Comparing methods of controlling unauthorized access to fiber-optic transmission lines

A. V. Yurchenko, A. D. Mekhtiyev, T. N. Shaigarayeva, A. D. Alkina, Y. G. Neshina

Research output: Contribution to journalConference article

Abstract

In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.

Original languageEnglish
Article number12026
JournalJournal of Physics: Conference Series
Volume1327
Issue number1
DOIs
Publication statusPublished - 9 Oct 2019
Event5th International Conference on Innovations in Non-Destructive Testing SibTest 2019, NDTS 2019 - Yekaterinburg, Russian Federation
Duration: 26 Jun 201928 Jun 2019

Fingerprint

transmission lines
fiber optics
reflectometers
data transmission
radiation sources
traffic
installing
telecommunication
laser beams
causes
configurations
wavelengths

ASJC Scopus subject areas

  • Physics and Astronomy(all)

Cite this

Comparing methods of controlling unauthorized access to fiber-optic transmission lines. / Yurchenko, A. V.; Mekhtiyev, A. D.; Shaigarayeva, T. N.; Alkina, A. D.; Neshina, Y. G.

In: Journal of Physics: Conference Series, Vol. 1327, No. 1, 12026, 09.10.2019.

Research output: Contribution to journalConference article

Yurchenko, A. V. ; Mekhtiyev, A. D. ; Shaigarayeva, T. N. ; Alkina, A. D. ; Neshina, Y. G. / Comparing methods of controlling unauthorized access to fiber-optic transmission lines. In: Journal of Physics: Conference Series. 2019 ; Vol. 1327, No. 1.
@article{c9f5ed29a4ee4c0c8cd08dd538d8678d,
title = "Comparing methods of controlling unauthorized access to fiber-optic transmission lines",
abstract = "In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.",
author = "Yurchenko, {A. V.} and Mekhtiyev, {A. D.} and Shaigarayeva, {T. N.} and Alkina, {A. D.} and Neshina, {Y. G.}",
year = "2019",
month = "10",
day = "9",
doi = "10.1088/1742-6596/1327/1/012026",
language = "English",
volume = "1327",
journal = "Journal of Physics: Conference Series",
issn = "1742-6588",
publisher = "IOP Publishing Ltd.",
number = "1",

}

TY - JOUR

T1 - Comparing methods of controlling unauthorized access to fiber-optic transmission lines

AU - Yurchenko, A. V.

AU - Mekhtiyev, A. D.

AU - Shaigarayeva, T. N.

AU - Alkina, A. D.

AU - Neshina, Y. G.

PY - 2019/10/9

Y1 - 2019/10/9

N2 - In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.

AB - In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.

UR - http://www.scopus.com/inward/record.url?scp=85075017088&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85075017088&partnerID=8YFLogxK

U2 - 10.1088/1742-6596/1327/1/012026

DO - 10.1088/1742-6596/1327/1/012026

M3 - Conference article

AN - SCOPUS:85075017088

VL - 1327

JO - Journal of Physics: Conference Series

JF - Journal of Physics: Conference Series

SN - 1742-6588

IS - 1

M1 - 12026

ER -