Effective management and encryption processing method for security of optical transmission network

被引:0
作者
Choi, Hoyoung [1 ]
Lee, Jongjin [1 ]
Kim, Taehun [1 ]
Kim, Sungcheol [1 ]
机构
[1] KEPCO KDN, Elect Power ICT Res Inst, Naju, South Korea
来源
11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020) | 2020年
关键词
optical; transmission; security; system; data; signal; encryption; cable; tapping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The optical communication network is at the center of the modern communication network and transmits various information such as data, voice, video, and email. The fourth industrial Revolution is developing along with the construction of an intelligent hyper-connected network and with the buoyant construction of intelligent network, all related transmission data is concentrated on the optical communication network. In addition, the importance of the security and viability of the optical transmission path is gradually increasing. Moreover, since the possibility of hacking the optical cable has been continuously reported, the optical transmission path is no longer safe from hacking. As a result, related security measure is necessary. Therefore, this paper proposes an effective management and encryption processing method to improve the network security of an optical transmission communication in order to enhance security against malicious attacks and leakage of internal information on the optical cable.
引用
收藏
页码:1048 / 1050
页数:3
相关论文
共 12 条
  • [1] [Anonymous], 2005, FIBER OPTICS ITS SEC
  • [2] Karimi F., OPSI2014
  • [3] Korea Computer and Communication Research Society, 2018, 2018 ICT STAND FOR F, P12
  • [4] Korea Computer Information Society, 2019, IMPL TLS LIB COMPL K
  • [5] Korea Information and Communication Technology Association, 2017, STAND TEST CERT TECH, P10
  • [6] Korea Optical Society, 2018, FIBER OPTIC COMMUNIC, P10
  • [7] SAVORY Brian, 2012, P REP 5 UBUNTUNET AL, P62
  • [8] Shin Jaebeom, 2019, KOR SOC RAILW AUT C
  • [9] SOUMYA SHIVANGI, 2014, INT J ELECT ELECT DA, V2
  • [10] Tae-seok Jin, 2011, PROTOCOL ALGORITHM A