Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Noise-suppressing channel allocation in dynamic DWDM-QKD networks using LightGBM

Open Access Open Access

Abstract

Integrating quantum key distribution (QKD) with existing optical networks is highly desired to reduce the deployment costs and achieve efficient resource utilization, and some point-to-point transmitting experiments have verified its feasibility. Nevertheless, there are still many problems in the realistic scenario where QKD coexists with dynamic data traffics. On the one hand, the conventional static channel allocation schemes cannot guarantee the quality of quantum channels in the presence of the time-varying noises. On the other hand, considering the complex noise generation caused by dynamic classical data traffics with variable characters, it is challenging to achieve online high-performance quantum channel assignments. To address these problems, we propose a machine learning based noise-suppressing channel allocation (ML-NSCA) scheme. In this scheme, the LightGBM based ML framework is trained to predict the optimal channel allocations with lowest noise impacts, according to which, the quantum channels are periodically reallocated to guarantee high secure key rate. To improve the accuracy and scalability of the ML framework, we also optimize the method of feature extraction during the training process. The performance evaluation results indicate that the proposed scheme can effectively resist the dynamic noise impacts in the realistic optical networks and obtain higher secure key rate with less operation complexity than the previous schemes.

© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

The recent advances in the optical communication have enabled many emerging applications, such as Internet of things (IoT) and smart cities [1], but the security of them is under threat since the concept of quantum computing came up. Currently, the traditional asymmetric encryption has been demonstrated to be insecure facing quantum algorithms [2]. Some forms of symmetric encryption are proven to be more resistant to quantum attacks, such as “one-time pad" (OTP) and advanced encryption standard (AES) encryption [3], but the vulnerability of secure key distribution severely restricts their applications. Luckily, the emergence of quantum key distribution (QKD) provides a feasible solution to this problem. QKD can achieve information-theoretically secure key establishment between two remote parties, and the laws of quantum mechanics guarantee that it is impossible to eavesdrop information without being discovered [46]. Consequently, combining QKD with symmetric encryption is a promising way to resist future advances in quantum computing. In these decades, the theoretical and practical security of QKD has been constantly improved [79], and the many experimental demonstrations also show significant breakthroughs in the secure key generation rate and the transmission distance [1013]. These signs of progress have paved the way for large-scale implementations of QKD networks [14], but another obstacle for widespread use of QKD is the high costs of deploying dedicated fibers.

A promising solution of reducing the deployment costs is integrating QKD with the existing optical networks. However, it is very challenging for single-photon quantum signals to share the same fiber with the intensive classical signals. Recently, the point-to-point joint transmission of quantum signals and classical signals been researched preliminarily. One of the feasible multiplexing schemes is placing the quantum signals in the O-band, which is relatively far away from the C-band classical signals, to reduce the impacts on QKD systems [1517], and through this scheme, the multiplexing of quantum signals with 3.6 THz classical signals over 66 km backbone fiber has been achieved [18]. Whereas, the low transmission loss of the C-band has also attracted more and more interests to place both quantum signals and classical signals in the C-band through dense wavelength-division multiplexing (DWDM) components (i.e., DWDM-QKD scheme) [1924]. In the DWDM-QKD scheme, the impairments on QKD are more serious due to the narrow frequency spacing. Some previous researches have already proven that appropriate management of channel allocations is critical for noise suppression in DWDM-QKD systems [25], and some static channel allocation schemes have been proposed to reduce the dominant in-band impairment sources such as four-wave mixing (FWM) noise and Raman scattering noise [2629].

The existing static channel allocation schemes mentioned above can provide low-noise multiplexing plans under given numbers of signals by exhaustive searching. However, in order to enable QKD in the realistic optical networks, quantum signals are required to coexist with dynamic classical data requests. In this scenario, the fixed channel allocations cannot handle the time-varying noise interferences on QKD systems. Furthermore, considering dynamic classical data traffics with variable allocations, signal powers, service holding time, etc., the traditional way of computing low-noise channel allocations every time classical channels change is of high burden and hard to fulfill the real-time requirement in the practical implementations. Therefore, more efficient online channel allocation schemes to maintain high performance of QKD are required in the dynamic DWDM-QKD networks.

Inspired by the recent researches of utilizing machine learning (ML) to predict the performances of the unestablished paths in conventional optical networks [3032], Y. Ou et al. proposed an ML-based QKD performance predicting scheme [33] in 2018. In their scheme, channel reallocating is invoked if the performance of QKD is worse than the requirement. This scheme improves the robustness of QKD, but it has a limited effect on improving the secure key rate (SKR). In the short term, the quantum key pool (QKP) based key management is regarded as the most feasible configuration to alleviate the limited secure key generation rate [34,35], in which the keys are constantly generated and stored in the QKP for later use. This configuration determines that large amounts of key generations during a period is more desirable than the robustness. Therefore, the performance predicting scheme in [33] fails to solve the main concern in current QKD configurations. Besides, the real-time performance evaluation and the frequent searching of backup plans are likely to overburden the network management. As far as we know, the adaptive channel allocation scheme targeted to maximize the SKR in dynamic DWDM-QKD networks is not available so far.

