SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 310 
SPECTRAL THREAT IN TCP OVER OPTICAL BURST SWITCHED NETWORKS Terrance Frederick Fernandez1, Brabagaran Karunanithi2, Sreenath Niladhuri3 1Research Scholar, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India 2M.Tech Student, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India 3Professor, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India Abstract Exponential increase in the number of online users has increased over the years posed a demand for high speed core architecture for the internet. The Optical Burst Switching (OBS) is a new switching architecture that efficiently utilizes the bandwidth of the optical layer. It offers all-optical switching as there is no Optical-Electronic conversion at any intermediate switching node. It is one of the three optical switching architectures, while others being Optical Circuit Switching (OCS) and Optical Packet Switching (OPS). The basic switching entity of OBS is a burst which posses an intermediate granularity between a packet and the amount of optical data in a circuit. The OBS architecture merits the shortcomings of the other two optical architectures namely OCS and OPS. This efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes a novel security threat namely the spectral threat. It is a threat that affects only multicast capable nodes. Multicast Capable nodes are those nodes that are capable of multicasting an optical data. The wavelength of the optical data burst is altered resulting in flooding of data to a particular outgoing channel and ultimately blocking the channel. The attack results in losses thereby reducing the burst throughput and increasing the burst latency. The paper further summarizes other potential threats affecting normal nodes and Multicast Capable nodes for TCP over OBS networks. Keywords: Optical communication, Optical Burst Switching, Vulnerabilities in OBS Networks and Spectral Threat. 
-----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION TO OPTICAL BURST SWITCHING Driven by the demand to achieve huge bandwidth, the researchers wanted a cost effective optical networking architecture at the cores [1]. The optical circuit switching architecture is cozy to build, yet lacks flexibility to cope with the bursty internet traffic. Though optical packet switching poses a theoretically ideal architecture, it still suffers from immaturity in optical buffers. On the other hand, people from academia find the Optical Burst Switched architecture feasible as the future technology for the network cores [2], [3]. 
Fig -1: OBS Architecture 
In OBS, packets from different sources belonging to same destination are aggregated into a Burst and are forwarded through the cores, to the destination. OBS architecture is given in Figure 1. Unlike others, these Bursts do not contain control information. Instead there is a burst header packet, which carries control data for an associated data burst. A typical BHP format is shown in Figure 2. 
Fig -2: Burst Header Packet (BHP) format 
The header undergoes O/E/O conversion at the intermediate nodes for processing, while its burst is transmitted all- optically. The expected total processing time by a header packet is calculated and it is called offset time, after which the data bursts for the corresponding headers are sent [4]. Since the burst transmission at the cores is entirely at the optical domain and with the absence of potential optical buffers, there is a possibility of two or more bursts contend at the same outgoing channel and at the same instant. This phenomenon is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 311 
called as Burst Contention. There are a number of resolution mechanisms available like wavelength conversion [5], segmentation [6], optical buffering [7] and deflection routing [8]. 2. OPTICAL NODE CLASSIFICATION Since Optical Burst Switched Networks are all-optical in nature, multicasting is not possible in every core node due to absence of potential Optical buffering technology. Based on an optical node capability, the classification is [9]: 2.1 Multicast Capable Optical Cross-Connect Switches (MC-OXC) As discussed in Section 1, the BHP undergoes O/E/O conversion at the cores while the DB is all-optical. In order to split an incoming Burst all-optically, an optical node must possess light-splitting capability. Such nodes come under Multicast Capable nodes. 2.2 Multicast Incapable Optical Cross-Connect Switches Other nodes that do not posses sufficient capability to multicast a Data Burst all-optically come under the Multicast Incapable nodes. 3. VULNERABILITIES IN OBS NETWORKS Apart from being troubled in contention as discussed in Section1, OBS suffers from security threats too. During transmission, the scheduling request for a BHP may be rejected due to overflowing demands and the corresponding data burst is disconnected thus becoming an Orphan Burst [10]. The orphan bursts may flow along an unintended path wasting the bandwidth or even be tapped by an attacker compromising the security. Sometimes the BHP may be modified thus compromised by fraudulent parties forming Malicious Burst Headers and these include Time-out attack, Replay attack, Flooding attack and Burst Hijacking. Time-out attack happens when an attacker allegedly modifies the time-out field on the BHP. The time-out field is used for timer based assembly mechanism [11]. When this value is changed, bursts of shorter length are formed causing lot of unwanted mice flows in the network. 
In replay attack [10], a compromised node makes copy of BHP and stores it. In later time or in some other day, compromised node injects this BHP illegally that will get its channel allocated. In a flooding attack [12], the compromised node creates multiple copies of the BHP and forwards it to the next node and thereby flooding with duplicate copies of BHP. In order to make reservations for these bogus bursts the resources are blocked and denied for valid bursts. The compromised node tunnels the BHP to the attacker and it is called Burst hijacking [13]. The above vulnerabilities do not happen at a multicast OBS node and there are certain other vulnerabilities that could happen at the Multicast Capable nodes and they include Burst Duplication and Land attack. The duplication attack is similar to hijacking except for the fact it exploits the multicast node capability. The compromised node also splits the Burst along with its header and transmits it to the attacker. In land attack [14], the compromised node copies the BHP, transmits back to the source as well as to the intended destination. Since the attack is on a MC node, the payload also gets split and reaches both intended and unintended nodes thereby wasting resources. 4. SPECTRAL THREAT FOR OBS NETWORKS As seen from the BHP format in section 1, there is an input wavelength field specified for a corresponding burst. The attacker may compromise a core node and then change the wavelength of an incoming burst. Thus it may send it to an unintended channel. It may even change all incoming BHP to one particular channel thereby leading to contention. Since this particular attack takes place in spectral/wavelength domain it is called as spectral attack. This threat is shown in figure 3. The network supports three wavelengths (say λ1, λ2 and λ3) which are shown as three lines in the figure. The attacker compromises the node 3. The IP packets are initially assembled and sent as burst to the ingress, where individual channels are allocated to each formed burst. These are now forwarded to the compromised node 3, where all incoming bursts are altered to one wavelength (λ3).This causes contention at the next core node 9. To resolve contention, resources may be wasted or other routes are considered that are not optimal. The overall throughput decreases due to this attack. 
Fig -3: Spectral Attack on a core node in TCP over OBS networks
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 312 
5. SIMULATION RESULTS 
Fig -4: NSFNet Topology The left side of the table denotes the simulation Parameters and the right side denotes the values of the same. Link speed of the optical channel is given in Giga bytes. The simulation time and the switching time is given in milliseconds (ms). All the other network simulation parameters carry default values. Table -1: Simulation Parameters 
This attack is simulated in ns2 with modified nOBS patch [15] in a 14 node NSF network with the simulation parameters given in Table 1. Burst throughput before and after spectral attack acting upon Multicast Capable and normal nodes are shown in Chart 1, 2 and 3. 
Chart -1: Throughput Vs Simulation Time (Normal Multicast Incapable Nodes) 
Chart -2: Throughput Vs Simulation Time (Normal Multicast capable Nodes) 
Chart -3: Throughput Vs Simulation Time (After Attack on Multicast capable Nodes) 6. CONCLUSIONS 
The paper reviews various security vulnerabilities in an OBS network and proposes a novel threat happening in the wavelength domain. The effect of this security compromise shown before and after attack proves the lethality of the same on an MC node in comparison with a normal node. Multicast Capable nodes must be secured well as the effect of MC node compromise will be higher than a normal node compromise. The optimized route configured during light-tree configuration phase is not taken when a particular node is compromised thus wasting network resources. The quantification of the above 
Parameter 
Value 
Number of Electronic nodes 
28 
Number of Optical nodes 
14 
Link Speed 
1 GB 
Simulation Time 
60 ms 
Switching Time 
0.001 ms
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 313 
discussed are considered as the future work to this proposal. REFERENCES 
[1] Md. Shamim Reza, Md. Maruf Hossain and Satya Prasad Majumder, "Contention Problem in Optical Burst Switching Network", International Conference on Computational Intelligence and Communication Systems, pp 239 – 242, 2010. (Conference proceedings) 
[2] Y. Xiong, M. Vandenhoute, and H. Cankaya, “Control architecture in optical burst-switched WDM networks,” IEEE Journal of Selected Areas in Communication, vol. 18, no. 10, pp. 1838–1851, Oct. 2000. (IEEE Journal) 
[3] J. Ramamirtham and J. Turner, “Time sliced optical burst switching”, Proceeding of IEEE computer and communications, vol.3, pp. 2030–2038, 2003. (Conference proceedings) 
[4] H. M. H. Shalabi, ” A simplified performance analysis of optical burst switched networks.” Journal of Lightwave Technology, vol. 25, no. 4,pp. 986-995, April 2007. (Journal citation) 
[5] B. Ramamurthy and B. Mukherjee, “Wavelength conversion in WDM networking”, IEEE Journal of Selected Areas in Communication, vol. 16, no. 7, pp. 1061–1073, 1998. (IEEE Journal citation) 
[6] V. Vokkarane and J. Jue, “Burst segmentation: An approach for reducing packet loss in optical burst switched networks”, SPIE Optical Network Magazine, vol. 4, no. 6, pp. 81–89, Nov.–Dec. 2003. (Magazine citation) 
[7] .Y.Choi, H.L.Vu and M.Kang, “On Achieving the Optimal Performance of FDL Buffers Using Burst Assembly”, IEEE Communication Letters, vol. 11, no. 11, pp- 895-897, November 2007. (Communication Letters) 
[8] X. Wang, H. Morikawa, and T. Aoyama, “Burst optical deflection routing protocol for wavelength routing WDM networks”, in Proceeding of SPIE Optical Network Communication Conference, pp. 257–266, October 2000. (Conference proceedings) 
[9] B. G. Bathula, V. M. Vokkarane, and R. R. C. Bikram, “Impairment aware manycasting over optical burst- switched (OBS) networks,” in Proceeding on International Conference on Communications, pp. 5234–5238, May 2008, Beijing, China. (Conference proceedings) 
[10] Yuhua Chen, Pramode K. Verma, "Secure Optical Burst Switching: Framework and Research Directions", IEEE Communications magazine, vol.46, no.8, pp. 40- 45, August 2008. (Magazine citation) 
[11] N.Sreenath, K.Muthuraj, N.Ramkumar , "Secure Optical Internet : A novel threat detection and its countermeasures", in proceeding of International Conference on Electronics and Embedded Systems, 
2012. (Conference proceedings) 
[12] K. Muthuraj and N. Sreenath, “Secure Optical Internet: An attack on OBS node in a TCP over OBS Network”, International Journal of emerging trends and technology in computer science, vol.1, no.4, pp.75-80, December 2012. (Journal citation) 
[13] K.Muthuraj and N.Sreenath, "Secure Optical Internet: A novel attack prevention mechanism for an OBS node in TCP over OBS networks", International Journal of Advanced Computer Science and Applications, vol.3, no.12, pp-76-80, 2012. (Journal citation) 
[14] N.Sreenath and K.Muthuraj, “Optical Internet: Possible attacks on TCP/OBS networks”, International Journal of Computer Science and Information Security, ISSN: 1947-5500, vol. 10, no. 12, pp- 20-24, December 2012. (Journal Citation) 
[15] Guray Gurel, Onur Alparslan and Ezhan Karasan, “ nOBS: an ns2 based simulation tool for performance evaluation of TCP traffic in OBS networks, ” Annals of Telecommunications, vol. 62, no. 5-6, pp. 618-632, May 2007. 
BIOGRAPHIES 
Terrance Frederick Fernandez received his M.Tech Degree in Distributed Computing Systems from Pondicherry Engineering College, India and B.Tech Degree in Computer Science and Engineering from Sri Manakula Vinayagar Engineering College (affiliated to Pondicherry University), India. He qualified GATE with 92.53 percentile 
Brabagaran Karunanithi doing M.Tech Degree in Information Security from Pondicherry Engineering College, Puducherry, India, received his B.Tech Degree in Information Technology from Trichy Engineering College, Trichy, India and diploma in Computer Engineering from Valivalam Desikar Polytechenic College, Nagapattinam, India. 
Sreenath Niladhurai received his Ph.D Degree in Computer Science and Engineering from Indian Institute of Technology, Madras, Chennai, India, his M.Tech Degree from University of Hyderabad, India and his B.Tech in Electronics and Communication Engineering from Jawaharlal Nehru Technical University, Anathapur.

Más contenido relacionado

La actualidad más candente

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
 
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryeSAT Journals
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...eSAT Publishing House
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indooreSAT Publishing House
 
Use of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemsUse of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemseSAT Journals
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 

La actualidad más candente (20)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetry
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoor
 
Use of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemsUse of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systems
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 

Destacado

On the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbonOn the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carboneSAT Publishing House
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
 
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...eSAT Publishing House
 
Evaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban roadEvaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban roadeSAT Publishing House
 
Effect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertiesEffect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertieseSAT Publishing House
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingeSAT Publishing House
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaeSAT Publishing House
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemeSAT Publishing House
 
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...eSAT Publishing House
 
Reduction of root fillet stress by alternative root fillet profile
Reduction of root fillet stress by alternative root fillet profileReduction of root fillet stress by alternative root fillet profile
Reduction of root fillet stress by alternative root fillet profileeSAT Publishing House
 
Compressive strength variability of brown coal fly ash geopolymer concrete
Compressive strength variability of brown coal fly ash geopolymer concreteCompressive strength variability of brown coal fly ash geopolymer concrete
Compressive strength variability of brown coal fly ash geopolymer concreteeSAT Publishing House
 
Study of macro mechanical properties of ultra high strength concrete using qu...
Study of macro mechanical properties of ultra high strength concrete using qu...Study of macro mechanical properties of ultra high strength concrete using qu...
Study of macro mechanical properties of ultra high strength concrete using qu...eSAT Publishing House
 
Design and analysis of worm pair used in self locking system with development...
Design and analysis of worm pair used in self locking system with development...Design and analysis of worm pair used in self locking system with development...
Design and analysis of worm pair used in self locking system with development...eSAT Publishing House
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryeSAT Publishing House
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteeSAT Publishing House
 
Safety zone determination for wireless cellular
Safety zone determination for wireless cellularSafety zone determination for wireless cellular
Safety zone determination for wireless cellulareSAT Publishing House
 
Factors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavouFactors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavoueSAT Publishing House
 
Seismic retrofitting of a damaged school building
Seismic retrofitting of a damaged school buildingSeismic retrofitting of a damaged school building
Seismic retrofitting of a damaged school buildingeSAT Publishing House
 
Design of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled techniqueDesign of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled techniqueeSAT Publishing House
 

Destacado (20)

On the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbonOn the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbon
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivity
 
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
 
Evaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban roadEvaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban road
 
Effect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertiesEffect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the properties
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by using
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal area
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
 
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
 
Reduction of root fillet stress by alternative root fillet profile
Reduction of root fillet stress by alternative root fillet profileReduction of root fillet stress by alternative root fillet profile
Reduction of root fillet stress by alternative root fillet profile
 
Compressive strength variability of brown coal fly ash geopolymer concrete
Compressive strength variability of brown coal fly ash geopolymer concreteCompressive strength variability of brown coal fly ash geopolymer concrete
Compressive strength variability of brown coal fly ash geopolymer concrete
 
Study of macro mechanical properties of ultra high strength concrete using qu...
Study of macro mechanical properties of ultra high strength concrete using qu...Study of macro mechanical properties of ultra high strength concrete using qu...
Study of macro mechanical properties of ultra high strength concrete using qu...
 
Design and analysis of worm pair used in self locking system with development...
Design and analysis of worm pair used in self locking system with development...Design and analysis of worm pair used in self locking system with development...
Design and analysis of worm pair used in self locking system with development...
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industry
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
 
Safety zone determination for wireless cellular
Safety zone determination for wireless cellularSafety zone determination for wireless cellular
Safety zone determination for wireless cellular
 
Factors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavouFactors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavou
 
Seismic retrofitting of a damaged school building
Seismic retrofitting of a damaged school buildingSeismic retrofitting of a damaged school building
Seismic retrofitting of a damaged school building
 
Design of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled techniqueDesign of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled technique
 

Similar a Spectral threat in tcp over optical burst switched networks

Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...eSAT Journals
 
Wireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmWireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmeSAT Publishing House
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Journals
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Publishing House
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...eSAT Publishing House
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...eSAT Publishing House
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Journals
 

Similar a Spectral threat in tcp over optical burst switched networks (20)

Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
 
Wireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmWireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigm
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Último (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Spectral threat in tcp over optical burst switched networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 310 SPECTRAL THREAT IN TCP OVER OPTICAL BURST SWITCHED NETWORKS Terrance Frederick Fernandez1, Brabagaran Karunanithi2, Sreenath Niladhuri3 1Research Scholar, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India 2M.Tech Student, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India 3Professor, Computer Science and Engineering, Pondicherry Engineering College, Puducherry, India Abstract Exponential increase in the number of online users has increased over the years posed a demand for high speed core architecture for the internet. The Optical Burst Switching (OBS) is a new switching architecture that efficiently utilizes the bandwidth of the optical layer. It offers all-optical switching as there is no Optical-Electronic conversion at any intermediate switching node. It is one of the three optical switching architectures, while others being Optical Circuit Switching (OCS) and Optical Packet Switching (OPS). The basic switching entity of OBS is a burst which posses an intermediate granularity between a packet and the amount of optical data in a circuit. The OBS architecture merits the shortcomings of the other two optical architectures namely OCS and OPS. This efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes a novel security threat namely the spectral threat. It is a threat that affects only multicast capable nodes. Multicast Capable nodes are those nodes that are capable of multicasting an optical data. The wavelength of the optical data burst is altered resulting in flooding of data to a particular outgoing channel and ultimately blocking the channel. The attack results in losses thereby reducing the burst throughput and increasing the burst latency. The paper further summarizes other potential threats affecting normal nodes and Multicast Capable nodes for TCP over OBS networks. Keywords: Optical communication, Optical Burst Switching, Vulnerabilities in OBS Networks and Spectral Threat. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION TO OPTICAL BURST SWITCHING Driven by the demand to achieve huge bandwidth, the researchers wanted a cost effective optical networking architecture at the cores [1]. The optical circuit switching architecture is cozy to build, yet lacks flexibility to cope with the bursty internet traffic. Though optical packet switching poses a theoretically ideal architecture, it still suffers from immaturity in optical buffers. On the other hand, people from academia find the Optical Burst Switched architecture feasible as the future technology for the network cores [2], [3]. Fig -1: OBS Architecture In OBS, packets from different sources belonging to same destination are aggregated into a Burst and are forwarded through the cores, to the destination. OBS architecture is given in Figure 1. Unlike others, these Bursts do not contain control information. Instead there is a burst header packet, which carries control data for an associated data burst. A typical BHP format is shown in Figure 2. Fig -2: Burst Header Packet (BHP) format The header undergoes O/E/O conversion at the intermediate nodes for processing, while its burst is transmitted all- optically. The expected total processing time by a header packet is calculated and it is called offset time, after which the data bursts for the corresponding headers are sent [4]. Since the burst transmission at the cores is entirely at the optical domain and with the absence of potential optical buffers, there is a possibility of two or more bursts contend at the same outgoing channel and at the same instant. This phenomenon is
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 311 called as Burst Contention. There are a number of resolution mechanisms available like wavelength conversion [5], segmentation [6], optical buffering [7] and deflection routing [8]. 2. OPTICAL NODE CLASSIFICATION Since Optical Burst Switched Networks are all-optical in nature, multicasting is not possible in every core node due to absence of potential Optical buffering technology. Based on an optical node capability, the classification is [9]: 2.1 Multicast Capable Optical Cross-Connect Switches (MC-OXC) As discussed in Section 1, the BHP undergoes O/E/O conversion at the cores while the DB is all-optical. In order to split an incoming Burst all-optically, an optical node must possess light-splitting capability. Such nodes come under Multicast Capable nodes. 2.2 Multicast Incapable Optical Cross-Connect Switches Other nodes that do not posses sufficient capability to multicast a Data Burst all-optically come under the Multicast Incapable nodes. 3. VULNERABILITIES IN OBS NETWORKS Apart from being troubled in contention as discussed in Section1, OBS suffers from security threats too. During transmission, the scheduling request for a BHP may be rejected due to overflowing demands and the corresponding data burst is disconnected thus becoming an Orphan Burst [10]. The orphan bursts may flow along an unintended path wasting the bandwidth or even be tapped by an attacker compromising the security. Sometimes the BHP may be modified thus compromised by fraudulent parties forming Malicious Burst Headers and these include Time-out attack, Replay attack, Flooding attack and Burst Hijacking. Time-out attack happens when an attacker allegedly modifies the time-out field on the BHP. The time-out field is used for timer based assembly mechanism [11]. When this value is changed, bursts of shorter length are formed causing lot of unwanted mice flows in the network. In replay attack [10], a compromised node makes copy of BHP and stores it. In later time or in some other day, compromised node injects this BHP illegally that will get its channel allocated. In a flooding attack [12], the compromised node creates multiple copies of the BHP and forwards it to the next node and thereby flooding with duplicate copies of BHP. In order to make reservations for these bogus bursts the resources are blocked and denied for valid bursts. The compromised node tunnels the BHP to the attacker and it is called Burst hijacking [13]. The above vulnerabilities do not happen at a multicast OBS node and there are certain other vulnerabilities that could happen at the Multicast Capable nodes and they include Burst Duplication and Land attack. The duplication attack is similar to hijacking except for the fact it exploits the multicast node capability. The compromised node also splits the Burst along with its header and transmits it to the attacker. In land attack [14], the compromised node copies the BHP, transmits back to the source as well as to the intended destination. Since the attack is on a MC node, the payload also gets split and reaches both intended and unintended nodes thereby wasting resources. 4. SPECTRAL THREAT FOR OBS NETWORKS As seen from the BHP format in section 1, there is an input wavelength field specified for a corresponding burst. The attacker may compromise a core node and then change the wavelength of an incoming burst. Thus it may send it to an unintended channel. It may even change all incoming BHP to one particular channel thereby leading to contention. Since this particular attack takes place in spectral/wavelength domain it is called as spectral attack. This threat is shown in figure 3. The network supports three wavelengths (say λ1, λ2 and λ3) which are shown as three lines in the figure. The attacker compromises the node 3. The IP packets are initially assembled and sent as burst to the ingress, where individual channels are allocated to each formed burst. These are now forwarded to the compromised node 3, where all incoming bursts are altered to one wavelength (λ3).This causes contention at the next core node 9. To resolve contention, resources may be wasted or other routes are considered that are not optimal. The overall throughput decreases due to this attack. Fig -3: Spectral Attack on a core node in TCP over OBS networks
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 312 5. SIMULATION RESULTS Fig -4: NSFNet Topology The left side of the table denotes the simulation Parameters and the right side denotes the values of the same. Link speed of the optical channel is given in Giga bytes. The simulation time and the switching time is given in milliseconds (ms). All the other network simulation parameters carry default values. Table -1: Simulation Parameters This attack is simulated in ns2 with modified nOBS patch [15] in a 14 node NSF network with the simulation parameters given in Table 1. Burst throughput before and after spectral attack acting upon Multicast Capable and normal nodes are shown in Chart 1, 2 and 3. Chart -1: Throughput Vs Simulation Time (Normal Multicast Incapable Nodes) Chart -2: Throughput Vs Simulation Time (Normal Multicast capable Nodes) Chart -3: Throughput Vs Simulation Time (After Attack on Multicast capable Nodes) 6. CONCLUSIONS The paper reviews various security vulnerabilities in an OBS network and proposes a novel threat happening in the wavelength domain. The effect of this security compromise shown before and after attack proves the lethality of the same on an MC node in comparison with a normal node. Multicast Capable nodes must be secured well as the effect of MC node compromise will be higher than a normal node compromise. The optimized route configured during light-tree configuration phase is not taken when a particular node is compromised thus wasting network resources. The quantification of the above Parameter Value Number of Electronic nodes 28 Number of Optical nodes 14 Link Speed 1 GB Simulation Time 60 ms Switching Time 0.001 ms
