Exploring the potential of longitudinal power monitoring for detecting physical-layer attacks [Invited]

IF 4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Matheus Sena;Abdelrahmane Moawad;Robert Emmerich;Behnam Shariati;Marc Geitz;Ralf-Peter Braun;Johannes Fischer;Ronald Freund
{"title":"Exploring the potential of longitudinal power monitoring for detecting physical-layer attacks [Invited]","authors":"Matheus Sena;Abdelrahmane Moawad;Robert Emmerich;Behnam Shariati;Marc Geitz;Ralf-Peter Braun;Johannes Fischer;Ronald Freund","doi":"10.1364/JOCN.554766","DOIUrl":null,"url":null,"abstract":"The recurring cases of suspicious incidents involving optical fiber cables in recent years have exposed the vulnerabilities of modern communication networks. Whether driven by geopolitical tensions, sabotage, or urban vandalism, these disruptions can cause Internet blackouts, compromise user privacy, and, most critically, challenge operators’ reliability in delivering secure connectivity. Moreover, the emergence of such incidents raises key concerns about how effectively network operators can secure thousands of kilometers of deployed fiber without incurring additional costs from expensive monitoring solutions. In this context, the rise of receiver (Rx)-based digital signal processing (DSP) monitoring schemes can serve as a valuable ally. Originally designed for optical performance monitoring—providing insights such as the estimation of the longitudinal power monitoring (LPM) in optical fiber links—these approaches can also play a crucial role in detecting fiber-related attacks, as any attempt to leak or degrade information leaves distinctive optical power signatures that can be revealed by the Rx-DSP. Therefore, this work investigates the effectiveness of LPM in detecting physical-layer attacks. A detailed simulative analysis is conducted for fiber tapping, addressing aspects such as monitoring implementation, security vulnerabilities, and signature recognition. Other attacks, such as quality-of-service degradation and out-of-band jamming via gain competition, are explored qualitatively, offering insights and identifying opportunities for future research.","PeriodicalId":50103,"journal":{"name":"Journal of Optical Communications and Networking","volume":"17 7","pages":"C30-C40"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Optical Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10948119/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The recurring cases of suspicious incidents involving optical fiber cables in recent years have exposed the vulnerabilities of modern communication networks. Whether driven by geopolitical tensions, sabotage, or urban vandalism, these disruptions can cause Internet blackouts, compromise user privacy, and, most critically, challenge operators’ reliability in delivering secure connectivity. Moreover, the emergence of such incidents raises key concerns about how effectively network operators can secure thousands of kilometers of deployed fiber without incurring additional costs from expensive monitoring solutions. In this context, the rise of receiver (Rx)-based digital signal processing (DSP) monitoring schemes can serve as a valuable ally. Originally designed for optical performance monitoring—providing insights such as the estimation of the longitudinal power monitoring (LPM) in optical fiber links—these approaches can also play a crucial role in detecting fiber-related attacks, as any attempt to leak or degrade information leaves distinctive optical power signatures that can be revealed by the Rx-DSP. Therefore, this work investigates the effectiveness of LPM in detecting physical-layer attacks. A detailed simulative analysis is conducted for fiber tapping, addressing aspects such as monitoring implementation, security vulnerabilities, and signature recognition. Other attacks, such as quality-of-service degradation and out-of-band jamming via gain competition, are explored qualitatively, offering insights and identifying opportunities for future research.
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
9.40
自引率
16.00%
发文量
104
审稿时长
4 months
期刊介绍: The scope of the Journal includes advances in the state-of-the-art of optical networking science, technology, and engineering. Both theoretical contributions (including new techniques, concepts, analyses, and economic studies) and practical contributions (including optical networking experiments, prototypes, and new applications) are encouraged. Subareas of interest include the architecture and design of optical networks, optical network survivability and security, software-defined optical networking, elastic optical networks, data and control plane advances, network management related innovation, and optical access networks. Enabling technologies and their applications are suitable topics only if the results are shown to directly impact optical networking beyond simple point-to-point networks.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信