Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 786493, 7 pages
http://dx.doi.org/10.1155/2014/786493
Research Article

Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

Department of Electronics and Communication Engineering, St. Joseph’s College of Engineering, Chennai 600119, Tamil Nadu, India

Received 21 August 2013; Accepted 21 October 2013; Published 22 January 2014

Academic Editors: C. Gao and P. P. Monteiro

Copyright © 2014 A. M. Balamurugan and A. Sivasubramanian. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. Chlamtac, A. Ganz, and G. Karmi, “Lightpath communications: an approach to high bandwidth optical WAN's,” IEEE Transactions on Communications, vol. 40, no. 7, pp. 1171–1182, 1992. View at Publisher · View at Google Scholar · View at Scopus
  2. C. Qiao and M. Yoo, “Optical Burst Switching (OBS)—a new paradigm for an optical internet,” Journal of High Speed Networks, vol. 8, no. 1, pp. 69–84, 1999. View at Google Scholar · View at Scopus
  3. A. M. Balamurugan and A. Sivasubramanian, “Optical burst switching issues and its features,” International Journal of Emerging Trends & Technology in Computer Science, vol. 2, no. 3, pp. 306–315, 2013. View at Google Scholar
  4. F. Haselton, “A PCM frame switching concept leading to burst switching network architecture,” IEEE Communications Magazine, vol. 21, no. 6, pp. 13–19, 1983. View at Publisher · View at Google Scholar · View at Scopus
  5. K. Koduru, New contention resolution techniques for optical burst switching [M.S. thesis], Louisiana State University, Baton Rouge, La, USA, 2005.
  6. R. Lamba and G. A. Kumar, “Survey on contention resolution techniques for optical burst switching networks,” International Journal of Engineering Research and Applications, vol. 2, no. 1, pp. 956–961, 2012. View at Google Scholar
  7. C. Gauger, K. Dolzer, J. Späth, and S. Bodamer, “Service differentiation in optical burst switching networks,” Photonic Networks, pp. 12–13, 2001. View at Google Scholar
  8. Y. Chen, P. K. Verma, and S. Kak, “Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks,” Security and Communication Networks, vol. 2, no. 6, pp. 546–554, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. N. Sreenath, K. Muthuraj, and G. V. Kuzhandaivelu, “Threats and vulnerabilities on TCP/OBS networks,” in Proceedings of the International Conference on Computer Communication and Informatics (ICCCI '12), pp. 1–5, January 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, “Optical layer security in fiber-optic networks,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 725–736, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. P. D. Townsend, S. J. D. Phoenix, K. J. Blow, and S. M. Barnett, “Design of quantum cryptography systems for passive optical networks,” Electronics Letters, vol. 30, no. 22, pp. 1875–1877, 1994. View at Publisher · View at Google Scholar · View at Scopus
  12. C. H. Bennet and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179, Bangalore, India, December 1984.
  13. A. Mousa, “Data encryption performance based on Blowfish,” in Proceedings of the 47th International Symposium Electronics in Marine (Elmar '05), pp. 131–134, Zadar, Croatia, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Mousa and A. Hamad, “Evaluation of the RC4 algorithm for data encryption,” International Journal of Computer Science & Applications, vol. 3, no. 2, pp. 44–56, 2006. View at Google Scholar
  15. N. Singhal and J. P. S. Raina, “Comparative analysis of AES and RC4 algorithms for better utilization,” International Journal of Computer Trends and Technology, pp. 177–181, 2011. View at Google Scholar
  16. S. M. Seth and R. Mishra, “Comparative analysis of encryption algorithms for data communication,” International Journal of Computer Science and Technology, vol. 2, no. 2, pp. 292–294, 2011. View at Google Scholar