Optical Layer Security in Fiber-Optic Networks

The physical layer of an optical network is vulnerable to a variety of attacks, including jamming, physical infrastructure attacks, eavesdropping, and interception. As the demand for network capacity grows dramatically, the issue of securing the physical layer of optical network cannot be overlooked...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2011-09, Vol.6 (3), p.725-736
Hauptverfasser: Fok, M. P., Zhexing Wang, Yanhua Deng, Prucnal, P. R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The physical layer of an optical network is vulnerable to a variety of attacks, including jamming, physical infrastructure attacks, eavesdropping, and interception. As the demand for network capacity grows dramatically, the issue of securing the physical layer of optical network cannot be overlooked. In this survey paper, we discuss the security threats in an optical network as well as present several existing optical techniques to improve the security. In the first part of this paper, we discuss various types of security threats that could appear in the optical layer of an optical network, including jamming, physical infrastructure attacks, eavesdropping, and interception. Intensive research has focused on improving optical network security, in the above specific areas. Real-time processing of the optical signal is essential in order to integrate security functionality at the physical layer while not undermining the true value of optical communications, which is its speed. Optical layer security benefits from the unique properties of optical processing-instantaneous response, broadband operation, electromagnetic immunity, compactness, and low latency. In the second part of this paper, various defenses against the security threats outlined in this paper are discussed, including optical encryption, optical code-division multiple access (CDMA) confidentiality, self-healing survivable optical rings, anti-jamming, and optical steganography.
ISSN:1556-6013
1556-6021
DOI:10.1109/TIFS.2011.2141990