{"title":"Unauthorized Access Monitoring in Optical Access Networks","authors":"E. Kitova, N. Gorlov, I. Bogachkov","doi":"10.1109/SYNCHROINFO49631.2020.9166039","DOIUrl":null,"url":null,"abstract":"The article deals with the problem of protecting information from unauthorized access. The results of comparative analysis of methods for information extracting from optical fiber lines are presented. The classification of extraction methods, physical conditions for leak channels formation is given. In addition, methods making it possible to remove part of the optical radiation to outside of the propagation medium are given. A technique is proposed for detecting the fact of the information leakage channels formation. A number of different ways for the detection is described to successfully combat unauthorized access. The analysis showed that the simplest detection method is bending of optic fiber in order to eliminate total internal reflection. In this case, to monitor and detect fiber bends it is necessary to track the introduced losses. The structure, operation principles and trends in monitoring systems development are given.","PeriodicalId":255578,"journal":{"name":"2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNCHROINFO49631.2020.9166039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The article deals with the problem of protecting information from unauthorized access. The results of comparative analysis of methods for information extracting from optical fiber lines are presented. The classification of extraction methods, physical conditions for leak channels formation is given. In addition, methods making it possible to remove part of the optical radiation to outside of the propagation medium are given. A technique is proposed for detecting the fact of the information leakage channels formation. A number of different ways for the detection is described to successfully combat unauthorized access. The analysis showed that the simplest detection method is bending of optic fiber in order to eliminate total internal reflection. In this case, to monitor and detect fiber bends it is necessary to track the introduced losses. The structure, operation principles and trends in monitoring systems development are given.