{"title":"Burst circulating threat in optical burst switched networks","authors":"N. Sreenath, K. Muthuraj, K. Brabagaran","doi":"10.1109/ICACCCT.2014.7019197","DOIUrl":null,"url":null,"abstract":"Optical network is a high speed network thus reduce the huge bandwidth demands and increase the internet users. Optical burst switched network is an optical networking technique that allows dynamic sub wavelength. OBS is viewed as compromise the optical packet switching and optical circuit switching networks. OBS networks suffer from various security vulnerabilities. This paper propose a security threat named as Burst Circulating attack for OBS networks and provide defective mechanism for this attack. The ns2 simulator with modified nOBS patch is used simulate and verify the security parameter.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCCT.2014.7019197","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Optical network is a high speed network thus reduce the huge bandwidth demands and increase the internet users. Optical burst switched network is an optical networking technique that allows dynamic sub wavelength. OBS is viewed as compromise the optical packet switching and optical circuit switching networks. OBS networks suffer from various security vulnerabilities. This paper propose a security threat named as Burst Circulating attack for OBS networks and provide defective mechanism for this attack. The ns2 simulator with modified nOBS patch is used simulate and verify the security parameter.