entropy-logo

Journal Browser

Journal Browser

Secure Network Ecosystems in the Quantum Era

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Quantum Information".

Deadline for manuscript submissions: closed (31 July 2025) | Viewed by 535

Special Issue Editors


E-Mail Website
Guest Editor
School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Interests: quantum networks; quantum communication; quantum key distribution; optical network security; satellite network security; software-defined networking

E-Mail Website
Guest Editor
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
Interests: quantum networks; quantum communication; quantum key distribution; optical network security; satellite network security; software-defined networking

Special Issue Information

Dear Colleagues,

Developing secure network ecosystems is a bright vision, including secure optical networks, secure Internet of Things (IoT), secure satellite networks, and so on. Quantum technologies have the potential to provide effective solutions for security in a multitude of network scenarios. Hence, the scope of this Special Issue is to explore the opportunities for secure network ecosystems in the quantum era. This requires the involvement of multiple disciplines to facilitate their development, including informing the communications society of the latest advances in quantum information technologies, as well as exploring the application of security solutions such as quantum cryptography in response to numerous cyberattacks. Over the past decades, a wide variety of secure systems have been developed and demonstrated in laboratories, fields, and commercial settings. In addition, real applications in quantum communications and information-related fields have been confirmed. This includes applications in areas such as data security, high-precision sensing, and computing. It is the aim of this Special Issue to connect people from academia and industry, in classical and quantum communities, to discuss the theory, technology, and applications of secure network ecosystems in the quantum era, as well as to exchange ideas to efficiently promote the engineering and development of this exciting area.

This Special Issue will accept unpublished original papers and comprehensive reviews that are focused (but not restricted) on such research areas.

Dr. Yuan Cao
Dr. Xiaosong Yu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum networks
  • quantum communication
  • quantum key distribution
  • entanglement generation and distribution
  • quantum secure direct communication
  • quantum repeaters and switches
  • quantum machine learning
  • quantum algorithms and applications
  • optical network security
  • IoT security
  • satellite network security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 3043 KB  
Article
Secure Virtual Network Provisioning over Key Programmable Optical Networks
by Xiaoyu Wang, Hao Jiang, Jianwei Li and Zhonghua Liang
Entropy 2025, 27(10), 1042; https://doi.org/10.3390/e27101042 - 7 Oct 2025
Viewed by 215
Abstract
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks [...] Read more.
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks remains a challenging problem. To address this challenge, the concept of evolving traditional optical networks into key programmable optical networks (KPONs) has been proposed. Inspired by this, this paper delves into the establishment of secure virtual networks over KPONs, in which the information-theoretically secure keys can be supplied for ensuring the information-theoretic security of data transfer within virtual networks. A layered architecture for secure virtual network provisioning over KPONs is proposed, which leverages software-defined networking to realize the programmable control of optical-layer resources. With this architecture, a heuristic algorithm, i.e., the key adaptation-based secure virtual network provisioning (KA-SVNP) algorithm, is designed to dynamically allocate key resources based on the adaption between the key supply and key demand. To evaluate the proposed solutions, an emulation testbed is established, achieving millisecond latencies for secure virtual network establishment and deletion. Moreover, numerical simulations indicate that the designed KA-SVNP algorithm performs superior to the benchmark algorithm in terms of the success probability of secure virtual network requests. Full article
(This article belongs to the Special Issue Secure Network Ecosystems in the Quantum Era)
Show Figures

Figure 1

Back to TopTop