DocumentCode :
1493160
Title :
Optical Layer Security in Fiber-Optic Networks
Author :
Fok, Mable P. ; Wang, Zhexing ; Deng, Yanhua ; Prucnal, PAul R.
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
Volume :
6
Issue :
3
fYear :
2011
Firstpage :
725
Lastpage :
736
Abstract :
The physical layer of an optical network is vulnerable to a variety of attacks, including jamming, physical infrastructure attacks, eavesdropping, and interception. As the demand for network capacity grows dramatically, the issue of securing the physical layer of optical network cannot be overlooked. In this survey paper, we discuss the security threats in an optical network as well as present several existing optical techniques to improve the security. In the first part of this paper, we discuss various types of security threats that could appear in the optical layer of an optical network, including jamming, physical infrastructure attacks, eavesdropping, and interception. Intensive research has focused on improving optical network security, in the above specific areas. Real-time processing of the optical signal is essential in order to integrate security functionality at the physical layer while not undermining the true value of optical communications, which is its speed. Optical layer security benefits from the unique properties of optical processing-instantaneous response, broadband operation, electromagnetic immunity, compactness, and low latency. In the second part of this paper, various defenses against the security threats outlined in this paper are discussed, including optical encryption, optical code-division multiple access (CDMA) confidentiality, self-healing survivable optical rings, anti-jamming, and optical steganography.
Keywords :
code division multiple access; cryptography; jamming; optical communication; optical fibre networks; steganography; CDMA; anti-jamming; fiber-optic networks; network capacity; optical code-division multiple access; optical communications; optical encryption; optical layer security; optical signal; optical steganography; real-time processing; self-healing survivable optical rings; Encryption; High speed optical techniques; Optical fiber networks; Optical fibers; Optical receivers; Optical signal processing; Fiber-optics network; optical layer security; optical signal processing; physical layer security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2011.2141990
Filename :
5749282
Link To Document :
بازگشت