2008 2nd ICTON Mediterranean Winter 2008
DOI: 10.1109/ictonmw.2008.4773124
|View full text |Cite
|
Sign up to set email alerts
|

Security in all-optical networks: Failure and attack avoidance using self-organization

Abstract: While transparent optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many security issues, which do not exist in traditional optoelectronic networks. The existing protection schemes which rely heavily on fault detection due to the use of network monitoring performed by the use of optoelectronic conversion at the switching nodes, is not sufficient to provide security assurance for all optical networks which lack the massive use of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
(8 reference statements)
0
6
0
Order By: Relevance
“…In this section, we present a detailed overview of security attacks in AONs, and we mainly focus on the physical-layer security attacks that differ significantly from those in electro-optic and electronic networks and that directly impact the physical infrastructure of AONs. As described in [1,2,6,9,13], physical-layer attacks can be broadly categorized into two main types: SD, which prevents communication or degrades the QoS, and tapping, which compromises privacy by providing unauthorized access to the transmitted data, which can then be used for eavesdropping or traffic analysis purposes. To perform a physical-layer security attack in an AON, an attacker needs an attack method allowing the exploitation of the vulnerabilities of the network physical infrastructure to affect the network security.…”
Section: Security Attacks In Aonsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we present a detailed overview of security attacks in AONs, and we mainly focus on the physical-layer security attacks that differ significantly from those in electro-optic and electronic networks and that directly impact the physical infrastructure of AONs. As described in [1,2,6,9,13], physical-layer attacks can be broadly categorized into two main types: SD, which prevents communication or degrades the QoS, and tapping, which compromises privacy by providing unauthorized access to the transmitted data, which can then be used for eavesdropping or traffic analysis purposes. To perform a physical-layer security attack in an AON, an attacker needs an attack method allowing the exploitation of the vulnerabilities of the network physical infrastructure to affect the network security.…”
Section: Security Attacks In Aonsmentioning
confidence: 99%
“…In [1,2,8,9,11,12], the authors present an analysis of the security and management issues that arise in AONs from their peculiar features. In [10,13], the authors propose a self-organization scheme ensuring an autonomous network adaptation against new vulnerabilities, which helps to better protect against potential failures. Another aspect of prevention concerns maintaining data semantic security through the deployment of the optical cryptography scheme [1,2,14].…”
Section: Management Of Security Attacks In Aonsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [96], intelligence is embedded into the optical network to enable it continuously learn from different faults and attacks in a self-organized manner. In [97], a new self-organized method, as analogous to the human immunization system's primary defense mechanism, is proposed to enable the network autonomously and persistently adapt to network changes by learning newly observed vulnerabilities, while at the same time obviate the effort to exploiting already discovered ones. Furthermore, the immune-network theory can also be used to suppress or encourage multi-agent behavior [98] and for approaches such as collaborative mine detection [99].…”
Section: ) Aismentioning
confidence: 99%
“…Due to the sensitivity of the data that can be transmitted across optical networks, strict security requirements should be thought of. Indeed, some optical networks features can be used by an attacker to analyze traffic, eavesdrop, deny service, etc [I], [2], [3]. Several approaches have been proposed in the literature to address the protection of optical networks [4], [5].…”
Section: Introductionmentioning
confidence: 99%