Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring

Citation

Siew, Hong Wei and Tan, Saw Chin and Lee, Ching Kwang (2016) Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. Lecture Notes in Computer Science, 10060. pp. 137-150. ISSN 0302-9743

[img] Text
114.pdf
Restricted to Repository staff only

Download (1MB)

Abstract

In this article, a multiple crosstalk attacks source identification algorithm under sparse monitoring called Masking algorithm is proposed where the placement of monitors is selected based on the Greedy sparse monitor placement algorithm. The result obtained show that the proposed algorithm successfully identifies multiple sources of crosstalk attack under worst case scenario of 3-level crosstalk attack propagation model in 8-node Grid and Europe 11-node COST239 networks.

Item Type: Article
Uncontrolled Keywords: Identification and localization algorithm, Multiple crosstalk attacks, Sparse monitoring, Optical network, Security
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
Divisions: Faculty of Computing and Informatics (FCI)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 09 Feb 2018 10:30
Last Modified: 09 Feb 2018 10:30
URII: http://shdl.mmu.edu.my/id/eprint/6674

Downloads

Downloads per month over past year

View ItemEdit (login required)