Research on High Power Inter-Channel Crosstalk Attack in Optical Networks

Expand
  • (1. Laboratory of Optical Communication, Xi’an Communications Institute, Xi’an 710106, China; 2. Foreign Language School, Zhengzhou University, Zhengzhou 450001, China)

Online published: 2015-03-10

Abstract

While all-optical networks become more and more popular as the basis of the next generation Internet (NGI) infrastructure, such networks raise many critical security issues. High power inter-channel crosstalk attack is one of the security issues which have negative effect on information security in optical networks. Optical fiber in optical networks has some nonlinear characteristics, such as self phase modulation (SPM), cross phase modulation (XPM), four-wave mixing (FWM) and stimulated Raman scattering (SRS). They can be used to implement high power inter-channel crosstalk attack by malicious attackers. The mechanism of high power inter-channel crosstalk attack is analyzed. When an attack occurs, attack signal power and fiber nonlinear refractive index are the main factors which affect quality of legitimate signals. The effect of high power inter-channel crosstalk attack on quality of legitimate signals is investigated by building simulation system in VPI software. The results show that interchannel crosstalk caused by high power attack signal leads to quality deterioration of legitimate signals propagated in the same fiber. The higher the power of attack signal is, the greater the fiber nonlinear refractive index is. The closer the channel spacing away from the attack signal is, the more seriously the legitimate signals are affected by attack. We also find that when attack position and power of attack signal are constant, attack signal cannot infinitely spread, while its attack ability shows a fading trend with the extension of propagation distance.

Cite this article

ZHANG Yin-fa1 (张引发), REN Shuai1* (任 帅), LI Juan1 (李 娟), LIAO Xiao-min1 (廖晓闽),LI Ming1 (李 明), FANG Yuan-yuan2 (方园园) . Research on High Power Inter-Channel Crosstalk Attack in Optical Networks[J]. Journal of Shanghai Jiaotong University(Science), 2015 , 20(1) : 7 -13 . DOI: 10.1007/s12204-015-1580-4

References

[1] Wu Qiang, Yu Chong-xiu, Xin Xiang-jun, et al. Research of crosstalk in cascade system of OXC and OADM [J]. Acta Photonica Sinica, 2002, 31(4): 421-424 (in Chinese).

[2] Jirattigalachote A, Skorin-Kapov N, Furdek M, et al. Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks [J]. Optical Switching and Networking,2011, 8(4): 249-258.

[3] Furdek M. Physical-layer attacks in optical WDM networks and attack-aware network planning [J]. European Journal of Operational Research, 2011, 178(2):1160-1167.

[4] Wu T, Somani A K. Cross-talk attack monitoring and localization in all-optical networks [J]. IEEE/ACM Transactions on Networking, 2006, 13(6): 1390-1401.

[5] Zhao Zi-sen. Past, present and future of optical fiber communications [J]. Acta Photonica Sinica, 2011,31(9): 0900109 (in Chinese).

[6] Castanon G, Razo-Zapata I, Ramirez-Velarde C M R, et al. Security in all-optical networks: Failure and attack avoidance using self-organization [C] //Proceedings of 2nd International Conference on Transparent Optical Networks (ICTON). [s.l.]: IEEE, 2008: 1-5.

[7] Medard M, Marquis D, Barry R A, et al. Security issues in all-optical networks [J]. IEEE Network, 1997,11(3): 42-48.

[8] Sharma N. Effects of crosstalk propagation on the performance of all-optical networks [C]// Proceedings of 1st International Conference on Recent Advances in Information Technology. [s.l.]: IEEE, 2012: 240-245.

[9] Peng Y F, Sun Z Y, Du S, et al. Propagation of alloptical crosstalk attack in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 085002.

[10] Skorin-Kapov N, Chen J J, Wosinska L. A new approach to optical networks security: Attack-aware routing and wavelength assignment [J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 750-760.

[11] Furdek M, Skorin-Kapov N, Tzanakaki A. Survivable routing and wavelength assignment considering high-powered jamming attacks [C] // Proceedings of SPIE-OSA-IEEE Asia Communications and Photonics.[s.l.]: IEEE, 2011: 83101H.

[12] Furdek M, Skorin-Kapov N. Attack-survivable routing and wavelength assignment for high-power jamming [C]// Proceedings of 17th International Conference on Optical Network Design and Modeling. [s.l.]:IEEE, 2013: 70-75, .

[13] Rejeb R, Leeson M S, Green R J. Fault and attack management in all-optical networks [J]. IEEE Communications Magazine, 2006, 44(11): 79-86.

[14] Jedidi A, Abid M. Performance monitoring method for all-optical networks [C]// Proceedings of International Conference on Networking and Digital Society.[s.l.]: IEEE, 2009: 57-62.

[15] Bergman R, Medard M, Chan S. Distributed algorithms for attack localization in all-optical networks [C] // the 5th Annual Symposium on Network and Distributed System Security Symposium. [s.l.]: Internet Society (ISOC), 1998: 1-17.

[16] Liu Yu, Sun Ya-ni, Fang Li-jie, et al. Analysis of stimulated Raman scattering effects on DWDM optical communication systems [J]. Study on Optical Communications,2010 (157):1-4 (in Chinese).

[17] Shen Ting-gen, He Qin, Tan Xi-lin, et al. Analyze of non-linear effect and crosstalk in the DWDM System[J]. Laser Journal, 2002, 23(5): 42-47 (in Chinese).

Options
Outlines

/