Internet DRAFT - draft-li-rtgwg-photonic-firewall-rsa
draft-li-rtgwg-photonic-firewall-rsa
rtgwg X. Li
Internet Draft L. Zhang
Intended status: Informational Y. Tang
Expires: January 2023 Z. Shi
S. Huang
BUPT
June 30, 2022
Photonic firewall oriented routing and spectrum allocation strategy
in optical networks
draft-li-rtgwg-photonic-firewall-rsa-03.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Li, et al. Expires January 1, 2023 [Page 1]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
This Internet-Draft will expire on January 1, 2023.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Abstract
The photonic firewall oriented routing and spectrum allocation
strategy in elastic optical networks is proposed. For the security
detecting requirement, each light-path should pass through at least a
photonic firewall. To reduce the blocking rate and improve the
spectrum efficiency, the whole network is divided into several parts
according to the locations of all deployed photonic firewalls. A
photonic firewall is responsible for the security detecting for each
part. This strategy has a low complexity and is suitable for large-
scale optical networks.
Table of Contents
1. Introduction....................................................3
2. Conventions used in this document...............................4
3. Motivation......................................................4
4. Photonic Firewall Oriented Routing and Spectrum Allocation
Strategy...........................................................4
4.1. Photonic Firewall.........................................4
4.2. Secure Connection Establishment Requirement...............6
4.3. Photonic Firewall oriented Routing and Spectrum Allocation
Strategy.......................................................6
5. Security Considerations.........................................7
6. IANA Considerations.............................................7
7. References......................................................7
7.1. Normative References......................................7
7.2. Informative References....................................8
Li, et al. Expires January 1, 2023 [Page 2]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
1. Introduction
This document describes the photonic firewall oriented routing and
spectrum allocation strategy in optical networks. Optical networks
which take advantages of high-speed and large-capacity has been
widely applied to access, backbone transmission, data center
interconnection, inter-satellite link, etc. Many new technologies are
emerging with the aim of improving the capacity of optical fiber,
such as optical orthogonal frequency division multiplexing (O-OFDM)
and space division multiplexing (SDM). The accommodated traffic is
booming, and more services are emerging, such as cloud computing, big
data, augmented reality, and virtual reality. Since the accommodated
traffic is very large, the secure transmission becomes more and more
important. Due to the large amount of transmission information, wide
coverage, and QoT sensitivity, optical networks are highly vulnerable
to eavesdropping and attacks. The common attacks exist in optical
networks can be simply divided into two parts. One aims for optical
device and the other aims for network management. Attacks for optical
fiber include eavesdropping, interception, in-band interference,
signal delays [Fok2011]. To ensure secure data transmission, some
security technologies such as optical encryption, quantum key
distribution, chaotic encryption, node/line reinforcement, optical
steganography [Wang2010], etc., have been proposed. These
technologies help to ensure the confidentiality and integrity of data
transmission over optical networks. However, when invasions and
attacks are hidden in the transmitted data, these technologies are
useless. Photonic firewall is an important network security device.
It leverages the all-optical pattern matching to directly identify
the signals in the optical domain, then distinguish hidden network
intrusions and attacks, and finally selects corresponding defense
means according to the set security policy. Thus, it can directly
realize intrusion detection and security protection in the optical
domain. Since the processing rate of the photonic firewall is far
great than that of the electronic firewall, a photonic firewall can
replace tens of thousands of electronic firewalls. In future, we
believe the photonic firewall can be widely used in the optical
backbone network, optical access network, optical datacenter network,
etc. A photonic firewall is composed of multiple all-optical logic
gate, regenerators, optical amplifiers, etc. The cost of the photonic
firewall is very high. In the early stage, the photonic firewall can
only be deployed just in a few places. To ensure each established
light-path can be obtained the security detecting, the photonic
firewall oriented routing and spectrum allocation strategy should be
designed. To avoid the traffic congestion on some fiber links or a
certain photonic firewall, we divide the whole topology into several
parts according to the number of and the locations of all deployed
Li, et al. Expires January 1, 2023 [Page 3]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
photonic firewalls. A photonic firewall is responsible for the
security detecting for each connection in the each part.
2. Conventions used in this document
This document makes use of the following acronyms:
QoT: Quality of Transmission
AI: Artificial Intelligence
SDM: Space Division Multiplexing
O-OFDM: Optical Orthogonal Frequency Division Multiplexing
In this document, these words will appear with that interpretation
only when in ALL CAPS. Lower case uses of these words are not to be
interpreted as carrying significance described in RFC 2119 [RFC2119].
3. Motivation
Photonic firewall can directly realize the intrusion detection and
security protection in optical domain. A photonic firewall can
replace tens of thousands of electronic firewalls. Since the cost of
the photonic firewall is very high, it can only be deployed just in a
few places. In order to ensure that each established light-path can
be obtained the security detecting, the photonic firewall oriented
routing and spectrum allocation strategy should be designed for each
user request. The strategy has a low complexity and is suitable for
large-scale optical networks.
4. Photonic Firewall Oriented Routing and Spectrum Allocation Strategy
This section first gives introduce the photonic firewall and its
applications in optical networks. Then, the secure connection
establishment requirement is elaborated. At last, the photonic
firewall oriented routing and spectrum allocation strategy is
elaborated.
4.1. Photonic Firewall
Photonic firewall is an optical network device. It leverages the all-
optical pattern matching to directly identify the signals in the
optical domain, and then distinguish hidden network intrusions and
Li, et al. Expires January 1, 2023 [Page 4]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
attacks. It selects corresponding defense means according to the set
security policy. As presented in Figure 1, it can be deployed in the
important optical switching node, gateway node, or access node. The
all-optical pattern recognition is the core part of photonic
firewall. It is composed of one all-optical XNOR gate, all-optical
AND gate, and a regenerator, as shown in Figure 2.
+------------------------+ +---------------------+
| | | |
| IP/Ethernet | | Optical Network |
| | | |
| +--------|--------+ +-----|-----------+ |
+------------------------+ | | +---------------------+
| Core Router | |Photonic Firewall|
|Photonic Firewall| | |
| +-------------------------+ |
+----|------------+ +------|----------+
| |
| Optical Network |
| |
| |
+-------------------------+
Photonic Firewall Applications
Loop
--<---
| nT |
-->--- +------+
Data sequence------------>| | +------+
Probe-------------------->| XNOR |----------->| AND |------->Output
Target sequence---------->| | ---->---->| | |
+------+ | | +------+ |
| | |
| | Recirculating |
Initialing signal | Loop |
| --<--- |
| |(n+1)T| |
| -->--- |
| +-----------+ |
|--|Regenerator|<-|
+-----------+
All-optical pattern matching
Li, et al. Expires January 1, 2023 [Page 5]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
4.2. Secure Connection Establishment Requirement
For the security detecting requirement, each light-path should pass
through at least a photonic firewall. As presented in Fig. 3, three
photonic firewalls are deployed in nodes A, F, and D. There are
three light-paths are established in the network (B->A->G, G->F->C,
and E->D->C). Each light-path passes through a photonic firewall.
+---+ +---+
| B |--------------| C |
/+---+ /+---+\
/ / \ / A A \
/ / \ / / \ \
/ / \ / / \ \
/ / \ / +----+ \ \
+----+ / / \ / /| PF | \ \ +----+
| PF |+---+/ +---+ +----+ \+---+| PF |
+----+| A X--------------| F/|--------------X D |+----+
+---+\ +---+ /+---+
\ \ / / \ / /
\ \ / / \ / /
\ \ / / \ / /
\ \ / / \ / /
\ V / / \ / /
\+---+/ +---+/
| G |-------------| E |
+---+ +---+
Secure Connection Establishment (PF denotes photonic
firewall)
4.3. Photonic Firewall oriented Routing and Spectrum Allocation Strategy
The photonic firewall oriented routing and spectrum allocation
strategy adopts the greedy strategy. For each user, it calculates
the closest photonic firewall. Thus, each photonic firewall has a
user set in which any user is closest to it. In other words, the
whole network is divided into several parts according to the
locations of all deployed photonic firewalls. When a new user
request arrive the network, the user first calculates the shortest
path to its closest photonic firewall, and then calculates the
shortest path from the photonic firewall to its destination.
Finally, the First-Fit algorithm is used to conduct spectrum
allocation on the two shortest paths.
Li, et al. Expires January 1, 2023 [Page 6]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
+--------------------+ +------------+
| +---+| / +---+ /
| | B |--------------| C | /
| /+---+| / /+---+\ /
| Area1 / / \ / / A A \ /
| / / |\ / / / \ \
| / / | \ / / / \ \ +------------+
| / / | \ / / +----+ / \ \ |
|+----+ / / | \/ / /| PF | / \ \ +----+ |
|| PF |+---+/ | /+---+ +----+/ / \+---+| PF | |
|+----+| A X--------------| F/|--------------X D |+----+ |
| +---+\ | / +---+ / / /+---+ |
+----------\-\-------+/ / / \ / / / / |
\ \ / / / \ / / / / |
\ \ / / / \/ / / / |
\ \ / / / /\ / / / Area3 |
\ V/ / / Area2 / \/ / / |
\+---+/ / /+---+/ |
/| G |-------------| E | |
/ +---+ / / +---+ |
+------------+ +--------------------------+
Photonic Firewall Area
As presented in Fig. 4, the whole network is divided into three
parts. In each part, a photonic firewall is responsible for the
security detecting for each user in this part. This strategy has a
low complexity and is suitable for large-scale optical networks.
5. Security Considerations
TBD
6. IANA Considerations
This document makes no request of IANA.
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Li, et al. Expires January 1, 2023 [Page 7]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
7.2. Informative References
[Fok2011] M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, "Optical
Layer Security in Fiber-Optic Networks", IEEE
Transactions On Information Forensics and Security,
vol. 6, no. 3, pp. 725-736, 2011.
[Wang2010] Z. Wang, M. P. Fok, L. Xu, J. Chang, and P. R. Prucnal,
"Improving the privacy of optical steganography with
temporal phase masks", Opt. Express, vol. 18, no. 6, pp.
6079-6088, 2010.
Li, et al. Expires January 1, 2023 [Page 8]
Internet-DraftPhotonic firewall oriented routing and spectrum allocation
strategy in optical networks June 2022
Authors' Addresses
Xin Li
Beijing University of Posts and Telecommunications
10 Xitucheng Road, Haidian District, Beijing, China
Email: xinli@bupt.edu.cn
Lu Zhang
Beijing University of Posts and Telecommunications
10 Xitucheng Road, Haidian District, Beijing, China
Email: luzhang@bupt.edu.cn
Ying Tang
Beijing University of Posts and Telecommunications
10 Xitucheng Road, Haidian District, Beijing, China
Email: ytang@bupt.edu.cn
Zicheng Shi
Beijing University of Posts and Telecommunications
10 Xitucheng Road, Haidian District, Beijing, China
Email: zchshi@bupt.edu.cn
Shanguo Huang
Beijing University of Posts and Telecommunications
10 Xitucheng Road, Haidian District, Beijing, China
Email: shghuang@bupt.edu.cn
Li, et al. Expires January 1, 2023 [Page 9]