Digest of the 9th International Conference on Optical Internet (COIN 2010) 2010
DOI: 10.1109/coin.2010.5546557
|View full text |Cite
|
Sign up to set email alerts
|

FTTH network survivability security based on massive fiber optic mechanical switch in consolidated central office

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…As the move of FTTH network, survivability or robustness of FTTH system has become an important issue [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. From the view point of implementing methods for enhancing the survivability of FTTH system, we can divide the research works into two parts roughly.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…As the move of FTTH network, survivability or robustness of FTTH system has become an important issue [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. From the view point of implementing methods for enhancing the survivability of FTTH system, we can divide the research works into two parts roughly.…”
Section: Related Workmentioning
confidence: 99%
“…One part of the reported research works focused on the protection or restoration schemes for the FTTH network when the failures had been detected [14][15][16][17][18][19][20]. A hybrid protection architecture which was devised to ensure survivability against multipoint failure (MPF) as well as the single point failure (SPF) in WDM-PON for FTTH was proposed [17].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The connections between two devices might also be subjected to physical attacks that range from unplugging cords or cables to unauthenticated or unauthorized devices, damaging or severing the channels physically, or simply removing connections to the legitimate devices. Wiretapping and open authentication mechanisms are vulnerabilities that allow the attacker to gain access to the network directly [61,62]. The access points could deliberately be turned rogue by an attacker to potentially exploit for man-in-the-middle (MITM) attacks.…”
Section: Physical (Layer 1)mentioning
confidence: 99%
“…These attacks could be mitigated in different ways: (1) blocking or hardening the unused Universal Serial Bus (USB) ports; (2) using data storage cryptography to protect sensitive data to at least prevent the loss of data confidentiality or integrity if the theft is successful; and (3) employing additional security methods such as ACLs to ensure accountability, and auditing to track and control the DER devices. Additionally, to mitigate physical attacks, the devices could be installed in enclosures secured by locks and keys, or could be physically isolated from other frequently used infrastructure in the area, guarded by fences or gates [57,62,96].…”
Section: Physical (Layer 1)mentioning
confidence: 99%