Optical Networks and Their Applications 1998
DOI: 10.1364/ona.1998.ap3
|View full text |Cite
|
Sign up to set email alerts
|

Attack detection in all-optical networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
64
0

Year Published

2004
2004
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(64 citation statements)
references
References 2 publications
0
64
0
Order By: Relevance
“…An attacker can exploit the gain saturation property of EDFA by inserting a strong so that the legitimate signals can be deprived of the photons. However, according to equation (2), if input power changes, the corresponding change of pump power can compensate for loss of N 2 . Therefore, it is possible to maintain the gain of the legitimate channels by providing extra pump power when attack is detected.…”
Section: Attack Monitoring Security Index Calculation and On-the-fmentioning
confidence: 99%
See 3 more Smart Citations
“…An attacker can exploit the gain saturation property of EDFA by inserting a strong so that the legitimate signals can be deprived of the photons. However, according to equation (2), if input power changes, the corresponding change of pump power can compensate for loss of N 2 . Therefore, it is possible to maintain the gain of the legitimate channels by providing extra pump power when attack is detected.…”
Section: Attack Monitoring Security Index Calculation and On-the-fmentioning
confidence: 99%
“…Thus an in-band jammer who injects a signal on a single wavelength into a link using high power transmitter can destroy many signals on that wavelength since channels of the same wavelength from different fibers share the same switching plane. An attacker, a person internal to the network oran external remote person, can disrupt the operation of an optical node by exploiting these cross-talk characteristics of switches by injecting a very high power attack signal through the wavelength selective switch [2]. A second type of attack, known as gain competitionattack, exploits gain competition property of optical amplifiers.If an attacker injects a strong signal at a wavelength outside the communication band, but within the passband of the amplifier then the gains of the legitimate signals may be reduced considerably.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The optical power detection, optical spectral analysis, pilot tones and optical time domain reflectometry (OTDR) could be deployed for fault detection and also attack detection [2] in AONs.…”
Section: Introductionmentioning
confidence: 99%