Secure Virtual Network Provisioning over Key Programmable Optical Networks.

  • Abstract
  • Literature Map
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks remains a challenging problem. To address this challenge, the concept of evolving traditional optical networks into key programmable optical networks (KPONs) has been proposed. Inspired by this, this paper delves into the establishment of secure virtual networks over KPONs, in which the information-theoretically secure keys can be supplied for ensuring the information-theoretic security of data transfer within virtual networks. A layered architecture for secure virtual network provisioning over KPONs is proposed, which leverages software-defined networking to realize the programmable control of optical-layer resources. With this architecture, a heuristic algorithm, i.e., the key adaptation-based secure virtual network provisioning (KA-SVNP) algorithm, is designed to dynamically allocate key resources based on the adaption between the key supply and key demand. To evaluate the proposed solutions, an emulation testbed is established, achieving millisecond latencies for secure virtual network establishment and deletion. Moreover, numerical simulations indicate that the designed KA-SVNP algorithm performs superior to the benchmark algorithm in terms of the success probability of secure virtual network requests.

ReferencesShowing 10 of 28 papers
  • Cite Count Icon 82
  • 10.1109/jlt.2011.2166248
Security in Photonic Networks: Threats and Security Enhancement
  • Nov 1, 2011
  • Journal of Lightwave Technology
  • Ken-Ichi Kitayama + 8 more

  • Open Access Icon
  • Cite Count Icon 1124
  • 10.1103/revmodphys.92.025002
Secure quantum key distribution with realistic devices
  • May 26, 2020
  • Reviews of Modern Physics
  • Feihu Xu + 4 more

  • 10.1364/acpc.2016.af2a.139
Key Programmable Optical Networks (KPON) with OpenFlow-based Key Distribution
  • Jan 1, 2016
  • Yongli Zhao + 2 more

  • Cite Count Icon 245
  • 10.1109/comst.2022.3144219
The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet
  • Jan 1, 2022
  • IEEE Communications Surveys & Tutorials
  • Yuan Cao + 5 more

  • Cite Count Icon 1146
  • 10.1109/surv.2013.013013.00155
Virtual Network Embedding: A Survey
  • Jan 1, 2013
  • IEEE Communications Surveys & Tutorials
  • Andreas Fischer + 4 more

  • Open Access Icon
  • Cite Count Icon 34
  • 10.1109/jlt.2016.2522823
Dynamic Virtual Network Reconfiguration Over SDN Orchestrated Multitechnology Optical Transport Domains
  • Jan 28, 2016
  • Journal of Lightwave Technology
  • Alejandro Aguado + 15 more

  • Cite Count Icon 138
  • 10.1109/tnet.2016.2533625
Novel Location-Constrained Virtual Network Embedding LC-VNE Algorithms Towards Integrated Node and Link Mapping
  • Dec 1, 2016
  • IEEE/ACM Transactions on Networking
  • Long Gong + 3 more

  • Cite Count Icon 5
  • 10.1109/tnet.2023.3256409
On the Multilayer Planning of Filterless Optical Networks With OTN Encryption
  • Dec 1, 2023
  • IEEE/ACM Transactions on Networking
  • Qian Lv + 1 more

  • Open Access Icon
  • Cite Count Icon 92
  • 10.1364/oe.21.005487
Experimental demonstration of an OpenFlow based software-defined optical network employing packet, fixed and flexible DWDM grid technologies on an international multi-domain testbed
  • Feb 27, 2013
  • Optics Express
  • M Channegowda + 17 more

  • Open Access Icon
  • Cite Count Icon 8
  • 10.1109/jlt.2021.3119603
IF-Over-Fiber Transmission of OFDM Quantum-Noise Randomized PSK Cipher for Physical Layer Encryption of Wireless Signals
  • Mar 15, 2022
  • Journal of Lightwave Technology
  • Ken Tanizawa + 1 more

Similar Papers
  • Conference Article
  • Cite Count Icon 9
  • 10.1109/iccnc.2012.6167543
Isolation and resource efficiency of virtual optical networks
  • Jan 1, 2012
  • Marc De Leenheer + 3 more

Virtualization of optical networking infrastructure is considered a fundamental technology in the future Internet. A key principle is that virtual networks are isolated to coexist on a shared physical substrate without interference. Although a very attractive proposition for virtual network operators and users, in this paper we demonstrate that realizing complete isolation by partitioning resources is wasteful. Therefore, we propose to group virtual network requests in clusters: within a cluster, bandwidth can be shared, whereas different cluster are properly isolated. Results indicate that intelligent isolation and design of virtual networks can lead to substantial savings of optical network resources compared to a fully isolated approach. Finally, we demonstrate the trade-off between network resource utilization and control plane scalability.

  • Research Article
  • Cite Count Icon 42
  • 10.1364/jocn.5.00a162
Role of Optical Network Virtualization in Cloud Computing [Invited
  • Sep 19, 2013
  • Journal of Optical Communications and Networking
  • Shuping Peng + 2 more

New and emerging Internet applications are increasingly becoming high-performance and network-based, relying on optical network and cloud computing services. Due to the accelerated evolution of these applications, the flexibility and efficiency of the underlying optical network infrastructure as well as the cloud computing infrastructure [i.e., data centers (DCs)] become more and more crucial. In order to achieve the required flexibility and efficiency, coordinated provisioning of DCs and optical network interconnecting DCs is essential. In this paper, we address the role of high-performance dynamic optical networks in cloud computing environments. A DC as a service architecture for future cloud computing is proposed. Central to the proposed architecture is the coordinated virtualization of optical network and IT resources of distributed DCs, enabling the composition of virtual infrastructures (VIs). During the composition process of the multiple coexisting but isolated VIs, the unique characteristics of optical networks (e.g., optical layer constraints and impairments) are addressed and taken into account. The proposed VI composition algorithms are evaluated over various network topologies and scenarios. The results provide a set of guidelines for the optical network and DC infrastructure providers to be able to effectively and optimally provision VI services to users and satisfy their requirements.

  • Conference Article
  • 10.1117/12.916258
A distributed optical grid network infrastructure for future easy-to-use innovative network services
  • Nov 19, 2011
  • Sugang Xu + 2 more

Extending the researches on wavelength switched optical networks (WSON), efficient integration of the novel optical packet switching network and wavelength switching-based optical circuit switching network technologies which offers both best-effort packet delivery and QoS guaranteed lightpath services has been being studied. In addition, researches on the optical-layer transparent data processing, such as all-optical wavelength multicasting, all-optical 3R regeneration, etc, are conducted simultaneously. It is believed that future innovative optical network services (INSes) would be built on these novel future-proof technologies, and foster colorful applications in the new generation networks. Before the wide applications of INS in different fields, there would be a foreseeable strong requirement for INS firstly posed by pioneer grid applications, e.g., e-science, e-government, and e-banking, etc, which would require the high-performance underlying networks. Our research here is motivated to glue the optical networks and grid applications by integrating lightpath, geographically distributed INS systems and grid resources (e.g., computers, storages, instruments, etc.), and finally offering an easy-to-use high performance networked grid computing environment-optical grid network (OGN) to user applications. In this paper, we introduce our research activities of a distributed optical grid network infrastructure (OGNI), and the creation of the future easy-to-use INS based on OGNI. The proposals have been validated through fieldtrial experiments over a developed WSON testbed.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/cloudnet.2012.6483672
Strong virtual network authentication using EAP-TLS smart-cards
  • Nov 1, 2012
  • Fouad Amine Guenane + 1 more

The future Internet is a term commonly related to research topics on new architecture for Internet. In fact, the Internet of tomorrow will rely on virtualization and cloud networking, which open the door for new security threats and attacks and address many problems related to identification, authentication, secure data transfer, and privacy in virtual networks and clouds. The purpose of our work is to define an architecture for strong authentication and identity management in virtual networks using EAP-TLS smart cards technology. The architecture is based on a Grid of EAP-TLS smart cards, as an authentication server, able to manage users' access to their virtual networks by authenticating either the user and the virtual network.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/giis.2012.6466770
A strong authentication for virtual networks using EAP-TLS smart cards
  • Dec 1, 2012
  • Fouad Amine Guenane + 3 more

