Academic literature on the topic 'All-Optical Network Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'All-Optical Network Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "All-Optical Network Security"

1

Zhao, Zhong-Nan, Pei-Li Qiao, Jian Wang, and Guan-Yu Hu. "Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule." Mathematical Problems in Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/9312476.

Full text
Abstract:
It is important to determine the security situations of the all-optical network (AON), which is more vulnerable to hacker attacks and faults than other networks in some cases. A new approach of the security situation assessment to the all-optical network is developed in this paper. In the new assessment approach, the evidential reasoning (ER) rule is used to integrate various evidences of the security factors including the optical faults and the special attacks in the AON. Furthermore, a new quantification method of the security situation is also proposed. A case study of an all-optical networ
APA, Harvard, Vancouver, ISO, and other styles
2

Palak, Kesar, and Kaur Sandhu Mandeep. "Security Issues and the Energy Consumption in the Optical Burst Switched Networks." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 881–85. https://doi.org/10.31142/ijtsrd23934.

Full text
Abstract:
Optical burst switching is an optical network technology that helps in improving the use of the optical networks resources. In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in an optical form, can travel in an all optical manner from source to destination node. This approach suffers from all the disadvantages known to circuit switching the circuits require time to set up and to destroy, and while the circuit is established, the resources will not be eff
APA, Harvard, Vancouver, ISO, and other styles
3

Feng, Manying, Yiyuan Xie, Li Dai, et al. "Security mesh-based optical network exploiting the double masking scheme." Optics Express 30, no. 24 (2022): 43826. http://dx.doi.org/10.1364/oe.471213.

Full text
Abstract:
In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, an
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yi. "Exploration On the Construction of Smart Campus All-Optical Network." Journal of Big Data and Computing 2, no. 2 (2024): 106–11. http://dx.doi.org/10.62517/jbdc.202401214.

Full text
Abstract:
With the rapid development of information technology, the construction of education informatization is urgent, and it is particularly important to promote the gradual development of colleges and universities towards digital transformation. Among them, the construction of smart campus has become an important means to enhance the level of education informatization and improve the quality of education and teaching. As an important part of the new generation of information technology, all-optical network has been widely used in the construction of smart campus. This paper first summarizes the exis
APA, Harvard, Vancouver, ISO, and other styles
5

Fok, Mable P., and Paul R. Prucnal. "All-optical encryption based on interleaved waveband switching modulation for optical network security." Optics Letters 34, no. 9 (2009): 1315. http://dx.doi.org/10.1364/ol.34.001315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Lanlan. "Secure Data Sequence Recognition of All-Optical High-Speed Network Using Semiconductor Optical Amplifier." Journal of Nanoelectronics and Optoelectronics 16, no. 10 (2021): 1667–74. http://dx.doi.org/10.1166/jno.2021.3124.

Full text
Abstract:
Semiconductor optical amplifier (SOA) has nonlinear optical effect and integration advantages, and is widely used in all-optical logic gates. Hence, it is used in the identification of all-optical high-speed network security data sequences. First, the SOA model is established and then simplified based on the existing model. On this basis, the identification model of all-optical high-speed network security data sequence is established, and the concept of integrated turbo-switch is introduced. The structure of the turbo-switch is analyzed. Then, an integrated turbo-switch architecture based on S
APA, Harvard, Vancouver, ISO, and other styles
7

Mao, Zhi Jie, Jiang Tao Wei, Hong Wei Li, Qiong Wu, and Feng Chen Qian. "Physical Layer Security Solutions for High Speed Data Networks." Advanced Materials Research 712-715 (June 2013): 2514–20. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2514.

Full text
Abstract:
To improve the confidentiality and availability of the network, it is important to provide multilevel security in the physical layer of optical networks. Based on the orthogonal characterization of OFDM, we introduce a new electronic encryption method for the encryption of the subcarriers symbols after data mapping. Since all-optical networks are emerging as implementations for very high data rate communications, flexible switching and broadband application support, we present a novel all-optical security system technique using random sequence encryption. The noise function was applied via a p
APA, Harvard, Vancouver, ISO, and other styles
8

Spurny, Vladimir, Petr Munster, Adrian Tomasov, Tomas Horvath, and Edvin Skaljo. "Physical Layer Components Security Risks in Optical Fiber Infrastructures." Sensors 22, no. 2 (2022): 588. http://dx.doi.org/10.3390/s22020588.

Full text
Abstract:
Optical fiber communications are essential for all types of long- and short-distance transmissions. The aim of this paper is to analyze the previously presented security risks and, based on measurements, provide the risk level evaluation. The major risk is the possibility of inserting a splitter into the optical distribution network and capturing a portion of the entire spectrum, i.e., all channels in the optical fiber. Another significant security risk is crosstalk on multiplexers in networks with wavelength division multiplexing. The paper covers the macrobend attenuation evaluation of fiber
APA, Harvard, Vancouver, ISO, and other styles
9

Fahmida, Rahman, and Arozullah Mohammed. "REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 01–21. https://doi.org/10.5281/zenodo.4400051.

Full text
Abstract:
This paper deals with protecting all-optical networks (AON) from security attacks at the physical level. It firstly presents an overall high level protocol for establishment, management and on-the-fly restoration of optimal secure lightpaths established by applying constraint-based open shortest path first (OSPF) source routing using proposed security databases of components. Secondly it presents a protocol for using fiber diversity between adjacent nodes to protect against attacks on fiber links. Thirdly it presents analytical models of propagation of security attacks on optical amplifiers an
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Ying, Ziyi Kang, Xin Li, Ningjing Liang, Jinyong Chang, and Genqing Bian. "Tunable All-Optical Pattern Recognition System Based on Nonlinear Optical Loop Mirror for Bit-Flip BPSK Targets." Photonics 12, no. 4 (2025): 342. https://doi.org/10.3390/photonics12040342.

Full text
Abstract:
As the basic physical infrastructure of various networks, optical networks are crucial to the advancement of information technology. Meanwhile, as new technologies emerge, the security of optical networks is facing serious threats. To improve the security of optical networks, optoelectronic firewalls primarily leverage all-optical pattern recognition to perform direct detection and analysis of data transmitted through the optical network at the optical layer. However, the current all-optical pattern recognition system still faces some problems when deployed in optical networks, including phase
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "All-Optical Network Security"

1

Feffer, Antonia Lynn. "Comprehensive security strategy for all-optical networks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99866.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 107-109).<br>Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "All-Optical Network Security"

1

Sakaino, Akira. "International Collaboration Between Data Spaces and Carrier Networks." In Designing Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_28.

Full text
Abstract:
AbstractNTT, headquartered in Japan, is a global ICT company with data centers, network facilities, R&amp;D centers, and business locations all over the world. It is developing new data infrastructures that utilize next-generation information communications technology and digital twin computing. This section introduces NTT’s R&amp;D activities, services and solutions, and future initiatives to ensure security, compliance, fairness, transparency, and interoperability in the global data space. The details are as follows: Concerns and issues regarding the cross-border sharing and use of industrial IoT data between multiple companies Use cases considered by RRI (Robot Revolution and Industrial IoT Initiative) and requirements for global data spaces Next-generation optical and wireless network “IOWN” and highly reliable data infrastructure “SDPF with Trust” proposed by NTT to realize data spaces that meet requirements for global data spaces Demonstration system and international interconnection experiments using IDS Connectors to connect data spaces between Japan and Europe Ideal international data platform architecture that connects GAIA-X compliant data spaces to networks of telecommunications carriers in various countries Concept of a digital immune system “Global autonomic nerve” that combines data spaces with IoT and AI to achieve sustainable governance of economic activities and the global ecosystem
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Aftab. "Security Assessment of Networks." In Wireless Technologies. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch111.

Full text
Abstract:
In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based on the ITU security framework, recommended in the ITU-T Recommendation X.805. We employ this model to quantify network security against five threat categories mentioned in the recommendations. The quantification has been done based on the recommended measures against all threats. A threat vector has been proposed that defines required measures for a particular threat category. Other vectors, such as the security implementation vector define how effectively these measures are implemented in a given device, system, or network. As a simple application of the proposed model, the security provided by the IEEE 802.15.4 standard is analyzed, viewing it as an ‘end-to-end’ system (e.g., for ad hoc sensor network applications). The proposed security assessment model can be applied to any type of network (wireless, wired, optical, service oriented, transport, etc.). The model can be employed to obtain security assessment in the form of five security metrics, one for each threat category (destruction, corruption, removal, disclosure, and interruption). An expression for the overall security against all threats has also been derived.
APA, Harvard, Vancouver, ISO, and other styles
3

Boslau, Madlen. "Consumer Attitudes toward RFID Usage." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch034.

