acceptedRejected/accepted
      QLR2/highQLR2QLR2Accepted/rejectedAccepted/rejected
      QLR3/highQLR1QLR3Accepted/acceptedAccepted/rejected
    • Table 4. Resource allocation result of each scheme on link BD

      View table

      Table 4. Resource allocation result of each scheme on link BD

      Resource allocation scheme

      Acceptance status of

      QLR1/ QLR2/ QLR3

      Acceptance

      status of QLR4

      Service blocking rate /%Time slot utilization rate /%
      SSL-RAAccepted/rejected/rejectedAccepted5064.0
      NPOB-RAAccepted/accepted/rejectedAccepted2577.5
      PFSL-RWTAAccepted/accepted/acceptedAccepted083.0
    • Table 5. Simulation system parameter setting

      View table

      Table 5. Simulation system parameter setting

      ParameterValue
      Network topologyNSFNET,UBN24
      Number of nodes14,24
      Number of links21,43
      Number of wavelengths for TDCh32
      Number of wavelengths λQ for QSCh2,4,6
      Range of key update time slot requirements Dr26],[38
      Number of time slots in high/low security level λQ40/60
      Number of QKD lightpath requests150‒1500
    Tools

    Get Citation

    Copy Citation Text

    Junhai Yao, Min Nie, Guang Yang, Huanyao Jiang, Aijing Sun, Changxing Pei. Priority-Based Flexible Security Level Quantum Key Resource Allocation Scheme[J]. Laser & Optoelectronics Progress, 2025, 62(9): 0927001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Quantum Optics

    Received: Aug. 9, 2024

    Accepted: Sep. 12, 2024

    Published Online: Apr. 23, 2025

    The Author Email: Junhai Yao (amosyaojh@163.com)

    DOI:10.3788/LOP241826

    CSTR:32186.14.LOP241826

    Topics