CN107231211A - Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks - Google Patents
Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks Download PDFInfo
- Publication number
- CN107231211A CN107231211A CN201710364852.2A CN201710364852A CN107231211A CN 107231211 A CN107231211 A CN 107231211A CN 201710364852 A CN201710364852 A CN 201710364852A CN 107231211 A CN107231211 A CN 107231211A
- Authority
- CN
- China
- Prior art keywords
- node
- signal
- optical circuit
- circuit path
- wdm traffic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0227—Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/03—Arrangements for fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/07—Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of encryption Dynamic- Recovery method being applied in WDM traffic grooming networks, there are at least three nodes in WDM traffic grooming networks, several nodes constitute an optical circuit path, signal is transmitted by optical circuit path from source node to destination node, and it is end node that the node between source node and destination node is located in the optical circuit path.The present invention can either enter Mobile state for optical signal and dredge, dynamic fault recovery, improve performance indications, ensure information transmission safety again.
Description
Technical field
Signal transmission energy property lifting and security fields are realized the present invention relates to a kind of Dynamic- Recovery algorithm of encryption mechanism, especially
It is related to a kind of encryption Dynamic- Recovery method being applied in WDM traffic grooming networks.
Background technology
With the rapid development of information technology, the information of transfers on network is more and more, the speed of transmission signal is also required to
It is increasingly faster, while the bandwidth and capacity to network it is also proposed higher requirement.Wavelength-division multiplex (WDM) technology, traffic grooming
The proposition of technology and its development cause network bandwidth resources to be fully utilized, when catastrophic failure occurs for network,
Recover a large amount of interrupting services.Serious safety issue is can bring about in the such big network of load, own service resistance is removed
Plug problem needs to solve, and is also faced with the threat for being trapped and stealing.
At present, it is Dynamic- Recovery mechanism to solve the maximally efficient method of WDM traffic grooming network failures.Restoration Mechanism exists
In the case of not reserving resource, after failure occurs, utilizable resource is dynamically searched for, road again is carried out to failure business
By and substitute failure route, select a new path.Its advantage is to effectively improve the handling capacity of network, reduction obstruction
Rate, increases network resource utilization.Although Restoration Mechanism can effectively overcome network failure, network performance is improved, can not
Ensure to obtain safety assurance in the transmission in waiting process of the information when recovering failure and after recovery, therefore on this basis,
It is a kind of particularly important mode for information encryption, Mobile state can either be entered for optical signal and dredged, dynamic fault recovery is improved
Performance indications, again ensuring information security property.
The content of the invention
Part, WDM traffic groomings are applied to it is an object of the invention to provide one kind in view of the shortcomings of the prior art
Encryption Dynamic- Recovery method in network, Mobile state can either be entered for optical signal and dredges, dynamic fault recovery, improve performance
Index, ensures information transmission safety again.
The purpose of the present invention is achieved through the following technical solutions:
Have extremely in a kind of encryption Dynamic- Recovery method being applied in WDM traffic grooming networks, WDM traffic grooming networks
Few three nodes, several nodes constitute an optical circuit path, and signal is transmitted by optical circuit path from source node to destination node,
It is end node to be located at the node between source node and destination node in the optical circuit path.Set in the WDM traffic groomings network
There are light key maker and Network Fault Detection equipment;It is as follows that it encrypts Dynamic- Recovery method:
A, signal transmission start, and light key maker is to the signal encryption of transmission and produces coded signal;
B, detection failure, find out the optical circuit path list that failure is connected in WDM traffic grooming networks, the optical circuit path row
Be stored with the optical circuit path of faulty connection successively in table;The WDM traffic groomings network provides coded signal in step A and transmitted
Optical circuit path, WDM traffic groomings network to the optical circuit path carry out fault detect;
If the optical circuit path does not include faulty connection, coded signal is saved in WDM traffic grooming networks from source
Point arrives destination node normal transmission, and coded signal is encrypted, decrypted successively at each node between source node and destination node
Operation is re-encrypted, signal to be encrypted is transmitted to the destination node of WDM traffic grooming networks, decrypted signal operation is encrypted,
After decrypted signal success, then into step F;
If the optical circuit path includes faulty connection, read failure connection sends failure from end node to source node
Message, then source node disconnects and discharges resource, while the network state of WDM traffic grooming networks is updated, subsequently into
Step C;
Source node in C, WDM traffic grooming network starts comprehensive congestion relief algorithm, dynamically searches out the extensive of destination node
Multiple path, and new optical circuit path is set up, restoration path is new optical circuit path;
If restoration path is chosen successfully, into step D;If restoration path selection is unsuccessful, step B is returned to
In;
D, coded signal are transmitted according to restoration path in WDM traffic grooming networks, then for by each of restoration path
The information of the coded signal of individual node encrypts successively, decrypts and re-encrypts operation;Then successful connection is recovered, coded signal is in WDM
Normal transmission data between each node in traffic grooming network between source node and destination node;Update network-like simultaneously
State, and the optical circuit path list that failure is connected in WDM traffic grooming networks is counted, into step E;
E, signal to be encrypted are transmitted to the destination node of WDM traffic grooming networks, and decrypted signal operation is encrypted, when
After decrypted signal success, then into step F;
F, signal transmission success, the signal end of transmission.
