Today’s Transparent Optical Networks (TONs) are highly vulnerable to various physical-layer attacks, such as high-power jamming, which can cause severe service disruption or even service denial. The transparency of TONs enables certain attacks to propagate through the network, not only increasing their damage proportions, but also making source identification and attack localization more difficult. High-power jamming attacks causing in-band crosstalk in switches are amongst the most malicious of such attacks. In this paper, we propose a wavelength assignment scheme to reduce their damage assuming limited attack propagation capabilities. This complements our previous work in [Furdek et al., 2010] where we investigated infinite jamming attack...
In transparent optical networks (TONs), all-optical channels, called lightpaths, are established bet...
In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire...
Part 14: First Workshop on Computational Intelligence for Critical Infrastructure Systems (CICIS 201...
This work presents joint optimization algorithms for lightpath establishment as well as sparse place...
The transparency feature of All Optical Wavelength Division Multiplexing (WDM) Networks makes it an ...
1st author is a student Abstract: We propose and evaluate a Greedy Randomized Adaptive Search Proced...
This work considers lightpath provisioning in elastic optical networks with traffic demand variation...
Optical networks are vulnerable to a range of attacks targeting service disruption at the physical l...
In Transparent Optical Networks, tra c is carried over lightpaths, creating a vir- tual topology ove...
Abstract An attacker’s connection can propagate quickly to different parts of a transparent All-Opti...
This work presents efficient connection provisioning techniques mitigating high-power jamming attack...
In emerging all-optical networks, efficient monitoring and estimation of signal quality along a ligh...
Recent studies show that deliberate malicious attacks performed by high-power sig- nals can put larg...
This work presents optimization algorithms on attack-aware routing and spectrum allocation (Aa-RSA) ...
In this chapter, novel attack‐aware routing and wavelength assignment (Aa‐RWA) algorithms for multip...
In transparent optical networks (TONs), all-optical channels, called lightpaths, are established bet...
In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire...
Part 14: First Workshop on Computational Intelligence for Critical Infrastructure Systems (CICIS 201...
This work presents joint optimization algorithms for lightpath establishment as well as sparse place...
The transparency feature of All Optical Wavelength Division Multiplexing (WDM) Networks makes it an ...
1st author is a student Abstract: We propose and evaluate a Greedy Randomized Adaptive Search Proced...
This work considers lightpath provisioning in elastic optical networks with traffic demand variation...
Optical networks are vulnerable to a range of attacks targeting service disruption at the physical l...
In Transparent Optical Networks, tra c is carried over lightpaths, creating a vir- tual topology ove...
Abstract An attacker’s connection can propagate quickly to different parts of a transparent All-Opti...
This work presents efficient connection provisioning techniques mitigating high-power jamming attack...
In emerging all-optical networks, efficient monitoring and estimation of signal quality along a ligh...
Recent studies show that deliberate malicious attacks performed by high-power sig- nals can put larg...
This work presents optimization algorithms on attack-aware routing and spectrum allocation (Aa-RSA) ...
In this chapter, novel attack‐aware routing and wavelength assignment (Aa‐RWA) algorithms for multip...
In transparent optical networks (TONs), all-optical channels, called lightpaths, are established bet...
In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire...
Part 14: First Workshop on Computational Intelligence for Critical Infrastructure Systems (CICIS 201...