| With the rapid development of new network applications such as cloud computing and high-resolution video,network information traffic has surged,which is a huge challenge for the transmission capacity of optical networks.Elastic optical networks have greatly improved the utilization of spectrum resources through more fine-grained bandwidth division,and have become an effective way to ease the pressure on optical network traffic.At the same time,in order to change the situation of network rigidity,network virtualization is proposed.Network virtualization construct virtual optical networks between different users by ing the underlying physical network resources.Different virtual optical networks can share physical resources to improve the flexibility and scalability of the network.As more and more confidential information depends on the transmission of virtual optical networks,the security of data transmission in virtual optical networks has begun to attract researchers’attention.However,current virtual optical network data encryption uses an encryption method based on computational complexity.The encryption method based on high computational complexity cannot ensure the absolute security of key generation and distribution,which is easy to be intercepted and attacked.The emergence of quantum key distribution is expected to address this security issue.Through Heisenberg’s uncertainty principle and non-cloning theorem,quantum key distribution can theoretically achieve unconditional security.It’s feasible to combine quantum key distribution with network virtualization to improve service security.Therefore,this paper abstracts the physical resources of the quantum key distribution network to carry virtual services,and studies the resource allocation strategy of the virtual services in the quantum key distribution network.The specific research and innovation work mainly include the following aspects:Firstly,from the perspective of node embedding,using the quantum key distribution optical network as the underlying physical network,a virtual service embedding network model based on node ranking is proposed,and a virtual service embedding algorithm based on node ranking is proposed based on the model.The algorithm sorts the nodes according to the bandwidth and key resources of the adjacent links of the nodes,embeds the virtual nodes to the physical nodes in order,and then assigns routing,spectrum and key resources to the virtual links.The blocking rate and key utilization rate are used to evaluate the effect of the algorithm on network performance.Simulation results show that both blocking rate and key resource utilization rate increase with the increase of traffic.The blocking rate and key resource utilization are different when key generation rate,key consumption and k take different values.Secondly,combining node embedding with link embedding,an embedding strategy for virtual services based on link ranking in the quantum key distribution optical network is proposed.Considering that virtual nodes can embed in a range of physical nodes,the bandwidth requirements and key requirements of the virtual links are integrated.The virtual links are evaluated and sorted.And then the virtual links are embedded in order.For a virtual link,the source and destination physical node pairs that can be embedded are calculated,and appropriate physical nodes are selected to complete key relay path embedding,node embedding,and data transmission path embedding.Link ranking based strategies help maximize quantum key resource savings.Simulation results show that adjusting the adjustment factor,key generation rate,and k value can balance the blocking rate and key resource utilization.Finally,from the perspective of the survivability strategy of virtual service embedding,a surviving virtual service embedding model and corresponding embedding algorithms are proposed.Adopting a protection strategy,when embedding virtual services on the underlying quantum key distribution network,a working path and a protection path need to be configured when allocating data transmission paths,and the two paths are allocated corresponding spectrum resources and key resources.The simulation results verify the network performance under different adjustment factors,different key generation rates,and different k values.The balance between the blocking rate and key resource utilization can be found by adjusting the parameters. |