Optical networks are vulnerable to various types of security threats. In one type of attack, sometimes referred to as a man-in-the-middle (MITM) attack, an intruder severs a fiber connecting two nodes of the network and inserts an intrusion device that intercepts signals communicated across the fiber by the two nodes. To prevent its detection, the intrusion device may regenerate the intercepted signals so that each node continues to receive optical signals from the other node after insertion of the intrusion device in the fiber's path. In this scenario, the intrusion device could remain in the path and, hence, have unauthorized access to communicated data for long periods of time.
As optical networks become a significant element of data transfers for individuals, banks, and other data users, there is a need to protect optical networks from MITM attacks and other security threats. It is generally desirable for the circuitry for protecting optical networks from such threats to be relatively simple and inexpensive without adversely impacting the performance of the optical networks.
The disclosure can be better understood with reference to the following drawings. The elements of the drawings are not necessarily to scale relative to each other, emphasis instead being placed upon clearly illustrating the principles of the disclosure. Furthermore, like reference numerals designate corresponding parts throughout the several views.
The present disclosure generally pertains to systems and methods for protecting a communication system from a man-in-the-middle (MITM) attack on a physical layer of a communication system. An embodiment of an optical communication system of the present disclosure comprises optical communication devices coupled together via an optical fiber. One of the optical communication devices, referred to hereafter as the “transmitting device,” generates an optical signal that is double-modulated for transmission to the other optical communication device, referred to hereafter as the “receiving device.” The double-modulated signal contains payload information and security information. The payload information is carried by an optical data signal, and the transmitting device embeds the security information in the optical data signal by amplitude modulating the optical data signal with the security information at a level that is hidden in optical channel noise. Therefore, if an intrusion device is inserted into the fiber path, such intrusion device should be unaware of the existence of the security information and, thus, will not embed the security information in the regenerated signal. Upon receiving an optical signal from the fiber, the receiving device determines whether the security information is present. If the security information is not present, the receiving device detects a presence of an intrusion device in the fiber and notifies a system administrator or other user. The receiving device also stops using the fiber for data communication until the system administrator or other user has verified that fiber is safe of such communication.
To facilitate detection of the optical intrusion device 130, the transmitter 125 embeds security information in the optical signals transmitted by it. In one exemplary embodiment, the security information is a predefined code word that is expected by the optical communication device 122. Such code word may be a shared secret or may be derived from a shared secret that is negotiated or otherwise communicated between the optical communication devices 120 and 122. Techniques for communicating shared secrets between communication devices (e.g., encryption, public key/private key, etc.) are generally well-known, and any known technique may be used by the devices 120 and 122 for communicating the security information described herein. Alternatively, the security information may be provisioned or otherwise stored in the devices 120 and 122 a priori such that each device 120 and 122 is aware of the security information prior to communicating with one another. Yet other techniques for informing each device 120 and 122 of the security information are possible.
As will be described in more detail hereafter, the security information is embedded in the optical signal such that it is effectively hidden from the intrusion device 130. Thus, the intrusion device 130 should be unaware of the presence of the security information in the optical signal and, therefore, fail to embed the security information in the optical signals transmitted by it to the receiver 126. Moreover, the optical communication device 122 is configured to detect the presence of the intrusion device 130 in the fiber path in response to a determination that the receiver 126 has received at least one optical signal missing the security information.
In one exemplary embodiment, the transmitter 125 embeds the security information in the transmitted optical signals using double-modulation techniques as described in U.S. Pat. No. 6,366,373, entitled “Method of Intrinsic Continuous Management Data Transmission in Fiber Optic Communications” and filed on Apr. 2, 2002, and U.S. Pat. No. 7,630,631, entitled “Out-of Band Data Communication between Network Transceivers” and filed on Dec. 8, 2009, which are both incorporated herein by reference. In double modulation, a high-speed data signal defining first data is modulated (e.g., amplitude modulated) with a low-speed data signal defining second data in order to embed the low-speed signal in the high-speed signal. In the instant embodiment, the transmitter 125 amplitude modulates a high-speed signal, referred to hereafter as “payload signal,” carrying payload data for the receiver 126 with a low-speed signal, referred to hereafter as “security signal,” carrying security information, such as a predefined code word, as shown by block 310 of
Note that the amplitude modulation of the payload signal is preferably at a level that does not interfere with recovery of the payload data. In this regard, the amplitude modulation of the payload signal affects the amplitude of such signal by a small amount, such as less than about 5 to 10 percent, so that embedding of the security signal in the payload signal does not prevent recovery of payload data from the payload signal. The optical signal transmitted by optical communication device 120 is a double-modulated signal where the payload signal serves as a carrier for the security signal.
To better illustrate the foregoing, refer to
Upon receiving an optical signal, the receiver 126 is configured to determine whether such signal has an embedded security signal, as shown by block 320 of
However, when the intrusion device 130 is within the fiber path, as shown by
As an example, the optical communication device 122 may transmit a message through the network 150 or otherwise to an address of a system administrator or other user thereby warning the administrator or other user of the presence of the intrusion device 130. In one embodiment, the message identifies the fiber 140 to which the intrusion device 130 is coupled or otherwise indicates the approximate location of the intrusion and/or the data path compromised by the intrusion.
When the device 122 detects the optical intrusion device 130, the device 122 also stops sending data across the fiber 140. For example, the optical communication device 122 may find other paths through the network 150 for messages that otherwise would have been transmitted across the fiber 140, thereby preventing the intrusion device 130 from receiving any further messages from the device 122. Note that the device 120 may be similarly configured to detect the presence of the intrusion device 130 and to stop transmitting messages across the fiber 140 as well.
An exemplary embodiment of the transmitter 125 is depicted in
Another exemplary embodiment of the transmitter 125 is depicted in
If the intrusion device 130 is detected, there are various actions that can be taken. As an example, data communication across the optical fiber 140 may be stopped and/or a notification message may be transmitted in response to detection of the intrusion device 130, as described above. In one exemplary embodiment, attempts are made to ascertain the approximate location of the detected intrusion device 130 in an effort to facilitate removal of the intrusion device from the network. In this regard, the optical fiber 140 may span across a significant distance, such as several miles, and a technician may have problems locating the intrusion device 130 without a means to sense its approximate location.
As shown by
In this regard, OTDR modules generally operate on the principle that light is reflected all along the length of the fiber 140, but light is generally reflected more at anomalies than at other points along the fiber 140. By analyzing the returns of a transmitted sequence, it is possible to determine not only the presence of anomalies but also the distance of such anomalies from the transmitter 125. The use of OTDR modules is generally well-known and will not be described in more detail herein. An exemplary OTDR module is described in commonly-assigned U.S. patent application Ser. No. 13/218,204, entitled “Correlation Systems and Methods with Error Compensation” and filed on Aug. 25, 2011, which is incorporated herein by reference. Such patent application describes exemplary techniques for embedding an M sequence in an optical data signal using amplitude modulation similar to the techniques described herein for embedding a low-speed security signal in a high-speed optical data signal.
In one exemplary embodiment, the OTDR module 168 is responsive to a detection of the intrusion device 130 in order to determine its approximate location along the fiber 140. In this regard, if an intrusion device 130 is inserted into the fiber 140, as shown by
When the intrusion logic 152 detects the presence of the intrusion device 130, as described above, the logic 152 is configured to request the OTDR module 168 to perform an analysis of the fiber 140 in order to determine the distance of the intrusion device 130 from the transmitter 168. In response, the OTDR module 168 is configured to perform such analysis and to provide data indicative of such distance to the logic 152. When the intrusion logic 152 transmits a message notifying the administrator or other user about the presence of the intrusion device 130, such message preferably indicates the location of the intrusion device 130, such as the distance of the intrusion device 130 from the optical communication device 122. Such message also identifies the device 122 and/or indicates the location of the device 122. Thus, by analyzing the message, the user should be able to determine the approximate location of the intrusion device 130.
