Marija Furdek

Learn More
The high data rates employed by wavelength division multiplexing transparent optical networks make them most suitable for today's growing network traffic demands. However, their transparency imposes several vulnerabilities in network security, enabling malicious signals to propagate from the source to other parts of the network without losing their(More)
Keywords: OR in telecommunications Integer linear programming Optical networks Physical-layer attacks Wavelength assignment Greedy Randomized Adaptive Search Procedure (GRASP) a b s t r a c t Today's Transparent Optical Networks (TONs) are highly vulnerable to various physical-layer attacks, such as high-power jamming, which can cause severe service(More)
Due to the large transmission speeds and enormous volume of transferred data, network reliability performance and cost-efficiency are among the key concerns in optical network design. Reducing the number of used optical components with higher failure probability within nodes represents a promising approach for achieving reliable and cost-effective optical(More)
We propose and evaluate a Greedy Randomized Adaptive Search Procedure applied to minimize the number of power equalizers (GRASP-PE) needed to limit the propagation of high-power jamming attacks in WDM networks. Simulation results show that GRASP-PE significantly reduces the required number of power equalizers when compared to a greedy approach. 1.(More)
Physical layer attacks in transparent optical networks are a serious security threat to network operation. We propose a novel protection approach based on wavelength assignment which limits the maximal propagation of intra-channel crosstalk attacks. 1. Introduction In Transparent Optical Networks (TONs), all-optical data connections, called lightpaths, are(More)
Keywords: Physical-layer attacks Power equalizers Greedy randomized adaptive search procedure (GRASP) Transparent optical networks a b s t r a c t The latest advances in Wavelength Division Multiplexing (WDM) technology are making it possible to build all-optical transparent WDM networks, which are expected to be able to satisfy the rapid growth of today's(More)
—The high data rates employed by WDM transparent optical networks make them most suitable for today's growing network traffic demands. However, their transparency imposes several vulnerabilities in network security, enabling malicious signals to propagate from the source to other parts of the network without losing their attacking capabilities. Furthermore,(More)