Proceedings of 2003 5th International Conference on Transparent Optical Networks, 2003.
DOI: 10.1109/icton.2003.1264585
|View full text |Cite
|
Sign up to set email alerts
|

Securing all-optical networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Although transparency, in AONs, offers many advantages for high rate communications, it introduces new vulnerabilities to network security, which do not exist in traditional networks [1,3,4,[6][7][8][9]11,12]. Actually, the absence of signal interpretation and regeneration within the network allows for transmission impairments (crosstalk, power increase, etc.)…”
Section: A Transparency Featurementioning
confidence: 99%
See 2 more Smart Citations
“…Although transparency, in AONs, offers many advantages for high rate communications, it introduces new vulnerabilities to network security, which do not exist in traditional networks [1,3,4,[6][7][8][9]11,12]. Actually, the absence of signal interpretation and regeneration within the network allows for transmission impairments (crosstalk, power increase, etc.)…”
Section: A Transparency Featurementioning
confidence: 99%
“…Although they offer many advantages for high data rate communications, AONs come with new challenges in terms of network security that do not exist in traditional communication networks [1,3,[6][7][8][9]11,12]. In particular, AON components have different accessibility and vulnerabilities from electronic components.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Now if the crosstalk from only λ 21 is considered, then the worst case crosstalk power coming from λ 21 in the signal at λ 11 is given by expression (8). …”
Section: 21analytical Model For Crosstalk In Optical Cross-connecmentioning
confidence: 99%
“…To foil the in-band and out-of-band jamming attacks in AON, some preventive countermeasures have been proposed in [1], [2], [3], [4], [5], [6], [7], [8], [9] and [10] which are primarily focused on detection and attack localization, i.e., reactive approach. Three types of preventive countermeasure categories are primarily focused in [1]: 1) incorporating band limiting filters to thwart signals outside certain band to prevent out-of-band gain competition and reducing vulnerabilities intrinsic to hardware, 2) providing anti-jamming transmission schemes such as CDMA or TDMA that are hardened for anti-jamming and anti-tapping measures and 3) protocols and architecture designs adapted to AONs, such as avoiding compromised link for sensitive communications.…”
Section: Introductionmentioning
confidence: 99%