SlideShare a Scribd company logo
Secure Communication Over
Fiber Optic Networks
Fiona Rozario
D Y Patil School of Engg. & Technology
M.E. (CN) – I
22nd March, 2016
Contents
 Optical Fiber Networks
 What are optical fibers?
 Working principle of optical fibers
 Types of optical fibers
 Fiber optic communication system
 Advantages of using fiber optics in communication
 Security issues in fiber optic networks
 Encryption systems
 What is encryption?
 Encryption schemes
 Optical cryptography
 Steganography
What are optical fibers?
 A flexible, transparent fiber made of
glass or plastic
 Slightly thicker than human hair
 Its function is to guide visible and
infrared light over long distances
What are optical fibers?
Working principle of optic fibers
Total internal reflection
Fiber optic communication system
Advantages of fiber optics in communication
networks
• Longer life than copper wire
• Nominal handling and installation costs
• Unaffected by electromagnetic interference
• Attenuation much lower than coaxial cable or twisted pair
(about 0.2dB/km)
• No issue of protecting against grounding and voltage
problems
• Higher BW offered
Security Issues
 Network attacks can be classified as:
 Service disruptions: prevents communication or degrades QoS
 Tapping: unauthorized access to data, compromises privacy
 Physical layer attacks
 Direct attacks: characteristics of physical elements changed
 Indirect attacks: introducing crosstalk
Security Issues
Attacks aimed at:
 Network transmission – tapping, jamming
Security Issues – Direct attacks
Attacks aimed at:
 Optical amplifiers – jamming
Security Issues – Direct attacks
Attacks aimed at:
 Optical cross-connects – in-band and out-of-band crosstalk
Security in optical networks
Security –
 Physical security – ensures minimum privacy of data and
QoS
 Semantic security – protects meaning of the data even if it
has already been reached by the attacker
Deals with cryptopraphy
What is encryption?
 Mathematical altering data (plaintext) in a
consistent manner to form a unintelligible ciphertext
 Reversible process
 Relies on a secret key
Encryption schemes
Building blocks of all cipher algorithms:
• Substitution – replace bits/characters/blocks of
data with substitutes
• Transposition - rearrange replace
bits/characters/blocks of data
Encryption schemes
Optical encryption schemes
 Optical CDMA
 Quantum cryptography
 Chaos based encryptions
 Steganography
Optical CDMA
• An optical short pulse is spread over a one-bit duration T by encoding.
• The decoding time despreads the signal, reconstructing the signal if the codes
between the encoder and decoder match.
• The signal remains spread over T if the codes do not match.
Coherent OCDMA
Incoherent OCDMA
Elements of Quantum Cryptography
 Light waves are propagated as discrete quanta called photons.
 They are massless and have energy, momentum and angular
momentum called spin.
 Spin carries the polarization – plane in which the electric field
oscillates.
 Photons of different polarizations represent the different
quantum states
 Polarization basis is the mapping we decide to use for a
particular state
Quantum Cryptography
 Deals with secure key distribution
 Key transmitted at a lower rate than data but at a
higher security level
 Key information is coded onto the quantum states of
a photon
Chaos based encryption
 Masks the confidential data with stronger chaos
 Enhances robustness of data transmission
Steganography
Aim –
to hide the signal in the existing public channels; hacker should be unable
to detect the presence of a signal
Steganography
Approach 1 -
 temporally stretch a short optical pulse through chromatic
dispersion
 Without the correct dispersion compensation at the receiver,
signal stays buried in the noise of the public channel
 Attacker can use tunable dispersion compensating device to check
presence of stealth signals
 Fine tune the device to retrieve the stealth signal
Steganography
Approach 2 –
Add temporal phase masks
Steganography
Approach 3 -
 Employ ASE noise from amplifiers
 ASE noise from EDFA is most prevalent in optic systems
 ASE noise carrying stealth signal and ASE noise already existing in
the system have identical spectral properties
 Eavesdropper cannot differentiate between the two ASE noises
Conclusion
Technique Limitations Advantages
OCDMA Effected by dispersions in
the fiber; hence range of
transmission gets limited to
no longer than 100 km [3].
It is a multiple access
system; plurality of codes
can exist in the same
channel.
Confidentiality is not as
strong as that provided by
data encryption.
Chaos based encryption Synchronization of receiver
and transmitter is critical to
proper functioning. It is very
difficult to get lasers of the
same parameters for
synchronization.
There is high level of
robustness at high bit rates
It can create jamming as
well as avoid jamming to a
high degree.
Quantum cryptography Use of amplifiers will
change the qubits. Hence
the range of transmission is
limited.
This method can notify of
interception of data [12].
It needs a dedicated channel
of high quality for key
exchange between every
pair of sender and receiver.
Hence multiplexing is not
possible.
Very vulnerable to
jamming.
Optical steganography:
(a) Temporal stretching of
pulse
Data can be intercepted
using tunable dispersion
compensation devices.
Simplest in implementation.
(b) Temporal phase mask Robust against adversary
attacks.
(c) ASE noise Optical delays between
receiver and transmitter
must be matched exactly to
get the stealth signal.
Public channel does not
induce any power penalty
on the stealth channel and
the stealth channel induces
a power penalty of only 0.2-
0.3 dBm on the public
channel.

More Related Content

PPTX
Code division duplexing
PPTX
Fabrication of fibers
PPT
Topic: Spread Spectrum
PPTX
GSM & CDMA
PPT
Code division Duplexing
PPTX
RC 4
PPT
Dsss final
PDF
MyIX Updates by Raja Mohan Marappan, MyIX
Code division duplexing
Fabrication of fibers
Topic: Spread Spectrum
GSM & CDMA
Code division Duplexing
RC 4
Dsss final
MyIX Updates by Raja Mohan Marappan, MyIX

What's hot (20)

PPT
Cdma ppt for ECE
PPTX
Analog and digital signals
PPTX
Audio steganography
PPTX
Array antenna and LMS algorithm
PPT
Photo detector noise
PPTX
Digital signal processors
DOCX
comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA
PPTX
Information and network security 9 model for network security
PPTX
PPT
Lecture20
PPTX
Zigbee ppt
PDF
Bpsk rayleigh
PPT
VLSI circuit design process
PPT
Wireless sensor network and its application
DOCX
Bluetooth technology
PDF
Signal Constellation, Geometric Interpretation of Signals
PPTX
PPTX
Gsm architecture
PPT
Digital signature
Cdma ppt for ECE
Analog and digital signals
Audio steganography
Array antenna and LMS algorithm
Photo detector noise
Digital signal processors
comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA
Information and network security 9 model for network security
Lecture20
Zigbee ppt
Bpsk rayleigh
VLSI circuit design process
Wireless sensor network and its application
Bluetooth technology
Signal Constellation, Geometric Interpretation of Signals
Gsm architecture
Digital signature
Ad

Viewers also liked (20)

PPTX
PACE-IT: Troubleshooting Fiber Cable Networks
PPTX
Why optical networks ?
ODP
Secure VoIP - DroidCon 2015
PPTX
Security in Optical Networks - Useless or Necessary?
PDF
Secure communication over optical networks
PPTX
Senetas fibre optic connections are secure - right
PPTX
Layer 1 Encryption in WDM Transport Systems
PPT
Nanorobot using in medical field
PPTX
Mgidigitalglobalization
PPT
Science Communication 2.0: changing University attitude through Science resea...
PDF
Samanage-Website-Redesign-Jan2017
PPT
Av capabilities presentation
PDF
R Statistics With MongoDB
PPTX
Heavy Metal PowerPivot Remastered
PDF
VirtualSense presentation at FBK
PDF
Revving Up Revenue By Replenishing
PPTX
Anti-social Databases
PPT
Introduction to jira
PDF
Review: Leadership Frameworks
PACE-IT: Troubleshooting Fiber Cable Networks
Why optical networks ?
Secure VoIP - DroidCon 2015
Security in Optical Networks - Useless or Necessary?
Secure communication over optical networks
Senetas fibre optic connections are secure - right
Layer 1 Encryption in WDM Transport Systems
Nanorobot using in medical field
Mgidigitalglobalization
Science Communication 2.0: changing University attitude through Science resea...
Samanage-Website-Redesign-Jan2017
Av capabilities presentation
R Statistics With MongoDB
Heavy Metal PowerPivot Remastered
VirtualSense presentation at FBK
Revving Up Revenue By Replenishing
Anti-social Databases
Introduction to jira
Review: Leadership Frameworks
Ad

Similar to Secure communication over fiber optic networks (20)

DOCX
Seminar report OCDMA SYSTEM
PPTX
Optical code division multiple access
PDF
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
PDF
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PPT
Computer network by faraz ali
PDF
100 Technical Interview Questions on Wireless communication, LTE and 5G.
PDF
FIBEROPTICS.pdf
PDF
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
PDF
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
PPTX
Guided Transmission Media
PPT
Communication channels
PPTX
Wired Transmission Media
PPT
communication Systems
PPT
Optical tech
PPT
Chapter_Threhvvhhhhhhhhhhhhhhhhhhhhhhhjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj...
PPT
What Is A Network made by Ms. Archika Bhatia
PDF
Ai25204209
PPTX
Seminar on BSNL-EETP
PPTX
OPTICAL_FIBRE_COMMUNICATION.pptx
PPT
Seminar report OCDMA SYSTEM
Optical code division multiple access
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
Computer network by faraz ali
100 Technical Interview Questions on Wireless communication, LTE and 5G.
FIBEROPTICS.pdf
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Guided Transmission Media
Communication channels
Wired Transmission Media
communication Systems
Optical tech
Chapter_Threhvvhhhhhhhhhhhhhhhhhhhhhhhjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj...
What Is A Network made by Ms. Archika Bhatia
Ai25204209
Seminar on BSNL-EETP
OPTICAL_FIBRE_COMMUNICATION.pptx

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPT
Project quality management in manufacturing
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Well-logging-methods_new................
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mechanical Engineering MATERIALS Selection
Project quality management in manufacturing
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CYBER-CRIMES AND SECURITY A guide to understanding
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
UNIT 4 Total Quality Management .pptx
Well-logging-methods_new................
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Categorization of Factors Affecting Classification Algorithms Selection
Foundation to blockchain - A guide to Blockchain Tech
Fundamentals of Mechanical Engineering.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...

Secure communication over fiber optic networks

  • 1. Secure Communication Over Fiber Optic Networks Fiona Rozario D Y Patil School of Engg. & Technology M.E. (CN) – I 22nd March, 2016
  • 2. Contents  Optical Fiber Networks  What are optical fibers?  Working principle of optical fibers  Types of optical fibers  Fiber optic communication system  Advantages of using fiber optics in communication  Security issues in fiber optic networks  Encryption systems  What is encryption?  Encryption schemes  Optical cryptography  Steganography
  • 3. What are optical fibers?  A flexible, transparent fiber made of glass or plastic  Slightly thicker than human hair  Its function is to guide visible and infrared light over long distances
  • 5. Working principle of optic fibers Total internal reflection
  • 7. Advantages of fiber optics in communication networks • Longer life than copper wire • Nominal handling and installation costs • Unaffected by electromagnetic interference • Attenuation much lower than coaxial cable or twisted pair (about 0.2dB/km) • No issue of protecting against grounding and voltage problems • Higher BW offered
  • 8. Security Issues  Network attacks can be classified as:  Service disruptions: prevents communication or degrades QoS  Tapping: unauthorized access to data, compromises privacy  Physical layer attacks  Direct attacks: characteristics of physical elements changed  Indirect attacks: introducing crosstalk
  • 9. Security Issues Attacks aimed at:  Network transmission – tapping, jamming
  • 10. Security Issues – Direct attacks Attacks aimed at:  Optical amplifiers – jamming
  • 11. Security Issues – Direct attacks Attacks aimed at:  Optical cross-connects – in-band and out-of-band crosstalk
  • 12. Security in optical networks Security –  Physical security – ensures minimum privacy of data and QoS  Semantic security – protects meaning of the data even if it has already been reached by the attacker Deals with cryptopraphy
  • 13. What is encryption?  Mathematical altering data (plaintext) in a consistent manner to form a unintelligible ciphertext  Reversible process  Relies on a secret key
  • 14. Encryption schemes Building blocks of all cipher algorithms: • Substitution – replace bits/characters/blocks of data with substitutes • Transposition - rearrange replace bits/characters/blocks of data
  • 16. Optical encryption schemes  Optical CDMA  Quantum cryptography  Chaos based encryptions  Steganography
  • 17. Optical CDMA • An optical short pulse is spread over a one-bit duration T by encoding. • The decoding time despreads the signal, reconstructing the signal if the codes between the encoder and decoder match. • The signal remains spread over T if the codes do not match.
  • 20. Elements of Quantum Cryptography  Light waves are propagated as discrete quanta called photons.  They are massless and have energy, momentum and angular momentum called spin.  Spin carries the polarization – plane in which the electric field oscillates.  Photons of different polarizations represent the different quantum states  Polarization basis is the mapping we decide to use for a particular state
  • 21. Quantum Cryptography  Deals with secure key distribution  Key transmitted at a lower rate than data but at a higher security level  Key information is coded onto the quantum states of a photon
  • 22. Chaos based encryption  Masks the confidential data with stronger chaos  Enhances robustness of data transmission
  • 23. Steganography Aim – to hide the signal in the existing public channels; hacker should be unable to detect the presence of a signal
  • 24. Steganography Approach 1 -  temporally stretch a short optical pulse through chromatic dispersion  Without the correct dispersion compensation at the receiver, signal stays buried in the noise of the public channel  Attacker can use tunable dispersion compensating device to check presence of stealth signals  Fine tune the device to retrieve the stealth signal
  • 25. Steganography Approach 2 – Add temporal phase masks
  • 26. Steganography Approach 3 -  Employ ASE noise from amplifiers  ASE noise from EDFA is most prevalent in optic systems  ASE noise carrying stealth signal and ASE noise already existing in the system have identical spectral properties  Eavesdropper cannot differentiate between the two ASE noises
  • 27. Conclusion Technique Limitations Advantages OCDMA Effected by dispersions in the fiber; hence range of transmission gets limited to no longer than 100 km [3]. It is a multiple access system; plurality of codes can exist in the same channel. Confidentiality is not as strong as that provided by data encryption. Chaos based encryption Synchronization of receiver and transmitter is critical to proper functioning. It is very difficult to get lasers of the same parameters for synchronization. There is high level of robustness at high bit rates It can create jamming as well as avoid jamming to a high degree. Quantum cryptography Use of amplifiers will change the qubits. Hence the range of transmission is limited. This method can notify of interception of data [12]. It needs a dedicated channel of high quality for key exchange between every pair of sender and receiver. Hence multiplexing is not possible. Very vulnerable to jamming. Optical steganography: (a) Temporal stretching of pulse Data can be intercepted using tunable dispersion compensation devices. Simplest in implementation. (b) Temporal phase mask Robust against adversary attacks. (c) ASE noise Optical delays between receiver and transmitter must be matched exactly to get the stealth signal. Public channel does not induce any power penalty on the stealth channel and the stealth channel induces a power penalty of only 0.2- 0.3 dBm on the public channel.