Real Time Securing of All-optical Networks against Security Attacks at the Physical Level

نویسندگان

  • Fahmida Rahman
  • Mohammed Arozullah
چکیده

This paper deals with protecting all-optical networks (AON) from security attacks at the physical level. It firstly presents an overall high level protocol for establishment, management and on-the-fly restoration of optimal secure lightpaths established by applying constraint-based open shortest path first (OSPF) source routing using proposed security databases of components. Secondly it presents a protocol for using fiber diversity between adjacent nodes to protect against attacks on fiber links. Thirdly it presents analytical models of propagation of security attacks on optical amplifiers and switches. These models are then used to develop security envelopes around these components, to calculate security indices and on-the-fly real-time restoration of components in case of an attack. Fourthly it presents simulation results for evaluation of the performance of these on-the-fly restoration schemes. These on-the-fly restoration schemes eliminate need for tearing down of attacked lightpaths and prevent consequent loss of large amount of data.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Securing Wireless Communication Against Dictionary Attacks Without Using PKI

Geethakumar, Sarath. M.S., Purdue University, May, 2010. Securing Wireless Communication Against Dictionary Attacks Without Using PKI. Major Professors: Samuel S. Wagstaff Jr. and Melissa Dark. Security of 802.11x wireless encryption standards are increasingly coming under scrutiny as compared to other security protocols and standards. The attacks on 802.11x wireless security protocols are exac...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Securing Clock Synchronization in Industrial Heterogeneous Networks

Today, wireless solutions for industrial networks are becoming more and more appealing since they increase flexibility and enable the use of additional wireless sensors, but also bring such advantages as mobility and weight reduction. Wired networks, on the other hand, are reliable and, more importantly , already existing in most distributed control loops. Heterogeneous networks consisting of w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013