Skip to main content
Top
Published in:

2023 | OriginalPaper | Chapter

1. Einführung

Authors : Riccardo Bassoli, Holger Boche, Christian Deppe, Roberto Ferrara, Frank H. P. Fitzek, Gisbert Janssen, Sajad Saeedinaeeni

Published in: Quantenkommunikationsnetze

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Die Telekommunikation hat sich von einem „Store-and-Forward“-Paradigma zu einem „Compute-and-Forward“-Paradigma entwickelt. Dieser Wandel (der die Datenverarbeitung zum Kernstück der Kommunikation macht) ist dank der Virtualisierung und Softwarisierung der Netze möglich geworden. Allerdings stoßen alte, und künftige Kommunikationsnetze, die auf der klassischen Physik basieren, an Grenzen, die nicht überschritten werden können. Solche Limitationen werden vor allem die Leistung der Sicherheit, die Latenzzeit und die Kommunikationseffizienz betreffen. Die einzige Möglichkeit, über diese Grenzen hinauszugehen, ist ein Paradigmenwechsel, bei dem die Telekommunikation die Quantenmechanik nutzt. Durch die Nutzung quantenmechanischer Eigenschaften der Natur können künftige Kommunikationsnetze unerwartete Leistungen auf effiziente Weise erzielen. Die Klärung dieses Zusammenhangs und die Gründe für den Einsatz der Quantenmechanik in der Telekommunikation sind das zentrale Thema dieses einführenden Kapitels.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[AvW18]
go back to reference Abdou, A., van Oorschot, P. C., & Wan, T. (2018). Comparative analysis of control plane security of SDN and conventional networks. IEEE Communications Surveys Tutorials, 20(4), 3542–3559.CrossRef Abdou, A., van Oorschot, P. C., & Wan, T. (2018). Comparative analysis of control plane security of SDN and conventional networks. IEEE Communications Surveys Tutorials, 20(4), 3542–3559.CrossRef
[ARS16]
go back to reference Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys Tutorials, 18(3), 1617–1655.CrossRef Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys Tutorials, 18(3), 1617–1655.CrossRef
[ANYG15]
go back to reference Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined networks: A survey. IEEE Communications Surveys Tutorials, 17(4), 2317–2346.CrossRef Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined networks: A survey. IEEE Communications Surveys Tutorials, 17(4), 2317–2346.CrossRef
[BGADR19]
go back to reference Bassoli, R., Granelli, F., Arzo, S. T., & Di Renzo, M. (2019). Toward 5G cloud radio access network: An energy and latency perspective. Transactions on Emerging Telecommunications Technologies, e3669. Bassoli, R., Granelli, F., Arzo, S. T., & Di Renzo, M. (2019). Toward 5G cloud radio access network: An energy and latency perspective. Transactions on Emerging Telecommunications Technologies, e3669.
[BB84]
go back to reference Bennett, C. H., & Brassard, G. (1984). An update on quantum cryptography. In Workshop on the Theory and Application of Cryptographic Techniques (S. 475–480). Bennett, C. H., & Brassard, G. (1984). An update on quantum cryptography. In Workshop on the Theory and Application of Cryptographic Techniques (S. 475–480).
[BBC+93]
go back to reference Bennett, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., & Wootters, W. K. (1993). Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters, 70(13), 1895.MathSciNetCrossRefMATH Bennett, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., & Wootters, W. K. (1993). Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters, 70(13), 1895.MathSciNetCrossRefMATH
[BCMdW10]
go back to reference Buhrman, H., Cleve, R., Massar, S., & de Wolf, R. (2010). Nonlocality and communication complexity. Reviews of Modern Physics, 82(1), 665–698.CrossRef Buhrman, H., Cleve, R., Massar, S., & de Wolf, R. (2010). Nonlocality and communication complexity. Reviews of Modern Physics, 82(1), 665–698.CrossRef
[BIK+16]
go back to reference Buzzi, S., Chih-Lin, I., Klein, T. E., Poor, H. V., Yang, C., & Zappone, A. (2016). A survey of energy-efficient techniques for 5G networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 34(4), 697–709.CrossRef Buzzi, S., Chih-Lin, I., Klein, T. E., Poor, H. V., Yang, C., & Zappone, A. (2016). A survey of energy-efficient techniques for 5G networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 34(4), 697–709.CrossRef
[CWY04]
go back to reference Cai, N., Winter, A., & Yeung, R. W. (2004). Quantum privacy and quantum wiretap channels. Problems of Information Transmission, 40(4), 318–336.MathSciNetCrossRefMATH Cai, N., Winter, A., & Yeung, R. W. (2004). Quantum privacy and quantum wiretap channels. Problems of Information Transmission, 40(4), 318–336.MathSciNetCrossRefMATH
