Securing Optical Networks by Modern Cryptographic Techniques

被引:3
|
作者
Cho, Joo Yeon [1 ]
机构
[1] ADVA Opt Networking SE, Fraunhoferstr 9a, D-82152 Martinsried, Germany
来源
关键词
Optical network security; Quantum security; Authentication; Software-defined network;
D O I
10.1007/978-3-030-35055-0_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of optical networks grows due to the demand of high-speed communication in our daily life. Virtually all modern security solutions on optical networks are based on cryptographic technology. Various security solutions using cryptographic techniques have been adapted in current optical networks. In this paper, we investigate advanced cryptographic techniques to ensure the long-term security of optical networks.
引用
收藏
页码:120 / 133
页数:14
相关论文
共 50 条
  • [1] A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data
    Manowska, Anna
    Boros, Martin
    Hassan, Muhammad Waqar
    Bluszcz, Anna
    Tobor-Osadnik, Katarzyna
    [J]. ELECTRONICS, 2024, 13 (14)
  • [2] Data protection techniques, cryptographic protocols and PKI systems in modern computer networks
    Markovic, M.
    [J]. 2007 14TH INTERNATIONAL WORKSHOP ON SYSTEMS, SIGNALS, & IMAGE PROCESSING & EURASIP CONFERENCE FOCUSED ON SPEECH & IMAGE PROCESSING, MULTIMEDIA COMMUNICATIONS & SERVICES, 2007, : 487 - 498
  • [3] A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks
    Deshpande, Sarang
    Todimala, Ajay
    Balachandran, Ravi K.
    Ramamurthy, Byrav
    Zou, Xukai
    Vinodchandran, N. V.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2310 - 2315
  • [4] One-Way Cryptographic Hash Function Securing Networks
    Athavale, Vijay Anant
    Arora, Shakti
    Athavale, Anagha
    Yadav, Ruchika
    [J]. PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 105 - 113
  • [5] Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols
    Goyal, Dinesh
    Kumar, Anil
    Gandhi, Yatin
    Khetani, Vinit
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 703 - 714
  • [6] Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity
    Garcia, Jose Luis Cano
    Udechukwu, Izuchukwu Patrick
    Ibrahim, Isiaq Bolaji
    Chukwu, Ikechukwu John
    Dag, Hasan
    Dimitrova, Vesna
    Mollakuqe, Elissa
    [J]. 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 250 - 257
  • [7] Cryptographic Techniques for Wireless Sensor Networks: A Survey
    Faquih, Aiman
    Kadam, Priyanka
    Saquib, Zia
    [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [8] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
  • [9] Securing all-optical networks
    Rejeb, R
    Pavlosoglou, I
    Leeson, MS
    Green, RJ
    [J]. ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS, 2003, : 87 - 90
  • [10] Techniques for securing networks against criminal attacks
    Haffner, EG
    Engel, T
    Meinel, C
    [J]. IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 365 - 369