Preferably, the step B and each node in step D coded signal are encrypted using ASE AESs
Operation.
Preferably, the step B and each node in step D coded signal are decrypted using ASE decipherment algorithms
Operation.
The present invention compared with the prior art, with advantages below and beneficial effect:
The present invention can either enter Mobile state for optical signal and dredge, dynamic fault recovery, improve performance indications, ensure again
Information transmission safety.
Brief description of the drawings
Fig. 1 is schematic flow sheet of the invention;
Fig. 2 is Dynamic- Recovery operating diagram when optical circuit path of the present invention breaks down.
Embodiment
The present invention is described in further detail with reference to embodiment:
Embodiment
As shown in Figure 1 and Figure 2, a kind of encryption Dynamic- Recovery method being applied in WDM traffic grooming networks, WDM business is dredged
There are at least three nodes, several nodes constitute an optical circuit path, and signal is by optical circuit path from source node in wire guide network
Transmitted to destination node, it is end node that the node between source node and destination node is located in the optical circuit path.The WDM industry
It is engaged in Grooming Networks being provided with light key maker and Network Fault Detection equipment;It is as follows that it encrypts Dynamic- Recovery method:
A, signal transmission start, and light key maker is to the signal encryption of transmission and produces coded signal;
B, detection failure, find out the optical circuit path list that failure is connected in WDM traffic grooming networks, the optical circuit path row
Be stored with the optical circuit path of faulty connection successively in table;The WDM traffic groomings network provides coded signal in step A and transmitted
Optical circuit path, WDM traffic groomings network to the optical circuit path carry out fault detect;
If the optical circuit path does not include faulty connection, coded signal is saved in WDM traffic grooming networks from source
Point arrives destination node normal transmission, and coded signal is encrypted, decrypted successively at each node between source node and destination node
Operation is re-encrypted, operation is encrypted using ASE AESs in the coded signal of each node of the invention;Meanwhile, the present invention is each
Operation is decrypted using ASE decipherment algorithms in the coded signal of individual node.Signal to be encrypted is transmitted to WDM traffic grooming networks
After destination node, decrypted signal operation is encrypted, after decrypted signal success, then into step F;
If the optical circuit path includes faulty connection, read failure connection sends failure from end node to source node
Message, then source node disconnects and discharges resource, while the network state of WDM traffic grooming networks is updated, subsequently into
Step C;
Source node in C, WDM traffic grooming network starts comprehensive congestion relief algorithm, dynamically searches out the extensive of destination node
Multiple path, and new optical circuit path is set up, restoration path is new optical circuit path;
If restoration path is chosen successfully, into step D;If restoration path selection is unsuccessful, step B is returned to
In;
D, coded signal are transmitted according to restoration path in WDM traffic grooming networks, then for by each of restoration path
The information of the coded signal of individual node encrypts successively, decrypts and re-encrypts operation;The coded signal of each node of the invention uses ASE
Operation is encrypted in AES;Meanwhile, behaviour is decrypted using ASE decipherment algorithms in the coded signal of each node of the invention
Make.Then successful connection, each node of coded signal in WDM traffic grooming networks between source node and destination node are recovered
Between normal transmission data;Network state is updated simultaneously, and counts the optical circuit path row that failure is connected in WDM traffic grooming networks
Table, into step E;
E, signal to be encrypted are transmitted to the destination node of WDM traffic grooming networks, and decrypted signal operation is encrypted, when
After decrypted signal success, then into step F;
F, signal transmission success, the signal end of transmission.
On the basis of multilink bundling model-aided figure and comprehensive congestion relief algorithm, system is set to realize the Dynamic- Recovery of link level
Method, it is main to include three aspects:Send request, it is calculating network failure, extensive by the link-recovery mechanism of encryption progress failure
It is multiple.The link-recovery mechanism wherein encrypted carries out emphasis of the fault recovery for the present invention.