[DCA+17]
go back to reference Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., & Conti, M. (2017). A survey on the security of stateful SDN data planes. IEEE Communications Surveys Tutorials, 19(3), 1701–1725.CrossRef Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., & Conti, M. (2017). A survey on the security of stateful SDN data planes. IEEE Communications Surveys Tutorials, 19(3), 1701–1725.CrossRef
[DWF16]
go back to reference Dayarathna, M., Wen, Y., & Fan, R. (2016). Data center energy consumption modeling: A survey. IEEE Communications Surveys Tutorials, 18(1), 732–794.CrossRef Dayarathna, M., Wen, Y., & Fan, R. (2016). Data center energy consumption modeling: A survey. IEEE Communications Surveys Tutorials, 18(1), 732–794.CrossRef
[Dev05]
go back to reference Devetak, I. (2005). The private classical capacity and quantum capacity of a quantum channel. IEEE Transactions on Information Theory, 51(1), 44–55.MathSciNetCrossRefMATH Devetak, I. (2005). The private classical capacity and quantum capacity of a quantum channel. IEEE Transactions on Information Theory, 51(1), 44–55.MathSciNetCrossRefMATH
[DS05]
go back to reference Devetak, I., & Shor, P. W. (2005). The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Communications in Mathematical Physics, 256(2), 287–303.MathSciNetCrossRefMATH Devetak, I., & Shor, P. W. (2005). The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Communications in Mathematical Physics, 256(2), 287–303.MathSciNetCrossRefMATH
[DW05]
go back to reference Devetak, I., & Winter, A. (2005). Distillation of secret key and entanglement from quantum states. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 461(2053), 207–235.MathSciNetCrossRefMATH Devetak, I., & Winter, A. (2005). Distillation of secret key and entanglement from quantum states. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 461(2053), 207–235.MathSciNetCrossRefMATH
[FTKS19]
go back to reference Farris, I., Taleb, T., Khettab, Y., & Song, J. (2019). A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys Tutorials, 21(1), 812–837.CrossRef Farris, I., Taleb, T., Khettab, Y., & Song, J. (2019). A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys Tutorials, 21(1), 812–837.CrossRef
[GB18]
go back to reference Granelli, F., & Bassoli, R. (2018). Autonomic mobile virtual network operators for future generation networks. IEEE Network, 32(5), 76–84.CrossRef Granelli, F., & Bassoli, R. (2018). Autonomic mobile virtual network operators for future generation networks. IEEE Network, 32(5), 76–84.CrossRef
[Hol73]
go back to reference Holevo, A. S. (1973). Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii, 9(3), 3–11.MathSciNetMATH Holevo, A. S. (1973). Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii, 9(3), 3–11.MathSciNetMATH
[HW10a]
go back to reference Hsieh, M.-H., & Wilde, M. M. (2010). Entanglement-assisted communication of classical and quantum information. IEEE Transactions on Information Theory, 56(9), 4682–4704.MathSciNetCrossRefMATH Hsieh, M.-H., & Wilde, M. M. (2010). Entanglement-assisted communication of classical and quantum information. IEEE Transactions on Information Theory, 56(9), 4682–4704.MathSciNetCrossRefMATH
[IG12]
go back to reference Imre, S., & Gyongyosi, L. (2012). Advanced quantum communications: An engineering approach (1. Aufl.). Wiley-IEEE Press.CrossRefMATH Imre, S., & Gyongyosi, L. (2012). Advanced quantum communications: An engineering approach (1. Aufl.). Wiley-IEEE Press.CrossRefMATH
[JITT16]
go back to reference Jaber, M., Imran, M. A., Tafazolli, R., & Tukmanov, A. (2016). 5G backhaul challenges and emerging research directions: A survey. IEEE Access, 4, 1743–1766.CrossRef Jaber, M., Imran, M. A., Tafazolli, R., & Tukmanov, A. (2016). 5G backhaul challenges and emerging research directions: A survey. IEEE Access, 4, 1743–1766.CrossRef
[JHA+16]
go back to reference Jalali, F., Hinton, K., Ayre, R., Alpcan, T., & Tucker, R. S. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728–1739.CrossRef Jalali, F., Hinton, K., Ayre, R., Alpcan, T., & Tucker, R. S. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728–1739.CrossRef
[Kim08]
[LALS20]
go back to reference Leditzky, F., Alhejji, M. A., Levin, J., & Smith, G. (2020). Playing games with multiple access channels. Nature Communications, 11(1), 1497.CrossRef Leditzky, F., Alhejji, M. A., Levin, J., & Smith, G. (2020). Playing games with multiple access channels. Nature Communications, 11(1), 1497.CrossRef
[LSC+17]
go back to reference Li, X., Samaka, M., Chan, H. A., Bhamare, D., Gupta, L., Guo, C., et al. (2017). Network slicing for 5G: Challenges and opportunities. IEEE Internet Computing, 21(5), 20–27.CrossRef Li, X., Samaka, M., Chan, H. A., Bhamare, D., Gupta, L., Guo, C., et al. (2017). Network slicing for 5G: Challenges and opportunities. IEEE Internet Computing, 21(5), 20–27.CrossRef
[LJK+16]
go back to reference Liu, J., Jiang, Z., Kato, N., Akashi, O., & Takahara, A. (2016). Reliability evaluation for NFV deployment of future mobile broadband networks. IEEE Wireless Communications, 23(3), 90–96.CrossRef Liu, J., Jiang, Z., Kato, N., Akashi, O., & Takahara, A. (2016). Reliability evaluation for NFV deployment of future mobile broadband networks. IEEE Wireless Communications, 23(3), 90–96.CrossRef
[MSG+16]
go back to reference Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., & Boutaba, R. (2016). Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys Tutorials, 18(1), 236–262.CrossRef Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., & Boutaba, R. (2016). Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys Tutorials, 18(1), 236–262.CrossRef
[Nö19]
go back to reference Nötzel, J. (2019). Entanglement-enabled communication. IEEE Journal on Selected Areas in Information Theory, 1(2), 401–415.CrossRef Nötzel, J. (2019). Entanglement-enabled communication. IEEE Journal on Selected Areas in Information Theory, 1(2), 401–415.CrossRef
[NMN+14]
go back to reference Nunes, B. A. A., Mendonca, M., Nguyen, X., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys Tutorials, 16(3), 1617–1634.CrossRef Nunes, B. A. A., Mendonca, M., Nguyen, X., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys Tutorials, 16(3), 1617–1634.CrossRef
[PHS+18]
go back to reference Pattaranantakul, M., He, R., Song, Q., Zhang, Z., & Meddahi, A. (2018). NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures. IEEE Communications Surveys Tutorials, 20(4), 3330–3368.CrossRef Pattaranantakul, M., He, R., Song, Q., Zhang, Z., & Meddahi, A. (2018). NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures. IEEE Communications Surveys Tutorials, 20(4), 3330–3368.CrossRef
[RBSG16]
go back to reference Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462–476.CrossRef Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462–476.CrossRef
[SB14a]
go back to reference Schaefer, R. F., & Boche, H. (2014). Physical layer service integration in wireless networks: Signal processing challenges. IEEE Signal Processing Magazine, 31(3), 147–156.CrossRef Schaefer, R. F., & Boche, H. (2014). Physical layer service integration in wireless networks: Signal processing challenges. IEEE Signal Processing Magazine, 31(3), 147–156.CrossRef
[SNS16]
go back to reference Scott-Hayward, S., Natarajan, S., & Sezer, S. (2016). A survey of security in software defined networks. IEEE Communications Surveys Tutorials, 18(1), 623–654.CrossRef Scott-Hayward, S., Natarajan, S., & Sezer, S. (2016). A survey of security in software defined networks. IEEE Communications Surveys Tutorials, 18(1), 623–654.CrossRef
[SR00]
go back to reference Steane, A. M., & Rieffel, E. G. (2000). Beyond bits: The future of quantum information processing. Computer, 33(1), 38–45.CrossRef Steane, A. M., & Rieffel, E. G. (2000). Beyond bits: The future of quantum information processing. Computer, 33(1), 38–45.CrossRef
[WEH18]
[WZ82]
go back to reference Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803.CrossRefMATH Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803.CrossRefMATH
[XGU+19]
go back to reference Xiang, Z., Gabriel, F., Urbano, E., Nguyen, G. T., Reisslein, M., & Fitzek, F. H. P. (2019). Reducing latency in virtual machines: Enabling tactile internet for human-machine co-working. IEEE Journal on Selected Areas in Communications, 37(5), 1098–1116.CrossRef Xiang, Z., Gabriel, F., Urbano, E., Nguyen, G. T., Reisslein, M., & Fitzek, F. H. P. (2019). Reducing latency in virtual machines: Enabling tactile internet for human-machine co-working. IEEE Journal on Selected Areas in Communications, 37(5), 1098–1116.CrossRef
Metadata
Title
Einführung
Authors
Riccardo Bassoli
Holger Boche
Christian Deppe
Roberto Ferrara
Frank H. P. Fitzek
Gisbert Janssen
Sajad Saeedinaeeni
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-26326-2_1