TY - JOUR
T1 - Security in photonic networks
T2 - Threats and security enhancement
AU - Kitayama, Ken Ichi
AU - Sasaki, Masahide
AU - Araki, Soichiro
AU - Tsubokawa, Makoto
AU - Tomita, Akihisa
AU - Inoue, Kyo
AU - Harasawa, Katsuyoshi
AU - Nagasako, Yuki
AU - Takada, Atsushi
PY - 2011
Y1 - 2011
N2 - We address emerging threats to the security of photonic networks as these networks become heterogeneous being opened to the upper layers, other operators, and end users. We review the potential threats, mainly loss of the confidentiality of user data transmitted through optical fibers and disturbances of network control, both of which could seriously damage the entire network. We then propose a novel conceptual model of a secure photonic network by introducing a quantum key distribution (QKD) network to its legacy structure. Secure keys generated by the QKD network are managed by key management agents (KMAs) and used to encrypt not only user data but also control signals. The KMAs cooperate with the generalized multiprotocol label-switching controller for secure path provisioning and drive photonic and modern crypto engines in appropriate combinations. Finally, we present a roadmap of a deployment scenario, starting from niche applications such as mission critical and business applications and the next. Digital cinema distribution through a photonic network is presented as an example of a niche application.
AB - We address emerging threats to the security of photonic networks as these networks become heterogeneous being opened to the upper layers, other operators, and end users. We review the potential threats, mainly loss of the confidentiality of user data transmitted through optical fibers and disturbances of network control, both of which could seriously damage the entire network. We then propose a novel conceptual model of a secure photonic network by introducing a quantum key distribution (QKD) network to its legacy structure. Secure keys generated by the QKD network are managed by key management agents (KMAs) and used to encrypt not only user data but also control signals. The KMAs cooperate with the generalized multiprotocol label-switching controller for secure path provisioning and drive photonic and modern crypto engines in appropriate combinations. Finally, we present a roadmap of a deployment scenario, starting from niche applications such as mission critical and business applications and the next. Digital cinema distribution through a photonic network is presented as an example of a niche application.
KW - Network architecture
KW - optical fiber communications
KW - photonic network
KW - quantum key distribution (QKD)
KW - security
UR - http://www.scopus.com/inward/record.url?scp=80054874572&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054874572&partnerID=8YFLogxK
U2 - 10.1109/JLT.2011.2166248
DO - 10.1109/JLT.2011.2166248
M3 - Article
AN - SCOPUS:80054874572
SN - 0733-8724
VL - 29
SP - 3210
EP - 3222
JO - Journal of Lightwave Technology
JF - Journal of Lightwave Technology
IS - 21
M1 - 6003728
ER -