Comparing methods of controlling unauthorized access to fiber-optic transmission lines

מידע ביבליוגרפי
Parent link:Journal of Physics: Conference Series
Vol. 1327 : Innovations in Non-Destructive Testing (SibTest 2019).— 2019.— [012026, 6 р.]
מחבר תאגידי: Национальный исследовательский Томский политехнический университет Исследовательская школа физики высокоэнергетических процессов
מחברים אחרים: Yurchenko A. V. Aleksey Vasilievich, Mekhtiyev (Mekhtiev) A. Ali, Shaigarayeva T. N., Alkina A. D., Neshina Y. G.
סיכום:Title screen
In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.
יצא לאור: 2019
נושאים:
גישה מקוונת:https://doi.org/10.1088/1742-6596/1327/1/012026
http://earchive.tpu.ru/handle/11683/57047
פורמט: אלקטרוני Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=661277
תיאור
סיכום:Title screen
In present day telecommunication systems the topical problem is protection of the subscribers' personal data against possible thefts and hacking fiber-optic information transmission guide lines, as this causes a number of dangerous situations and problems. The attackers, in spite of the legislative framework for the information protection, are still trying to read information from a fiber-optic transmission line (FOTL). This possibility arises due to incorrect installation and configuration of error protection, unauthorized access to information is possible. This article discusses two methods of detecting unauthorized admission (unauthorized access). The results of the study using an optical laser radiation source and power meter, as well as a YOKOGAWA optical reflectometer are presented. As a result, it was concluded that the method of preventing unauthorized access at the wavelength of 1625 nm can be used, since continuous FOTL monitoring will not interfere with the traffic.
DOI:10.1088/1742-6596/1327/1/012026