75 research outputs found

    Resilient Resource Allocation Schemes in Optical Networks

    Get PDF
    Recent studies show that deliberate malicious attacks performed by high-power sig- nals can put large amount of data under risk. We investigate the problem of sur- vivable optical networks resource provisioning scheme against malicious attacks, more specically crosstalk jamming attacks. These types of attacks may cause ser- vice disruption (or possibly service denial). We consider optical networks based on wavelength-division multiplexing (WDM) technology and two types of jamming at- tacks: in-band and out-of-band attacks. We propose an attack-aware routing and wavelength assignments (RWA) scheme to avoid or reduce the damaging effects of potential attacking signals on individual or multiple legitimate lightpaths travers- ing the same optical switches and links. An integer linear programs (ILPs) as well as heuristic approaches were proposed to solve the problem. We consider dynamic traffic where each demand is dened by its start time and a duration. Our results show that the proposed approaches were able to limit the vulnerability of lightpaths to jamming attacks. Recently, large-scale failures caused by natural disasters and/or deliberate at- tacks have left major parts of the networks damaged or disconnected. We also investigate the problem of disaster-aware WDM network resource provisioning in case of disasters. We propose an ILP and efficient heuristic to route the lightpaths in such a way that provides protection against disasters and minimize the network vi resources such as the number of wavelength links used in the network. Our models show that signicant resource savings can be achieved while accommodating users demands. In the last few years, optical networks using Space Division Multiplexing (SDM) has been proposed as a solution to the speed bottleneck anticipated in data center (DC) networks. To our knowledge the new challenges of designing such communica- tion systems have not been addressed yet. We propose an optimal approach to the problem of developing a path-protection scheme to handle communication requests in DC networks using elastic optical networking and space division multiplexing. We have formulated our problem as an ILP. We have also proposed a heuristic that can handle problems of practical size. Our simulations explore important features of our approach

    Security-Aware RWA for Dynamic Traffic Using Path Protection In WDM Networks

    Get PDF
    Security and attack management have become the prime concern for the network operators due to high data transfer rates and vulnerabilities associated with transparency in WDM networks. In the recent years, there is a substantial increase in perception to develop suitable mechanisms for subduing the adverse effects of malicious attacks such as high power jamming and tapping attacks.In transparent optical networks (TONs) traffic is carried over the optical fibers in the form of signals called lightpaths, creating a virtual topology over the physical interconnections of an optical fiber. This allows an exchange of an enormous amount of data at a very high speed. A fault or an attack on the network can lead to data tampering and data loss. Unlike faults, malicious attacks may not be localized and we cannot handle them with the standard fault-tolerance mechanisms in WDM networks. The Routing and Wavelength Assignment (RWA) problem assigns appropriate routes and wavelengths to all associated lightpaths in the network. Most the researchers considered the static traffic model, where the network requests (i.e. lightpaths to be established) are known in advance and last over long durations. In this thesis, we are solving the security-aware problem for dynamic requests by using protection strategy known as dedicated path protection (DPP). In the dynamic model, lightpaths are generated on-demand, and RWA must be performed based on available resources that are not being used by ongoing lightpaths. We propose an Integer linear programming (ILP) formulation to maximize requests satisfaction and reducing the disruption in the network due to malicious attacks (In-band and out-band)

    Attack-aware routing and wavelength assignment for dynamic traffic in WDM networks

    Get PDF
    Transparent Optical Networks (TONs) can communicate large amount of data at a high speed among nodes of the network. So, any type of failure whether caused by component failure or caused by an attack can cause a significant loss of data. In case of faults, the network can restore its functionality, by identifying the malfunctioning component of the network and solving the problem. This is not the case with a deliberate, malicious attack. That is why security and attack management is becoming a very important issue in WDM networks. In the previous years, a number of researchers worked on solving the attack problem. One common approach is to plan the network in a way that minimizes the influence of an attack, by using appropriate routing and wavelength assignment (RWA) strategies. Most of the research in this area focuses on the static traffic model, where the set of traffic demands is known in advance. In this thesis, we propose a new security-aware RWA technique for dynamic traffic, using dedicated path protection. The goal is to improve the performance of WDM networks by accommodating more traffic demands, while reducing the probability of disruption due to malicious attacks

    Multi-Period Attack-Aware Optical Network Planning under Demand Uncertainty

    Get PDF
    In this chapter, novel attack‐aware routing and wavelength assignment (Aa‐RWA) algorithms for multiperiod network planning are proposed. The considered physical layer attacks addressed in this chapter are high‐power jamming attacks. These attacks are modeled as interactions among lightpaths as a result of intra‐channel and/or inter‐channel crosstalk. The proposed Aa‐RWA algorithm first solves the problem for given traffic demands, and subsequently, the algorithm is enhanced in order to deal with demands under uncertainties. The demand uncertainty is considered in order to provide a solution for several periods, where the knowledge of demands for future periods can only be estimated. The objective of the Aa‐RWA algorithm is to minimize the impact of possible physical layer attacks and at the same time minimize the investment cost (in terms of switching equipment deployed) during the network planning phase

    Attack-Aware Routing and Wavelength Assignment of Scheduled Lightpath Demands

    Get PDF
    In Transparent Optical Networks, tra c is carried over lightpaths, creating a vir- tual topology over the physical connections of optical bers. Due to the increasingly high data rates and the vulnerabilities related to the transparency of optical network, security issues in transparent wavelength division multiplexing (WDM) optical net- works have become of great signi cance to network managers. In this thesis, we intro- duce some basic concepts of transparent optical network, the types and circumstances of physical-layer attacks and analysis of related work at rst. In addition, based on the previous researches, we present a novel approach and several new objective cri- terions for the problem of attack-aware routing and wavelength assignment. Integer Linear Programming (ILP) formulation is used to solve the routing sub-problem with the objective to minimize the disruption of physical-layer attack as well as to opti- mize Routing and Wavelength Assignment (RWA) of scheduled transparent optical network

    Present and Future Trends in Military Satellite Communication Systems

    Get PDF
    Recent years have seen a phenomenal growth in the field of satellite communications. Satcom systems offer many advantages for military applications which include wide area coverage, rapid deployment, flexible networking and long range service to moving platforms like ships, aircraft and vehicles. This paper gives an overview of the special features and future trends in military satcom systems. A brief account of various countermeasures against threats, use of EHF, spread-spectrum techniques and on board processing has also been given. Major technological advances are anticipated in near future to realise high capacity, secure and survivable satcom systems for Defence applications

    Attack Aware RWA for Sliding Window Scheduled Traffic Model

    Get PDF
    In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire transmission path. The capability of handling high data rates and features like transparency makes TONs susceptible to several physical layer attacks. Hence, designing TONs with a capability of handling such high power jamming attacks is an important network security problem. In this work, we propose an integer linear program (ILP) formulation to control the propagation of these physical layer attacks in TONs, for the demands which need periodic bandwidth usage at certain predefined timings. There are two different approaches for handling these scheduled traffic demands, fixed window and sliding window. Our research deals with the sliding window scheduled traffic model, which is more flexible when compared with fixed window, as the start and end timings of the demand are unknown and they slide within a larger window setting. Hence, we present an ILP to handle the routing and wavelength assignment (RWA) problem for sliding window scheduled traffic model, with an objective to minimize the attack radius for all the commodities

    Project BeARCAT : Baselining, Automation and Response for CAV Testbed Cyber Security : Connected Vehicle & Infrastructure Security Assessment

    Get PDF
    Connected, software-based systems are a driver in advancing the technology of transportation systems. Advanced automated and autonomous vehicles, together with electrification, will help reduce congestion, accidents and emissions. Meanwhile, vehicle manufacturers see advanced technology as enhancing their products in a competitive market. However, as many decades of using home and enterprise computer systems have shown, connectivity allows a system to become a target for criminal intentions. Cyber-based threats to any system are a problem; in transportation, there is the added safety implication of dealing with moving vehicles and the passengers within
    corecore