Метод мониторинга информационной безопасности волоконно-оптической линии связи
15
Method of information security monitoring
of fiber optic link
©
M.V. Filippov, N.V. Chichvarin
Bauman Moscow State Technical University, Moscow, 105005, Russia
The basis of this work is the results of research on the development of the method of
detection and localization of the site of unauthorized access for the fiber-optic
communication line.
We studied functioning of the fiber-optic line in emergency
conditions
.
On the basis of analytical review of methods of unauthorized access to the
optical fiber we propose a developed method of detection and localization of the site of
leakage radiation from the optical fiber
. The method consists in applying a laser phase
rangefinder as a device for monitoring the information security. It is shown that
application of classical laser phase rangefinders allows to achieve localization accuracy
up to several centimeters.
Keywords:
optical fiber, radiation leakage, monitoring, information security, laser
rangefinder.
REFERENCES
[1]
Miller S.K. Hacking at the Speed of Light.
Security Solutions Magazine
, April,
2006. Available at:
(accessed on 20.02.2014).
[2]
Davis J.P., Carter J. Expanding Future SSN Missions.
Undersea Waifare
, Fall,
1999, vol. 2, no. 1. Available at:
(accessed on 20.02.2014).
[3]
Miller S.K. Optical Illusion.
Information security
. November 2006. Available at:
(accessed on 20.02.2014).
[4]
Shaneman K., Gray S. Optical Network Security: Technical Analysis of Fiber
Tapping Mechanisms and Methods for detection and Prevention.
IEEE Military
Communications Conference
, October 2004, vol. 2, pp. 711–716. doi:
(accessed on 20.02.2014).
[5]
Jedidi R., Pierre R. High-Order Finite-Element Methods for the Computation of
Bending Loss in Optical Waveguides.
lLT
, Sep. 2007, vol. 25, no. 9, p. 2618–30.
[6]
Optical Fiber Design for Secure Tap Proof Transmission
, US Patent
no. 6801700 B2, Oct. 5, 2004.
[7]
All Optical Networks (AON).
National Communication System
, NCS TIB 00-7,
August 2000, pp. 245–257.
[8]
Ford W.
Computer Communications Security: Principles, Standard Protocols
and Techniques.
NJ: Prentice-Hall, 1994, 494 p.
[9]
Stinson D.R. C
ryptography: Theory and Practi
c. CRC Press Inc., 2005, 616 p.
[10]
Ferguson N., Schneier B.
Practical Cryptography
. Indianapolis, In: Wiley,
2003, 432 p.
[11] Godnyi V.G.
Sistemy bezopasnosti
—
Security and Safety
, 2002, no. 2 (44),
pp. 44–46.
[12] Quantum Cryptography.
Photonics Spectra
, 1994, vol. 28, no. 9, рр.
48–50.
[13]
Fietcher P. Light pulses sent over optical fibers create «Invulnerable» encryp-
tion.
Electron Des
., 1995, vol. 43, no. 26, рр. 38–40.
[14]
Iqbal M.Z., Fathalla H., Belhadj N
. Optical Fiber Tapping: Methods and Pre-
cautions. High Capacity Optical Networks and Enabling Technologies
(HO-