Security in Photonic Networks: Threats and Security Enhancement

被引:69
|
作者
Kitayama, Ken-Ichi [1 ]
Sasaki, Masahide [2 ]
Araki, Soichiro [3 ]
Tsubokawa, Makoto [4 ]
Tomita, Akihisa [5 ]
Inoue, Kyo [6 ]
Harasawa, Katsuyoshi [7 ]
Nagasako, Yuki [8 ]
Takada, Atsushi [9 ]
机构
[1] Osaka Univ, Grad Sch Engn, Dept Elect Elect & Informat Engn, Suita, Osaka 5650871, Japan
[2] Natl Inst Informat & Commun Technol, Koganei, Tokyo 1848795, Japan
[3] NEC Corp Ltd, Syst Platforms Res Labs, Tokyo 1088001, Japan
[4] NTT Corp, Access Network Serv Syst Lab, Tokyo 1808585, Japan
[5] Hokkaido Univ, Grad Sch Informat Sci & Technol, Sapporo, Hokkaido 0881113, Japan
[6] Osaka Univ, Osaka 5600043, Japan
[7] Hitachi informat & Commun Engn Ltd, Karagawa 2590157, Japan
[8] Internet Res Inst Inc, Tokyo 1640011, Japan
[9] NTT Corp, Network Innovat Lab, Tokyo 1808585, Japan
关键词
Network architecture; optical fiber communications; photonic network; quantum key distribution (QKD); security; ALL-OPTICAL NETWORKS; QUANTUM KEY DISTRIBUTION; ATTACK; FIBER; CRYPTOGRAPHY;
D O I
10.1109/JLT.2011.2166248
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We address emerging threats to the security of photonic networks as these networks become heterogeneous being opened to the upper layers, other operators, and end users. We review the potential threats, mainly loss of the confidentiality of user data transmitted through optical fibers and disturbances of network control, both of which could seriously damage the entire network. We then propose a novel conceptual model of a secure photonic network by introducing a quantum key distribution (QKD) network to its legacy structure. Secure keys generated by the QKD network are managed by key management agents (KMAs) and used to encrypt not only user data but also control signals. The KMAs cooperate with the generalized multiprotocol label-switching controller for secure path provisioning and drive photonic and modern crypto engines in appropriate combinations. Finally, we present a roadmap of a deployment scenario, starting from niche applications such as mission critical and business applications and the next. Digital cinema distribution through a photonic network is presented as an example of a niche application.
引用
收藏
页码:3210 / 3222
页数:13
相关论文
共 50 条
  • [1] Analysis of threats to the security of EPC networks
    Garcia-Alfaro, Joaquin
    Barbeau, Michel
    Kranakis, Evangelos
    [J]. CNSR 2008: PROCEEDINGS OF THE 6TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2008, : 67 - 74
  • [2] Security Threats in Online Social Networks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Shanmugam, Bharanidharan
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 254 - 258
  • [3] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [4] Security Threats and Dealing with Social Networks
    Barati R.
    [J]. SN Computer Science, 4 (1)
  • [5] Security threats in Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    Kar, Avijit
    [J]. 2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 243 - +
  • [6] Security threats in Wireless Sensor Networks
    Kumar, Hiren
    Sarma, Deva
    Kar, Avijit
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2008, 23 (06) : 39 - 45
  • [7] Security Threats of Wireless Networks: A Survey
    Gupta, Akhil
    Jha, Rakesh Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 389 - 395
  • [8] Threats to Security of Wireless Sensor Networks
    Tyagi, Akshat
    Kushwah, Juhi
    Bhalla, Monica
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 402 - 405
  • [9] Enhancement of Security in Coginitive Networks
    Saini, Natasha
    Pandey, Nitin
    Singh, Ajeet Pal
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1905 - 1907
  • [10] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447