All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

NETWORK PHYSICAL LAYER ATTACK IN THE VERY HIGH CAPACITY NETWORKS

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F23%3APU148356" target="_blank" >RIV/00216305:26220/23:PU148356 - isvavai.cz</a>

  • Alternative codes found

    RIV/60162694:G43__/24:00560179 RIV/00216224:14610/23:00139898

  • Result on the web

    <a href="http://advances.utc.sk/index.php/AEEE/article/view/4973/488488729" target="_blank" >http://advances.utc.sk/index.php/AEEE/article/view/4973/488488729</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.15598/aeee.v21i1.4973" target="_blank" >10.15598/aeee.v21i1.4973</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    NETWORK PHYSICAL LAYER ATTACK IN THE VERY HIGH CAPACITY NETWORKS

  • Original language description

    This paper focuses on the analysis of fiber optic line eavesdropping options based on cheap and easy-to-use equipment -for example, the commonly used fiber optic splitters with suitable optical power division ratios. The fiber optic splitter takes a small portion of the optical power sufficient for the eavesdropper to read the data and lets as much signal power as possible pass in the original direction. We attempted to detect the presence of fiber optic splitter-based eavesdropping points on the communication line by using common techniques designated for fiber optic quality measurement and fault detection. The results are summarised in this paper.year billions of dollars are lost due to intrusions into those same networks. At first, fiber optic networks were touted as one of the most secure infrastructure options. In the last couple of years, it has been suggested that fiber is almost as easy to tap as copper [1] and [2]. Today, there are millions of miles of fiber cable spanning the globe. Large amount of data are being transmitted across these cables daily, including sensitive government data, and personal financial, and medical information. Fiber optic communication is widely and publicly understood as a medium that is difficult to eavesdrop on. Unfortunately, this common conception is far from the technical reality. In this paper, we study some cheap and easily accessible tools for eavesdropping on fiber optic communications and explore the chances for the automatic detection of their placement on live fiber optic lines.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20200 - Electrical engineering, Electronic engineering, Information engineering

Result continuities

  • Project

    <a href="/en/project/VI20192022140" target="_blank" >VI20192022140: Detection of Defence Perimeter Disturbance by Instaneous Changing of Optical Signal Polarization</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Advances in Electrical and Electronic Engineering

  • ISSN

    1336-1376

  • e-ISSN

    1804-3119

  • Volume of the periodical

    21

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    SK - SLOVAKIA

  • Number of pages

    11

  • Pages from-to

    37-47

  • UT code for WoS article

    000995750300005

  • EID of the result in the Scopus database

    2-s2.0-85165875712