Advertisement

Applying Cryptographic Techniques for Securing the Client Data Signals on the Egyptian Optical Transport Network

  • Kamel H. RahomaEmail author
  • Ayman A. Elsayed
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)

Abstract

The physical layer of the optical transport network (OTN) is the weakest layer in the network, as anyone can access the optical cables from any unauthorized location of the network and stat his attack by using any type of the vulnerabilities. The paper discusses the security threats and the practical challenges in the Egyptian optical network and presents a new technique to protect the client’s data on the physical layer. A new security layer is added to the OTN frames for the first time since the network infrastructure has been installed. The design of the proposed security layer is done by using a structure of XOR, a linear feedback shift register (LFSR), and random number generator in a synchronous model. We propose the security model for different rates in the OTN and wavelength division multiplexing (WDM) system. The proposed model is implemented on the basis of protecting the important client signals only over the optical layers by passing these signals into extra layer called security layer, and before forming the final frame of the OTN system, this done by adding a new card in the Network Element (NE) to perform this job. The results show that the proposed model of the OTN encryption scheme is providing a high security against any wiretapping attack. If the attacker has the ability to access the fiber cables from any unauthorized location, he will find encrypted data and many years will be needed to find one right key to perform the decryption process.

Keywords

Linear feedback shift registers (LFSR) Random number generators XOR Optical Transport Network (OTN) Wiretapping Client data signals 

References

  1. 1.
    Skorin-Kapov, N., et al.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 54(8), 110–117 (2016)CrossRefGoogle Scholar
  2. 2.
    Fok, M.P., et al.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6(3), 725–736 (2011)CrossRefGoogle Scholar
  3. 3.
    Han, M., Kim, Y.: Unpredictable 16 bits LFSR-based true random number generator. In: SoC Design International Conference (ISOCC17( (2017)Google Scholar
  4. 4.
    Liu, X.-B., et al.: A study on reconstruction of linear scrambler using dual words of channel encoder. IEEE Trans. Inf. Forensics Secur. 8(3), 542–552 (2013)CrossRefGoogle Scholar
  5. 5.
    Dimitriadou, E., Zoiros, K.E.: All-optical XOR gate using single quantum-dot SOA and optical filter. J. Lightwave Technol. 31(23), 3813–3821 (2013)CrossRefGoogle Scholar
  6. 6.
    Mobilen, E., Bernardo, R., Monte, L.R.: 100 Gbit/s optical transport network 40 nm test chip design and prototyping. In: Microwave and Optoelectronics Conference (IMOC), 2017 SBMO/IEEE MTT-S International. IEEE (2017)Google Scholar
  7. 7.
    Loprieno, G., Losio, G.: Timeslot encryption in an optical transport network. U.S. Patent No. 8,942,379, 27 January 2015‏Google Scholar
  8. 8.
    Liu, X.-B., et al.: Investigation on scrambler reconstruction with minimum a priori knowledge. In: Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE. IEEE (2011)‏Google Scholar
  9. 9.
    Kumar, M.C., Praveen Kumar, Y.G., Kurian, M.Z.: Design and implementation of logical scrambler architecture for OTN protocol. IJARCET 3(4), 1260–1262 (2014)Google Scholar
  10. 10.
    Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint arXiv:1610.01315 (2016)‏
  11. 11.
    Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint arXiv:1610.01315 (2016)
  12. 12.
    Carter, T.: An Introduction to Information Theory and Entropy. Complex systems summer school, Santa Fe (2007)Google Scholar
  13. 13.
    Barlow, G.: A G. 709 Optical Transport Network Tutorial. Innocor Ltd. Capturado em (2003). http://www.innocor.com/pdf_files/g709_tutorial.pdf

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Electrical Engineering Department, Faculty of EngineeringMinia UniversityMiniaEgypt
  2. 2.Telecom EgyptCairoEgypt

Personalised recommendations