Professional Documents
Culture Documents
Optical Layer Security in Fiber Optics
Optical Layer Security in Fiber Optics
Topics
Introduction Threats Optical Layer Security (Defenses)
4 May 2012
M.Tech, CSE-PESIT
Introduction
Optical Communication system has variety of applications. Ranging form Personal - commercial - military. Due to dramatic increase in network speed and usage, there is a dramatic increase in vulnerability. Securing the physical layer of optical network has become difficult job. Building security on top of an insecure foundation is a risky practice. Accomplishing real-time security processing at optical layer is a technically challenging problem.
4 May 2012
M.Tech, CSE-PESIT
Threats
Optical networks ranging from local area to backbone of the Internet. For each the actual implementation of particular threat varies. Loosely the Threats are categorized as: 1. Confidentiality 2. Authentication 3. Privacy 4. Availability
4 May 2012
M.Tech, CSE-PESIT
Threats
Confidentiality Adversary tries to listen in on communication. Optical Networks do not emit electromagnetic signature, even attacker eavesdrop on a optical system. physical tapping listening to residual crosstalk
4 May 2012
M.Tech, CSE-PESIT
Threats
1.Confidentiality Physical Tapping Tapping optical fiber is not difficult if the fiber itself is exposed. small amount of light escapes from the optical fiber. Directly placing the second fiber adjacent to the place where light escapes can capture a small amount of desired optical signal. In practice tapping an optical fiber is not a easy task. eavesdropper must operate at a very low signal to noise ratio. A special procedure is required to peel-off the protective material and cladding from the fiber, else causes breakage.
4 May 2012
M.Tech, CSE-PESIT
Threats
1.Confidentiality listening to residual crosstalk The other way of eavesdropping is to listen to the residual adjacent crosstalk while impersonating one of the subscribers. This is possible in wavelength-division-multiplexing (WDM) networks. This occur due to wavelength demultiplexers do not have perfect channel isolation, resulting to small amount of optical power leakage from adjacent channels. This method require special optical equipment to extract weak optical signal from the crosstalk.
4 May 2012
M.Tech, CSE-PESIT
Threats
2.Authentication An unauthorized entity tries to communicate. It requires the use of a unique coding/decoding scheme between the desired users. In physical optical link, an optical signal travels freely in the network and reach destination as long as it has correct wavelength (for WDM Networks). 3.Privacy & Traffic Analysis Adversary observing the existence of communication. Apart from the sender and intended receiver, no one else is aware of the existence of the transmission.
4 May 2012
M.Tech, CSE-PESIT
Threats
4.Availability when an adversary tries to subvert the successful delivery of communications. Optical networks are susceptible to a variety of attacks on physical infrastructure as well as signal jamming attacks. This results in denial of service. It doesnt result in theft of information, but translates loss into loss of network resources (bandwidth). Impact many users, result in significant fiscal losses to network providers. Physical damage (breakage) results in unavailability.
4 May 2012
M.Tech, CSE-PESIT
4 May 2012
M.Tech, CSE-PESIT
10
4 May 2012
M.Tech, CSE-PESIT
11
4 May 2012
M.Tech, CSE-PESIT
12
4 May 2012
M.Tech, CSE-PESIT
13
14
THANKS
4 May 2012
M.Tech, CSE-PESIT
15