The future Internet is a term commonly related to research topics on new architecture for Internet. In fact, the Internet of tomorrow will rely on virtualization and cloud networking, which open the door for new security threats and attacks and address many problems related to identification, authentication, secure data transfer, and privacy in virtual networks and clouds. The purpose of our work is to define an architecture for strong authentication and identity management in virtual networks using EAP-TLS smart cards technology. The architecture is based on a Grid of EAP-TLS smart cards, as an authentication server, able to manage users' access to their virtual networks by authenticating either the user or the virtual network.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/icbaie52039.2021.9389947
Optical Network Virtual Mapping Method Based on Network Container
  • Mar 26, 2021
  • Anqin Luo + 3 more

With the rapid development of data center, cloud computing and Internet of things technology, the ossification of traditional optical network architecture is increasingly prominent. Virtual optical network services have the characteristics of business diversification and differentiation, which leads to the increasingly complex virtual mapping between virtual network and elastic optical network. At the same time, the virtual network and the physical network are not completely decoupled. The difference of physical network results in the limited flexibility of virtual network mapping and restricts the rapid deployment of virtual network services. In order to solve this problem, this paper proposes an optical network virtual method based on network container. Firstly, a three-tier architecture model of "virtual network layer, network container layer and physical network layer" is designed, and the network container and its generation rules are defined. Secondly, a virtual network service mapping method based on network container is proposed. Finally, the physical network resources of elastic optical network are virtualized into multiple differentiated network containers to realize the rapid mapping and flexible configuration of virtual network services and network containers.

  • Research Article
  • Cite Count Icon 5
  • 10.1016/j.optcom.2021.127693
Virtual optical network embedding of time-varying traffic in elastic optical networks
  • Dec 16, 2021
  • Optics Communications
  • Huanlin Liu + 5 more

Virtual optical network embedding of time-varying traffic in elastic optical networks

  • Research Article
  • Cite Count Icon 3
  • 10.1109/jlt.2015.2440394
A Wireless Link-Up Augmentation Design for Disaster-Resilient Optical Networks
  • Sep 1, 2015
  • Journal of Lightwave Technology
  • Yazan M Allawi + 2 more

In view of the increasing frequency and damage severity of disasters, network operators have become more concerned with providing disaster-resiliency measures for their optical network infrastructure, whereas mitigating network service interruption due to the disaster region failures in the optical physical medium merely by increasing network redundancy is deemed spatially inefficient and very costly, with recent advancements, wireless technology is a potential candidate solution for efficient medium diversification. This paper addresses the challenge of efficiently designing disaster-resilient wireless-link-augmented optical network infrastructure. We formulate this problem as an optimization model of finding the subset of links in an optical network topology whose wireless augmentation maximizes postdisaster recovery of overall network availability for a given budget constraint. To overcome the computational complexity of finding the optimal design solution, a novel greedy heuristic algorithm is proposed. Performance comparisons with an exhaustive enumeration search and simple heuristics demonstrate the efficiency and scalability of our heuristic algorithm.

  • Research Article
  • Cite Count Icon 39
  • 10.1186/s13174-014-0015-z
Virtual network security: threats, countermeasures, and challenges
  • Jan 27, 2015
  • Journal of Internet Services and Applications
  • Leonardo Richter Bays + 4 more

Network virtualization has become increasingly prominent in recent years. It enables the creation of network infrastructures that are specifically tailored to the needs of distinct network applications and supports the instantiation of favorable environments for the development and evaluation of new architectures and protocols. Despite the wide applicability of network virtualization, the shared use of routing devices and communication channels leads to a series of security-related concerns. It is necessary to provide protection to virtual network infrastructures in order to enable their use in real, large scale environments. In this paper, we present an overview of the state of the art concerning virtual network security. We discuss the main challenges related to this kind of environment, some of the major threats, as well as solutions proposed in the literature that aim to deal with different security aspects.

