首页    期刊浏览 2024年09月16日 星期一
登录注册

文章基本信息

  • 标题:Source based Security Issues in WDM Systems
  • 本地全文:下载
  • 作者:A. Antwiwaa ; A. Kumar ; A. K Jaiswal
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2017
  • 卷号:7
  • 期号:4
  • 页码:2101-2108
  • DOI:10.11591/ijece.v7i4.pp2101-2108
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed
  • 其他摘要:The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed
  • 关键词:Adversary; Clone; Source based ;Security ;Attack
国家哲学社会科学文献中心版权所有