preview

Security Consideration Of High Speed Network

Better Essays

Security Consideration of High Speed Network — 40G/100G Optical Ethernet Ying Shu Chen Xiao Yang Ren Qiu Yang Guo Abstract—The basic ideas and technologies for security of 40G/100G Ethernet are briefly described. Some potential security-related problems referring to physical security and the possible preventive measure, and the information security of its data are analyzed in line with its characteristics. Several practical methods for the enhancement of its information security based on the identity authentication and data encryption are proposed. Index Terms—Ethernet, network security, physical security, information security. I. INTRODUCTION N ETWORK security is a problem that for every network administrator must be paid …show more content…

Nowadays, attackers may use many means and methods to jamming and intercept the data transmitting in the optical fiber. Ethernet is a medium shared network, the data packets that sending to any users will also be broadcasted to everyone in the network. These packets contain the address information of the intended users. At the client side, users will collect their own packets based on the address information. Therefore, users may easily get the data belong to the others. For the security of the optical Ethernet, physical security must be considered first. The purpose of physical security is to ensure the security and performance of the transmitting data on the physical layer, and be able to alert users when such objects cannot be guaranteed. The meanwhile, the transmitting data on the physical level need to be further processed. This process is called information security. By processing information security, the attackers will not be able to read the data even they actually catch the packets. Information security can be done by encryption. Therefore, physical security and information security must be done simultaneously. II. ANALYSIS OF PHYSICAL SECURITY Optical network generally use WDM technology. The existing optical components are not perfect, the crosstalk exist between each channels in WDM. This crosstalk may be utilized by the attacker to break

Get Access