Effective management and encryption processing method for security of optical transmission network

被引:0
|
作者
Choi, Hoyoung [1 ]
Lee, Jongjin [1 ]
Kim, Taehun [1 ]
Kim, Sungcheol [1 ]
机构
[1] KEPCO KDN, Elect Power ICT Res Inst, Naju, South Korea
关键词
optical; transmission; security; system; data; signal; encryption; cable; tapping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The optical communication network is at the center of the modern communication network and transmits various information such as data, voice, video, and email. The fourth industrial Revolution is developing along with the construction of an intelligent hyper-connected network and with the buoyant construction of intelligent network, all related transmission data is concentrated on the optical communication network. In addition, the importance of the security and viability of the optical transmission path is gradually increasing. Moreover, since the possibility of hacking the optical cable has been continuously reported, the optical transmission path is no longer safe from hacking. As a result, related security measure is necessary. Therefore, this paper proposes an effective management and encryption processing method to improve the network security of an optical transmission communication in order to enhance security against malicious attacks and leakage of internal information on the optical cable.
引用
收藏
页码:1048 / 1050
页数:3
相关论文
共 50 条
  • [21] Integrating optical security management with optical-layer controller architecture for enhanced network security
    Babbar, Himanshi
    Rani, Shalli
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (03)
  • [22] Collision in optical image encryption based on interference and a method for avoiding this security leak
    He, Wenqi
    Peng, Xiang
    Meng, Xiangfeng
    Liu, Xiaoli
    OPTICS AND LASER TECHNOLOGY, 2013, 47 : 31 - 36
  • [23] Towards effective security policy management for heterogeneous network environments
    Teo, Lawrence
    Ahn, Gail-Joon
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 241 - +
  • [24] An effective method of capture data processing for optical motion
    Wu, Sheng
    Zhang, Qiang
    Xiao, Boxiang
    Wei, Xiaopeng
    Yingyong Jichu yu Gongcheng Kexue Xuebao/Journal of Basic Science and Engineering, 2009, 17 (05): : 790 - 798
  • [25] Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method
    Madaan, Vishu
    Sethi, Dimple
    Agrawal, Prateek
    Jain, Leena
    Kaur, Ranjit
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 249 - 257
  • [26] An effective network security scrutinising method based on deep learning
    Sivakumar, K.
    Rajesh, C.
    Faith, S. Julia
    Prasad, S. Narasimha
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (04) : 464 - 473
  • [27] Information encryption using optical processing
    Barrera-Ramirez, John Fredy
    REVISTA DE LA ACADEMIA COLOMBIANA DE CIENCIAS EXACTAS FISICAS Y NATURALES, 2022, 46 (178): : 68 - 89
  • [28] A Novel Encryption Method for Image Security
    Al-Husainy, Mohammed Abbas Fadhil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (01): : 1 - 8
  • [29] Optical encryption and decryption in security volume holograms
    Su, WC
    Sun, CC
    Ouyang, Y
    PHOTOREFRACTIVE FIBER AND CRYSTAL DEVICES: MATERIALS, OPTICAL PROPERTIES, AND APPLICATIONS IX, 2003, 5206 : 177 - 184
  • [30] Optical security and encryption with totally incoherent light
    Tajahuerce, E
    Lancis, J
    Javidi, B
    Andrés, P
    OPTICS LETTERS, 2001, 26 (10) : 678 - 680