2010
DOI: 10.1109/tnet.2009.2031555
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
46
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 96 publications
(48 citation statements)
references
References 20 publications
2
46
0
Order By: Relevance
“…By controlling the number of candidate paths k, the number of variables and constraints is also controlled. Other formulations, that do not depend on k-shortest paths as presented in [9] (used for the routing sub-problem), and [10] (used only for the wavelength assignment sub-problem), are more sensitive to the network topology (number of nodes, connectivity degree, etc.) and use more variables and constraints, even for the sub-problems, compared to the proposed formulations for the routing and wavelength assignment problem.…”
Section: A-rwa-convex Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…By controlling the number of candidate paths k, the number of variables and constraints is also controlled. Other formulations, that do not depend on k-shortest paths as presented in [9] (used for the routing sub-problem), and [10] (used only for the wavelength assignment sub-problem), are more sensitive to the network topology (number of nodes, connectivity degree, etc.) and use more variables and constraints, even for the sub-problems, compared to the proposed formulations for the routing and wavelength assignment problem.…”
Section: A-rwa-convex Formulationmentioning
confidence: 99%
“…The concept of preventive, attack-aware RWA problem was proposed in [9]. The authors formulate the routing sub-problem of RWA as an Integer Linear Programming (ILP) with the objective to decrease the potential damage of jamming attacks causing out-of-band crosstalk in fibers and gain competition in optical amplifiers.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, we propose to partially protect the network from attacks by adding attack-awareness to standard survivability approaches which consider single link failures such that little or no extra resources are incurred. Attack-awareness has been incorporated into the routing and wavelength assignment (WA) process in transparent optical networks to reduce the number of connections that can be affected by a single jamming attack in [25]- [27]. In this paper, we address the issue of survivability to provide protection in the presence of such attacks, extending our preliminary works from [13], [28] and [29].…”
Section: Related Workmentioning
confidence: 99%
“…As in the ILP, the objective of AA-DPP-H is to minimize the number of attack-unprotected connections according to the propagation model described in Section III-B. In the heuristic, we also apply a secondary objective to minimize the number of working paths that can simultaneously be affected by a single attack inserted on any one of them, referred to as the attack radius (AR), as applied previously to non-survivable attack-aware RWA approaches [25]. The AR corresponds to the maximal size of the AG of any working path.…”
Section: Attack-aware Dedicated Path Protection Heuristic (Aa-dpp-h)mentioning
confidence: 99%
“…Three types of preventive countermeasure categories are primarily focused in [1]: 1) incorporating band limiting filters to thwart signals outside certain band to prevent out-of-band gain competition and reducing vulnerabilities intrinsic to hardware, 2) providing anti-jamming transmission schemes such as CDMA or TDMA that are hardened for anti-jamming and anti-tapping measures and 3) protocols and architecture designs adapted to AONs, such as avoiding compromised link for sensitive communications. Although [1] mentions some suggestions for preventive measure, these suggested preventive countermeasures are not implemented as a secured system and therefore, there is no in-depth discussion about how to implement these ideas, what challenges may arise through adoption of such security measures and how much security they may provide to AONs.The concept of attack aware network planning has also been proposed in [11], [12], [13] and [14]. In [11], the propagation of high-power jamming attack is stopped by using power equalizers in different nodes, which suggests placing the optical attenuators within optical components.…”
Section: Introductionmentioning
confidence: 99%