The operation principle for the link Dynamic- Recovery mechanism that the present invention is encrypted is as follows:
When detecting light path and breaking down, by the source node of all links in this light path, chain will be received
The information for this light path failure that terminal node is sent, then these source nodes will be by the startup of dynamic link recovery algorithms certainly
Dynamic Restoration Mechanism, dynamically avoids the link broken down, calculates and selects a nearest path as arrival destination node
New link, this is when the situation of only one light path composition of link.But some links are made up of several light path cascades,
When wherein one light path for cascading light path breaks down, then the link of this cascade is exactly a broken link, whole piece letter
Breath chain will break down, and transmission disconnects, and the information release transmitted before being allowed to is dynamic by above-mentioned failure recovering algorithm again
One new link of generation of state, recalculates path, information is transmitted again.Though such information transmission and fault recovery method
Networking is improved while so can effectively realizing in transmitting procedure and the dynamic of resource is used, and improve resource utilization
Time of fault recovery and the performance indications such as blocking rate are reduced, but be not carried out safe transmission, not only and do not make information
Safe transmission, on the contrary during Dynamic- Recovery is carried out, adds potential safety hazard, such as, the connection constituted in single light path
In, light path breaks down Dynamic- Recovery to be realized, source node identification is stopped transmission, and wait calculates next transmission
Path can just continue transmission, and in this process, information is easily lost, and the potential safety hazard such as be trapped, eavesdrop.Thus
Need when source node sends information by optical signal key generator, dynamic generation key sequence is encrypted for information, by light
Ensuring information security property is transmitted on road, is completed information decryption using identical algorithms in destination node receiving terminal, is obtained information needed.So
And when light path quantity is more, constitutes more complicated cascade Connection, the link of intergrade as failure and wait
Phenomenon, the security of network will be reduced, and the key sequence that now source node is produced has no idea that security is completely secured, therefore
Need to encrypt for information again, so needing to set encryption mechanism to encrypt for upper information all the way at each node, next
Individual node is that upper signal all the way is decrypted with same algorithm, re-encrypts, by such mode, realizes cascaded link
Encryption and decryption, it is excessively complicated to be also unlikely to data, makes safe information transmission.And this mode in intermediate node encrypting and decrypting is selected
ASE asymmetric encryption mechanisms.
Fig. 2 is 5 node network topologies, when signal is transferred to node 1, it is assumed that link frees failure (such as Fig. 2
(c) shown in), Dynamic link library is started by connection source node 1 and recovered, optical signal encryption generation encryption is now used on source node 1
Sequence, then the restoration path separately dynamically calculated to connection destination node 2 and destination node 3.It is assumed that being calculated by dredging route
Method, which is calculated, connects 1-2 restoration path for light path 1-4-2, and now optical signal is encrypted again at node 4, and transmission is new to be added
Secret letter number arrives node 2, after light path 1-4-2 is set up, and failure connection 1-2, which is forwarded on new restoration path, to be transmitted.
As connecting node 1-3, connection 1-3 is also to start connection Dynamic- Recovery by connection source node 1, calculates and arrives destination node
3 restoration path is light path 1-4-3, after two-way encrypted transmission, realizes restoration path.Recovery process connects 1-2 with failure.
The connection 1-2 broken down and the connection 1-3 broken down are that respective independent startup recovers.Network condition after fault recovery
As shown in Fig. 2 (d), now in network, there are three light paths is light path 2-3, light path 1-4-2 and light path 1-4-3 respectively, and correspondence is passed
Defeated three business.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (3)
1. have at least in a kind of encryption Dynamic- Recovery method being applied in WDM traffic grooming networks, WDM traffic grooming networks
Three nodes, several nodes constitute an optical circuit path, and signal is transmitted by optical circuit path from source node to destination node, institute
It is end node to state the node being located in optical circuit path between source node and destination node, it is characterised in that:The WDM traffic groomings
Light key maker and Network Fault Detection equipment are provided with network;It is as follows that it encrypts Dynamic- Recovery method:
A, signal transmission start, and light key maker is to the signal encryption of transmission and produces coded signal;
B, detection failure, find out the optical circuit path list that failure is connected in WDM traffic grooming networks, in the optical circuit path list
Be stored with the optical circuit path of faulty connection successively;The WDM traffic groomings network provides the light that coded signal is transmitted in step A
Road path, WDM traffic groomings network carries out fault detect to the optical circuit path;
If the optical circuit path not include faulty connection, coded signal in WDM traffic grooming networks from source node to
Destination node normal transmission, coded signal encrypts successively at each node between source node and destination node, decrypt again plus
Close operation, signal to be encrypted is transmitted to the destination node of WDM traffic grooming networks, and decrypted signal operation is encrypted, works as letter
After number successful decryption, then into step F;
If the optical circuit path includes faulty connection, read failure connection sends failure message from end node to source node,
Then source node disconnects and discharges resource, while the network state of WDM traffic grooming networks is updated, subsequently into step C;
Source node in C, WDM traffic grooming network starts comprehensive congestion relief algorithm, dynamically searches out the recovery road of destination node
Footpath, and new optical circuit path is set up, restoration path is new optical circuit path;
If restoration path is chosen successfully, into step D;If restoration path selection is unsuccessful, return in step B;
D, coded signal are transmitted according to restoration path in WDM traffic grooming networks, then for by each section of restoration path
The information of the coded signal of point is encrypted, decrypts and re-encrypt operation successively;Then successful connection is recovered, coded signal is in WDM business
Normal transmission data between each node in Grooming Networks between source node and destination node;Network state is updated simultaneously, and
The optical circuit path list that failure is connected in WDM traffic grooming networks is counted, into step E;
E, signal to be encrypted are transmitted to the destination node of WDM traffic grooming networks, and decrypted signal operation is encrypted, works as signal
After successful decryption, then into step F;
F, signal transmission success, the signal end of transmission.
