Dissertation > Excellent graduate degree dissertation topics show

The Research on Security Protocol of Network Based on Quantum Information Technology

Author: MaHongYang
Tutor: GuoZhongWen
School: Ocean University of China
Course: Applied Computer Technology
Keywords: Wireless LAN Quantum information technology Quantum secret sharing Multibank quantum network CCS quantum error-correcting codes GHZ
CLC: TN925.93
Type: PhD thesis
Year: 2011
Downloads: 98
Quote: 0
Read: Download Dissertation


Wireless LAN WLAN (wireless LAN) is the use of electromagnetic technology to replace the old underfoot composed of twisted-pair copper convenient data transmission system, to \Compared with the cellular network, WLAN has a higher data transfer rate, more suitable for government agencies, enterprises, national defense and other places. WLAN Because the data link layer of the media in the use of open, the message \Currently, WLAN security encryption protocol: Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and Counter Mode Cipher Block Chaining Message Authentication Protocol (CCMP). This field of study and its extension for wireless LANs quantum network, a total of six branches. The first branch, in order to compensate for WLAN security flaws, including the introduction of quantum cryptography was proposed based on quantum technologies-GHZ state security key wireless LAN solutions. In the 802.1x authentication based on the use of classical and quantum key co-management model. In the four-step handshake process, the original key structural improvements for the quantization of the pairwise key hierarchy, so as to solve TKIP, CCMP protocol security shortcomings of poor, both compatible with the existing network protocols, but also for the network to provide higher security. The second branch of research, drawing on the concept of clusters in the Bluetooth network, expansion of network complexity. In the case of a quantum channel without noise, raised a number of key clusters multi-quantum network sharing agreement. Quantum build all nodes in the network cluster S, M, D, three nodes in the cluster of S1, S2, ..., Sn, M1, M2, ..., Mw, D1, D2 ..., Dm. S1, S2, ..., Sn-1 the key information is encoded and transmitted to the Sn. Sn optionally by a node in the cluster M M1, using GHZ state, then the key information to each node in the cluster D D1, D2 ..., Dm. Features: S, M, D, one or several nodes can not know the key, and only S, D in the agreement of all the nodes can share the key. The third branch of research, in-depth study of the development of the next generation network context and the practical application of quantum cryptography. In the case of a quantum channel without noise is proposed consisting of nodes N 1 star quantum network model, and the network is designed in two security protocols. The first protocol used by two 1 nodes. A master node, two from the node, respectively, with M, S1, S2 represents. Where M is the trusted node master node. S1 to S2 send quantum signature keys, three nodes share the 2N GHZ-like states, the use of GHZ-like states feature ensures the security of quantum signature key. A second protocol used consisting of 31 nodes quantum star network model, a master node, three from the node, respectively, with M, S1, S2, S3 that. Four-node shared by respectively Smolin states state, to ensure the security of the star network. Theoretical analysis shows that two protocols for eavesdroppers have a high security. The fourth branch, in the case of a quantum channel without noise is proposed 2N 1 nodes consisting of circular quantum network model and the network design key transport protocol. Quantum node t0 use CONT doors, H gate operation, the key to pass through t1 to t2, more jump sequentially through t3, ..., t2N-1 pass to quantum node t4, ..., t2N, the key passed to the final node. The protocol relies on EPR entangled pairs key security to protect. . The fifth branch of the actual situation in the quantum channel can not be without noise, quantum noise for a broadcast network, the reliability of the key issues, the design of a single cluster of multi-error correcting quantum key sharing protocol. Agreement from the primary node to any node in bulk and set the upper limit value data error, if it exceeds the upper limit value, the key data will be discarded. If, in the upper range of values, the node using quantum error correction code CSS reversed its position appears wrong, phase error, bit reversal and phase error correcting wrong three kinds of errors, to obtain the correct key data transmitted. The agreement resolves a key process in the mass errors generated due to noise, to achieve key data transmission reliability. The sixth branch, compared to classical networks, including quantum network proposed next-generation wireless networking concepts and associated elements. First, the analysis of next-generation wireless network research status, then propose including quantum networks in which the concept of next-generation wireless networks, and proposes a five-story quantum network protocols: heterogeneous physical layer, data link layer of quantum information, quantum information the network layer, the quantum and classical information message transport layer, application layer quantum software. Objective To construct the appropriate quantum network model to adapt to the development needs of the next generation network, to improve their network security.

Related Dissertations

  1. Application of the Wireless LAN in the Industrial Control,TP273
  2. Research on Frame Traffic Control, Prediction and Energy Efficiency in Wireless Local Area Networks,TN925.93
  3. Design and implementation of CAPWAP multicast,TN925.93
  4. MIPS-based wireless communications device driver implementation technology,TP368.1
  5. Based on the 802.11n link performance directional antenna research,TN925.93
  6. LBS system WLAN-based wireless location technology,TN925.93
  7. CAPWAP protocol technology system implementation,TN925.93
  8. The Generation of Entanglement State and the Implementation of Phase Gate Base on Faraday Rotation and Cavity QED System,O431.2
  9. The Generation of Entanglement State and the Implementation of SWAP Gate Base on Dipole Blockade Mechanism and Atomic Ensembles System,O413.1
  10. The Design and Analysis of Quantum Secure Direct Communication Protocol,TN918.1
  11. The Generation of Quantum State and Implementation of Entanglement State Analyzers Based on the Leaked Cavity,O431.2
  12. Experimental Study of Biological Effects of Electromagnetic Radiation,TM937
  13. The Generation of Entanglement State and the Implementation of Phase Gate Base on Trapped Ion and Caity QED System,O413.2
  14. Intelligent Infrared Laser Gun Game System Design and Implementation,TP311.52
  15. The Design of WIFI Network Remote Communication-Based Lower Machine Control Circuit,TP273
  16. Design and Implementation of WLAN and Zigbee-Based Indoor Location System,TN967.1
  17. Quantum Design and Optimization vote,O413.1
  18. IEEE802.11 wireless network DCF Protocol Performance Analysis and Improvement,TN925.93
  19. Design of the Mixers for WLAN 802.11a/b/g/n Transceivers,TN773
  20. 60-GHz band circularly polarized antenna based on LTCC technology,TN821.1
  21. A Research and Realization for Video Signal Acquisition and Network Transmission System,TP391.41

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Radio relay communications,microwave communications > Wireless subscriber loop ( Radio Access Network)
© 2012 www.DissertationTopic.Net  Mobile