Emerging Trends in ICT Security

نویسندگان

  • Ben Wu
  • Bhavin J. Shastri
  • Paul R. Prucnal
چکیده

Optical networks form the backbone of the Internet and are an integral constituent of the physical layer of these networks. Since the physical layer forms the bottom layer in the open systems interconnection (OSI) model [1], the performance and security of the physical layer and especially optical networks have a critical influence on the six layers above it. For example, the channel capacity of the optical network determines the resources available for encryption processes in the upper layer. The security approach in upper layers is limited by both the processing speed of electronic devices and the capacity availability in the optical network. Fundamental improvements can be achieved for the entire network by increasing the optical network’s performance in terms of channel capacity, data rate, and processing speed. Furthermore, the security of the optical network has an impact on the security of the entire communication system. Since it is inherently risky to build a security system on top of a physical infrastructure that is already under threat [2], defending against threats to the optical network also benefits the security of the upper layer. Optical network security can be effectively protected by fiber-based methods, including alloptical signal processing [3 5], optical key distribution [6 8], optical steganography [9 11], and optical chaos-based communication [12 14]. Fiber-based devices do not radiate an electromagnetic signature and are immune to electromagnetic interference, so the adversary can neither eavesdrop from the leaked information to free space nor jam the fiber channel with electromagnetic waves. Another motivation for securing the network based on optical approaches is that fiber-based devices

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania

This paper discusses the human dimension in a ‘security chain’ within information systems and networks. This dimension is often overlooked at different stages and levels of ICT development and implementation. An example of this omission could happen at the stages of design and implementation of various ICT systems or strategies and policy formulation concerning ICT use; at the level of an organ...

متن کامل

Emerging Trends of ICT Adoption in Innovation Contexts: A Network Framework

Given the growing prominence of innovation in service sciences and international competitiveness, the context of innovation has emerged in adoption research. This study explores emerging trends of ICT adoption in an innovation context. More specifically, given the increased importance of interorganizational networks in fostering innovation, the study uncovers drivers of adoption of interorganiz...

متن کامل

Reengineering Cadastre and Land Registration Systems and Business Opportunities

The international initiatives by various agencies (such as World bank, FAO, UN, FIG, etc.) suggest that cadastre and land registration systems are currently undergoing major changes worldwide. On such changes, the emerging trends focus on easy access to land, security of land tenure, establishment and operation of efficient land markets, formalization of property rights, incorporating customary...

متن کامل

A Framework for Analyzing the Role of ICT on Agricultural Commercialization and Household Food Security

Lack of agricultural information has been attributed to the inability of smallholder farmers to transition from subsistence to commercial agriculture. Recent efforts to improve smallholder access to agricultural information have seen increased application of ICT technologies in developing agriculture. These efforts use ICT-based market information to reduce transaction costs of smallholder part...

متن کامل

The Rise of Emerging Asia: Regional Peace and Global Security

Th e rapid economic rise of China, India, and the Association of Southeast Asian Nations (ASEAN) could have several eff ects on regional peace and global security. Th e power transition perspective overstates the risk of confl ict that results from convergence between dominant and challenger states. Rapid changes in economic and military capabilities can, however, have negative consequences for...

متن کامل

Security Threats in Software Defined Mobile Clouds (SDMC)

Future Internet comprises of emerging ICT mega-trends (e.g., mobile, social, cloud, and big data) commands new challenges like ubiquitous accessibility, high bandwidth, and dynamic management to meet the data tsunami requirements. In the recent years, the rapid growth of smartphone business is highly evidenced due to its versatile usage irrespective of location, personality or context. Despite ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013