Abstract:Abstract-Due to the high data rates in optical networks, physical-layer attacks targeting service degradation, such as power jamming, can potentially lead to large data and revenue losses. Conventional network survivability approaches which establish link-disjoint working and backup paths to protect from component faults may not provide adequate protection for such attacks. Namely, the working and the backup paths, although link-disjoint, might both be affected by a single attack scenario due to specific attac… Show more
“…A number of papers have also considered attack-aware RWA for survivable optical networks. In [28] the authors propose a two-step ILP for RWA of working and backup lightpaths using dedicated path protection and a heuristic for larger problems. Heuristic approaches that ensure attack groups of primary and backup paths are disjoint and use the minimum number of wavelengths are presented in [24] and [29].…”
In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire transmission path, creating a virtual topology over the physical connections of optical fibers. Due to the increasingly high data rates and the vulnerabilities related to the transparency of optical networks, TONs are susceptible to different physical layer attacks, including high-power jamming attacks. Developing strategies to handle such attacks and mitigating their impact on network performance is becoming an important design problem for TONs. Some approaches for handling physical layer attacks for static and dynamic traffic in TONs have been presented in recent years. In this work, we propose an integer linear program (ILP) formulation to control the propagation of such attacks in TONs for scheduled lightpath demands, which need periodic bandwidth usage at certain predefined times. We consider both the fixed window model, where the start and end timings of the demand are known in advance, and the sliding window model, where exact start and end times are unknown but fall within a larger window. We consider a number of potential objectives for attack-aware RWA and show how the flexibility to schedule demands in time can impact these objectives, compared to both attackunaware and fixed window models. Keywords Transparent optical networks (TONs) • High-power jamming attacks • Scheduled lightpath demands (SLDs) • Integer linear program (ILP) • Routing and wavelength • Assignment (RWA)
“…A number of papers have also considered attack-aware RWA for survivable optical networks. In [28] the authors propose a two-step ILP for RWA of working and backup lightpaths using dedicated path protection and a heuristic for larger problems. Heuristic approaches that ensure attack groups of primary and backup paths are disjoint and use the minimum number of wavelengths are presented in [24] and [29].…”
In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire transmission path, creating a virtual topology over the physical connections of optical fibers. Due to the increasingly high data rates and the vulnerabilities related to the transparency of optical networks, TONs are susceptible to different physical layer attacks, including high-power jamming attacks. Developing strategies to handle such attacks and mitigating their impact on network performance is becoming an important design problem for TONs. Some approaches for handling physical layer attacks for static and dynamic traffic in TONs have been presented in recent years. In this work, we propose an integer linear program (ILP) formulation to control the propagation of such attacks in TONs for scheduled lightpath demands, which need periodic bandwidth usage at certain predefined times. We consider both the fixed window model, where the start and end timings of the demand are known in advance, and the sliding window model, where exact start and end times are unknown but fall within a larger window. We consider a number of potential objectives for attack-aware RWA and show how the flexibility to schedule demands in time can impact these objectives, compared to both attackunaware and fixed window models. Keywords Transparent optical networks (TONs) • High-power jamming attacks • Scheduled lightpath demands (SLDs) • Integer linear program (ILP) • Routing and wavelength • Assignment (RWA)
“…that do not consider such scenarios. Furdek et al [75] introduced a dedicated path protection scheme considering the concept of attack group that helps to established attack-aware disjoint primary and backup paths. Routing and wavelength assignment were handled by a 2-step ILP formulation.…”
Network survivability endeavors to ensure the uninterrupted provisioning of services by the network operators in case of a disaster event. Studies and news reports show that network failures caused by physical attacks and natural disasters have significant impacts on the optical networks. Such network failures may lead to a section of a network to cease to function, resulting in non-availability of services and may increase the congestion within the rest of the network. Therefore, fault tolerant and disaster-resilient optical networks have grasped the attention of the research community and have been a critical concern in network studies during the last decade. Several studies on protection and restoration techniques have been conducted to address the network component failures. This study reviews related previous research studies to critically discuss the issues regarding protection, restoration, cascading failures, disaster-based failures, and congestion-aware routing. We have also focused on the problem of simultaneous cascading failures (which may disturb the data traffic within a layer or disrupt the services at upper layers) along with their mitigating techniques, and disaster-aware network survivability. Since traffic floods and network congestion are pertinent problems, they have therefore been discussed in a separate section. In the end, we have highlighted some open issues in the disaster-resilient network survivability for research challenges and discussed them along with their possible solutions.
“…The concept of attack-aware Routing and Wavelength Assignment (RWA) problem presented in [9]- [13] dealt with WDM optical networks. However, jamming attacks in flexible grid optical networks have not been considered yet.…”
Section: Previous Workmentioning
confidence: 99%
“…An attack is defined as an intentional action against the ideal and secure functioning of the network [6]. Physical layer threats and attacks in optical networks have been studied in the literature by several researchers [6]- [13]; operators also consider of paramount importance the security and availability of their systems, and these features have always been a top priority in their solution designs. Further, several vendors are developing tools that protect optical networks, offering intrusion detection and prevention at the physical layer, as well as alerting capabilities for the operators.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth noting that this kind of attack can be performed from remote locations without physical access to the node under attack. Due to the high bit rates of flexible grid optical networks and the large number of lightpath interactions, a jamming attack can cause a huge amount of information loss, as this attack may propagate in the network, affecting other lightpaths as well [11]- [13]. Therefore, the limitation of crosstalk interactions in order to prevent service disruption is a crucial consideration in the planning of flexible grid optical networks.…”
Due to crosstalk-induced interactions among different connections, malicious high-power jamming signals can potentially spread widely in a transparent optical network. Moreover, due to imperfect port isolation in wavelength selective switches (WSSs), present within optical switching nodes, crosstalk also affects the quality of the transmitted signal. Therefore, it is necessary to design an optical network in a way that the effect of crosstalk is minimized, while at the same time keeping the cost and the power consumption of the network low. This is achieved in this work by the design of appropriate WSS placement and crosstalk-aware Routing and Spectrum Assignment (RSA) algorithms in flexible grid optical networks, in the form of an Integer Linear Program (ILP) formulation and a heuristic algorithm analogous to vertex coloring. The objective of the optimization algorithms is to minimize the impact of the crosstalk effect, thus minimizing the impact to the normal operation of the network. The optimization objective is enhanced with proper functions in order to minimize the capital expenditure (CAPEX) and the operational expenditure (OPEX) of the networks investigated in terms of cost and power consumption respectively. Performance results indicate that the proposed algorithms minimize the number of WSSs required to compensate for the crosstalk effect, while only slightly increasing the spectrum utilization.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.