Abstract

We describe a layer-1-based intrusion detection system for fiber-optic–based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

Highlights

  • The world is transitioning to an information-based society

  • The detection and prevention of eavesdropping/tapping activity in fiber-based optical networks represents an elevation in security, as it prevents the adversary from obtaining information in the first place

  • The intrusion detection system was tested under a variety of scenarios

Read more

Summary

Introduction

The world is transitioning to an information-based society. Information represents a “wealth” component of such a society. It is important to protect this wealth from unauthorized accesses and unauthorized entities. This is important for data at rest and for data in transit. Fiber-based optical networks are the primary mode of transmitting data. While information leakage can be prevented through the use of encryption, all contemporary forms of encryption are only computationally secure. A cryptanalyst can recover the original information. The detection and prevention of eavesdropping/tapping activity in fiber-based optical networks represents an elevation in security, as it prevents the adversary from obtaining information in the first place

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call