Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In this paper, we investigate how data transmissions may be affected by various types of optical interference introduced into the fiber on purpose, via a clip-on coupler. The research proved that transmissions may be jammed completely using inexpensive equipment readily available on the market, provided that the attacker has physical access to the fiber optic cable. The most dangerous attacks rely on a typical, slowly modulated communication laser with a rectangular waveform. This study urges further research aimed at counteracting such attacks.
Rocznik
Tom
Strony
93--101
Opis fizyczny
Bibliogr. 25 poz., rys., wykr.
Twórcy
autor
- Faculty of Electronics and Information Technology Warsaw University of Technology, Warsaw, Poland
autor
- Faculty of Electronics and Information Technology Warsaw University of Technology, Warsaw, Poland
autor
- Faculty of Electronics and Information Technology Warsaw University of Technology, Warsaw, Poland
Bibliografia
- [1] Opterna and iDefence, “Threats to Fiber Optic Infrastructures”, A Blackhat Federal Briefing, Tech. Rep., 2003 [Online]. Available: https://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-gross-up.pdf
- [2] Delloite, “Tapping of Fiber Networks”, Deloitte Touche Tohmatsu Ltd., Tech. Rep., 2017 [Online]. Available: https://zybersafe.com/wordpress/wp-content/uploads/2017/04/Deloitte_Fiber_tapping_Q1_2017_English.pdf
- [3] M. Medard, D. Marquis, R.A. Barry, and S.G. Finn, “Security Issues in All-optical Networks”, IEEE Network, vol. 11, no. 3, pp. 42– 48, 1997 (https://doi.org/10.1109/65.587049).
- [4] T. Uematsu, H. Hirota, T. Kawano, T. Kiyokura, and T. Manabe, “Design of a Temporary Optical Coupler Using Fiber Bending for Traffic Monitoring”, IEEE Photonics Journal, vol. 9, no. 6, 2017 (https://doi.org/10.1109/JPHOT.2017.2762662).
- [5] H. Hirota et al., “Optical Cable Changeover Tool with Light Injection and Detection Technology”, Journal of Lightwave Technology, vol. 34, no. 14, pp. 3379 –3388, 2016 (https://doi.org/ 10.1109/JLT.2016.2568221).
- [6] Go4Fiber Ltd., “PFC 1000, Passive Fiber Clip-on Coupler”, Tech. Specification, Available: https://spec.go 4fiber.com/testing_equipment/pfc_1000.pdf
- [7] Fiber Optic Devices Ltd., “Clip-On Coupler FOD 5516”, Tech. Specification, Available: https://www.fods.com/pdf/4/ 5516DS.pdf
- [8] A. Salim, S.S. Carroll, and J. Atai, “Limits of Intrusion Detection Systems in a Gigabit Optical Link”, Optical Engineering, vol. 49, no. 4, pp. 1–4, 2010 (https://doi.org/10.1117/1.3407426).
- [9] C. Mendonca, M. Lima, and A. Teixeira, “Security Issue Due to Reflection in PON Physical Medium”, 14th International Conference on Transparent Optical Networks (ICTON), Coventry, UK, 2012 (https://doi.org/10.1109/ICTON.2012.6254487).
- [10] M.P. Fok, Z. Wang, Y. Deng, and P.R. Prucnal, “Optical Layer Security in Fiber-optic Networks”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 725–736, 2011 (https://doi.org/10.1109/TIFS.2011.2141990).
- [11] S. Yuan and D. Stewart, “Protection of Optical Networks Against Interchannel Eavesdropping and Jamming Attacks”, International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, 2014 (https://doi.org/ 10. 1109/CSCI.2014. 14).
- [12] S. Krishnan and A. Borude, “Security Issues in All-optical Networks”, Annual SRII Global Conference, San Jose, USA, 2011 (https: //doi.org/10.1109/SRII.2011.108).
- [13] R. Rejeb, M.S. Leeson, and R.J. Green, “Fault and Attack Management in All-optical Networks”, IEEE Communications Magazine, vol. 44 , no. 11, pp. 79–86, 2006 (https://doi.org/10.1109/MCOM.2006.248169).
- [14] D. Dahan and U. Mahlab, “Security Threats and Protection Procedures for Optical Networks”, IET Optoelectronics, vol. 11, no. 5, pp. 186 –200, 2017 (https://doi.org/10.1049/iet-opt.2016.0150).
- [15] T. Wu and A.K. Somani, “Cross-talk Attack Monitoring and Localization in All-optical Networks”, IEEE/ACM Transactions on Networking, vol. 13, no. 6, pp. 1390– 1401, 2005 (https://doi.org/10.1109/TNET.2005.860103).
- [16] Y. Peng, K. Long, Z. Sun, and S. Du, “Propagation of All-optical Crosstalk Attack in Transparent Optical Networks”, Optical Engineering, vol. 50, no. 8, 2011 (https://doi.org/ 10.1117/1.3607412).
- [17] T. Deng and S. Subramaniam, “Analysis of Optical Amplifier Gain Competition Attack in a Point-to-point WDM Link”, Proc. of SPIE, vol. 4874, pp. 249 –261, 2002 (https://doi.org/ 10. 1117/12.475302).
- [18] N.S. Kapov, M. Furdek, S. Zsigmond, and L. Wosinska, “Physical Layer Security in Evolving Optical Networks”, IEEE Communications Magazine, vol. 54 , no. 8, pp. 110– 117, 2016 (https://doi.org/10.1109/MCOM.2016.7537185).
- [19] National Communications System, “All-optical Networks”, Technical Information Bulletin 00- 7, 2000 https://www.hsdl.org/?view&did=440833.
- [20] M.Z. Iqbal, H. Fathallah, and N. Belhadj, “Optical Fiber Tapping: Methods and Precautions”, 8 th International Conference on High-capacity Optical Networks and Emerging Technologies, Riyadh, SA, pp. 164–168, 2011 (https://doi.org/ 10.1109/HONET.2011. 6149809).
- [21] European Patent Office, “Optical Fiber Design for Secure Tap Proof Transmission”, Bulletin 2004/30, European patent application EP1256826 A2, 2004 [Online] Available: https://data.epo.org/gpi/EP1256826A2-Optical-fiber-design-for-secure-tap-proof-transmission
- [22] K. Shaneman and S. Gray, “Optical Network Security: Technical Analysis of Fiber Tapping Mechanisms and Methods for Detection and Prevention”, IEEE Military Communications Conference MILCOM, Monterey, USA, 2004 (https://doi.org/ 10.1109/MILCOM.2004.1494884).
- [23] C. Natalino, M. Schiano, A. Di Giglio, L. Wosinska, and M. Furdek, “Experimental Study of Machine-Learning-Based Detection and Identification of Physical-Layer Attacks in Optical Networks”, Journal of Lightwave Technology, vol. 37, no. 16, pp. 4173– 4182, 2019 (https://doi.org/10.1109/JLT.2019.2923558).
- [24] C. Natalino, M. Schiano, A. Di Giglio, L. Wosinska, and M. Furdek, “Field Demonstration of Machine-Learning-Aided Detection and Identification of Jamming Attacks in Optical Networks”, European Conference on Optical Communication (ECOC), Rome, Italy, 2018 (https://doi.org/10.1109/ECOC.2018.8535155).
- [25] K. Manousakis and G. Ellinas, “Attack-aware Planning of Transparent Optical Networks”, Optical Switching and Networking, vol. 19, pp. 97–109, 2016 (https://doi.org/10.1016/j.osn.2015.03.005).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-550e73eb-a9b6-4887-8a5f-ce3613b07620