Advanced Search
Turn off MathJax
Article Contents
LIU Huanlin, AN Dongxin, CHEN Yong, CHEN Haonan, MA Bing, ZOU Jiachen. Multi-path Resource Allocation for Confidential Services Based on Network Coding and Fragmentation Awareness in EONs[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251222
Citation: LIU Huanlin, AN Dongxin, CHEN Yong, CHEN Haonan, MA Bing, ZOU Jiachen. Multi-path Resource Allocation for Confidential Services Based on Network Coding and Fragmentation Awareness in EONs[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251222

Multi-path Resource Allocation for Confidential Services Based on Network Coding and Fragmentation Awareness in EONs

doi: 10.11999/JEIT251222 cstr: 32379.14.JEIT251222
Funds:  The National Natural Science Foundation of China (51977021), 2025 Scientific Research Fund for High-level Talents by Chongqing Institute of Engineering(2025gcky01)
  • Received Date: 2025-11-16
  • Accepted Date: 2026-02-05
  • Rev Recd Date: 2026-02-05
  • Available Online: 2026-02-16
  •   Objective  Each fiber in Elastic Optical Networks (EONs) provides enormous bandwidth capacity and carries a large volume of services and data. If any element in EONs is eavesdropped on or attacked, even for a short period, a large amount of data may be leaked or lost, which significantly reduces network performance. Moreover, confidential services are increasingly sensitive to data leakage and loss during transmission. Network attacks may therefore compromise a large number of confidential services. Network Coding (NC) combines data from different services using the XOR operation and transmits the coded data through EONs. Decoding is then performed at the receiver to recover the original information, providing a potential method to mitigate data eavesdropping during transmission. However, NC requires encryption constraints in EONs. Specifically, the routing and Frequency Slot (FS) allocation of other services must overlap with those of the confidential service to be encrypted. Therefore, routing and spectrum allocation for confidential services should consider both NC constraints and the efficiency of resource allocation.  Methods  A Multi-path Resource Allocation based on Network Coding and Fragmentation Awareness (MRA-NCFA) method is proposed to support secure and reliable transmission of confidential services under eavesdropping attacks. First, the proposed method applies NC to encrypt service data and adopts multi-path protection to improve transmission reliability. Second, in the routing stage, different strategies are designed for confidential and non-confidential services. For non-confidential services, the objective is to balance network load and improve resource utilization. A path weight function based on path load is designed. This function considers path hop count, the maximum idle spectrum block on the path, and the required FS of the service. The path with the largest function value is selected as the transmission path. For confidential services, routing selection focuses on preventing information leakage while considering path resource availability. Therefore, a path cost function based on eavesdropping probability is designed, and a routing strategy that considers this probability is adopted. Finally, different resource allocation strategies are applied. For non-confidential services, the objective is to maximize spectrum efficiency. Spectrum fragmentation should be minimized to maintain resource continuity and consistency. Therefore, a fragmentation-aware spectrum allocation strategy is designed. A fragmentation measurement formula evaluates the effect of service allocation on link resources. For confidential services, encryption constraints and FS matching must be satisfied. Therefore, a spectrum allocation strategy based on FS and fragmentation sensing is designed. This strategy considers both the effect of spectrum fragments and the effect of established service resources, which improves transmission security for confidential services.  Results and Discussions  The proposed MRA-NCFA algorithm achieves the lowest service blocking probability (Fig. 2). During routing selection, both confidential and non-confidential services consider path resource conditions. During resource allocation, fragmentation effects are also considered, which preserves idle resources for subsequent services as much as possible. In addition, confidential services adopt a multi-path transmission method. Large services can be divided into multiple sub-services, which improves spectrum resource utilization. As the number of services increases, the spectrum utilization of the MRA-NCFA algorithm improves significantly. This improvement results from the multi-path transmission mechanism, which divides large services into smaller ones and allows efficient use of small spectrum fragments. In addition, both confidential and non-confidential services consider path resource quantity during routing and prefer paths with lower spectrum consumption. During resource allocation, fragmentation effects are considered to avoid generating new fragments, which improves spectrum utilization (Fig. 3). As the number of services increases, the proposed MRA-NCFA algorithm shows the slowest and smallest increase in spectrum fragmentation ratio compared with the other two algorithms. This result occurs because the algorithm combines multi-path transmission with fragmentation-aware resource allocation, which improves the utilization of small spectrum fragments and reduces fragmentation in EONs. Moreover, both confidential and non-confidential services consider fragmentation effects during resource allocation and apply strategies to reduce fragmentation. Therefore, the proposed algorithm performs better than the Survivable Multipath Fragmentation-Sensitive Fragmentation-Aware Routing and Spectrum Assignment (SM-FSFA-RSA) algorithm and the Network Coding-based Routing and Spectrum Allocation (NC-RSA) algorithm (Fig. 4).  Conclusions  This study examines resource allocation for services that require protection against eavesdropping attacks in elastic optical networks. The objective is to satisfy the security requirements of confidential services and reduce spectrum fragmentation. The proposed MRA-NCFA algorithm applies NC to encrypt confidential services and adopts multi-path protection to improve transmission reliability. For non-confidential services, a path weight function based on path resources is designed for routing selection, and fragmentation-aware spectrum metrics are used for resource allocation. For confidential services, a path cost function that considers both path resources and eavesdropping probability is designed for routing selection. A bandwidth segmentation strategy based on eavesdropping probability supports multi-path transmission, and an FS and fragmentation sensing function based on encryption constraints is used for spectrum allocation. These mechanisms improve both reliability and security for confidential services. As the number of security-sensitive services on the Internet increases, the proposed MRA-NCFA algorithm can effectively reduce traffic blocking probability and improve spectrum resource utilization.
  • loading
  • [1]
    徐勇军, 李晶, 骆东鑫, 等. 近场通信物理层安全技术综述[J]. 电子与信息学报, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.

    XU Yongjun, LI Jing, LUO Dongxin, et al. A survey on physical layer security in near-field communication[J]. Journal of Electronics & Information Technology, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.
    [2]
    黄蔚亮, 李锦煊, 余志文, 等. 确定性网络: 架构、关键技术和应用[J]. 重庆邮电大学学报: 自然科学版, 2025, 37(1): 1–16. doi: 10.3979/j.issn.1673-825X.202409020229.

    HUANG Weiliang, LI Jinxuan, YU Zhiwen, et al. Deterministic networks: Standards, architectures and applications[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2025, 37(1): 1–16. doi: 10.3979/j.issn.1673-825X.202409020229.
    [3]
    刘焕淋, 张建剑, 陈勇, 等. 弹性光网络中基于频谱窗滑动的时变业务共享保护方法[J]. 电子与信息学报, 2023, 45(10): 3694–3701. doi: 10.11999/JEIT221406.

    LIU Huanlin, ZHANG Jianjian, CHEN Yong, et al. A time-varying traffic sharing protection based on spectrum window sliding in elastic optical networks[J]. Journal of Electronics & Information Technology, 2023, 45(10): 3694–3701. doi: 10.11999/JEIT221406.
    [4]
    刘焕淋, 谭明明, 任杰, 等. 基于频谱切片的弹性光网络中可调度请求资源分配算法[J]. 重庆邮电大学学报: 自然科学版, 2023, 35(2): 286–293. doi: 10.3979/j.issn.1673-825X.202201050007.

    LIU Huanlin, TAN Mingming, REN Jie, et al. Resource allocation algorithm for scheduled lightpath demands in elastic optical networks based on spectrum slicing[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2023, 35(2): 286–293. doi: 10.3979/j.issn.1673-825X.202201050007.
    [5]
    SAVVA G, MANOUSAKIS K, and ELLINAS G. Confidentiality meets protection in elastic optical networks[J]. Optical Switching and Networking, 2021, 42: 100620. doi: 10.1016/j.osn.2021.100620.
    [6]
    ZOU Yucong, CAI Xiaofeng, ZHU Min, et al. Nonlinear impairment-aware RMSA under the sliding scheduled traffic model for EONs based on deep reinforcement learning[J]. Journal of Lightwave Technology, 2023, 41(22): 6854–6864. doi: 10.1109/JLT.2023.3299272.
    [7]
    SAVVA G, MANOUSAKIS K, and ELLINAS G. A network coding optimization approach for physical layer security in elastic optical networks[J]. IEEE Transactions on Network and Service Management, 2025, 22(2): 1145–1159. doi: 10.1109/TNSM.2024.3498108.
    [8]
    LIU Huanlin, TANG Chang, CHEN Yong, et al. A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks[J]. Computer Communications, 2023, 204: 78–88. doi: 10.1016/j.comcom.2023.03.025.
    [9]
    XU He, WANG Hongxiang, and JI Yuefeng. Secure and efficient resource allocation for anti-eavesdropping in MCF-based SDM-EONs[C]. Proceedings of 2021 Asia Communications and Photonics Conference, Shanghai, China, 2021: 1–3.
    [10]
    赵夙, 王伟, 朱晓荣, 等. 基于自适应网络编码的异构无线链路并发传输控制方法研究[J]. 电子与信息学报, 2022, 44(8): 2777–2784. doi: 10.11999/JEIT210520.

    ZHAO Su, WANG Wei, ZHU Xiaorong, et al. Research on concurrent transmission control of heterogeneous wireless links based on adaptive network coding[J]. Journal of Electronics & Information Technology, 2022, 44(8): 2777–2784. doi: 10.11999/JEIT210520.
    [11]
    ARABUL E, OLIVEIRA R D, EMAMI A, et al. 100 Gbps quantum-secured and O-RAN-enabled programmable optical transport network for 5G fronthaul[J]. Journal of Optical Communications and Networking, 2023, 15(8): C223–C231. doi: 10.1364/JOCN.483644.
    [12]
    HAI D T. On routing, wavelength, network coding assignment, and protection configuration problem in optical-processing-enabled networks[J]. IEEE Transactions on Network and Service Management, 2023, 20(3): 2504–2514. doi: 10.1109/TNSM.2023.3283880.
    [13]
    HU Liyazhou, WANG Wei, PAN Yuanyuan, et al. Security enhanced routing and spectrum allocation against crosstalk attacks for confidential lightpath in elastic optical networks[J]. Optics Express, 2024, 32(5): 7254–7275. doi: 10.1364/OE.511055.
    [14]
    刘焕淋, 邓棣, 陈勇, 等. 基于网络编码的机密业务多路径光传输方法[J]. 电子学报, 2024, 52(9): 3272–3277. doi: 10.12263/DZXB.20230856.

    LIU Huanlin, DENG Di, CHEN Yong, et al. A network coding-based multipath optical transmission method for secret traffic[J]. Acta Electronica Sinica, 2024, 52(9): 3272–3277. doi: 10.12263/DZXB.20230856.
    [15]
    LIU Huanlin, HUO Xingji, CHEN Yong, et al. Shared protection survivable multipath-based VONE in EONs integrated with QKD[J]. Journal of Lightwave Technology, 2024, 42(17): 5800–5807. doi: 10.1109/JLT.2024.3406349.
    [16]
    YU Mingxuan, JIANG Jing, SHANG T, et al. A load balancing and time-frequency fragmentation-aware algorithm for elastic optical network[C]. Proceedings of 2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings, Wuhan, China, 2023: 1–5. doi: 10.1109/ACP/POEM59049.2023.10369171.
    [17]
    SRIVASTAVA R and SINGH Y N. A novel fragmentation metric and fragmentation-aware adaptive routing and spectrum allocation algorithm in elastic optical network[J]. Optical Fiber Technology, 2025, 94: 104318. doi: 10.1016/j.yofte.2025.104318.
    [18]
    张盛峰, 陈会丹, 彭樱. SDM-EON中基于串扰避免的多纤芯分配算法[J]. 重庆邮电大学学报: 自然科学版, 2023, 35(1): 23–30. doi: 10.3979/j.issn.1673-825X.202109190334.

    ZHANG Shengfeng, CHEN Huidan, and PENG Ying. Multi-core assignment algorithm based on crosstalk-avoiding in space division multiplexing elastic optical networks[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2023, 35(1): 23–30. doi: 10.3979/j.issn.1673-825X.202109190334.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(4)

    Article Metrics

    Article views (117) PDF downloads(14) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return