这是indexloc提供的服务,不要输入任何密码
Skip to main content
Log in

Security filtering of optical data signals: an approach based on codewords

  • Published:
Photonic Network Communications Aims and scope Submit manuscript

Abstract

In this paper, we propose an all-optical filtering architecture that filters session establishment and data traffic streams. The session establishment filtering concerns the connection-oriented protocols. Each traffic stream is identified by a traffic identifier composed of a set of optical codewords. Each codeword is formed by a sequence of optical pulses that represent the bit “1” positions. In the case when an information bit “0” is transmitted, the transmitter does not generate a pulse. In a core node that implements the security filtering module, an optical security policy will be applied to the received traffic stream (session establishment or data traffic stream) based on its traffic identifier. The decision after performing the filtering process can lead to accept or reject the traffic stream. The proposed security filtering architecture is mainly composed of two modules: a session and a traffic filtering modules.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Chen, Y., Verma, P.K.: Secure optical burst switching: framework and research directions. In: IEEE Communication Magazine (2008)

  2. Chen, Y., Verma, P.K., Kak, S.: Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. Secur. Commun. Netw. 2, 546–554 (2009)

    Article  Google Scholar 

  3. Subramanian, P.S., Muthuraj, K.: Threats in optical burst switched network. Int. J. Comput. Technol. Appl. 2, 510–514 (2011)

    Google Scholar 

  4. Furdek, M., Skorin-Kapov, N.: Physical-layer attacks in all-optical WDM networks. In: Proceedings of the 34th International Convention (Opatija, Croatia) (2011)

  5. Skorin-Kapov, N., Chen, J., Wosinska, L.: A new approach to optical networks security: attack-aware routing and wavelength assignment. IEEE/ACM Trans. Netw. 18(3), 750–760 (2010)

    Article  Google Scholar 

  6. Muthuraj, K., Sreenath, N.: Secure optical internet: an attack on OBS node in a TCP over OBS network. Int. J. Emerg. Trends Technol. Comput. Sci. 1(4), 75–80 (2012)

    Google Scholar 

  7. Manning, R., Giller, R., Yang, X., Webb, R., Cotter, D.: Faster switching with semiconductor optical amplifiers. In: Proceedings of the IEEE International Conference on Photonics in Switching (2007)

  8. Sliti, M., Boudriga, N.: Stateless security filtering of optical data signals: an approach based on codewords. In: Proceedings of the 17th International Conference on Optical Network Design and Modeling (ONDM) (2013)

  9. Sliti, M., Boudriga, N.: Optical stateful security filtering approach based on codewords. In: Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC) (2013)

  10. Fok, M., Wang, Z., Deng, Y., Prucnal, P.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6, 725–736 (2011)

    Article  Google Scholar 

  11. Kartalopoulos, S.: Quantum cryptography for secure optical networks. In: Proceedings of IEEE International Conference on Communications (ICC), (Glasgow, Scotland) (2007)

  12. Wu, T., Somani, A.K.: Cross-talk attack monitoring and localization in all-optical networks. IEEE/ACM Trans. Netw. 13, 1390–1401 (2005)

    Article  Google Scholar 

  13. Mas, C., Tomkos, I., Tonguz, O.K.: Failure location algorithm for transparent optical networks. IEEE J. Sel. Areas Commun. 23, 1508–1519 (2005)

    Article  Google Scholar 

  14. Sivakumar, M., Shenai, R.K., Sivalingam, K.M.: A Survey of Survivability Techniques for Optical WDM Networks, ch. 3. Springer Science, Berlin (2005)

    Google Scholar 

  15. Sun, X., Chan, C.-K., Chen, L.K.: A survivable WDM-PON architecture with centralized alternate-path protection switching for traffic restoration. IEEE Photonics Technol. Lett. 18, 631–633 (2006)

    Article  Google Scholar 

  16. Sun, X., Chan, C.-K., Wang, Z., Lin, C., Chen, L.-K.: A single-fiber bi-directional WDM self-healing ring network with bi-directional OADM for metro-access applications. IEEE J. Sel. Areas Commun. 25, 18–24 (2007)

    Article  Google Scholar 

  17. Rostami, A., Baghban, H., Maram, R.: Nanostructure Semiconductor Optical Amplifiers: Building Blocks for All-Optical Processing (Engineering Materials). Springer, Berlin (2010)

    Google Scholar 

  18. Kim, J., Son, C., Kim, G., Byun, Y., Jhon, Y., Lee, S., Woo, D., Kim, S.: Implementation of all-optical logic AND using XGM based on semiconductor optical amplifiers. In: Proceedings of Optical Internet and Next Generation Network, (Jeju), pp. 9–13 (2006)

  19. Srivastava, V.K., Priye, V.: All optical half adder design using equations governing XGM and FWM effect in semiconductor optical amplifier. Int. J. Appl. Eng. Res. 1(3), 396–403 (2010)

    Google Scholar 

  20. Scaffardi, M., Ghelfi, P., Lazzeri, E., Poti, L., Bogoni, A.: Photonic processing for digital comparison and full addition based on semiconductor optical amplifiers. IEEE J. Sel. Topics Quantum Electron. 14, 1–8 (2008)

    Article  Google Scholar 

  21. Pradeep, C.: Implementation of optical burst switched IP-over-WDM networks using tunable transmitter and tunable receiver. In: Proceedings of the International Conference on Communication Systems and Network Technologies, (Gwalior, India) (2013)

  22. Li, H., Yin, H.: An analytical approach to chaotic behavior of TCP in OBS networks. In: Proceedings of the International Conference on Communications, (Xi’an, China) (2013)

  23. Riadi, S., Ghanami, D.E., Maach, A.: An efficient burst cloning scheme for optical burst switching over star networks. In: Proceedings of the ACS International Conference on Computer Systems and Applications, (Ifrane, Morocco) (2013)

  24. Coulibaly, Y., Latiff, M., Selamat, A.: A novel routing optimization in optical burst switching networks. In: Proceedings of the Second International Conference on Communication Theory, Reliability, and Quality of Service, (Colmar, France) (2009)

  25. Batti, S., Zghal, M., Boudriga, N.: New all-optical switching node including virtual memory and synchronizer. J. Netw. 5, 165–179 (2010)

    Google Scholar 

  26. Guan, Y., Wang, R.: Demonstration of an optical switch based on SOA-MZI operation at 10 gbit/s. In: Proceedings of the International Conference on Artificial Intelligence and Software Engineering, (China) (2013)

  27. Rostam, R., Wahid, M., Rais, S., Faridus, M.: The effect of signal repetition rate, injected current and switching window on cross-phase modulation in SOA-NOLM. In: Proceedings of the IEEE Regional Symposium on Micro and Nanoelectronics, (Malaysia) (2011)

  28. Tan, H.N., Matsuura, M., Kishi, N.: Parallel WDM regenerative waveform conversion for mixed NRZ and RZ transmission networks using a SOA-based multiple switching-window optical gate. In: Proceedings of the Optical Fiber Communication Conference and Exposition (OFC/NFOEC), (Los Angeles, USA) (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maha Sliti.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sliti, M., Boudriga, N. Security filtering of optical data signals: an approach based on codewords. Photon Netw Commun 30, 261–279 (2015). https://doi.org/10.1007/s11107-015-0515-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11107-015-0515-1

Keywords