2. according to the encryption Dynamic- Recovery method being applied in WDM traffic grooming networks described in claim 1, its feature exists
In:Operation is encrypted using ASE AESs in the coded signal of each node in the step B and step D.
3. according to the encryption Dynamic- Recovery method being applied in WDM traffic grooming networks described in claim 1, its feature exists
In:Operation is decrypted using ASE decipherment algorithms in the coded signal of each node in the step B and step D.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710364852.2A CN107231211A (en) | 2017-05-22 | 2017-05-22 | Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710364852.2A CN107231211A (en) | 2017-05-22 | 2017-05-22 | Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107231211A true CN107231211A (en) | 2017-10-03 |
Family
ID=59934143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710364852.2A Pending CN107231211A (en) | 2017-05-22 | 2017-05-22 | Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107231211A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729249A (en) * | 2009-12-21 | 2010-06-09 | 西安西电捷通无线网络通信有限公司 | Building method of safe connection among user terminals and system thereof |
CN101741547A (en) * | 2009-12-18 | 2010-06-16 | 西安西电捷通无线网络通信有限公司 | Inter-node secret communication method and system |
-
2017
- 2017-05-22 CN CN201710364852.2A patent/CN107231211A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101741547A (en) * | 2009-12-18 | 2010-06-16 | 西安西电捷通无线网络通信有限公司 | Inter-node secret communication method and system |
CN101729249A (en) * | 2009-12-21 | 2010-06-09 | 西安西电捷通无线网络通信有限公司 | Building method of safe connection among user terminals and system thereof |
Non-Patent Citations (1)
Title |
---|
曹诚健: "WDM业务疏导网络中的动态恢复方法研究", 《东北大学硕士学位论文》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10348493B2 (en) | Quantum key distribution system, method and apparatus based on trusted relay | |
EP2697931B1 (en) | Qkd key management system | |
RU2736870C1 (en) | Complex for secure data transmission in digital data network using single-pass quantum key distribution system and method of keys adjustment during operation of system | |
JP6478749B2 (en) | Quantum key distribution apparatus, quantum key distribution system, and quantum key distribution method | |
EP1470660B1 (en) | Method and system for securely storing and transmitting data by applying a one-time pad | |
Kitayama et al. | Security in photonic networks: Threats and security enhancement | |
US10014934B2 (en) | Apparatus and method for providing eavesdropping detection of an optical fiber communication | |
CN105409157A (en) | Adaptive traffic encryption for optical networks | |
US20100329459A1 (en) | Multi-community network with quantum key distribution | |
CN109005030B (en) | Method and system for protecting key service in quantum network | |
CN110383280A (en) | Method and apparatus for the end-to-end stream of packets network with network safety for Time Perception | |
Shirko et al. | A novel security survival model for quantum key distribution networks enabled by software-defined networking | |
CN110011786A (en) | A kind of IP secret communication method of high safety | |
CN109412797B (en) | Key negotiation method and client based on bit error rate decision state base | |
CN107231211A (en) | Applied to the encryption Dynamic- Recovery method in WDM traffic grooming networks | |
CN111385087B (en) | Reliable key relay method and system thereof | |
Chung et al. | Multiple LSP routing network security for MPLS networking | |
KR102357375B1 (en) | System for transmitting optical of nuclear power plants network enhanced security and method for transmitting data there of | |
KR100938603B1 (en) | Method for extention of LMP for network survivability in a OVPN over DWDM | |
CN111669274A (en) | Rail transit signal system based on quantum encryption and communication method | |
CN111884798A (en) | Electric power business quantum encryption system | |
EP2304895A1 (en) | Secure communication method | |
Aly et al. | SNEED: Enhancing network security services using network coding and joint capacity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |