Postdoc Associate, University of Rochester
We are working to enhance the security of data in all-optical domain to omit O-E-O conversion.
Due to tremendous growth in the volume of information exchange and strong demands in security and privacy, the issues of physical-layer confidentiality potentially supported by all-optical encryption/ decryption using logic gates and optical code division multiple access (OCDMA) have become an interesting research topic. On the other hand, the increasing demand of high speed forced the modern research trends to ultra-fast all-optical signal processing. All-optical signal processing enhances speed and capacity of the core optical networks by avoiding expensive, time consuming and power hungry optoelectronic conversions. Security as well as capacity in optical transmission link could become a critical issue for some applications such as military networks or enterprise networks. The security sensitive data such as military transactions, financial transactions, medical records, intellectual property etc., which is to be securely transmitted, is done through the internet. The exponential growth in information throughput on the internet increases the transmission of confidential and commercially sensitive data through optical networks. With this, the potential risk of security of this valuable information also increases as tapping of the optical signal from a fiber could be easily done by using inexpensive equipment. Physical layer security is thus becoming an impelling request in the next generation of optical networks. OCDMA technology is an attractive solution for these applications since it provides format-independent security in physical layer while guaranteeing appreciably wide bandwidth. Recently, studies discovered that OCDMA systems are vulnerable to eavesdropping and jamming attacks. The physical layer of the OCDMA network can be attacked by an eavesdropper to intercept the data and by launching an interferer signal to jam the system. A jamming attack can easily manipulate information being transmitted, if jamming signals have the same frequency band as data signals. In addition, the increase in the number of attacks as well as in diverse methods of the attacks which are becoming more difficult to defend makes information security a crucial issue in OCDMA networks. Also, the main degradation factor of an OCDMA system is multiple user interference, caused by the asynchronous transmission between the users and the superposition of the transmitting data in the fiber.
Abstract: Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Pub.: 18 May '17, Pinned: 28 Jun '17
Abstract: Publication date: Available online 9 December 2016 Source:Information & Management Author(s): Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno As organisations are developing people-centric security workplaces, where proactive security behaviours are fostered, it is important to understand more about the sources of security influence. This research applied social network analysis methods to investigate security influence within a large interior contractor in Vietnam. The findings revealed that security influence occurs between employees in the same department, particularly those in senior positions, have longer tenure or younger age. Engagement in daily work and security-related activities can also increase the likelihood of influencing security behaviours. Moreover, the security influence network is transitive and has a hierarchical structure.
Pub.: 12 Dec '16, Pinned: 28 Jun '17
Abstract: The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation's social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper proposes the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees' information security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is developed and presented.
Pub.: 23 Mar '17, Pinned: 28 Jun '17