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 313 discussed are considered as the future work to this proposal. REFERENCES [1] Md. Shamim Reza, Md. Maruf Hossain and Satya Prasad Majumder, "Contention Problem in Optical Burst Switching Network", International Conference on Computational Intelligence and Communication Systems, pp 239 – 242, 2010. (Conference proceedings) [2] Y. Xiong, M. Vandenhoute, and H. Cankaya, “Control architecture in optical burst-switched WDM networks,” IEEE Journal of Selected Areas in Communication, vol. 18, no. 10, pp. 1838–1851, Oct. 2000. (IEEE Journal) [3] J. Ramamirtham and J. Turner, “Time sliced optical burst switching”, Proceeding of IEEE computer and communications, vol.3, pp. 2030–2038, 2003. (Conference proceedings) [4] H. M. H. Shalabi, ” A simplified performance analysis of optical burst switched networks.” Journal of Lightwave Technology, vol. 25, no. 4,pp. 986-995, April 2007. (Journal citation) [5] B. Ramamurthy and B. Mukherjee, “Wavelength conversion in WDM networking”, IEEE Journal of Selected Areas in Communication, vol. 16, no. 7, pp. 1061–1073, 1998. (IEEE Journal citation) [6] V. Vokkarane and J. Jue, “Burst segmentation: An approach for reducing packet loss in optical burst switched networks”, SPIE Optical Network Magazine, vol. 4, no. 6, pp. 81–89, Nov.–Dec. 2003. (Magazine citation) [7] .Y.Choi, H.L.Vu and M.Kang, “On Achieving the Optimal Performance of FDL Buffers Using Burst Assembly”, IEEE Communication Letters, vol. 11, no. 11, pp- 895-897, November 2007. (Communication Letters) [8] X. Wang, H. Morikawa, and T. Aoyama, “Burst optical deflection routing protocol for wavelength routing WDM networks”, in Proceeding of SPIE Optical Network Communication Conference, pp. 257–266, October 2000. (Conference proceedings) [9] B. G. Bathula, V. M. Vokkarane, and R. R. C. Bikram, “Impairment aware manycasting over optical burst- switched (OBS) networks,” in Proceeding on International Conference on Communications, pp. 5234–5238, May 2008, Beijing, China. (Conference proceedings) [10] Yuhua Chen, Pramode K. Verma, "Secure Optical Burst Switching: Framework and Research Directions", IEEE Communications magazine, vol.46, no.8, pp. 40- 45, August 2008. (Magazine citation) [11] N.Sreenath, K.Muthuraj, N.Ramkumar , "Secure Optical Internet : A novel threat detection and its countermeasures", in proceeding of International Conference on Electronics and Embedded Systems, 2012. (Conference proceedings) [12] K. Muthuraj and N. Sreenath, “Secure Optical Internet: An attack on OBS node in a TCP over OBS Network”, International Journal of emerging trends and technology in computer science, vol.1, no.4, pp.75-80, December 2012. (Journal citation) [13] K.Muthuraj and N.Sreenath, "Secure Optical Internet: A novel attack prevention mechanism for an OBS node in TCP over OBS networks", International Journal of Advanced Computer Science and Applications, vol.3, no.12, pp-76-80, 2012. (Journal citation) [14] N.Sreenath and K.Muthuraj, “Optical Internet: Possible attacks on TCP/OBS networks”, International Journal of Computer Science and Information Security, ISSN: 1947-5500, vol. 10, no. 12, pp- 20-24, December 2012. (Journal Citation) [15] Guray Gurel, Onur Alparslan and Ezhan Karasan, “ nOBS: an ns2 based simulation tool for performance evaluation of TCP traffic in OBS networks, ” Annals of Telecommunications, vol. 62, no. 5-6, pp. 618-632, May 2007. BIOGRAPHIES Terrance Frederick Fernandez received his M.Tech Degree in Distributed Computing Systems from Pondicherry Engineering College, India and B.Tech Degree in Computer Science and Engineering from Sri Manakula Vinayagar Engineering College (affiliated to Pondicherry University), India. He qualified GATE with 92.53 percentile Brabagaran Karunanithi doing M.Tech Degree in Information Security from Pondicherry Engineering College, Puducherry, India, received his B.Tech Degree in Information Technology from Trichy Engineering College, Trichy, India and diploma in Computer Engineering from Valivalam Desikar Polytechenic College, Nagapattinam, India. Sreenath Niladhurai received his Ph.D Degree in Computer Science and Engineering from Indian Institute of Technology, Madras, Chennai, India, his M.Tech Degree from University of Hyderabad, India and his B.Tech in Electronics and Communication Engineering from Jawaharlal Nehru Technical University, Anathapur.