Vous êtes sur la page 1sur 5

1

Secure Communication in Optical Fiber Network

Electronics & Communication Department


Fiber Optics Communications
ECN-539
Term Paper

IIT Roorkee

Aman Shivhare (14116011)


Amit Kumar (14116012)

Secure Communication in Optical Fiber Network


2

Amit Kumar (14116012)


Aman Shivhare (14116011) Dept. of ECE
Dept. of ECE IIT Roorkee
IIT Roorkee

AbstractThe backbone of the Internet is optical optical key distribution, optical signal processing, optical
networks which is a major part of physical layer in steganography and optical chaos-based communication.
computer networks. According to Open System
Interconnection model (OSI), Physical Layer is the bottom Optical Fibre devices are immune to
most layer in a network. Hence it is necessary to make this electromagnetic signal and also do not radiate EM
layer secure as much as possible. Optical networks are radiations. So the hacker neither intrude from the leaked
vulnerable to various attacks. These attacks include information to free space nor jam the fibre signal with
confidentiality, availability, jamming, eavesdropping, and EM waves. Also, fibre-based devices have low latency
interception. There are various techniques which can be and high processing speed, network is protected without
used in order to secure fiber optical networks including compromising it transmission speed. Also, optical layer
XOR of optical signal, optical key distribution and
security aims to increase the capacity of channel.
steganography. In this term paper, we are going to discuss
two techniques which are widely used; XOR of Optical We characterize optical fiber security systems
Signal & Steganography. We will also analyze Anti- by the risk they can address. We discuss confidentiality
Jamming to prevent the Denial of Service (DoS) attack of data communication and the optical-encryption uses
(caused by Jamming). The aim of studying security in the section titled Confidentiality. In the section titled
methods in optical network is to increase the capacity of Availability we discuss methods for network
optical fiber channel instead of consuming the available
availability, including anti-jamming and optical chaos-
capacity. Also, real-time processing is required in order to
based communication.
maintain the speed and robustness of optical fiber.
We compare the different technique in terms of
KeywordsOptical fibre, network security, Fiber
application and inter-relation that exist in the network.
Security.
We also provide examples and results from experimental
I. INTRODUCTION effects that validates for securing optical fibre
Optical systems frame the foundation of the communication.
Internet and are a basic constituent of the physical layer
of these systems. In open system interconnection (OSI) II. VARIOUS THREATS IN OPTICAL NETWORK
model physical layer forms the bottom layer and other
Optical networks are varying in range from local
layers securities are highly dependent on this layer. Due
area network to the backbones of the internet and the
to the increase in optical fibre communication, it is
threat and defense implementations varies accordingly.
essential that interchanges crossing these systems are
These threats can be categorized based on how an
legitimately secured. Different types of attacks which
adversary tries to listen and attack the network. There
can injure communication confidentiality on physical
are different ways in which an adversary can listen to
layer of optical fibre are jamming, physical
channel.
infrastructure attacks, eavesdropping, and interception.
1. Confidentiality: An adversary tries to listen in on
The capacity availability in the optical network and
communications.
processing speed of information sent are two important
2. Authentication: An unauthorized entity tries to
constraints for having secured upper layer
communicate.
communication. Fibre-based methods can be used to
3. Integrity: An entity manipulates the
effectively protect optical network security such as
communication data.
3

4. Availability: An adversary tries to jam the because optical signal has higher speed and lower
communication channel. latency.
5. Privacy Risks and Traffic Analysis: An
To encrypt or decrypt any data, an
adversary tries to observe the existence of
encryption/decryption key is used. There is key
communications.
distribution between transmitter and receiver in optical
encryption process. Optical XOR encryption is a
Throughout this paper, we will briefly describe
technique used to encrypt/decrypt optical network using
and compare the physical techniques used to maintain
exclusive-OR logic. This is quite similar to electronic
the confidentiality of optical network and to prevent the
XOR.
jamming attack. We will also analyze the privacy risks.
Over past years, various techniques has been
developed to implement XOR operation in optical
III. CONFIDENTIALITY network. One method is to use four wave mixing (FWM)
Information privacy guarantees that private in a semiconductor optical amplifier. This XOR gate
information isn't unveiled to an unapproved client in the works at a speed of 20Gb/s. At transmitter side, the
arrange. Although there is no electromagnetic radiation signal and key are fed into encryption block and the
in optical fiber networks, there are various techniques cipher signal and key are fed to decryption block at the
one can use in order to attack the optical network and receiver side. The above described FWM encryption
break the confidentiality of the communication. An methodology can also be extended to encrypt OCDMA
adversary can listen to a residual crosstalk from the signals and improve the security using wavelength
adjacent channel or he can physically tap the optical hopping time spreading (WHTS). Diagram of optical
fibers. If the optical fiber is exposed, one can easily tap encryption can be seen in Fig. 1
into it and try to listen to communication channel.
Although it looks very easy to tap but practically, it is IV. AVAILABILITY
not so because one can easily notice that too much Availability is a part of security that guarantees that
power has been removed from communicating signal. a system benefit isn't denied to authorised users.
Tapping procedure requires peeling off the cladding and Network security should be accessible to legal users.
the protective material over the fiber which can also
damage the optical fiber. To maintain the confidentiality B. Jamming and Anti Jamming
of communication channel (optical network), optical
Jamming a signal channel with strong noise is
encryption can be done and this encryption scheme is
one of the possible threat to network availability. Optical
invulnerable to attack because there is no radiation of
steganography is the technique which provides the
optical signature in fiber network.
protection to signal when carried with noise which
A. Optical Encryption covers the C band. Difficulty of carrying out hostile
Encryption is a process to convert a plain text into jamming increases as well as if adversary could jam C
ciphertext using a key. Mostly a secret key is used to band, there would be no bandwidth is left for its own
encrypt the data and without knowing the key, it is very communication. Another potential possible solution is to
hard to decrypt the ciphertext. So an eavesdropper make sure availability uses waveband conversion.
cannot recover the data without having the proper key.
Encryption is an effective way to protect the data in Multiple wavebands are used for communication
optical networks and helps in maintaining the in this technique. The data channel can be either up-
confidentiality of the network. Optical Encryption is converted or down-converted to a new waveband range,
different from electronic encryption and it has limited if a current waveband gets jammed.
functionalities as compare to the electronic encryption
4

C. Optical Chaos Based Communication ago, a new approach for optical steganography was
For transmitting data securely with high level of proposed to carry the stealth signal in the system noise.
robustness Chaos-based communication can be used. To In this approach, amplified spontaneous emission (ASE)
increase the immunity of data transmission to a narrow noise which are generated within the system by the
band interference or malicious jamming and also to jam amplifiers to mimic the noise instead of creating and
the communication of adversaries. The amplitude of stretching the stealth pulses.
stealth signal is reduced to as small as possible in optical VI. SUMMARY AND DISCUSSION
steganography, but here the case is opposite. The
strategy here is to mask the data with much stronger Several optical fibre based technique are proposed for
chaos. Input signal generates the chaos so now only protecting physical layer communication. Optical XOR
logic gates Optical encryption is one of the main
receiver that has now knowledge about the chaos
generates the chaos and cancel it to recover the original technique to secure the network. Because of Low latency
and immune to EM radiation, optical encryption is
signal. The diagram can be seen in Fig 2 below.
important to secure the network without compromising
the processing speed. Recently developed optical
V. PRIVACY RISKS steganography method which uses noise to carry the
Privacy is state of being free from being observed or transmission instead of minimizing it. Waveband
disturbed by the people. Privacy ensures what conversion technique and its uses on anti-jamming
information may be collected or distributed by a party provides channel availability assurance. To enhance the
and to whom it can be disclosed. Although data is robustness of data transmission or jamming an unwanted
encrypted which can not be decrypted without having channel to provide the assurance of security chaos-based
the knowledge of encryption key to adversary. but It can communication technique is used. To protect the
not hide the channel or one can not protect the channel physical layer from multiple attacks various techniques
from being discovered. have been proposed and implemented. Also, the security
of optical communication is always the concern issue. A
Optical Steganography is a technique which is used to lot of research is also going and we may expect some
improve privacy of an optical channel such that no one new more secured techniques in future.
can have knowledge of transmission except the sender
and the receiver. In this approach, short optical pulses VII. REFERENCES
are generated, also known as Stealth pulses, are stretched
[1] Chan K, Chan CK, Chen LK, Tong F. Demonstration of
using high group velocity dispersion. To receive the
20-Gb/s all-optical XOR gate by four-wave mixing in
signal at receiver side, it is necessary to use the right semiconductor optical amplifier with RZ-DPSK modulated
compensation dispersive element. If right dispersive inputs. IEEE Photon Technol Lett 2004;16(3):897!9.
element is not used, then the signal is lost in the noise of
the optical channel. [2] B. B. Wu and E. E. Narimanov, A method for secure
communications over a public fiber-optical network, Opt.
There are various steganography techniques has Express, vol. 14, no. 9, pp. 37383751, May 2006.
which are also compatible with a variety of modulation
methods, including on-off-keying (OOK) return-to-zero [3] Argris A, Syvridis D, Larger L, Lodi VA, Colet P, Fischer
I, et al. Chaos-based communications at high bit rates using
(NRZ), non-return-to-zero (RZ) OOK, OOK optical
commercial fibre-optic links. Nat 2006;438(17):343!6.
CDMA, and differential (quadrature) phase-shift keying
(DPSK/DQPSK). While demodulating the data, it is [4] Fok MP, Prucnal PR. All-optical encryption based on
necessary that dispersion and phase mask should be interleaved waveband switching modulation for optical
matched between the transmitter and receiver otherwise network security. Opt Lett 2009;34(9):1315!7.
it would not be possible to demodulate data. A few years
5

[5] Kim JH, Jhon YM, Byun YT, Lee S, Woo DH, Im SH. All without additional input beam. IEEE Photon Technol Lett
optical XOR gate using semiconductor optical amplifier 2002;14(10):1436!8.
VIII. IMAGES

Tran Re
Fi

Data Opti Opti Data


cal cal

Key Key
Distr Distr

Fig. 1 Diagram of Optical Encryption

Fig. 2 Diagram of Optical Chaos Based Communication

Vous aimerez peut-être aussi