Effective management and encryption processing method for security of optical transmission network

被引:0
|
作者
Choi, Hoyoung [1 ]
Lee, Jongjin [1 ]
Kim, Taehun [1 ]
Kim, Sungcheol [1 ]
机构
[1] KEPCO KDN, Elect Power ICT Res Inst, Naju, South Korea
关键词
optical; transmission; security; system; data; signal; encryption; cable; tapping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The optical communication network is at the center of the modern communication network and transmits various information such as data, voice, video, and email. The fourth industrial Revolution is developing along with the construction of an intelligent hyper-connected network and with the buoyant construction of intelligent network, all related transmission data is concentrated on the optical communication network. In addition, the importance of the security and viability of the optical transmission path is gradually increasing. Moreover, since the possibility of hacking the optical cable has been continuously reported, the optical transmission path is no longer safe from hacking. As a result, related security measure is necessary. Therefore, this paper proposes an effective management and encryption processing method to improve the network security of an optical transmission communication in order to enhance security against malicious attacks and leakage of internal information on the optical cable.
引用
收藏
页码:1048 / 1050
页数:3
相关论文
共 50 条
  • [31] Discussion on the Technology and Method of Computer Network Security Management
    Zhou, Jianlei
    2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017), 2017, 242
  • [32] Security system based on optical image encryption
    Han, JW
    Kim, ES
    OPTICAL PATTERN RECOGNITION VIII, 1997, 3073 : 383 - 388
  • [33] Network security - Hardware encryption for fast VPNs
    不详
    IEEE INTERNET COMPUTING, 1999, 3 (01) : 17 - 17
  • [34] Data Encryption and Transmission Technology for Cotton of IoT Security
    Zhao, Xiaodong
    Qi, Lin
    Li, Yajing
    Chen, Junxia
    Shen, Huanhuan
    LISS 2014, 2015, : 1695 - 1701
  • [35] Research on Computer Network Security and Encryption Technology
    Wang, Yanjun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 111 - 114
  • [36] Root Cause Analysis for Autonomous Optical Network Security Management
    Natalino, Carlos
    Schiano, Marco
    Di Giglio, Andrea
    Furdek, Marija
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2702 - 2713
  • [37] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [38] Optical Field Encryption for secure transmission of data
    Fraser, C
    Harvey, AR
    ADVANCED FREE-SPACE OPTICAL COMMUNICATIONS TECHNIQUES AND TECHNOLOGIES, 2004, 5614 : 89 - 96
  • [39] A Security Information Transmission Method Based on DHR for Seafloor Observation Network
    Ying, Fei
    Zhao, Shengjie
    Wang, Jia
    SENSORS, 2024, 24 (04)
  • [40] Optical image encryption and transmission with semiconductor lasers
    Li, Lili
    Xie, Yiyuan
    Liu, Bocheng
    Xiao, Ying
    Ye, Yichen
    Song, Tingting
    Zhang, Yushu
    Liu, Yong
    OPTICS AND LASER TECHNOLOGY, 2019, 119