Skip to main content

Applying Cryptographic Techniques for Securing the Client Data Signals on the Egyptian Optical Transport Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 921))

Abstract

The physical layer of the optical transport network (OTN) is the weakest layer in the network, as anyone can access the optical cables from any unauthorized location of the network and stat his attack by using any type of the vulnerabilities. The paper discusses the security threats and the practical challenges in the Egyptian optical network and presents a new technique to protect the client’s data on the physical layer. A new security layer is added to the OTN frames for the first time since the network infrastructure has been installed. The design of the proposed security layer is done by using a structure of XOR, a linear feedback shift register (LFSR), and random number generator in a synchronous model. We propose the security model for different rates in the OTN and wavelength division multiplexing (WDM) system. The proposed model is implemented on the basis of protecting the important client signals only over the optical layers by passing these signals into extra layer called security layer, and before forming the final frame of the OTN system, this done by adding a new card in the Network Element (NE) to perform this job. The results show that the proposed model of the OTN encryption scheme is providing a high security against any wiretapping attack. If the attacker has the ability to access the fiber cables from any unauthorized location, he will find encrypted data and many years will be needed to find one right key to perform the decryption process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Skorin-Kapov, N., et al.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 54(8), 110–117 (2016)

    Article  Google Scholar 

  2. Fok, M.P., et al.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6(3), 725–736 (2011)

    Article  Google Scholar 

  3. Han, M., Kim, Y.: Unpredictable 16 bits LFSR-based true random number generator. In: SoC Design International Conference (ISOCC17( (2017)

    Google Scholar 

  4. Liu, X.-B., et al.: A study on reconstruction of linear scrambler using dual words of channel encoder. IEEE Trans. Inf. Forensics Secur. 8(3), 542–552 (2013)

    Article  Google Scholar 

  5. Dimitriadou, E., Zoiros, K.E.: All-optical XOR gate using single quantum-dot SOA and optical filter. J. Lightwave Technol. 31(23), 3813–3821 (2013)

    Article  Google Scholar 

  6. Mobilen, E., Bernardo, R., Monte, L.R.: 100 Gbit/s optical transport network 40 nm test chip design and prototyping. In: Microwave and Optoelectronics Conference (IMOC), 2017 SBMO/IEEE MTT-S International. IEEE (2017)

    Google Scholar 

  7. Loprieno, G., Losio, G.: Timeslot encryption in an optical transport network. U.S. Patent No. 8,942,379, 27 January 2015‏

    Google Scholar 

  8. Liu, X.-B., et al.: Investigation on scrambler reconstruction with minimum a priori knowledge. In: Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE. IEEE (2011)‏

    Google Scholar 

  9. Kumar, M.C., Praveen Kumar, Y.G., Kurian, M.Z.: Design and implementation of logical scrambler architecture for OTN protocol. IJARCET 3(4), 1260–1262 (2014)

    Google Scholar 

  10. Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint arXiv:1610.01315 (2016)‏

  11. Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint arXiv:1610.01315 (2016)

  12. Carter, T.: An Introduction to Information Theory and Entropy. Complex systems summer school, Santa Fe (2007)

    Google Scholar 

  13. Barlow, G.: A G. 709 Optical Transport Network Tutorial. Innocor Ltd. Capturado em (2003). http://www.innocor.com/pdf_files/g709_tutorial.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamel H. Rahoma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahoma, K.H., Elsayed, A.A. (2020). Applying Cryptographic Techniques for Securing the Client Data Signals on the Egyptian Optical Transport Network. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_61

Download citation

Publish with us

Policies and ethics