IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applying Smart Security Model to Protect Client Services From the Threats of the Optical Network

Applying Smart Security Model to Protect Client Services From the Threats of the Optical Network
View Sample PDF
Author(s): Kamel H. Rahouma (Minia University, Egypt)and Ayman A. Ali (Minia Unversity, Egypt)
Copyright: 2021
Pages: 34
Source title: Advancements in Security and Privacy Initiatives for Multimedia Images
Source Author(s)/Editor(s): Ashwani Kumar (Vardhaman College of Engineering, India)and Seelam Sai Satyanarayana Reddy (Vardhaman College of Engineering, India)
DOI: 10.4018/978-1-7998-2795-5.ch004

Purchase

View Applying Smart Security Model to Protect Client Services From the Threats of the Optical Network on the publisher's website for pricing and purchasing information.

Abstract

The chapter discusses the security of the client signals over the optical network from any wiretapping or loosing. The physical layer of the optical transport network (OTN) is the weakest layer in the network; anyone can access the optical cables from any location and states his attack. A security layer is proposed to be added in the mapping of OTN frames. The detection of any intrusion is done by monitoring the variations in the optical signal to noise ratio (OSNR) by using intelligent software defined network. The signal cryptographic is done at the source and the destination only. The chapter shows how the multi-failure restorations in the multi-domains could be done. A new model is introduced by slicing the multi-domains to three layers to fit the needs of 5G. The results show that the multi-failure restoration improved from 25% to 100%, the revenue from some OTN domains increased by 50%, the switching time enhanced by 50%, the latency reduced from 27 msec to 742 usec, and it will take many years to figure out the right keys to perform the decryption process.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom