High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

نویسندگان

چکیده

This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power are modeled based on their impact the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based a desired threshold lightpath’s QoT, modulation format used, length path, as well set physical layer characteristics, each lightpath can potentially tolerate attack. In this paper, an integer linear program is thus formulated, heuristic algorithms to solve problem attack-aware routing, spectrum, format, and core allocation SS-FONs, aiming both efficiently provision network terms resources, minimize established lightpaths. Extensive simulation results obtained for several algorithm variants with different objectives, demonstrating validity efficiency proposed that effectively mitigate attacks, by minimizing number interactions, while at same time establishing connections high spectral efficiency.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spatially and Spectrally Flexible Elastic Optical Networking

While the rapid deployment of wavelength-division multiplexing (WDM) technologies sustained the explosive and exponential network traffic growths in the past decade, the continuing trend of exponential traffic growth driven by data centers and emerging new services is demanding deployment of more scalable and flexible networking technologies. The legacy WDM technologies can support traffic up t...

متن کامل

Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks

The latest advances inWavelength Division Multiplexing (WDM) technology are making it possible to build all-optical transparent WDM networks, which are expected to be able to satisfy the rapid growth of today’s capacity demand. However, the transparency of such networks makes them highly vulnerable to deliberate attacks, specifically targeting the physical layer. Physical-layer attacks, such as...

متن کامل

Mitigation of Jamming Attack in Vehicular Ad hoc Network

Vehicular Ad-hoc Network (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when a node sends any life critical information to other nodes. However, it can be expected that ...

متن کامل

Hardware Attack Mitigation Techniques Analysis

The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a ...

متن کامل

emittance control in high power linacs

چکیده این پایان نامه به بررسی اثر سیم پیچ مغناطیسی و کاوه یِ خوشه گر با بسامد رادیویی بر هاله و بیرونگراییِ باریکه هایِ پیوسته و خوشه ایِ ذرات باردار در شتابدهنده های خطیِ یونی، پروتونی با جریان بالا می پردازد و راه حل هایی برای بهینه نگهداشتن این کمیتها ارایه می دهد. بیرونگرایی یکی از کمیتهای اساسی باریکه هایِ ذرات باردار در شتابدهنده ها است که تاثیر قابل توجهی بر قیمت، هزینه و کاراییِ هر شتابدهند...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3058259