2017
DOI: 10.1049/iet-opt.2016.0150
|View full text |Cite
|
Sign up to set email alerts
|

Security threats and protection procedures for optical networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 51 publications
(50 reference statements)
0
7
0
Order By: Relevance
“…Although OTN networks provide significant advantages such as reduced complexity and network expense cost, optimizing them also comes with its own set of challenges that need to be considered and addressed [ 50 – 52 ]. These challenges are further exacerbated when using OTNs in the context of 5G networks due to the heterogeneous and dynamic nature of such networks.…”
Section: Challenges Facing Otn Optimization In 5g Networkmentioning
confidence: 99%
“…Although OTN networks provide significant advantages such as reduced complexity and network expense cost, optimizing them also comes with its own set of challenges that need to be considered and addressed [ 50 – 52 ]. These challenges are further exacerbated when using OTNs in the context of 5G networks due to the heterogeneous and dynamic nature of such networks.…”
Section: Challenges Facing Otn Optimization In 5g Networkmentioning
confidence: 99%
“…The dogma of cryptography and interpretation are described by ECDH-ES algorithm for N numbers of channels in OLT, where the input in OLT is supported by cryptography, while decryption is applied at ONU of ON. The bit sequences are created by a pseudorandom bit sequence (PRBS) generator, which is formulated [16][17][18] as…”
Section: Analytical Modeling For Secure Communicationmentioning
confidence: 99%
“…In [25], the authors propose ILP formulations to handle in-band attack propagation in all optical WDM networks for offline planning problem. Both the direct and indirect in-band crosstalk propagations are examined and are minimized to control the propagation.…”
Section: Attack-aware Rwamentioning
confidence: 99%