Method of information security monitoring of fiber optic link
Authors: Filippov M.V., Chichvarin N.V.
Published in issue: #8(32)/2014
DOI: 10.18698/2308-6033-2014-8-1327
Category: Information technology | Chapter: Information Security
The basis of this work is the results of research on the development of the method of detection and localization of the site of unauthorized access for the fiber-optic communication line. We studied functioning of the fiber-optic line in emergency conditions. On the basis of analytical review of methods of unauthorized access to the optical fiber we propose a developed method of detection and localization of the site of leakage radiation from the optical fiber. The method consists in applying a laser phase rangefinder as a device for monitoring the information security. It is shown that application of classical laser phase rangefinders allows to achieve localization accuracy up to several centimeters.
References
[1] Miller S.K. Hacking at the Speed of Light. Security Solutions Magazine, April, 2006. Available at: http://securitysolution.com/mag (accessed on 20.02.2014).
[2] Davis J.P., Carter J. Expanding Future SSN Missions. Undersea Waifare, Fall, 1999, vol. 2, no. 1. Available at: http://www.navy.mil/navydata (accessed on 20.02.2014).
[3] Miller S.K. Optical Illusion. Information security. November 2006. Available at: http://www.oysteroptics.com/Data/Sites/1 (accessed on 20.02.2014).
[4] Shaneman K., Gray S. Optical Network Security: Technical Analysis of Fiber Tapping Mechanisms and Methods for detection and Prevention. IEEE Military Communications Conference, October 2004, vol. 2, pp. 711-716. doi: http://dx.doi.org/10.1109/MILCOM.2004.1494884 (accessed on 20.02.2014).
[5] Jedidi R., Pierre R. High-Order Finite-Element Methods for the Computation of Bending Loss in Optical Waveguides. lLT, Sep. 2007, vol. 25, no. 9, p. 2618-30.
[6] Optical Fiber Design for Secure Tap Proof Transmission, US Patent no. 6801700 B2, Oct. 5, 2004.
[7] All Optical Networks (AON). National Communication System, NCS TIB 00-7, August 2000, pp. 245-257.
[8] Ford W. Computer Communications Security: Principles, Standard Protocols and Techniques. NJ: Prentice-Hall, 1994, 494 p.
[9] Stinson D.R. Cryptography: Theory and Practic. CRC Press Inc., 2005, 616 p.
[10] Ferguson N., Schneier B. Practical Cryptography. Indianapolis, In: Wiley, 2003, 432 p.
[11] Godnyi V.G. Sistemy bezopasnosti - Security and Safety, 2002, no. 2 (44), pp. 44-46.
[12] Quantum Cryptography. Photonics Spectra, 1994, vol. 28, no. 9, рр. 48-50.
[13] Fietcher P. Light pulses sent over optical fibers create "Invulnerable" encryption. Electron Des., 1995, vol. 43, no. 26, рр. 38-40.
[14] Iqbal M.Z., Fathalla H., Belhadj N. Optical Fiber Tapping: Methods and Precautions. High Capacity Optical Networks and Enabling Technologies (HONET). 2011. Available at: http://habrahabr.ru/post/176677 (accessed on 20.02.2014).
[15] Denisyuk R.E., Kuznetsov D.N. Issledovanie fazovogo detektora lazernogo dalnomera dlya system mashinnogo zreniya robotov [The study of the phase detector laser rangefinder for machine vision systems of robots]. Available at: http://ea.donntu.edu.ua (accessed on 20.02.2014).