In this paper, considering the physical layer impairments in dynamic DWDM-QKD networks, we propose an ML-based noise-suppressing channel allocation (ML-NSCA) scheme, and the major contributions can be summarized as follows:

  • 1). To maintain good performance under dynamic noise impairments, and reduce the computation and power consumptions, quantum channels are periodically reallocated in our scheme, and the optimal channel allocations in the next period are predicted by a LightGBM based ML framework online.
  • 2). Unavailable information of the random data traffics in the next period causes non-deterministic noise evaluations. To address this problem, we implement the Monte Carlo simulations to make the ML learn the statistical-based optimal channel allocating strategy.
  • 3). We propose an optimized feature extraction method to reflect the status of networks, and it is verified to be effective in improving the accuracy and scalability of the ML framework.

2. Problem of channel allocation in the dynamic DWDM-QKD network

2.1 Physical-layer constrains in typical DWDM-QKD networks

Firstly, we consider the typical construction of DWDM-QKD network. As shown in Fig. 1(a), the forward and backward classical communications are carried by two fibers, and the unidirectional quantum signals are transmitted through one of the fibers together with the classical signals in the same direction to avoid the harmful backward Raman scattering noise [36]. Additionally, apart from the quantum channel (Qch), the secure key establishment also requires the synchronization channel (Sch) and the public channel (Pch) to assist the key detecting, key sifting and distillation. In this paper, we consider placing the Sch and the Pch on the O-band or the L-band to save the limited C-band resources. In this case, their impacts on Qchs are negligible compared to that of data signals. Therefore, in this paper, we focus on the channel allocations of classical data channels (Dchs) and Qchs in the C-band.

 figure: Fig. 1.

Fig. 1. (a) Configuration of the DWDM-QKD network; MUX-Link: the link in which quantum signals and classical signals are multiplexed; Dch-Link: the link that only transmits the classical data signals. (b) Procedure of the trusted-relay-based key sharing, QM: quantum module.

Download Full Size | PDF

To enable key sharings between any two parties in a large-scale network and avoid the extra insert loss of the optical routing node, the trusted relay approach is generally employed [37,38], and the process is illustrated in Fig. 1(b). In detail, the quantum keys are directly established between neighbor nodes and stored in the QKP, and for nonadjacent nodes, the secure keys are encrypted through OTP and delivered hop-by-hop from the source to the destination. Based on these realistic configurations in DWDM-QKD network, the following factors should be considered in the channel allocation scheme:

  • 1). Qchs are unidirectional and should be multiplexed with Dchs in the same direction.
  • 2). The Qch allocation in each link is irrelative and independent as the key establishment between nonadjacent nodes are based on trusted relays and through Dch.

2.2 Noise impairments in the dynamic DWDM-QKD networks and current solutions

In the DWDM-QKD networks, quantum signals can be impacted by several kinds of noises, including channel crosstalk noise, spontaneous Raman scattering noise, as well as FWM noise, and the deployment of erbium-doped fiber amplifier (EDFA) also causes amplified spontaneous emission (ASE) noise. Among these noises, the ASE noise can be easily eliminated by a deep notch filter or the bypass technique [39], and high-isolation multiplexers or narrowband filters can provide adequate isolation to suppress the channel crosstalk noise [25,28]. The spontaneous Raman scattering and the FWM are two kinds of non-linear effects, and the generated noise photons may fall into the quantum channels and cannot be removed by filtering, which makes them the dominant impairment sources [19]. Since the noise generation is relative to the channel frequency of classical signals and quantum signals, appropriate wavelength assignment can effectively reduce the impacts of these non-linear noises on the quantum signals.

In the dynamic DWDM-QKD networks, the noises are varying with the classical data traffics. Considering the complex network configurations, it is challenging to search the optimal channel allocations in real-time. Therefore, most of the current DWDM-QKD networks still utilize the static fixed-band channel allocation (FBCA) scheme, in which the Dchs and the Qchs are assigned to two separate bands (as shown in Fig. 2(a)) [18,40], and the Qchs are fixed in the lowest wavelength to reduce the Stokes components of the Raman scattering noise [17]. Obviously, the FBCA scheme cannot guarantee the quality of Qch in the dynamic networks. For the recently proposed performance predicting channel allocation (PPCA) scheme shown in Fig. 2(b) [33], the performance of Qch is evaluated in each timeslot, and channels are reallocated if the performance is worse than the requirement. This scheme is more adaptive to the dynamic scenario, but the improvement of SKR is limited, and the real-time performance evaluation is very burdening for network management.

 figure: Fig. 2.

Fig. 2. Illustration of the previous channel allocation schemes in the dyanmic DWDM-QKD network. (a) FBCA scheme; (b) PPCA scheme.

Download Full Size | PDF

3. ML-based noise-suppressing channel allocation (ML-NSCA) scheme

To address the problem of the noise impairments on quantum signals in the dynamic DWDM-QKD network, we introduce a novel ML-NSCA scheme in this section. The core of the scheme is the LightGBM based ML framework, which is designed to predict the optimal channel allocations without knowing the information of future data traffics. In the training process, the dataset generation and feature extraction are optimized, so that the ML framework performs in a more accurate and scalable way.

