• Laser & Optoelectronics Progress
  • Vol. 51, Issue 10, 100003 (2014)
Zhang Yinfa*, Ren Shuai, Wang Peng, Li Ming, and Wang Jingyu
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/lop51.100003 Cite this Article Set citation alerts
    Zhang Yinfa, Ren Shuai, Wang Peng, Li Ming, Wang Jingyu. Research Progress of Effect of High Power Signal on Optical Networks and Protection Technology[J]. Laser & Optoelectronics Progress, 2014, 51(10): 100003 Copy Citation Text show less
    References

    [1] Zeng Shuguang, Hu Jing, Wang Fei, et al.. Pulse stacking scheme based on wavelength division multiplexing[J]. Acta Optica Sinica, 2013, 33(5): 0514001.

    [2] M Furdek, N Skorin-Kapov, M Bosiljevac, et al.. Analysis of crosstalk in optical couplers and associated vulnerabilities [C]. MIPRO 2010, 2010. 461-466.

    [3] Chris Develder, Marc De Leenheer, Bart Dhoedt, et al.. Optical networks for grid and cloud computing applications[J]. Proceedings of the IEEE, 2012, 100(5): 1149-1167.

    [4] Luo Qingsong, Yang Hua, Liu Zhiqiang, et al.. Security status and key technology study of optical network[J]. Journal of CAEIT, 2013, 8(4): 338-343.

    [5] Guanglei Liu, Chuanyi Ji. Resilience of all-optical network architectures under in-band crosstalk attacks: A probabilistic graphical model approach[J]. IEEE Journal on Selected Areas in Communications, 2007, 4(25): 2-17.

    [6] N Sreenath, K Muthuraj, P Sivasubramanian. Secure optical internet: attack detection and prevention mechanism[C]. 2012 ICCEET, 2012. 1009-1012.

    [7] M Medard, D Marquis, R A Barry, et al.. Security issues in all-optical networks [J]. IEEE Network, 1997, 11(3): 42-48.

    [8] Amornrat Jirattigalachote. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency[D]. Stockholm: KTH School of Information and Communication Technology, 2012.

    [9] Meng Xiangbo. The Research of Multifunctional EDFA[D]. Beijing: Beijing Jiaotong University, 2011.

    [10] Marija Furdek, Nina Skorin-Kapov. Physical-layer attacks in transparent optical networks[J]. Optical Communications Systems, 2012, (3): 123-146.

    [11] M Furdek, M Bosiljevac, N Skorin-Kapov, et al.. Gain competition in optical amplifiers: A case study[C]. MIPRO 2010, 2010: 467-472.

    [12] Mingliang Deng, Xingwen Yi, Jing Zhang, et al.. Fiber nonlinearity compensation for CO-OFDM transmission with 10.7-Gb/s NRZ-OOK neighbors[J]. Chin Opt Lett, 2012, 10(11): 110602.

    [13] Luo Xuan, Jiang Yang, Yu Jinlong, et al.. Simultaneous optical signal dropping and cleaning by utilizing four wave mixing effects based optical logic gate in optical fiber[J]. Acta Optica Sinica, 2010, 30(9): 2524-2528.

    [14] Liu Yu, Sun Yani, Fang Lijie, et al.. Analysis of stimulated raman scattering effects on DWDM optical communication systems[J]. Study on Optical Communications, 2010, (1): 1-4.

    [15] Yunfeng Peng, Zeyu Sun, Shu Du, et al.. Propagation of all-optical crosstalk attack in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 085002.

    [16] Marija Furdek. Physical-layer attacks in optical WDM networks and attack-aware network planning[J]. European Journal of Operational Research, 2011, 178(2): 1160-1167.

    [17] Shoba Krishnan, Anita Borude. Security issues in all-optical networks[C]. 2011 IEEE Annual SRII Global Conference, 2011. 790-794.

    [18] Wu Tao, Arun K Somani. Necessary and sufficient condition for crosstalk attack localization in all-optical networks [C]. Asia-Pacific Optical and Wireless Communications 2002, International Society for Optics and Photonics, 2002. 22-33.

    [19] Wu Tao, Arun K Somani. Cross-talk attack monitoring and localization in all-optical networks[J]. IEEE/ACM Transaction on Networking, 2006, 13(6): 1390-1401.

    [20] Zeyu Sun, Yunfeng Peng, Keping Long. Attack propagation of high-powered intrachannel crosstalk in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 100501.

    [21] Poompat Saengudomlert. Analysis and Detection of Jamming Attacks in an All-Optical Network[D]. Massachusetts: Massachusetts Institute of Technology, 1998.

    [22] T H Shake. Assessing network infrastructure vulnerabilities in physical layer attacks[C]. Proceedings of the 22nd National Information Systems Security Conference, 2000. 228-237.

    [23] Ridha Rejeb, Mark S Leeson, Roger J Green. Fault and attack management in all-optical networks[J]. IEEE Communications Magazine, 2006, 44(11): 79-86.

    [24] R Rejeb, M S Leeson, R J Green. Multiple attack localization and identification in all-optical networks[J]. Optical Switching and Networking, 2006, 3(1): 41-49.

    [25] Peng Bingbin. Research on Defense Technology of Crosstalk Attack in Optical Network[D]. Xi′ an: Xi′an Communications Institute, 2013.

    [26] Nina Skorin-Kapov, Jiajia Chen, Lena Wosinska. A new approach to optical networks security: Attack-aware routing and wavelength assignment[J]. IEEE/ACM Transaction on Networking, 2010, 18(3): 750-760.

    [27] Marija Furdek, Nina Skorin-Kapov, Anna Tzanakaki. Survivable routing and wavelength assignment considering highpowered jamming attacks[C]. Communication and Photonics Conference and Exibition, 2011. 1-7.

    [28] Marija Furdek, Nina Skorin-Kapov. Attack-survivable routing and wavelength assignment for high-power jamming [C]. IEEE 17th International Conference on Optical Network Design and Modeling, 2013. 70-75.

    [29] Sun Zeyu. Propagation Effect of High-Powerd Intra-Channel and Inter-Channel Crosstalk Attack in All-Optical Networks[D]. Chongqing: Chongqing University of posts and telecommunications, 2012.

    [30] S C Tan. Ant-based physical attack and amplifier spontaneous emission-aware routing[C]. 2012 IEEE ICCT, 2012. 727-730.

    [31] Peng Bingbin, Zhang Yinfa, Liu Tao, et al.. Research on a RWA algorithm to enhance the performance of attack tolerance in optical network[J]. Optical Communication Technology, 2013, 37(3): 31-34.

    [32] Ren Shuai, Zhang Yinfa, Wang Jingyu, et al.. A RWA algorithm for limiting the scope of physical layer attack influences in optical networks[J]. Study on Optical Communications, 2014, (1): 15-18.

    [33] Guanglei Liu, Chuanyi Ji. Resilient architecture of all-optical networks: probabilistic graphical models for crosstalk attack propagation[C]. 2006 IEEE International Symposium on Information Theory, 2006. 2914-2918.

    [34] Huang Qiong, Yin Pengfei, Sun Zeyu. Tolerance in high-powered crosstalk attack of DPSK and NRZ in transparent optical networks[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2012, 24(2): 144-147.

    CLP Journals

    [1] Li Ming, Zhang Yinfa, Ren Shuai, Wang Jingyu, Liao Xiaomin. Research Progress of Next Generation Optical Networks Technology for Cloud Computing[J]. Laser & Optoelectronics Progress, 2015, 52(7): 70003

    Zhang Yinfa, Ren Shuai, Wang Peng, Li Ming, Wang Jingyu. Research Progress of Effect of High Power Signal on Optical Networks and Protection Technology[J]. Laser & Optoelectronics Progress, 2014, 51(10): 100003
    Download Citation