1st International ICST Conference on Access Networks

Research Article

Security and self-organization in transparent optical networks: an overview

  • @INPROCEEDINGS{10.1145/1189355.1189368,
        author={Jae-seung   Yeom and Ozan K. Tonguz},
        title={Security and self-organization in transparent optical networks: an overview},
        proceedings={1st International ICST Conference on Access Networks},
        keywords={Security in all-optical networks self-organization physical layer impairments IP-over-WDM transparent optical networks},
  • Jae-seung Yeom
    Ozan K. Tonguz
    Year: 2006
    Security and self-organization in transparent optical networks: an overview
    DOI: 10.1145/1189355.1189368
Jae-seung Yeom1,2,*, Ozan K. Tonguz1,2,*
  • 1: Dept. of Electrical and Computer Engineering, Carnegie Mellon University
  • 2: Pittsburgh, PA 15213-3890, USA
*Contact email: jyeom@ece.cmu.edu, tonguz@ece.cmu.edu


The recent research on Internet Protocol-over-Wavelength Division Multiplexing (IP-over-WDM), driven by the explosion of the Internet data traffic, has uncovered many interesting issues, and much progress has been made as well. While transparent WDM optical networks become more and more popular as the basis of Next Generation Internet (NGI) infrastructure, such networks also raise many unique security issues. The existing protection schemes which only consider inadvertent failures and only rely on postmortem detection and reaction are not suitable for providing security assurance for such infrastructures which require timely protection from malicious sabotage as well as inadvertent faults. In addition, as may have been observed from the past practices, providing a particular solution dedicated to each incessantly discovered new problem would not dramatically improve the situation. In this paper, we discuss the diverse efforts reported in the literature to address the security problem in optical networks. Then, we propose a new approach to protect such infrastructure networks, which is to imbed intelligence into the network, such that they can continuously learn from different faults and attacks and self-organize to protect themselves from potential failures caused by malicious attacks or regular reliability problems.