Full text
Abstract:
The term RFID refers to radio frequency identification and describes transponders or tags that are attached to animate or inanimate objects and are automatically read by a network infrastructure or networked reading devices. Current solutions such as optical character recognition (OCR), bar codes, or smart card systems require manual data entry, scanning, or readout along the supply chain. These procedures are costly, timeconsuming, and inaccurate. RFID systems are seen as a potential solution to these constraints, by allowing non-line-of-sight reception of the coded data. Identification codes are stored on a tag that consists of a microchip and an attached antenna. Once the tag is within the reception area of a reader, the information is transmitted. A connected database is then able to decode the identification code and identify the object. Such network infrastructures should be able to capture, store, and deliver large amounts of data robustly and efficiently (Scharfeld, 2001). The applications of RFID in use today can be sorted into two groups of products: • The first group of products uses the RFID technology as a central feature. Examples are security and access control, vehicle immobilization systems, and highway toll passes (Inaba &amp; Schuster, 2005). Future applications include rechargeable public transport tickets, implants holding critical medical data, or dog tags (Böhmer, Brück, &amp; Rees, 2005). • The second group of products consists of those goods merely tagged with an RFID label instead of a bar code. Here, the tag simply substitutes the bar code as a carrier of product information for identification purposes. This seems sensible, as RFID tags display a number of characteristics that allow for faster, easier, more reliable, and superior identification. Once consumers are able to buy RFID tagged products, their attitude toward such tags is of central importance. Consumer acceptance of RFID tags may have severe consequences for all companies tagging their products with RFID.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "All-Optical Network Security"

1

Krithinakis, Antonis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, and Evangelos P. Markatos. "WSIM: A Software Platform to Simulate All-Optical Security Operations." In 2008 European Conference on Computer Network Defense, EC2ND. IEEE, 2008. http://dx.doi.org/10.1109/ec2nd.2008.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hirota, Osamu, Kentaro Kato, Masaki Shoma, and Tsuyoshi S. Usuda. "Quantum key disribution with unconditional security for all-optical fiber network." In Optical Science and Technology, SPIE's 48th Annual Meeting, edited by Ronald E. Meyers and Yanhua Shih. SPIE, 2004. http://dx.doi.org/10.1117/12.504978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Xintong. "All-optical millimeter wave generation and its applications in 5G communication systems." In Third International Conference on Computer Communication and Network Security (CCNS 2022), edited by Chuanjun Zhao and Hilal Imane. SPIE, 2022. http://dx.doi.org/10.1117/12.2659607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Pang-chen, Yuri T. Mazurenko, and Yeshayahu Fainman. "All-Optical Parallel-to-Serial Conversion by Holographic Spatial-to-Temporal Frequency Encoding." In Optical Computing. Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.owb3.

Full text
Abstract:
The bandwidth and the efficiency of fiber optic communication systems exceed these of electrical cable systems. However, presently, we are far from realizing the potential performance of optical networks. Electronic devices and systems connected to optical networks may reach bit-rates on the order of 1 Gb/s. In contrast, the maximum bit-rate of a photonic network may exceed 1 Tb/s, limited by the performance of the optical fiber. The three order-of-magnitude mismatch between fiber and device capacity can be used to increase the speed, security, and reliability in the data transmission. Several
APA, Harvard, Vancouver, ISO, and other styles
5

Krishnan, Shoba, and Anita Borude. "Security Issues in All-Optical Networks." In 2011 Annual SRII Global Conference (SRII). IEEE, 2011. http://dx.doi.org/10.1109/srii.2011.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marquis, Douglas, Muriel Medard, Richard A. Barry, and Steven G. Finn. "Physical security considerations in all-optical networks." In Voice, Video, and Data Communications, edited by V. Michael Bove, Jr., Barbara Derryberry, Clifford R. Holliday, et al. SPIE, 1998. http://dx.doi.org/10.1117/12.300896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cincotti, Gabriella, Valentina Sacchieri, Gianluca Manzacca, et al. "Physical layer security: All-optical cryptography in access networks." In 2008 10th Anniversary International Conference on Transparent Optical Networks (ICTON 2008). IEEE, 2008. http://dx.doi.org/10.1109/icton.2008.4598751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yeom, J. S., O. Tonguz, and G. Castanon. "Security in All-Optical Networks: Self-Organization and Attack Avoidance." In 2007 IEEE International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/icc.2007.224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guilfoyle, Peter, Ketan M. Patel, and William D. Hodges. "All-optical networks for platforms connected to the global information grid." In Defense and Security Symposium, edited by Michael J. Hayduk, Andrew R. Pirich, Eric J. Donkor, and Peter J. Delfyett, Jr. SPIE, 2006. http://dx.doi.org/10.1117/12.668923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Castanon, Gerardo, Ivan Razo-Zapata, Carlos Mex, Raul Ramirez-Velarde, and Ozan Tonguz. "Security in all-optical networks: Failure and attack avoidance using self-organization." In 2008 2nd ICTON Mediterranean Winter (ICTON-MW). IEEE, 2008. http://dx.doi.org/10.1109/ictonmw.2008.4773124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!