期刊文献+

光网络中大功率带间串扰攻击研究 被引量:6

Study on High Power Inter-Channel Crosstalk Attack in Optical Networks
原文传递
导出
摘要 理论分析了光网络中大功率带间串扰攻击的产生机理,得出了攻击信号功率和光纤非线性折射率系数是大功率带间串扰攻击对用户信号质量产生破坏影响的主要因素。在VPI中搭建仿真实验系统,以误码率为信号质量评价指标,研究了大功率带间串扰攻击对用户信号质量的攻击影响及其攻击传播能力。结果表明,大功率带间串扰攻击会造成和攻击信号使用同一条光纤进行传输的用户信号质量劣化。攻击信号功率越高,信道间隔距攻击信号越近,光纤非线性折射率系数越大,用户信号受攻击影响越严重。大功率带间串扰攻击具有一定的攻击传播能力,当攻击信号功率高于用户信号功率27 dB时,攻击信号的攻击影响可传播至第四个光交叉连接器。 The mechanism of high power inter- conclusion that power of attack signal and fiber channel crosstalk attack is analyzed theoretically. The nonlinear refractive index are the main factors causing destructive effect on quality of legitimate signals due to high power inter- channel crosstalk attack is obtained. The effects of high power inter-channel crosstalk attack on quality of legitimate signals and its attack propagation capability are investigated by building a simulation system in VPI software and using the bit error rate (BER) as evaluation index. The results show that high power inter-channel crosstalk leads to quality deterioration of legitimate signals propagated in the same fiber as the attack signal. The higher the power of attack signal is, the closer the channel spacing away from the attack signal is and the greater the fiber nonlinear refractive index is, the more the serious legitimate signals are affected by attack. The high power inter-channel crosstalk has an ability of attack propagation, and attack effect of the attack signal can be propagated to the fourth optical cross-connects (OXC4) when the power of attack signal is 27 dB higher than that of the legitimate signals.
出处 《激光与光电子学进展》 CSCD 北大核心 2014年第8期65-71,共7页 Laser & Optoelectronics Progress
基金 国家自然科学基金(61072125) 中国人民解放军国防基金(2012JY002-260)
关键词 光纤光学 光网络 大功率带间串扰攻击 攻击信号功率 光纤非线性 fiber optics optical networks high power inter-channel crosstalk attack power of attack signal fiber nonlinearity
  • 相关文献

参考文献19

  • 1曾曙光,胡静,王飞,刘雁.基于波分复用思想的啁啾脉冲堆积方法[J].光学学报,2013,33(5):148-153. 被引量:6
  • 2郭爱煌,薛琳.绿色IP over WDM网络研究进展[J].激光与光电子学进展,2012,49(7):1-8. 被引量:6
  • 3赵梓森.光纤通信的过去、现在和未来[J].光学学报,2011,31(9):91-93. 被引量:45
  • 4Amornrat Jirattigalachote, NinaSkorin-Kapov, Marija Furdek, et al: Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks[J]. Optical Switching and Networking, 2011, 8(4): 249-258.
  • 5Marija Furdek. Physical-layer attacks in optical WDM networks and attack-aware network planning[J]. European Journal of Operational Research, 2011, 178(2): 1160-1167.
  • 6Gerardo Castanon, Ivan Razo-Zapata, Carlos Mex, et al: Security in all-optical networks: Failure and attack avoidance using self-organization[C]. IEEE 2nd ICTON, 2008. 1-5.
  • 7M Medard, D Marquis, R A Barry, et al: Security issues in all-optical networks[J]. IEEE Network, 1997, 11(3): 42-48.
  • 8Neeraj Sharma. Effects of crosstalk propagation on the performance of all-optical networks[C]. IEEE International Conference on Recent Advances in Information Technology, 2012. 240-245.
  • 9Yunfeng Peng, Zeyu Sun, Shu Du, et al: Propagation of all-optical crosstalk attack in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 085002.
  • 10Nina Skorin-Kapov, Jiajia Chen, Lena Wosinska. A new approach to optical networks security: attack-aware routing and wavelength assignment[J]. IEEE/ACM Transaction on Networking, 2010, 18(3): 750-760.

二级参考文献76

共引文献67

同被引文献45

  • 1Nelson M R. The next generation internet, e-business, and e-everything[C]. 25th Anniversary AAS colloquium of Science and Technology Policy, 2010.
  • 2Tzanakaki A, Anastasopoulos M P, Georgakilas K N. demands(Invited)[J]. J Opt Commun Netw, 2013, 5(10) Dynamic virtual optical networks supporting uncertain traffic A76-A85.
  • 3Peng S, Nejabati R, Simeonidou D. Impairment-aware optical network virtualization in single-line-rate and mixed-line rate WDM networks[J]. J Opt Commun Netw, 2013, 5(4): 283-293.
  • 4Zhang S Q, Shi L, Vadrevu C S K, et al.. Network virtualization over WDM and flexible-grid optical networks[J]. Optical Switching and Networking, 2013, 10(4): 291-300.
  • 5Peng S, Nejabati R, Simeonidou D. Role of optical network virtualization in cloud computing(Invited)[J]. J Opt Commun Netw, 2013, 5(10): A162.
  • 6Hou Weigang, Guo Lei, Liu Yejun, et al.. Virtual network planning for converged optical and data centers: Ideas and challenges[J]. IEEE Network, 2013, 27(6): 52-58.
  • 7Murakami M. Analyzing power consumption in networks[J]. J Networks, 2010, 5(11): 1254-1259.
  • 8Katrinis K M, Jzanakaki A. On the dimensioning of WDM optical networks with impairment-aware regeneration[J]. IEEE/ACM Trans Netw, 19(3): 735-746.
  • 9Oracle exalogic elastic cloud X2-2 data sheet[OL]. 2011 http://www.oracle.com/us/products/middleware/exalogic/exalogicelasticcloud- datasheet- 2012885.pdf.
  • 10Orade exadata database machine X2-8[OL]. 2012, http://www.oracle.com/technetwork/database/exadata/dbmachine- x2-8- datasheet- 173705.pdf.

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部