Protection of Optical Networks against Interchannel Eavesdropping and Jamming Attacks

Wavelength-division-multiplexing (WDM) optical networks provide higher data rate and stronger security than many other transport technologies. Yet optical networks are not completely immune to security treats, among which are interchange attacks by exploiting the crosstalk effects, including eavesdropping and jamming. In this paper, we develop novel routing algorithms to minimize light path overlapping thus minimize the damages caused by interchange attacks. The algorithms are evaluated by complexity analysis and computer simulations.

[1]  Paul R. Prucnal,et al.  Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.

[2]  T. Hasama,et al.  All-optical wavelength conversion at 160Gb/s by intersubband transition switches utilizing efficient XPM in InGaAs/AlAsSb coupled double quantum well , 2009, 2009 35th European Conference on Optical Communication.

[3]  Donald C Lee 100G and DWDM: Application Climate, Network and Service Architecture , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[4]  Thomas H. Cormen,et al.  Introduction to algorithms [2nd ed.] , 2001 .

[5]  Mehrdad S. Sharbaf,et al.  Quantum cryptography: An emerging technology in network security , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[6]  Lena Wosinska,et al.  A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment , 2010, IEEE/ACM Transactions on Networking.

[7]  Shoba Krishnan,et al.  Security Issues in All-Optical Networks , 2011, 2011 Annual SRII Global Conference.

[8]  T Wuth,et al.  Multi-rate (100G/40G/10G) Transport Over Deployed Optical Networks , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[9]  Biswanath Mukherjee,et al.  Some principles for designing a wide-area WDM optical network , 1996, TNET.

[10]  George C. Polyzos,et al.  Tracking long-term growth of the NSFNET , 1994, CACM.

[11]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.