3.1 Procedure of the ML-NSCA scheme

In the ML-NSCA scheme, the Qchs is reallocated periodically, as illustrated in Fig. 3, and the detailed procedure of the ML-NSCA scheme is described in Algorithm 1. For every timeslot, the connections of classical data requests are established first, and the allocations of Qchs remain unchanged in a fixed time window, which is assumed to be TS. After each TS, the reallocation of Qchs proceeds in each MUX-link in sequence independently. According to the current state of the network, the features of each link are extracted as the input of the ML framework. Then, the trained ML framework is called to predict the performance evaluation index of each avaliable wavelength in the next time window. If there is only one Qch in the link, the wavelength with the best performance is the optimal channel allocation of the Qch. When the number of Qchs is more than one, which is assumed to be $K$ in each link, we select the first $K$ wavelengths with the highest performance evaluation index as the final channel allocations of Qchs.

 figure: Fig. 3.

Fig. 3. Illustration of the ML-NSCA scheme.

Download Full Size | PDF

The ML-NSCA scheme requires wavelength reconfiguration of the DWDM-QKD system. Currently, the commercial QKD terminals do not enable wavelength configuration, but it can be achieved by the customized QKD system built with wavelength-tunable or wavelength-transparent (i.e. operate in a wide waveband) components. Specifically, most of the modulator, the attenuator, and the single-photon detector (SPD) can operate in the whole C-band, and the tunable light source, the tunable filter, and the wavelength selective switch are also available in the market, which provides the technical feasibility for the wavelength reconfigurable DWDM-QKD system.

3.2 Predicting the optimal channel allocation with ML

In this paper, the ML module is based on the LightGBM, which is an advanced Gradient Boosting Decision Tree (GDBT) framework, proposed by Microsoft in 2017 [41]. The LightGBM provides better performance when the dimension of input features is relatively small, and it is proven to have less hardware requirement and high training speed. Therefore, it is suitable for our scheme, which has a few dozens of feature variables. As depicted in Fig. 4, predicting optimal channel allocation is carried out in four stages, which will be further described below.

 figure: Fig. 4.

Fig. 4. Procedure of the ML-based prediction of optimal Qch.

Download Full Size | PDF

3.2.1 Generate training datasets

In our scheme, the synthetic data are generated by simulating the data requests provisioning and theoretically evaluating the SKR of the QKD system. Different from the previous ML-based PPCA scheme, in which the noise estimation is done after the data requests arrive, our scheme needs to evaluate the noise impairments prior to a fixed period. Thus, the randomness of the data requests causes non-deterministic target of the training instance (i.e., the optimal Qch), which means one single simulation result is not generalizable to represent the optimal Qch in the next period. To address this problem, the Monte Carlo simulations are implemented to obtain the statistical-based training datasets. The procedure of generating data is described in Algorithm 2.

We consider a dynamic scenario in which the classical data traffics follow the Poisson process and are served with shortest-path routing and first-fit wavelength assignment. At each reallocation-required timeslot, the Qch in each link is assigned to one of the available wavelengths and remains unchanged in a fixed time window (i.e., TS). Then, the average SKR during TS is evaluated by the Monte Carlo simulations (in line 6 -16 of Algorithm 2). We randomly generate 200 sets of the data traffics during TS and repeat the provisioning of each set of data traffics, and simultaneously, the average SKR of each available wavelength is evaluated. Based on the records of the wavelength with the highest SKR in each iteration, the statistical probability of each available wavelength outperforming others can be obtained (i.e., ${p_{opt}}$), which is the target of our ML framework.

The simulations of SKR are based on a QKD performance evaluation module, whose validity was verified by experiments in our previous researches [2729]. In this module, several major noise impairments are concerned, including crosstalk noise, FWM noise, Raman scattering noise, and dark count noise of the SPD. We also consider the practical characteristics of the QKD system, such as the detector efficiency, detecting gate duration, and the imperfection of the interferometer and the single-photon laser source. On these bases, the lower bound of SKR can be calculated by GLLP function [42].

3.2.2 Derivate and extract features

Before we start training the ML, one important work is to process the features. Redundant irrelative features not only increase the complexity of the ML framework but may also lead to over-fitting and reduce accuracy.

Preliminarily, the training data generation is carried out in the 4-node metro-scale network shown in Fig. 1(a), and each fiber contains 8 channels. Under the assumption that the holding time of each data service is available, totally 6 features are comprehensively considered, including the average traffic load (TL) of data services, the period of reallocating Qch (i.e., time window), the residual holding time (RHT) of each channel in all the links, the fiber length of the current processing link (i.e., The link in which the Qch prediction is processed.), the power of each channel in the current processing link, and the candidate Qch.

The importance of each feature can be computed by the embedding function in the LightGBM framework. Here, we take the training datasets collected in MUX-Link1 as an example, and the results are shown in Fig. 5. It is noted that the importance of the link length is not shown in Fig. 5, because it is a constant variable in this sample and does not affect the output of ML. We can see that the candidate Qch, time window, the RHT of the MUX-link1, average TL, and the power of Dch are predominantly related to the output of ML. Besides, the RHT of neighbor links (i.e., MUX-link3 and DC-only link2) are more relative than the RHT of other links, which is resulted from the wavelength continuity constraint of establishing the connection for classical data requests. As illustrated in Fig. 6, the wavelength continuity constraint requires that the lightpath occupies the same wavelength in all the links [43]. Therefore, even the channel occupancies of Link2 in Figs. 6(a) and 6(b) are the same the Qch would suffer different noise impairments in the next TS influenced by the neighbor links.

 figure: Fig. 5.

Fig. 5. The relative improtance of the features, and the values here are normalized by dividing the maximum value.

Download Full Size | PDF

 figure: Fig. 6.

Fig. 6. Illustration of the lightpath establishment of data requests in the condition of wavelength continuity constraint; (a) the case that the third wavelength is available in all the three links; (b) the case that the fourth wavelength is available in all the three links.

Download Full Size | PDF

Based on the analysis above, we extract four subsets of features, which are listed in TABLE 1 (S1 to S4). S1 includes all the original features. S2 excludes the RHT of all the links except the current processing link. S3 further considers the continuity of each channel in the path passing through the current processing link. The continuity here reflects the occupancy state of the channel in each link of the path, and to evaluate it uniformly, we define a character called path-based RHT (RHT_path), which can be expressed as

$$RHT\_pat{h_n} = {\textrm{Maxmum}}:~~RHT_n^m~~~~(m \in M)\textrm{,}$$
where ${RHT_n^m}$ is the RHT of the link $m$ in the channel $n$, $M$ is the set of the links along the path. The channel is available to establish the lightpath only if it is not occupied in any links along the path, so the maximum RHT of all links represents the RHT of the path. Then, considering the current processing link can be involved to establish multiple paths, the RHT_path of all the paths are averaged.

Tables Icon

Table 1. Extracted feature subsets

In the subset S4, the TL is normalized to express the average TL carried by each link. This derivation is under the consideration that the utilization of each link is different according to the connections in the topology. The normalized TL (i.e., Nor_TL) of the link $m$ can be calculated as

$$Nor\_T{L_m} = \frac{{{p_m}\Lambda }}{\mu } = {p_m} \cdot TL\textrm{,}$$
where $\Lambda$ is the average arriving rate of the classical data traffic, and the average holding time of each classical data service is represented by $1/\mu$. $p_m$ is the probability of the arriving data traffic passing through the link $m$. For example, in the 4-node topology in Fig. 1(a), there are 12 kinds of combinations of source and destination nodes, and three of them require MUX-Link1 to establish connections, so ${p_1}$ is 0.25. The performance of the four subsets of features will be evaluated in the next section, and the subsets with better accuracy and less complexity would be adopted in the ML-NSCA scheme.

3.2.3 Train the ML framework and predict the optimal Qch

Apart from the relevance of the features, the performance of the ML framework is also affected by several parameters, such as the training iteration, the learning_rate, the num_leaves, the max_depth, the min_data_in_leaf, and so on. Among them, the num_leaves, the max_depth, and the min_data_in_leaf are critical for LightGBM. The num_leaves and the max_depth determine the complexity of the model, and the num_leaves should be smaller than $2^{max\_depth}$ to avoid over-fitting. The min_data_in_leaf is also influential for the leaf-wise tree growth algorithm, improper value of it can cause under-fitting or over-fitting of LightGBM. By tuning the value of each parameter step by step and testing them with ten-fold cross-validation, the combination with the best tradeoff between accuracy and time-consuming will be our final choice.

Based on the trained ML framework, the $p_{opt}$ of each available wavelength is predicted according to the input features. The available wavelength with the highest $p_{opt}$ is most likely to have minimal impacts of noises during the next time window, so it is selected as the optimal Qch. The ML framework here output a performance evaluation index $p_{opt}$ rather than the optimal Qch, which provides an opportunity to design more flexible algorithms for selecting Qch.

4. Performance evaluation of the ML-NSCA scheme

In this section, we first analyze the effectiveness of our feature extraction method and evaluate the accuracy of the trained ML framework to predict the optimal Qch. Then, to verify the superiority of the ML-NSCA scheme, the average SKR of the QKD system is numerically assessed in different channel allocation schemes.

4.1 Analysis of the feature extraction method

For each feature subset described in TABLE 1, we test the accuracy of ML through ten-fold cross-validation based on the datasets generated in the 4-node network, and the root mean squared error (RMSE) are reported in TABLE 2.

Tables Icon

Table 2. RMSE comparision of different feature subsets

For S1, it contains the largest number of elements, and the RMSE is 0.0314. S2 contains fewest elements, but the RMSE is the highest due to the leakage of critical features. The subset S3 and S4 have similar RMSE, which is lower than that of S1. These results indicate that the link information required for predicting can be well reflected by the proposed feature derivation and extraction method in S3 and S4. What’s more, the removal of some redundant features in S1 also improves the accuracy and reduces the complexity of the ML framework.

Although S3 and S4 have similar performances, S4 can reflect the features of each link independently and is irrelevant to the network topology because it processes the TL of the network to represent the average load in each link. Therefore, through the feature extraction method in S4, the trained ML framework can be applied in other kinds of topologies. To evaluate this scalability, we generate two test datasets in the 6-node network and the 14-node NSFNet shown in Fig. 7, based on which, the ML framework trained by the datasets generated in the 4-node network are tested. The results are shown in TABLE 3, which verify that the feature extraction method in S4 significantly improves the RMSE in different topologies.

 figure: Fig. 7.

Fig. 7. Network topology; (a) 6-node DWDM-QKD network; (b) 14-node DWDM-QKD network.

Download Full Size | PDF

Tables Icon

Table 3. RMSE tested in the 6-node network and the 14-node network

It can be concluded that the feature derivation and extraction method can improve the accuracy of the ML framework and effectively simplify the dimension of features. Even for the complex topology, the required features are not increased, which reduces the cost of computation and storage. Besides, the link-based feature extraction also makes the trained ML framework generalized to different topologies, so it is unnecessary to be retrained when the optical nodes in the network are added or removed, which makes the ML framework has good scalability and can also be adapted to the topology-reconfigurable networks.

4.2 The accuracy of predicting optimal Qchs

After carefully adjusting, the best performance of ML can be obtained when the main parameters are set as TABLE 4 (the default vaules are used for most of the parameters not mentioned in Table 4), and in this case, the RMSE can reach 0.029.

Tables Icon

Table 4. Parameter settings of the ML module

The deviation of ML directly affects the accuracy of identifying the optimal Qch. We calculate the coincident rate of the estimated optimal Qch and the true optimal Qch in the test datasets. To analyze the ability to identify the obvious instances and the ambiguous instances, we divide the whole test datasets into four groups according to the difference between the highest $p_{opt}$ and the second $p_{opt}$, which is described in TABLE 5. The results of the coincident rate in different groups are shown in Fig. 8.

 figure: Fig. 8.

Fig. 8. Coincident rate in different subsets of test data.

Download Full Size | PDF

Tables Icon

Table 5. Description of dividing the test datasets.

For the 4-node network, the coincident rate in the whole test datasets can achieve 95%. Most of the errors are generated in Group 1, in which the optimal Qch has very close $p_{opt}$ with another channel, and for Group 2, Group 3, and Group 4, the coincident rates are about 99%. It can be concluded that the ML framework in our scheme can clearly identify the optimal Qch with outstanding performance, although some mistakes are made when it identifies the instances where the channels have similar $p_{opt}$, it is acceptable due to these channels have similar performances on SKR. Similar conclusions can also be obtained for the results in the 6-node network and the 14-node NSFNet, except for a slight decrement of accuracy when the network becomes complex.

4.3 Performance evaluation of improving SKR

To verify the superiority of the ML-NSCA scheme in improving the SKR, we compare it with the FBCA scheme and the PPCA scheme, which are described in Section 2. It needs to be supplemented that for the PPCA scheme, the backup channel plan is not declared in [33], so the channel with lowest noise impacts is selected as the backup plan in our simulation to get the upper bound of the PPCA scheme. Besides, considering the fairness, the threshold of the PPCA scheme is set to make the times of channel reallocation equal to that in the ML-NSCA scheme. The main simulation parameters are stated in TABLE 6.

Tables Icon

Table 6. Major simulation parameters of DWDM-QKD system

The simulation results in Fig. 9 are obtained in the 4-node network in Fig. 1(a), and the four links range 5 km, 15 km, 20 km, and 30 km respectively. In each simulation, the average SKR is obtained after serving 10000 data requests, and the statistic accuracy is ensured by 100 times of repetition.

 figure: Fig. 9.

Fig. 9. Evaluations of SKR in 4-node network; (a) SKR vs. data traffic load with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot; (b) SKR vs. configuration period with $P_{Dch} =[-5, 5]$ dBm, TL=10 Erlang; (c) SKR vs. fiber length of each link with TL=10 Erlang, TS=10 time slot, $P_{Dch} =[-5, 5]$ dBm; (d) SKR vs. number of Qchs with TL=10 Erlang, TS=10 time slot, $P_{Dch} =[-5, 5]$ dBm.

Download Full Size | PDF

The results of SKR versus the data traffic load are shown in Fig. 9(a). The SKR gradually decreases with the increment of TL, which results from more classical signals in the network generating more noises. The SKR in the FBCA scheme is the lowest because the quality of the fixed Qch cannot be guaranteed in the condition of time-varying noises. Both the PPCA scheme and ML-NSCA scheme can dynamically adjust the Qch allocations, but with the same operation complexity (i.e., the same times of channel reallocation), the PPCA scheme has a very limited performance of improving the SKR. Whereas the ML-NSCA scheme can obtain the highest SKR, especially, in the case of data traffic load of 30, the SKR is 35% and 31% higher than that in the FBCA scheme and the PPCA scheme respectively. Additionally, Fig. 9(b) indicates that reallocating Qch more frequently can achieve higher SKR for dynamic schemes like the PPCA scheme and ML-NSCA scheme, but it is also at the costs of high operation complexity. Nevertheless, our proposed scheme not only has better performance under the same operation complexity but also avoid real-time performance predicting, which lightens the burden of network management.

Figure 9(c) shows the SKR versus the fiber length of each link. We can see that the SKR decreases dramatically with the fiber distance, and it is higher in the PPCA scheme and the ML-NSCA scheme than that in the benchmark FBCA scheme. While the ML-NSCA scheme can improve SKR more effectively than the PPCA scheme. For example, at the distance of 30 km, the SKR of the ML-NSCA scheme is 41% higher than that of the FBCA scheme and 20% higher than that of the PPCA scheme, and at the distance of 50 km, the improvements are 31% and 11% respectively. While as the fiber distance increases to 60 km or 70 km, the improvements of the PPCA scheme and the ML-NSCA scheme are less obvious, because the dominant cause of SKR descent is the transmission loss rather than the noises.

In Fig. 9(d), we increase the number of Qchs and evaluate the total SKR in different schemes. It is concluded that although the channel allocation method for more than one Qchs is not the global optimum solution, it can be more flexible and scalable, and the ML-NSCA scheme still obtains the highest SKR under different numbers of Qchs.

We also evaluate the performances of the ML-NSCA scheme in the 6-node network and the 14-node NFSNet, and the fiber length of each link is randomly set between 5 km to 30 km. The results in Figs. 10(a) and 10(b) verify that the superiority of the ML-NSCA scheme can be maintained in different networks.

 figure: Fig. 10.

Fig. 10. SKR vs. data traffic load in 6-node network and 14-node network; (a) SKR vs. data traffic loads in 6-node network with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot; (b) SKR vs. data traffic loads in 14-node network with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot.

Download Full Size | PDF

5. Conclusion

In this paper, an ML-NSCA scheme is proposed to reduce the noise impairments on quantum signals in the scenario of QKD being integrated into dynamic optical networks. A LightGBM based ML framework is designed to predict the optimal channel allocations with the highest probabilities to obtain better SKR in the presence of random data traffics. Through optimizing the feature extraction method, the ML framework can obtain high accuracy of identifying optimal channel allocations, and it also has good scalability for different network topologies. The comparison with the existing schemes shows that the ML-NSCA scheme significantly improves the SKR than the FBCA scheme, and it can also effectively obtain higher SKR than the PPCA scheme with less operational complexity. Our research here provides a feasible method to reduce the impairments on quantum signals when they coexist with dynamic data traffics, and it is meaningful for promoting the integration of QKD with the realistic optical communication networks.

Furthermore, in this paper we evaluate the performance of the ML-NSCA scheme in the 200 GHz spaced DWDM-QKD networks. It will be more challenging to integrate QKD with the 100 GHz or 50 GHz spaced DWDM communication systems due to the increasing noise impacts, which worth further researches. Additionally, the feature extraction method in this paper still can be improved to obtain better performance in complex optical networks, and novel noise-suppressing channel allocation schemes with flexible recollection period will also be investigated in our future works.

Funding

National Natural Science Foundation of China (61831003, 61971059) and the fund of the Fundamental Research Funds for the Central Universities (2019XD-A02).

Disclosures

The authors declare no conflicts of interest.

References

1. Y. Ji, J. Zhang, X. Wang, and H. Yu, “Towards converged, collaborative and co-automatic (3c) optical networks,” Sci. China Inf. Sci. 61(12), 121301 (2018). [CrossRef]  

2. P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings of 35th Annual Symposium on Foundations of Computer Science, (1994), pp. 124–134.

3. R. Alléaume, C. Branciard, J. Bouda, T. Debuisschert, M. Dianati, N. Gisin, M. Godfrey, P. Grangier, T. Länger, N. Lütkenhaus, C. Monyk, P. Painchault, M. Peev, A. Poppe, T. Pornin, J. Rarity, J. Renner, G. Ribordy, M. Riguidel, L. Salvail, A. Shields, H. Weinfurter, and A. Zeilinger, “Using quantum key distribution for cryptographic purposes: a survey,” Theor. Comput. Sci. 560, 62–81 (2014). [CrossRef]  

4. W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299(5886), 802–803 (1982). [CrossRef]  

5. H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283(5410), 2050–2056 (1999). [CrossRef]  

6. H.-K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nat. Photonics 8(8), 595–604 (2014). [CrossRef]  

7. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72(1), 012326 (2005). [CrossRef]  

8. H. L. Yin, T. Y. Chen, Z. W. Yu, H. Liu, L. X. You, Y. H. Zhou, S. J. Chen, Y. Mao, M. Q. Huang, W. J. Zhang, H. Chen, M. J. Li, D. Nolan, F. Zhou, X. Jiang, Z. Wang, Q. Zhang, X. B. Wang, and J. W. Pan, “Measurement-device-independent quantum key distribution over a 404 km optical fiber,” Phys. Rev. Lett. 117(19), 190501 (2016). [CrossRef]  

9. Z.-Q. Yin, S. Wang, W. Chen, Y.-G. Han, R. Wang, G.-C. Guo, and Z.-F. Han, “Improved security bound for the round-robin-differential-phase-shift quantum key distribution,” Nat. Commun. 9(1), 457 (2018). [CrossRef]  

10. Z. Yuan, A. Plews, R. Takahashi, K. Doi, W. Tam, A. Sharpe, A. Dixon, E. Lavelle, J. Dynes, A. Murakami, M. Kujiraoka, M. Lucamarini, Y. Tanizawa, H. Sato, and A. J. Shields, “10-Mb/s quantum key distribution,” J. Lightwave Technol. 36(16), 3427–3433 (2018). [CrossRef]  

11. A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M.-J. Li, D. Nolan, and A. Martin, “Secure quantum key distribution over 421 km of optical fiber,” Phys. Rev. Lett. 121(19), 190502 (2018). [CrossRef]  

12. M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]  

13. S. Wang, D.-Y. He, Z.-Q. Yin, F.-Y. Lu, C.-H. Cui, W. Chen, Z. Zhou, G.-C. Guo, and Z.-F. Han, “Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system,” Phys. Rev. X 9, 021046 (2019). [CrossRef]  

14. Q. Zhang, F. Xu, Y.-A. Chen, C.-Z. Peng, and J.-W. Pan, “Large scale quantum key distribution: challenges and solutions,” Opt. Express 26(18), 24260–24273 (2018). [CrossRef]  

15. P. Townsend, “Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing,” Electron. Lett. 33(3), 188–190 (1997). [CrossRef]  

16. N. I. Nweke, P. Toliver, R. J. Runser, S. R. McNown, J. B. Khurgin, T. E. Chapuran, M. S. Goodman, R. J. Hughes, C. G. Peterson, K. McCabe, J. E. Nordholt, K. Tyagi, P. Hiskett, and N. Dallmann, “Experimental characterization of the separation between wavelength-multiplexed quantum and classical communication channels,” Appl. Phys. Lett. 87(17), 174103 (2005). [CrossRef]  

17. L. J. Wang, K. H. Zou, W. Sun, Y. Mao, Y. X. Zhu, H. L. Yin, Q. Chen, Y. Zhao, F. Zhang, T. Y. Chen, and J. W. Pan, “Long-distance copropagation of quantum key distribution and terabit classical optical data channels,” Phys. Rev. A 95(1), 012301 (2017). [CrossRef]  

18. Y. Mao, B.-X. Wang, C. Zhao, G. Wang, R. Wang, H. Wang, F. Zhou, J. Nie, Q. Chen, Y. Zhao, Q. Zhang, J. Zhang, T.-Y. Chen, and J.-W. Pan, “Integrating quantum key distribution with classical communications in backbone fiber network,” Opt. Express 26(5), 6010–6020 (2018). [CrossRef]  

19. N. A. Peters, P. Toliver, T. E. Chapuran, R. J. Runser, S. R. McNown, C. G. Peterson, D. Rosenberg, N. Dallmann, R. J. Hughes, K. P. McCabe, J. E. Nordholt, and K. T. Tyagi, “Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments,” New J. Phys. 11(4), 045012 (2009). [CrossRef]  

20. P. Eraerds, N. Walenta, M. Legré, N. Gisin, and H. Zbinden, “Quantum key distribution and 1 Gbps data encryption over a single fibre,” New J. Phys. 12(6), 063027 (2010). [CrossRef]  

21. K. A. Patel, J. F. Dynes, M. Lucamarini, I. Choi, A. W. Sharpe, Z. L. Yuan, R. V. Penty, and A. J. Shields, “Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks,” Appl. Phys. Lett. 104(5), 051123 (2014). [CrossRef]  

22. L.-J. Wang, L.-K. Chen, L. Ju, M.-L. Xu, Y. Zhao, K. Chen, Z.-B. Chen, T.-Y. Chen, and J.-W. Pan, “Experimental multiplexing of quantum key distribution with classical optical communication,” Appl. Phys. Lett. 106(8), 081108 (2015). [CrossRef]  

23. J. F. Dynes, W. W. Tam, A. Plews, B. Fröhlich, A. W. Sharpe, M. Lucamarini, Z. Yuan, C. Radig, A. Straw, T. Edwards, and A. J. Shields, “Ultra-high bandwidth quantum secured data transmission,” Sci. Rep. 6(1), 35149 (2016). [CrossRef]  

24. B. Fröhlich, M. Lucamarini, J. F. Dynes, L. C. Comandar, W. W.-S. Tam, A. Plews, A. W. Sharpe, Z. Yuan, and A. J. Shields, “Long-distance quantum key distribution secure against coherent attacks,” Optica 4(1), 163–167 (2017). [CrossRef]  

25. T. Ferreira Da Silva, G. B. Xavier, G. P. Temporao, and J. P. Von Der Weid, “Impact of Raman scattered noise from multiple telecom channels on fiber-optic quantum key distribution systems,” J. Lightwave Technol. 32(13), 2332–2339 (2014). [CrossRef]  

26. S. Bahrani, M. Razavi, and J. A. Salehi, “Wavelength assignment in hybrid quantum-classical networks,” Sci. Rep. 8(1), 3456 (2018). [CrossRef]  

27. Y. Sun, Y. Lu, J. Niu, and Y. Ji, “Reduction of FWM noise in WDM-based QKD systems using interleaved and unequally spaced channels,” Chin. Opt. Lett. 14(6), 060602 (2016). [CrossRef]  

28. J. Niu, Y. Sun, C. Cai, and Y. Ji, “Optimized channel allocation scheme for jointly reducing four-wave mixing and raman scattering in the DWDM-QKD system,” Appl. Opt. 57(27), 7987–7996 (2018). [CrossRef]  

29. Y. Sun, P. Zhang, X. Jia, J. Niu, and Y. Ji, “Experimental study of co-propagation and co-switching of quantum and optical signals (invited),” in Proceedings of 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), (IEICE, 2019), paper TuF3-3.

30. P. Samadi, D. Amar, C. Lepers, M. Lourdiane, and K. Bergman, “Quality of transmission prediction with machine learning for dynamic operation of optical WDM networks,” in Proceedings of 2017 European Conference on Optical Communication (ECOC), (IEEE, 2017), paper W3A1.

31. C. Rottondi, L. Barletta, A. Giusti, and M. Tornatore, “Machine-learning method for quality of transmission prediction of unestablished lightpaths,” IEEE/OSA J. Opt. Commun. Netw. 10(2), A286–A297 (2018). [CrossRef]  

32. Q. Yao, H. Yang, R. Zhu, A. Yu, W. Bai, Y. Tan, J. Zhang, and H. Xiao, “Core, mode, and spectrum assignment based on machine learning in space division multiplexing elastic optical networks,” IEEE Access 6, 15898–15907 (2018). [CrossRef]  

33. Y. Ou, E. Hugues-Salas, F. Ntavou, R. Wang, Y. Bi, S. Yan, G. Kanellos, R. Nejabati, and D. Simeonidou, “Field-trial of machine learning-assisted quantum key distribution (QKD) networking with SDN,” in Proceedings of 2018 European Conference on Optical Communication (ECOC), (IEEE, 2018), paper Mo3D.

34. W. Maeda, A. Tanaka, S. Takahashi, A. Tajima, and A. Tomita, “Technologies for quantum key distribution networks integrated with optical communication networks,” IEEE J. Sel. Top. Quantum Electron. 15(6), 1591–1601 (2009). [CrossRef]  

35. Y. Cao, Y. Zhao, C. Colman-Meixner, X. Yu, and J. Zhang, “Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD),” Opt. Express 25(22), 26453–26467 (2017). [CrossRef]  

36. I. Choi, R. J. Young, and P. D. Townsend, “Quantum key distribution on a 10Gb/s WDM-PON,” Opt. Express 18(9), 9600–9612 (2010). [CrossRef]  

37. J. Qiu, “Quantum communications leap out of the lab,” Nat. News 508(7497), 441–442 (2014). [CrossRef]  

38. M. Geihs, O. Nikiforov, D. Demirel, A. Sauer, D. Butin, F. Günther, G. Alber, T. Walther, and J. Buchmann, “The status of quantum-key-distribution-based long-term secure internet communication,” IEEE Transactions on Sustainable Computing (to be published).

39. S. Aleksic, D. Winkler, F. Hipp, A. Poppe, G. Franzl, and B. Schrenk, “Towards a smooth integration of quantum key distribution in metro networks,” in Proceedings of 16th International Conference on Transparent Optical Networks (ICTON 2014), (IEEE, 2014), paper Tu.B1.1.

40. Y. Cao, Y. Zhao, Y. Wu, X. Yu, and J. Zhang, “Time-scheduled quantum key distribution (QKD) over wdm networks,” J. Lightwave Technol. 36(16), 3382–3395 (2018). [CrossRef]  

41. G. Ke, Q. Meng, T. Finley, T. Wang, W. Chen, W. Ma, Q. Ye, and T.-Y. Liu, “Lightgbm: A highly efficient gradient boosting decision tree,” in Proceedings of Advances in Neural Information Processing Systems 30, (2017), pp. 3146–3154.

42. D. Gottesman, H. Lo, N. Lutkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” Quantum Inf. Comput 4, 135 (2003). [CrossRef]  

43. H. Zang, J. P. Jue, and B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” SPIE/Baltzer Optical Network Mag. 1, 47–60 (2000).

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (10)

Fig. 1.
Fig. 1. (a) Configuration of the DWDM-QKD network; MUX-Link: the link in which quantum signals and classical signals are multiplexed; Dch-Link: the link that only transmits the classical data signals. (b) Procedure of the trusted-relay-based key sharing, QM: quantum module.
Fig. 2.
Fig. 2. Illustration of the previous channel allocation schemes in the dyanmic DWDM-QKD network. (a) FBCA scheme; (b) PPCA scheme.
Fig. 3.
Fig. 3. Illustration of the ML-NSCA scheme.
Fig. 4.
Fig. 4. Procedure of the ML-based prediction of optimal Qch.
Fig. 5.
Fig. 5. The relative improtance of the features, and the values here are normalized by dividing the maximum value.
Fig. 6.
Fig. 6. Illustration of the lightpath establishment of data requests in the condition of wavelength continuity constraint; (a) the case that the third wavelength is available in all the three links; (b) the case that the fourth wavelength is available in all the three links.
Fig. 7.
Fig. 7. Network topology; (a) 6-node DWDM-QKD network; (b) 14-node DWDM-QKD network.
Fig. 8.
Fig. 8. Coincident rate in different subsets of test data.
Fig. 9.
Fig. 9. Evaluations of SKR in 4-node network; (a) SKR vs. data traffic load with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot; (b) SKR vs. configuration period with $P_{Dch} =[-5, 5]$ dBm, TL=10 Erlang; (c) SKR vs. fiber length of each link with TL=10 Erlang, TS=10 time slot, $P_{Dch} =[-5, 5]$ dBm; (d) SKR vs. number of Qchs with TL=10 Erlang, TS=10 time slot, $P_{Dch} =[-5, 5]$ dBm.
Fig. 10.
Fig. 10. SKR vs. data traffic load in 6-node network and 14-node network; (a) SKR vs. data traffic loads in 6-node network with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot; (b) SKR vs. data traffic loads in 14-node network with $P_{Dch} =[-5, 5]$ dBm, TS=10 time slot.

Tables (6)

Tables Icon

Table 1. Extracted feature subsets

Tables Icon

Table 2. RMSE comparision of different feature subsets

Tables Icon

Table 3. RMSE tested in the 6-node network and the 14-node network

Tables Icon

Table 4. Parameter settings of the ML module

Tables Icon

Table 5. Description of dividing the test datasets.

Tables Icon

Table 6. Major simulation parameters of DWDM-QKD system

Equations (2)

Equations on this page are rendered with MathJax. Learn more.

R H T _ p a t h n = Maxmum :     R H T n m         ( m M ) ,
N o r _ T L m = p m Λ μ = p m T L ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.