5G Network Slicing with QKD and Quantum-Safe Security
Authors:
Paul Wright,
Catherine White,
Ryan C. Parker,
Jean-Sébastien Pegon,
Marco Menchetti,
Joseph Pearse,
Arash Bahrami,
Anastasia Moroz,
Adrian Wonfor,
Richard V. Penty,
Timothy P. Spiller,
Andrew Lord
Abstract:
We demonstrate how the 5G network slicing model can be extended to address data security requirements. In this work we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking: namely, an enterprise application hosted at a metro network site, and a content delivery network. We create a modified software-defined net…
▽ More
We demonstrate how the 5G network slicing model can be extended to address data security requirements. In this work we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking: namely, an enterprise application hosted at a metro network site, and a content delivery network. We create a modified software-defined networking (SDN) orchestrator which calculates and provisions network slices according to the requirements, including encryption backed by quantum key distribution (QKD), or other methods. Slices are automatically provisioned by SDN orchestration of network resources, allowing selection of encrypted links as appropriate, including those which use standard Diffie-Hellman key exchange, QKD and quantum-resistant algorithms (QRAs), as well as no encryption at all. We show that the set-up and tear-down times of the network slices takes of the order of 1-2 minutes, which is an order of magnitude improvement over manually provisioning a link today.
△ Less
Submitted 8 January, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
Iterated geometric harmonics for data imputation and reconstruction of missing data
Authors:
Chad Eckman,
Jonathan A. Lindgren,
Erin P. J. Pearse,
David J. Sacco,
Zachariah Zhang
Abstract:
The method of geometric harmonics is adapted to the situation of incomplete data by means of the iterated geometric harmonics (IGH) scheme. The method is tested on natural and synthetic data sets with 50--500 data points and dimensionality of 400--10,000. Experiments suggest that the algorithm converges to a near optimal solution within 4--6 iterations, at runtimes of less than 30 minutes on a med…
▽ More
The method of geometric harmonics is adapted to the situation of incomplete data by means of the iterated geometric harmonics (IGH) scheme. The method is tested on natural and synthetic data sets with 50--500 data points and dimensionality of 400--10,000. Experiments suggest that the algorithm converges to a near optimal solution within 4--6 iterations, at runtimes of less than 30 minutes on a medium-grade desktop computer. The imputation of missing data values is applied to collections of damaged images (suffering from data annihilation rates of up to 70\%) which are reconstructed with a surprising degree of accuracy.
△ Less
Submitted 4 November, 2014;
originally announced November 2014.