Secure burst control packet scheme for Optical Burst Switching networks

Optical networks are the most adequate platform for the transport of ever increasing bandwidth-hungry applications and services (BwGAS). Additionally, these networks cope with the continuous growth of the number of Internet users. Optical Burst Switching (OBS) paradigm is expected to be the backbone infrastructure of near-future all-optical Internet. In OBS, data and control packet known as burst header packet (BHP) are sent out of band (i.e., control packets and data bursts are carried by different channels) and it is sent ahead of the data burst to reserve necessary network resources for the corresponding burst. After the elapse of a predetermined time known as offset time, the data burst is sent with the hope that, the control packet was able to make necessary reservations. Sending the BHP ahead of the burst exposes the burst to different security challenges, particularly data burst redirection and denial of service attacks. If the BHP is compromised the corresponding burst will definitely be compromised. Less efforts have been dedicated to investigate control packet security issues in OBS. In this paper, we propose and evaluate a solution to address Data Burst Redirection (DBR) Attack in OBS networks. The solution is designed based on Rivest-Shamir-Adleman (RSA) public-key encryption algorithm. We evaluated the algorithm via computer simulation. Evaluation metrics are burst loss ratio and throughput. The obtained results demonstrate that, the proposed algorithm has succeeded in protecting the network against DBR attacks reducing the number of compromised BHP. In the future, the authors will work on denial of service issues considering reliability aspects.

[1]  Siddharth Singh Chouhan,et al.  Identification of current attacks and their counter measures in Optical Burst Switched (OBS) network , 2012 .

[2]  Mohsen Guizani,et al.  Architecture of an All-Optical Circuit-Switched Multistage Interconnection Network , 1990, IEEE J. Sel. Areas Commun..

[3]  Bruno Lavigne,et al.  Transparent optical packet switching: the European ACTS KEOPS project approach , 1998 .

[4]  Atul Kahate Cryptography and Network Security , 2009 .

[5]  N. Sreenath,et al.  Burstification threat in Optical Burst Switched Networks , 2014, 2014 International Conference on Communication and Signal Processing.

[6]  Jason P. Jue,et al.  Optical Burst Switched Networks , 2004 .

[7]  Pramode K. Verma,et al.  Secure Optical Burst Switching: Framework and Research Directions , 2008, IEEE Communications Magazine.

[8]  P. Castoldi,et al.  Application-Driven Control of Network Resources in Multiservice Optical Networks , 2009, IEEE/OSA Journal of Optical Communications and Networking.

[9]  R. Venkatesha Prasad,et al.  High Definition Multimedia : An Overview on Quality-of-Service Requirements , 2010 .

[10]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[11]  William Stallings,et al.  Cryptography and network security , 1998 .

[12]  Chunming Qiao,et al.  Optical burst switching (OBS) - a new paradigm for an Optical Internet^{1} , 1999, J. High Speed Networks.

[13]  Mohamed Hamdi,et al.  A novel optical firewall architecture for Burst Switched networks , 2010, 2010 12th International Conference on Transparent Optical Networks.

[14]  Bin Wang,et al.  Dynamic contention resolution in optical burst switched networks with partial wavelength conversion and fiber delay lines , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[15]  J.J. Wang,et al.  Design and Evaluation of M-Commerce Applications , 2005, 2005 Asia-Pacific Conference on Communications.

[16]  N. Sreenath,et al.  Secure Optical Internet: Attack detection and prevention mechanism , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[17]  Pramode K. Verma,et al.  Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks , 2009, Secur. Commun. Networks.

[18]  V. Shakhov DDoS flooding attacks in OBS networks , 2012, 2012 7th International Forum on Strategic Technology (IFOST).

[19]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .