OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 15, Iss. 2 — Jan. 22, 2007
  • pp: 289–301

Analysis of stealth communications over a public fiber-optical network

Bernard B. Wu and Evgenii E. Narimanov  »View Author Affiliations


Optics Express, Vol. 15, Issue 2, pp. 289-301 (2007)
http://dx.doi.org/10.1364/OE.15.000289


View Full Text Article

Enhanced HTML    Acrobat PDF (319 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We evaluate the security performance of the recently proposed “stealth” approach to covert communications over a public fiber-optical network. We present quantitative security analysis to assess the vulnerability of such systems against different attacks executed by an eavesdropper. We demonstrate the security advantage of the system by examining the BER/SNR performance as a function of the fidelity of the decoder used by an eavesdropper. Effective key length is constructed as a security metric to gauge the level of confidentiality implicit in the secure transmission.

© 2007 Optical Society of America

OCIS Codes
(060.2330) Fiber optics and optical communications : Fiber optics communications
(060.2360) Fiber optics and optical communications : Fiber optics links and subsystems

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: August 15, 2006
Revised Manuscript: January 2, 2007
Manuscript Accepted: January 12, 2007
Published: January 22, 2007

Citation
Bernard B. Wu and Evgenii E. Narimanov, "Analysis of stealth communications over a public fiber-optical network.," Opt. Express 15, 289-301 (2007)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-15-2-289


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. T. Jamil, "Steganography: the art of hiding information in plain sight," IEEE Potentials 18, 10-12 (1999) [CrossRef]
  2. A.J. Viterbi, "Spread spectrum communications - myths and realities," IEEE Commun. Mag. 17, 11-18 (1979) [CrossRef]
  3. B. B. Wu and E. E. Narimanov, "A method for secure communications over a public fiber-optical network," Opt. Express 14, 3738-3751 (2006) [CrossRef] [PubMed]
  4. A.J. Viterbi, CDMA: Principles of Spread Spectrum Communications, Addison-Wesley, Reading, Massachusetts (1995)
  5. J. Shah, "Optical CDMA," Opt. Photon. News 14, 42-47 (2003) [CrossRef]
  6. Z. Jiang, D. S. Seo, S.-D. Yang, D. E. Leaird, A. M. Weiner, R. V. Roussev, C. Langrock and M. M. Fejer, "Four user, 2.5 Gb/s, spectrally coded O-CDMA system demonstration using low power nonlinear processing," J. Lightwave Technol. 23, 143-158 (2005) [CrossRef]
  7. Z. Jiang, D.E. Leaird and A.M. Weiner, " Experimental Investigation of Security Issues in OCDMA," OFC 2006 OThT2
  8. T. H. Shake, "Confidentiality Performance of Spectral-Phase-Encoded Optical CDMA," J. Lightwave Technol. 23, 1652-1663
  9. G. P. Agrawal, Fiber-Optical Communication Systems 3rd Edition (Wiley-Interscience, 2002) [PubMed]
  10. C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal27 379-423, 623-656 (1948).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 
Fig. 4 Fig. 5
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited