SlideShare a Scribd company logo
Secure Communication Over
Fiber Optic Networks
Fiona Rozario
D Y Patil School of Engg. & Technology
M.E. (CN) – I
22nd March, 2016
Contents
 Optical Fiber Networks
 What are optical fibers?
 Working principle of optical fibers
 Types of optical fibers
 Fiber optic communication system
 Advantages of using fiber optics in communication
 Security issues in fiber optic networks
 Encryption systems
 What is encryption?
 Encryption schemes
 Optical cryptography
 Steganography
What are optical fibers?
 A flexible, transparent fiber made of
glass or plastic
 Slightly thicker than human hair
 Its function is to guide visible and
infrared light over long distances
What are optical fibers?
Working principle of optic fibers
Total internal reflection
Fiber optic communication system
Advantages of fiber optics in communication
networks
• Longer life than copper wire
• Nominal handling and installation costs
• Unaffected by electromagnetic interference
• Attenuation much lower than coaxial cable or twisted pair
(about 0.2dB/km)
• No issue of protecting against grounding and voltage
problems
• Higher BW offered
Security Issues
 Network attacks can be classified as:
 Service disruptions: prevents communication or degrades QoS
 Tapping: unauthorized access to data, compromises privacy
 Physical layer attacks
 Direct attacks: characteristics of physical elements changed
 Indirect attacks: introducing crosstalk
Security Issues
Attacks aimed at:
 Network transmission – tapping, jamming
Security Issues – Direct attacks
Attacks aimed at:
 Optical amplifiers – jamming
Security Issues – Direct attacks
Attacks aimed at:
 Optical cross-connects – in-band and out-of-band crosstalk
Security in optical networks
Security –
 Physical security – ensures minimum privacy of data and
QoS
 Semantic security – protects meaning of the data even if it
has already been reached by the attacker
Deals with cryptopraphy
What is encryption?
 Mathematical altering data (plaintext) in a
consistent manner to form a unintelligible ciphertext
 Reversible process
 Relies on a secret key
Encryption schemes
Building blocks of all cipher algorithms:
• Substitution – replace bits/characters/blocks of
data with substitutes
• Transposition - rearrange replace
bits/characters/blocks of data
Encryption schemes
Optical encryption schemes
 Optical CDMA
 Quantum cryptography
 Chaos based encryptions
 Steganography
Optical CDMA
• An optical short pulse is spread over a one-bit duration T by encoding.
• The decoding time despreads the signal, reconstructing the signal if the codes
between the encoder and decoder match.
• The signal remains spread over T if the codes do not match.
Coherent OCDMA
Incoherent OCDMA
Elements of Quantum Cryptography
 Light waves are propagated as discrete quanta called photons.
 They are massless and have energy, momentum and angular
momentum called spin.
 Spin carries the polarization – plane in which the electric field
oscillates.
 Photons of different polarizations represent the different
quantum states
 Polarization basis is the mapping we decide to use for a
particular state
Quantum Cryptography
 Deals with secure key distribution
 Key transmitted at a lower rate than data but at a
higher security level
 Key information is coded onto the quantum states of
a photon
Chaos based encryption
 Masks the confidential data with stronger chaos
 Enhances robustness of data transmission
Steganography
Aim –
to hide the signal in the existing public channels; hacker should be unable
to detect the presence of a signal
Steganography
Approach 1 -
 temporally stretch a short optical pulse through chromatic
dispersion
 Without the correct dispersion compensation at the receiver,
signal stays buried in the noise of the public channel
 Attacker can use tunable dispersion compensating device to check
presence of stealth signals
 Fine tune the device to retrieve the stealth signal
Steganography
Approach 2 –
Add temporal phase masks
Steganography
Approach 3 -
 Employ ASE noise from amplifiers
 ASE noise from EDFA is most prevalent in optic systems
 ASE noise carrying stealth signal and ASE noise already existing in
the system have identical spectral properties
 Eavesdropper cannot differentiate between the two ASE noises
Conclusion
Technique Limitations Advantages
OCDMA Effected by dispersions in
the fiber; hence range of
transmission gets limited to
no longer than 100 km [3].
It is a multiple access
system; plurality of codes
can exist in the same
channel.
Confidentiality is not as
strong as that provided by
data encryption.
Chaos based encryption Synchronization of receiver
and transmitter is critical to
proper functioning. It is very
difficult to get lasers of the
same parameters for
synchronization.
There is high level of
robustness at high bit rates
It can create jamming as
well as avoid jamming to a
high degree.
Quantum cryptography Use of amplifiers will
change the qubits. Hence
the range of transmission is
limited.
This method can notify of
interception of data [12].
It needs a dedicated channel
of high quality for key
exchange between every
pair of sender and receiver.
Hence multiplexing is not
possible.
Very vulnerable to
jamming.
Optical steganography:
(a) Temporal stretching of
pulse
Data can be intercepted
using tunable dispersion
compensation devices.
Simplest in implementation.
(b) Temporal phase mask Robust against adversary
attacks.
(c) ASE noise Optical delays between
receiver and transmitter
must be matched exactly to
get the stealth signal.
Public channel does not
induce any power penalty
on the stealth channel and
the stealth channel induces
a power penalty of only 0.2-
0.3 dBm on the public
channel.

More Related Content

What's hot

02-Fundamentals of Optical Fiber Waveguides-I.pptx
02-Fundamentals of Optical Fiber Waveguides-I.pptx02-Fundamentals of Optical Fiber Waveguides-I.pptx
02-Fundamentals of Optical Fiber Waveguides-I.pptx
AkliluAyele3
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
Srinivas Vasamsetti
 
Presentation
PresentationPresentation
Presentation
Engr KALIM ULLAH KHAN
 
Digital communication systems unit 1
Digital communication systems unit 1Digital communication systems unit 1
Digital communication systems unit 1
Anil Nigam
 
Erbium-Doped Fiber Amplifier (EDFA)
Erbium-Doped Fiber Amplifier (EDFA)Erbium-Doped Fiber Amplifier (EDFA)
Erbium-Doped Fiber Amplifier (EDFA)
Naku Technology Co,. Ltd
 
Receiver structures(optical communication)
Receiver structures(optical communication)Receiver structures(optical communication)
Receiver structures(optical communication)
shraddha bajaj
 
DWDM Transmission System.pptx
DWDM Transmission System.pptxDWDM Transmission System.pptx
DWDM Transmission System.pptx
MagarsaaQanaii
 
Transmission system used for optical fibers
Transmission system used for optical fibers Transmission system used for optical fibers
Transmission system used for optical fibers
Jay Baria
 
Fiber optics
Fiber opticsFiber optics
Fiber optics
PRADEEPRAGHAV16
 
Dispersion Compensation Techniques for Optical Fiber Communication
Dispersion Compensation Techniques for Optical Fiber CommunicationDispersion Compensation Techniques for Optical Fiber Communication
Dispersion Compensation Techniques for Optical Fiber Communication
Amit Raikar
 
Passive component z versus freq
Passive component z versus freqPassive component z versus freq
Passive component z versus freq
Pei-Che Chang
 
Dense wavelength division multiplexing
Dense wavelength division multiplexingDense wavelength division multiplexing
Dense wavelength division multiplexing
Tauseef khan
 
Dense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) techniqueDense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) technique
Sushmesh Sharma (Looking For Change)
 
Free space optics
Free space optics Free space optics
Free space optics
Kartik Benageri
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
Umme habiba
 

What's hot (20)

02-Fundamentals of Optical Fiber Waveguides-I.pptx
02-Fundamentals of Optical Fiber Waveguides-I.pptx02-Fundamentals of Optical Fiber Waveguides-I.pptx
02-Fundamentals of Optical Fiber Waveguides-I.pptx
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Raptor codes
Raptor codesRaptor codes
Raptor codes
 
Presentation
PresentationPresentation
Presentation
 
Digital communication systems unit 1
Digital communication systems unit 1Digital communication systems unit 1
Digital communication systems unit 1
 
Erbium-Doped Fiber Amplifier (EDFA)
Erbium-Doped Fiber Amplifier (EDFA)Erbium-Doped Fiber Amplifier (EDFA)
Erbium-Doped Fiber Amplifier (EDFA)
 
Ch17
Ch17Ch17
Ch17
 
Receiver structures(optical communication)
Receiver structures(optical communication)Receiver structures(optical communication)
Receiver structures(optical communication)
 
DWDM Transmission System.pptx
DWDM Transmission System.pptxDWDM Transmission System.pptx
DWDM Transmission System.pptx
 
Transmission system used for optical fibers
Transmission system used for optical fibers Transmission system used for optical fibers
Transmission system used for optical fibers
 
Fiber optics
Fiber opticsFiber optics
Fiber optics
 
Dispersion Compensation Techniques for Optical Fiber Communication
Dispersion Compensation Techniques for Optical Fiber CommunicationDispersion Compensation Techniques for Optical Fiber Communication
Dispersion Compensation Techniques for Optical Fiber Communication
 
Passive component z versus freq
Passive component z versus freqPassive component z versus freq
Passive component z versus freq
 
Dense wavelength division multiplexing
Dense wavelength division multiplexingDense wavelength division multiplexing
Dense wavelength division multiplexing
 
Dense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) techniqueDense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) technique
 
Ultra wide band antenna
Ultra wide band antennaUltra wide band antenna
Ultra wide band antenna
 
Free space optics
Free space optics Free space optics
Free space optics
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Satellite Microwave
Satellite MicrowaveSatellite Microwave
Satellite Microwave
 

Viewers also liked

PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
Pace IT at Edmonds Community College
 
Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?
Gagan Randhawa
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
Marco Pozzato
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?
ADVA
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
Pawar Public School, Amanora, Hadapsar
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - rightresponsedatacomms
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
ADVA
 
Nanorobot using in medical field
Nanorobot using in medical fieldNanorobot using in medical field
Nanorobot using in medical field
APEC
 
Mgidigitalglobalization
MgidigitalglobalizationMgidigitalglobalization
Mgidigitalglobalization
Vera Kovaleva
 
Science Communication 2.0: changing University attitude through Science resea...
Science Communication 2.0: changing University attitude through Science resea...Science Communication 2.0: changing University attitude through Science resea...
Science Communication 2.0: changing University attitude through Science resea...
Miquel Duran
 
Samanage-Website-Redesign-Jan2017
Samanage-Website-Redesign-Jan2017Samanage-Website-Redesign-Jan2017
Samanage-Website-Redesign-Jan2017WhatConts
 
Av capabilities presentation
Av capabilities presentationAv capabilities presentation
Av capabilities presentationNAISales2
 
R Statistics With MongoDB
R Statistics With MongoDBR Statistics With MongoDB
R Statistics With MongoDB
MongoDB
 
Heavy Metal PowerPivot Remastered
Heavy Metal PowerPivot RemasteredHeavy Metal PowerPivot Remastered
Heavy Metal PowerPivot RemasteredJason Himmelstein
 
VirtualSense presentation at FBK
VirtualSense presentation at FBKVirtualSense presentation at FBK
VirtualSense presentation at FBK
Alessandro Bogliolo
 
Revving Up Revenue By Replenishing
Revving Up Revenue By ReplenishingRevving Up Revenue By Replenishing
Revving Up Revenue By Replenishing
WhatConts
 
Anti-social Databases
Anti-social DatabasesAnti-social Databases
Anti-social Databases
William LaForest
 
Introduction to jira
Introduction to jiraIntroduction to jira
Introduction to jiraXpand IT
 
Review: Leadership Frameworks
Review: Leadership FrameworksReview: Leadership Frameworks
Review: Leadership Frameworks
Mariam Nazarudin
 

Viewers also liked (20)

PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
 
Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - right
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
Nanorobot using in medical field
Nanorobot using in medical fieldNanorobot using in medical field
Nanorobot using in medical field
 
Mgidigitalglobalization
MgidigitalglobalizationMgidigitalglobalization
Mgidigitalglobalization
 
Science Communication 2.0: changing University attitude through Science resea...
Science Communication 2.0: changing University attitude through Science resea...Science Communication 2.0: changing University attitude through Science resea...
Science Communication 2.0: changing University attitude through Science resea...
 
Samanage-Website-Redesign-Jan2017
Samanage-Website-Redesign-Jan2017Samanage-Website-Redesign-Jan2017
Samanage-Website-Redesign-Jan2017
 
Av capabilities presentation
Av capabilities presentationAv capabilities presentation
Av capabilities presentation
 
Creative Overview
Creative OverviewCreative Overview
Creative Overview
 
R Statistics With MongoDB
R Statistics With MongoDBR Statistics With MongoDB
R Statistics With MongoDB
 
Heavy Metal PowerPivot Remastered
Heavy Metal PowerPivot RemasteredHeavy Metal PowerPivot Remastered
Heavy Metal PowerPivot Remastered
 
VirtualSense presentation at FBK
VirtualSense presentation at FBKVirtualSense presentation at FBK
VirtualSense presentation at FBK
 
Revving Up Revenue By Replenishing
Revving Up Revenue By ReplenishingRevving Up Revenue By Replenishing
Revving Up Revenue By Replenishing
 
Anti-social Databases
Anti-social DatabasesAnti-social Databases
Anti-social Databases
 
Introduction to jira
Introduction to jiraIntroduction to jira
Introduction to jira
 
Review: Leadership Frameworks
Review: Leadership FrameworksReview: Leadership Frameworks
Review: Leadership Frameworks
 

Similar to Secure communication over fiber optic networks

Seminar report OCDMA SYSTEM
Seminar report OCDMA SYSTEM Seminar report OCDMA SYSTEM
Seminar report OCDMA SYSTEM
Brijesh Bharti
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
Murtadha ali shukur
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710guestbd2263
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
adeel paracha
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
Faraz Faqeer
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
Pavithra Nagaraj
 
FIBEROPTICS.pdf
FIBEROPTICS.pdfFIBEROPTICS.pdf
FIBEROPTICS.pdf
GOUTHAMAB2
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
IJERA Editor
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
IJERA Editor
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission Media
Rajapriya82
 
Communication channels
Communication channelsCommunication channels
Communication channels
Joseph Zacharia
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
nimx106
 
communication Systems
communication Systems communication Systems
communication Systems
AJAL A J
 
Optical tech
Optical techOptical tech
Optical tech
coolateeq
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
kulachihansraj
 
Seminar on BSNL-EETP
Seminar on BSNL-EETPSeminar on BSNL-EETP
Seminar on BSNL-EETPAmir Mustafa
 
OPTICAL_FIBRE_COMMUNICATION.pptx
OPTICAL_FIBRE_COMMUNICATION.pptxOPTICAL_FIBRE_COMMUNICATION.pptx
OPTICAL_FIBRE_COMMUNICATION.pptx
DavidBrown748658
 

Similar to Secure communication over fiber optic networks (20)

Seminar report OCDMA SYSTEM
Seminar report OCDMA SYSTEM Seminar report OCDMA SYSTEM
Seminar report OCDMA SYSTEM
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
 
FIBEROPTICS.pdf
FIBEROPTICS.pdfFIBEROPTICS.pdf
FIBEROPTICS.pdf
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission Media
 
Communication channels
Communication channelsCommunication channels
Communication channels
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
communication Systems
communication Systems communication Systems
communication Systems
 
Optical tech
Optical techOptical tech
Optical tech
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Ai25204209
Ai25204209Ai25204209
Ai25204209
 
Seminar on BSNL-EETP
Seminar on BSNL-EETPSeminar on BSNL-EETP
Seminar on BSNL-EETP
 
OPTICAL_FIBRE_COMMUNICATION.pptx
OPTICAL_FIBRE_COMMUNICATION.pptxOPTICAL_FIBRE_COMMUNICATION.pptx
OPTICAL_FIBRE_COMMUNICATION.pptx
 
Mod8
Mod8Mod8
Mod8
 
VOCATIONAL TRAINING-1
VOCATIONAL TRAINING-1VOCATIONAL TRAINING-1
VOCATIONAL TRAINING-1
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

Secure communication over fiber optic networks

  • 1. Secure Communication Over Fiber Optic Networks Fiona Rozario D Y Patil School of Engg. & Technology M.E. (CN) – I 22nd March, 2016
  • 2. Contents  Optical Fiber Networks  What are optical fibers?  Working principle of optical fibers  Types of optical fibers  Fiber optic communication system  Advantages of using fiber optics in communication  Security issues in fiber optic networks  Encryption systems  What is encryption?  Encryption schemes  Optical cryptography  Steganography
  • 3. What are optical fibers?  A flexible, transparent fiber made of glass or plastic  Slightly thicker than human hair  Its function is to guide visible and infrared light over long distances
  • 5. Working principle of optic fibers Total internal reflection
  • 7. Advantages of fiber optics in communication networks • Longer life than copper wire • Nominal handling and installation costs • Unaffected by electromagnetic interference • Attenuation much lower than coaxial cable or twisted pair (about 0.2dB/km) • No issue of protecting against grounding and voltage problems • Higher BW offered
  • 8. Security Issues  Network attacks can be classified as:  Service disruptions: prevents communication or degrades QoS  Tapping: unauthorized access to data, compromises privacy  Physical layer attacks  Direct attacks: characteristics of physical elements changed  Indirect attacks: introducing crosstalk
  • 9. Security Issues Attacks aimed at:  Network transmission – tapping, jamming
  • 10. Security Issues – Direct attacks Attacks aimed at:  Optical amplifiers – jamming
  • 11. Security Issues – Direct attacks Attacks aimed at:  Optical cross-connects – in-band and out-of-band crosstalk
  • 12. Security in optical networks Security –  Physical security – ensures minimum privacy of data and QoS  Semantic security – protects meaning of the data even if it has already been reached by the attacker Deals with cryptopraphy
  • 13. What is encryption?  Mathematical altering data (plaintext) in a consistent manner to form a unintelligible ciphertext  Reversible process  Relies on a secret key
  • 14. Encryption schemes Building blocks of all cipher algorithms: • Substitution – replace bits/characters/blocks of data with substitutes • Transposition - rearrange replace bits/characters/blocks of data
  • 16. Optical encryption schemes  Optical CDMA  Quantum cryptography  Chaos based encryptions  Steganography
  • 17. Optical CDMA • An optical short pulse is spread over a one-bit duration T by encoding. • The decoding time despreads the signal, reconstructing the signal if the codes between the encoder and decoder match. • The signal remains spread over T if the codes do not match.
  • 20. Elements of Quantum Cryptography  Light waves are propagated as discrete quanta called photons.  They are massless and have energy, momentum and angular momentum called spin.  Spin carries the polarization – plane in which the electric field oscillates.  Photons of different polarizations represent the different quantum states  Polarization basis is the mapping we decide to use for a particular state
  • 21. Quantum Cryptography  Deals with secure key distribution  Key transmitted at a lower rate than data but at a higher security level  Key information is coded onto the quantum states of a photon
  • 22. Chaos based encryption  Masks the confidential data with stronger chaos  Enhances robustness of data transmission
  • 23. Steganography Aim – to hide the signal in the existing public channels; hacker should be unable to detect the presence of a signal
  • 24. Steganography Approach 1 -  temporally stretch a short optical pulse through chromatic dispersion  Without the correct dispersion compensation at the receiver, signal stays buried in the noise of the public channel  Attacker can use tunable dispersion compensating device to check presence of stealth signals  Fine tune the device to retrieve the stealth signal
  • 25. Steganography Approach 2 – Add temporal phase masks
  • 26. Steganography Approach 3 -  Employ ASE noise from amplifiers  ASE noise from EDFA is most prevalent in optic systems  ASE noise carrying stealth signal and ASE noise already existing in the system have identical spectral properties  Eavesdropper cannot differentiate between the two ASE noises
  • 27. Conclusion Technique Limitations Advantages OCDMA Effected by dispersions in the fiber; hence range of transmission gets limited to no longer than 100 km [3]. It is a multiple access system; plurality of codes can exist in the same channel. Confidentiality is not as strong as that provided by data encryption. Chaos based encryption Synchronization of receiver and transmitter is critical to proper functioning. It is very difficult to get lasers of the same parameters for synchronization. There is high level of robustness at high bit rates It can create jamming as well as avoid jamming to a high degree. Quantum cryptography Use of amplifiers will change the qubits. Hence the range of transmission is limited. This method can notify of interception of data [12]. It needs a dedicated channel of high quality for key exchange between every pair of sender and receiver. Hence multiplexing is not possible. Very vulnerable to jamming. Optical steganography: (a) Temporal stretching of pulse Data can be intercepted using tunable dispersion compensation devices. Simplest in implementation. (b) Temporal phase mask Robust against adversary attacks. (c) ASE noise Optical delays between receiver and transmitter must be matched exactly to get the stealth signal. Public channel does not induce any power penalty on the stealth channel and the stealth channel induces a power penalty of only 0.2- 0.3 dBm on the public channel.