  • Conference Article
  • 10.1109/cobcom.2018.8443977
Optical Network Softwarization: Technologies, Trends and Challenges
  • Jul 1, 2018
  • Slavisa Aleksic

Nowadays, a high level of digitalization, transformation of the industry, machine-to-machine communication, and many other innovative commercial, industrial and private applications set very high requirements on the underlying optical network infrastructure. Mainly for this reason, optical networks are currently undergoing a radical change from traditional static architectures to more dynamic, flexible, and adaptable concepts. In order to optimally support the emerging applications, future optical networks should be able to provide rapid and on-demand provisioning of high data rates in a flexible and efficient manner. In this talk, we will discuss current trends and challenges in the areas of softwarization and virtualization of optical network infrastructure and review various emerging technologies and architectures for future high capacity, efficient, and flexible optical transport networks.

  • Book Chapter
  • 10.3233/faia241362
Comprehensive Fragmentation Awareness Enabled Virtual Network Mapping Scheme of Elastic Optical Networks
  • Dec 13, 2024
  • Yanhong Yin + 1 more

Amidst the surge in virtual network services, resource fragmentation issues have significantly escalated in elastic optical networks (EON). In response, this paper introduces an all-encompassing fragmentation probability model, incorporating both temporal and spectral dimensions. Furthermore, we present a virtual optical network mapping strategy within the EON framework, specifically tailored for edge computing applications. This strategy ensures minimal fragmentation across the entire EON, enabling effective and continuous virtual network deployment. Experimental results reveal that our proposed technique significantly reduces the incidence of blocking, markedly improving the support for virtual optical network services.

  • Conference Article
  • Cite Count Icon 39
  • 10.1109/ondm.2012.6210209
Optimal allocation of virtual optical networks for the future internet
  • Apr 1, 2012
  • A Pages + 5 more

Optical network infrastructures can be partitioned into multiple parallel, dedicated virtual networks for a physical infrastructure sharing purpose. However, different transport technologies may impact in both the amount and the characteristics of the different virtual instances that can be built on top of a single physical infrastructure. To analyse the impact of the transport technology in this regard, we present exact Integer Linear Programming (ILP) formulations that address the off-line problem of optimally allocate a set of virtual networks in two kind of substrates: wavelength switching and spectrum switching. Both formulations serve the purpose to provide opaque transport services from the virtual network point of view, where electronic terminations are assumed in the virtual network nodes. We carry out a series of experiments to validate the presented formulations and determine which is the impact of both substrates in the number of virtual networks that can be optimally allocated in the transport network.

  • Conference Article
  • Cite Count Icon 87
  • 10.1109/iccit.2010.5711022
Network security for virtual machine in cloud computing
  • Nov 1, 2010
  • Hanqian Wu + 3 more

Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on-demand resources and services over the Internet. Undoubtedly, one of the significant concerns in cloud computing is security. Virtualization is a key feature of cloud computing. In this paper, we focus on the security of virtual network in virtualized environment. First, we outline the security issues in virtual machines, and then security problems that exist in a virtual network are discussed and analyzed based on Xen platform. Finally this paper presents a novel virtual network framework aimed to control the inter-communication among virtual machines deployed in physical machines with higher security.

  • Conference Article
  • Cite Count Icon 3
  • 10.1109/iwcmc.2011.5982533
A Virtual Network topology security assessment
  • Jul 1, 2011
  • Process R Goyette + 1 more

Network virtualization is a concept in which a Virtual Network Provider constructs logical virtual networks for various clients on a common, virtualized infrastructure substrate. However, there is currently no general framework or benchmark for assessing the security properties of these logical networks within the context of network virtualization. In this paper, we describe a virtual network security assessment process in which a preference model is constructed over a select set of network element attributes. This preference model reflects the knowledge and experience of one or more security experts. The relevant attribute values are exposed during virtual network composition. Our process answers the question: “how does the security of my virtual network compare to an equivalent topology whose attribute values are most preferred by security experts?”

  • Conference Article
  • Cite Count Icon 12
  • 10.1109/icton.2013.6603032
Anycast end-to-end resilience for cloud services over virtual optical networks
  • Jun 1, 2013
  • Minh Bui + 2 more

Optical networks are crucial to support increasingly demanding cloud services. Delivering the requested quality of service is key to successfully provisioning end-to-end services in clouds. Therefore, as for traditional optical network services, it is of utter importance to guarantee that clouds are resilient to any failure of either network infrastructure or data centers. A crucial concept in establishing cloud services is that of network virtualization: the physical infrastructure is logically partitioned in separate virtual networks. Also, combined control of the network and data center (IT) resources is exploited. To guarantee end-to-end resilience for cloud services in such a set-up, we need to simultaneously route the services and map the virtual network, while ensuring that an alternate routing is always available. Note that the anycast routing concept applies: assigning server resources requested by the customer to a particular (physical) data center can be done transparently. This paper investigates the design of scalable optimization models to perform the virtual network mapping resiliently (for single bidirectional link failures), thus supporting resilient anycast cloud virtual networks. We compare two resilience approaches: PIP-resilience maps each virtual link to two alternate physical routes, VNO-resilience provides alternate paths in the virtual topology (while enforcing physical link disjointness).

More from: Entropy (Basel, Switzerland)
  • Research Article
  • 10.3390/e27101077
A Bayesian Model for Paired Data in Genome-Wide Association Studies with Application to Breast Cancer.
  • Oct 18, 2025
  • Entropy (Basel, Switzerland)
  • Yashi Bu + 3 more

  • Research Article
  • 10.3390/e27101071
Impact of Homophily in Adherence to Anti-Epidemic Measures on the Spread of Infectious Diseases in Social Networks.
  • Oct 15, 2025
  • Entropy (Basel, Switzerland)
  • Piotr Bentkowski + 1 more

  • Front Matter
  • 10.3390/e27101074
Advances in Quantum Computation in NISQ Era.
  • Oct 15, 2025
  • Entropy (Basel, Switzerland)
  • Xu-Dan Xie + 3 more

  • Research Article
  • 10.3390/e27101065
High-Efficiency Lossy Source Coding Based on Multi-Layer Perceptron Neural Network.
  • Oct 14, 2025
  • Entropy (Basel, Switzerland)
  • Yuhang Wang + 5 more

  • Research Article
  • 10.3390/e27101069
A Decision Tree Classification Algorithm Based on Two-Term RS-Entropy.
  • Oct 14, 2025
  • Entropy (Basel, Switzerland)
  • Ruoyue Mao + 2 more

  • Research Article
  • 10.3390/e27101058
Exploring Ohm's Law: The Randomness of Determinism.
  • Oct 11, 2025
  • Entropy (Basel, Switzerland)
  • Angel Cuadras + 2 more

  • Discussion
  • 10.3390/e27101050
Comment on Cimmelli, V.A. Interpretation of Second Law of Thermodynamics in Extended Procedures for the Exploitation of the Entropy Inequality: Korteweg Fluids and Strain-Gradient Elasticity as Examples. Entropy 2024, 26, 293.
  • Oct 10, 2025
  • Entropy (Basel, Switzerland)
  • Samuel Paolucci

  • Research Article
  • 10.3390/e27101049
Study on a Fault Diagnosis Method for Heterogeneous Chiller Units Based on Transfer Learning.
  • Oct 9, 2025
  • Entropy (Basel, Switzerland)
  • Qiaolian Feng + 6 more

  • Research Article
  • 10.3390/e27101042
Secure Virtual Network Provisioning over Key Programmable Optical Networks.
  • Oct 7, 2025
  • Entropy (Basel, Switzerland)
  • Xiaoyu Wang + 3 more

  • Research Article
  • 10.3390/e27101039
The Amount of Data Required to Recognize a Writer's Style Is Consistent Across Different Languages of the World.
  • Oct 4, 2025
  • Entropy (Basel, Switzerland)
  • Boris Ryabko + 3 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon