{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:48:05Z","timestamp":1743018485715,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030446840"},{"type":"electronic","value":"9783030446857"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44685-7_8","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:01Z","timestamp":1595426821000},"page":"193-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security-Aware Carrier Network Planning"],"prefix":"10.1007","author":[{"given":"R\u00f3\u017ca","family":"Go\u015bcie\u0144","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Ellinas","sequence":"additional","affiliation":[]},{"given":"Marija","family":"Furdek","sequence":"additional","affiliation":[]},{"given":"Panayiotis","family":"Kolios","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Lechowicz","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Manousakis","sequence":"additional","affiliation":[]},{"given":"Giannis","family":"Savva","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Skorin-Kapov","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Walkowiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1049\/el:19970022","volume":"33","author":"F Adachi","year":"1997","unstructured":"Adachi F, Sawahashi M, Okawa K (1997) Tree-structured generation of orthogonal spreading codes with different lengths for forward link of DS-CDMA mobile radio. Electron Lett 33(1):27\u201328","journal-title":"Electron Lett"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Angelou M, Pointurier Y, Azodolmolky S, Careglio D, Spadaro S, Tomkos I (2011) A novel monitor placement algorithm for accurate performance monitoring in optical networks. In: 2011 IEEE\/OSA Optical Fiber Communication Conference","DOI":"10.1364\/NFOEC.2011.JWA053"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1364\/JOCN.4.000015","volume":"4","author":"M Angelou","year":"2012","unstructured":"Angelou M, Pointurier Y, Careglio D, Spadaro S, Tomkos I (2012) Optimized monitor placement for accurate QoT assessment in core optical networks. IEEE\/OSA J Opt Commun Netw 4(1):15\u201324","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Aparicio-Pardo R, Pavon-Marino P, Mukherjee B (2012) Robust upgrade in optical networks under traffic uncertainty. In: 2012 Optical Network Design and Modelling (ONDM), pp 1\u20136","DOI":"10.1109\/ONDM.2012.6210204"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.yofte.2017.10.004","volume":"40","author":"W Bai","year":"2018","unstructured":"Bai W, Yang H, Yu A, Xiao H, He L, Feng L, Zhang J (2018) Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks. Opt Fiber Technol 40:18\u201327","journal-title":"Opt Fiber Technol"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/JLT.2015.2480798","volume":"34","author":"Z Dong","year":"2016","unstructured":"Dong Z, Khan FN, Sui Q, Zhong K, Lu C, Lau APT (2016) Optical performance monitoring: a review of current and future technologies. IEEE\/OSA J Lightwave Technol 34(2):525\u2013543","journal-title":"IEEE\/OSA J Lightwave Technol"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Engelmann A, Jukan A (2016) Balancing the demands of reliability and security with linear network coding in optical networks. In: 2016 IEEE International Conference on Communication, pp 1\u20137","DOI":"10.1109\/ICC.2016.7511590"},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/JLT.2009.2039464","volume":"28","author":"R Essiambre","year":"2010","unstructured":"Essiambre R, Kramer G, Winzer PJ, Foschini GJ, Goebel B (2010) Capacity limits of optical fiber networks. J Lightwave Technol 28(4):662\u2013701","journal-title":"J Lightwave Technol"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2011.2141990","volume":"6","author":"MP Fok","year":"2011","unstructured":"Fok MP, Wang Z, Deng Y, Prucnal PR (2011) Optical layer security in fiber-optic networks. IEEE Trans Inf Forensics Secur 6(3):725\u2013736","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1364\/JOCN.2.001000","volume":"11","author":"M Furdek","year":"2010","unstructured":"Furdek M, Skorin-Kapov N, Grbac M (2010) Attack-aware wavelength assignment for localization of in-band crosstalk attack propagation. IEEE\/OSA J Opt Commun Netw 11(2):1000\u20131009","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.endm.2016.03.023","volume":"52","author":"R Go\u015bcie\u0144","year":"2016","unstructured":"Go\u015bcie\u0144 R, Walkowiak K, Klinkowski M (2016) ILP modelling and joint optimization of anycast and unicast traffic in survivable elastic optical networks. Electron Notes Discrete Math 52:173\u2013180","journal-title":"Electron Notes Discrete Math"},{"issue":"10","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/JLT.2018.2791103","volume":"36","author":"R Go\u015bcie\u0144","year":"2018","unstructured":"Go\u015bcie\u0144 R, Walkowiak K (2018) On the efficiency of survivable flex-grid SDM networks IEEE\/OSA. J Lightwave Technol 36(10):1815\u20131823","journal-title":"J Lightwave Technol"},{"key":"8_CR13","unstructured":"ITU-T Recommendation G.694.1 (ed. 2.0). Spectral grids for WDM applications: DWDM frequency grid, Feb 2012"},{"issue":"10","key":"8_CR14","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1364\/JOCN.9.000813","volume":"9","author":"J Ji","year":"2017","unstructured":"Ji J, Zhang G, Li W, Sun L, Wang K, Xu M (2017) Performance analysis of physical-layer security in an OCDMA-based wiretap channel. IEEE\/OSA J Opt Commun Netw 9(10):813\u2013818","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"issue":"11","key":"8_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2009.5307468","volume":"47","author":"M Jinno","year":"2009","unstructured":"Jinno M, Takara H, Kozicki B, Tsukishima Y, Sone Y, Matsuoka S (2009) Spectrum-efficient and scalable elastic optical path network: architecture, benefits, and enabling technologies. IEEE Commun Mag 47(11):66\u201373","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"8_CR16","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/MCOM.2010.5534599","volume":"48","author":"M Jinno","year":"2010","unstructured":"Jinno M, Kozicki B, Takara H, Watanabe A, Sone Y, Tanaka T, Hirano A (2010) Distance-adaptive spectrum resource allocation in spectrum-sliced elastic optical path network. IEEE Commun Mag 48(8):138\u2013145","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.osn.2011.06.008","volume":"8","author":"A Jirattigalachote","year":"2011","unstructured":"Jirattigalachote A, Skorin-Kapov N, Furdek M, Chen J, Monti P, Wosinska L (2011) Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks. Opt Switching Netw 8(4):249\u2013258","journal-title":"Opt Switching Netw"},{"issue":"21","key":"8_CR18","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/JLT.2011.2166248","volume":"29","author":"K Kitayama","year":"2011","unstructured":"Kitayama K, Sasaki M, Araki S, Tsubokawa M, Tomita A, Inoue K, Harasawa K, Nagasako Y, Takada A (2011) Security in photonic networks: threats and security enhancement. IEEE\/OSA J Lightwave Technol 29(21):3210\u20133222","journal-title":"IEEE\/OSA J Lightwave Technol"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Klinkowski, M., Lechowicz, P. Walkowiak, K.: Survey of resource allocation schemes and algorithms in spectrally-spatially flexible optical networking. Opt Switching Netw 27(C), 58\u201378 (2018)","DOI":"10.1016\/j.osn.2017.08.003"},{"issue":"6","key":"8_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MNET.2013.6678926","volume":"27","author":"M Klinkowski","year":"2013","unstructured":"Klinkowski M, Walkowiak K (2013) On the advantages of elastic optical networks for provisioning of cloud computing traffic. IEEE Netw 27(6):44\u201351","journal-title":"IEEE Netw"},{"issue":"11","key":"8_CR21","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1109\/JLT.2016.2551299","volume":"34","author":"PS Khodashenas","year":"2016","unstructured":"Khodashenas PS, Rivas-Moscoso JM, Siracusa D, Pederzolli F, Shariati B, Klonidis D, Salvadori E, Tomkos I (2016) Comparison of spectral and spatial super-channel allocation schemes for SDM networks. IEEE\/OSA J Lightwave Technol 34(11):2710\u20132716","journal-title":"IEEE\/OSA J Lightwave Technol"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Kronberger C, Schondienst T, Schupke D (2011) Impact and handling of demand uncertainty in multiperiod planned networks. In: 2011 IEEE International Conference on Communications, pp 1\u20136","DOI":"10.1109\/icc.2011.5962890"},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11107-005-2479-z","volume":"10","author":"D Leung","year":"2005","unstructured":"Leung D, Grover W (2005) Capacity planning of survivable mesh-based transport networks under demand uncertainty. Photonic Netw Commun 10(2):123\u2013140","journal-title":"Photonic Netw Commun"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Manousakis, K., Ellinas, G.: Minimizing the Impact of in-band jamming attacks in WDM optical networks. In: 2013 critical information infrastructures security, pp 38\u201349","DOI":"10.1007\/978-3-319-03964-0_4"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Manousakis K, Ellinas G (2015) Equalizer placement and wavelength selective switch architecture for optical network security. In: 2015 IEEE Symposium on Computers and Communication, pp 918\u2013923","DOI":"10.1109\/ISCC.2015.7405631"},{"issue":"2","key":"8_CR26","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.osn.2015.03.005","volume":"19","author":"K Manousakis","year":"2016","unstructured":"Manousakis K, Ellinas G (2016) Attack-aware planning of transparent optical networks. Opt Switching Netw 19(2):97\u2013109","journal-title":"Opt Switching Netw"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Manousakis K, Kolios P, Ellinas G (2017) Multi-period attack-aware optical network planning under demand uncertainty. Opt Fiber Wirel Commun","DOI":"10.5772\/intechopen.68491"},{"issue":"8","key":"8_CR28","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1109\/JSAC.2005.852182","volume":"23","author":"C Mas","year":"2005","unstructured":"Mas C, Tomkos I, Tonguz OK (2005) Failure location algorithm for transparent optical networks. IEEE J Sel Areas Commun 23(8):1508\u20131519","journal-title":"IEEE J Sel Areas Commun"},{"key":"8_CR29","unstructured":"Miller SK (2006) Fiber optic networks vulnerable to attack. Inf Secur Mag"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Monoyios D, Manousakis K, Christodoulou C, Hadjiantonis A, Vlachos K, Ellinas G (2016) Indirect crosstalk-aware routing and wavelength assignment in transparent optical networks with the use of Genetic Algorithms. In: 2016 International Conference on Transparent Optical Networks, pp 1\u20134","DOI":"10.1109\/ICTON.2016.7550355"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.osn.2018.03.003","volume":"29","author":"D Monoyios","year":"2018","unstructured":"Monoyios D, Manousakis K, Christodoulou C, Vlachos K, Ellinas G (2018) Attack-aware resource planning and sparse monitor placement in optical networks. Opt Switching Netw 29:46\u201356","journal-title":"Opt Switching Netw"},{"key":"8_CR32","volume-title":"Routing, flow and capacity design in communication and computer networks","author":"M Pi\u00f3ro","year":"2004","unstructured":"Pi\u00f3ro M, Medhi D (2004) Routing, flow and capacity design in communication and computer networks. Morgan Kaufmann, San Francisco"},{"issue":"9","key":"8_CR33","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1109\/JLT.2011.2110636","volume":"29","author":"O Rival","year":"2011","unstructured":"Rival O, Villares G, Morea A (2011) Impact of inter-channel nonlinearities on the planning of 25\u2013100Gb\/s elastic optical networks. IEEE\/OSA J Lightwave Technol 29(9):1326\u20131334","journal-title":"IEEE\/OSA J Lightwave Technol"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comcom.2018.05.013","volume":"126","author":"R Rumipamba-Zambrano","year":"2018","unstructured":"Rumipamba-Zambrano R, Moreno-Muro FJ, Perello J, Pavon-Marino P, Spadaro S (2018) Space continuity constraint in dynamic Flex-Grid\/SDM optical core networks: an evaluation with spatial and spectral super-channels. Comput Commun 126:38\u201349","journal-title":"Comput Commun"},{"issue":"4","key":"8_CR35","doi-asserted-by":"publisher","first-page":"2136","DOI":"10.1109\/COMST.2015.2466458","volume":"17","author":"GM Saridis","year":"2015","unstructured":"Saridis GM, Alexandropoulos D, Zervas G, Simeonidou D (2015) Survey and evaluation of space division multiplexing: from technologies to optical networks. IEEE Commun Surv Tutorials 17(4):2136\u20132156","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"3","key":"8_CR36","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/JSTQE.2014.2369507","volume":"21","author":"M Sasaki","year":"2015","unstructured":"Sasaki M, Fujiwara M, Jin RB, Takeoka M, Han TS, Endo H, Yoshino KI, Ochi T, Asami S, Tajima A (2015) Quantum photonic network: concept, basic tools, and future issues. IEEE J Sel Top Quant Electron 21(3):49\u201361","journal-title":"IEEE J Sel Top Quant Electron"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Savva G, Manousakis K, Ellinas G (2018) Eavesdropping-aware routing and spectrum allocation in EONs using spread spectrum techniques. In: 2018 IEEE Global Communication Conference, pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647253"},{"issue":"7","key":"8_CR38","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1364\/JOCN.11.000409","volume":"11","author":"G Savva","year":"2019","unstructured":"Savva G, Manousakis K, Ellinas G (2019) Eavesdropping-aware routing and spectrum\/code allocation in OFDM-based EONs using spread spectrum techniques. IEEE\/OSA J Opt Commun Netw 11(7):409\u2013421","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Savva G, Manousakis K, Ellinas G (2018) Spread spectrum over OFDM for enhanced security in elastic optical networks. In: 2018 IEEE Photonics in Switching and Computing, pp 1\u20133","DOI":"10.1109\/PS.2018.8751442"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Singh SK, Bziuk W, Jukan A (2016) Balancing data security and blocking performance with spectrum randomization in optical networks. In: 2016 IEEE Global Communication Conference, pp 1\u20137","DOI":"10.1109\/GLOCOM.2016.7841622"},{"key":"8_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05227-4","volume-title":"Optical network design and planning","author":"J Simmons","year":"2014","unstructured":"Simmons J (2014) Optical network design and planning, 2nd edn. Springer Publishing Company, Incorporated","edition":"2"},{"issue":"3","key":"8_CR42","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1109\/TNET.2009.2031555","volume":"18","author":"N Skorin-Kapov","year":"2010","unstructured":"Skorin-Kapov N, Chen J, Wosinska L (2010) A new approach to optical networks security: attack-aware routing and wavelength assignment. IEEE\/ACM Trans Netw 18(3):750\u2013760","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"3","key":"8_CR43","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.ejor.2012.05.022","volume":"222","author":"N Skorin-Kapov","year":"2012","unstructured":"Skorin-Kapov N, Furdek M, Pardo R, Pavon-Marino P (2012) Wavelength assignment for reducing in-band crosstalk attack propagation in optical networks: ILP formulations and heuristic algorithms. Eur J Oper Res 222(3):418\u2013429","journal-title":"Eur J Oper Res"},{"issue":"8","key":"8_CR44","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","volume":"54","author":"N Skorin-Kapov","year":"2016","unstructured":"Skorin-Kapov N, Furdek M, Zsigmond S, Wosinska L (2016) Physical-layer security in evolving optical networks. IEEE Commun Mag 54(8):110\u2013117","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"8_CR45","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1002\/sec.958","volume":"12","author":"N Skorin-Kapov","year":"2014","unstructured":"Skorin-Kapov N, Jirattigalachote A, Wosinska L (2014) An integer linear programming formulation for power equalization placement to limit jamming attack propagation in transparent optical networks. Secur Commun Netw 12(7):2463\u20132468","journal-title":"Secur Commun Netw"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Verbrugge S, Colle D, Pickavet M, Demeester P (2003) Common planning practices for network dimensioning under traffic uncertainty. In: 2003 Design of Reliable Communication Networks, pp 317\u2013324","DOI":"10.1109\/DRCN.2003.1275372"},{"key":"8_CR47","volume-title":"Modeling and optimization of cloud-ready and content-oriented networks","author":"K Walkowiak","year":"2016","unstructured":"Walkowiak K (2016) Modeling and optimization of cloud-ready and content-oriented networks, 1st edn. Springer, Berlin","edition":"1"},{"key":"8_CR48","doi-asserted-by":"publisher","first-page":"22","DOI":"10.15325\/BLTJ.2014.2347431","volume":"19","author":"PJ Winzer","year":"2014","unstructured":"Winzer PJ (2014) Spatial multiplexing in fiber optics: the 10X scaling of metro\/core capacities. Bell Labs Tech J 19:22\u201330","journal-title":"Bell Labs Tech J"}],"container-title":["Computer Communications and Networks","Guide to Disaster-Resilient Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44685-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T23:29:12Z","timestamp":1595460552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44685-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030446840","9783030446857"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44685-7_8","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}