In another embodiment, the use of the OTDR module 168 is controlled by a system administrator or other user. As an example, the intrusion detection logic 152 may transmit a message via the network 150 or otherwise to a system administrator who may then activate operation of the OTDR module 168 for discovering the location of the instruction device 130. Such system administrator or other user may be at a location remote from the device 122 and communicate with the OTDR module 168 via the network 150 or otherwise in order to control the operation of the OTDR module 168 and/or receive results of the OTDR analysis. Note that the use of the OTDR module 168 is optional, and the OTDR module 136 may be omitted from the optical communication device 122, if desired.
In one exemplary embodiment, the transmitter 125 is configured to frequency modulate the security signal in an effort to better hide the security signal within the transmitted optical signal and/or to help mitigate the effects of noise. In this regard, the transmitter 125 is configured to generate a security signal and to amplitude modulate the payload signal (either in the electrical domain or the optical domain) with the security signal, as described above. Also, as described above, the security signal is modulated with security information, such as a predefined code word, in order to convey the security information. However, rather than amplitude modulating the security signal with the security information in order to convey such information as is described above, the instantaneous frequency of the security signal is varied in order to convey the security information. That is, the security signal is frequency modulated with the security information. In yet other embodiments, other techniques for modulating the security signal with the security information are possible.
Number | Name | Date | Kind |
---|---|---|---|
4217488 | Hubbard | Aug 1980 | A |
4435850 | Bowen et al. | Mar 1984 | A |
4538140 | Prestel | Aug 1985 | A |
4605922 | Blattman et al. | Aug 1986 | A |
5093568 | Maycock | Mar 1992 | A |
5274488 | Udd | Dec 1993 | A |
5825516 | Walsh | Oct 1998 | A |
6046797 | Spencer et al. | Apr 2000 | A |
6122044 | Gautheron et al. | Sep 2000 | A |
6476952 | Snawerdt | Nov 2002 | B1 |
7126678 | Fayolle et al. | Oct 2006 | B2 |
7280188 | Schmuck et al. | Oct 2007 | B2 |
7317874 | Li et al. | Jan 2008 | B2 |
7440701 | Li et al. | Oct 2008 | B2 |
7450848 | Li et al. | Nov 2008 | B2 |
7493042 | Li et al. | Feb 2009 | B2 |
7570843 | Miyazaki et al. | Aug 2009 | B2 |
8000601 | Schofield et al. | Aug 2011 | B2 |
20050180315 | Chitrapu et al. | Aug 2005 | A1 |
20060156009 | Shin et al. | Jul 2006 | A1 |
20090148159 | Schofield et al. | Jun 2009 | A1 |
20090257743 | Chung et al. | Oct 2009 | A1 |
20100088766 | Michaely et al. | Apr 2010 | A1 |
20110043806 | Guetta et al. | Feb 2011 | A1 |
20110135074 | McNaughton et al. | Jun 2011 | A1 |
20110175568 | Leijssen et al. | Jul 2011 | A1 |
20120076301 | Kanter | Mar 2012 | A1 |
Number | Date | Country |
---|---|---|
1748580 | Jul 2005 | EP |
1884758 | Mar 2006 | EP |
1901448 | Sep 2006 | EP |
1986350 | Apr 2007 | EP |
1524781 | Oct 2007 | EP |
Entry |
---|
Fuse et al., Development of an Ultra High-secure and 1 Gbps Optical Transmission System Using Quantum Noise Diffusion Cryptography, Sep. 2005, 31st European Conference on Optical Communication, ECOC 2005, vol. 3, pp. 555-556. |
Sischka, et al., “Complimentary Correlation Optical Time-Domain Reflectometry—in respect to the HP 8145A Optical Time-Domain Reflectorneter—technical,” Hewlett-Packard Journal, Dec. 1988, p. 14-21. |
Takushima, et al. “In-Service OTDR for Passive Optical Networks,” OSA/OFC/NFOEC, 2010. |
Turner, et al, U.S. Appl. No. 12/783,999 entitled, “Systems and Methods for Unobtrusively Testing Optical Fibers,” filed May 20, 2010. |