Optical Network Security Technical Analysis of Fiber Tapping Mec
Optical Network Security Technical Analysis of Fiber Tapping Mec
02004 IEEE
0-7803-8847-X/04/$20.00 71 1
distances and creating a condition called ‘Total Internal The goal of an intruder would be to use the minimum
Reflection.’ bend loss required to tap a discernable data signal
without inteipting the optical signal in its entirety or
In order for an optical signal to be tapped or intercepted, damaging the fiber (both of which would create an
the core of the fiber carrying the traffic must be
Interruption of Signal alarm fiom the connecting switch
compromised or ‘tapped.’ In order to access the core of
and result in Security services being dispatched.). If an
a fiber, an intruder must first physically access the fibers
optimal fiber bend tap is achieved, the signal
within the optical cable.
degradation will be minimal and only detectable through
on-going network monitoring and testing.
2) Optical Splitting: An optical splitter works very
much in the same manner as a coax splitter for
‘R televisions - it ‘splits’ a single optical signal into two
identical signals. However, in order for the device to be
installed, the target fiber must be cut and both ends
spIiced onto the optical splitter. Once the fibers are
accessed within the cable, the splicing of the fibers onto
the optical splitter could take as little 2-3 minutes
Figure 1. Optical Cable Cross-section
depending on the splicing method used.
The figure above depicts a standard indoor, dielectric
cable with 24-fibers. In order to access the fibers, an
intruder would have to either access a terminated end of
the cable where the fibers are exposed (usually inside of
a Controlled Access Area and/or Red Equipment Area)
or gain mid-span access to the cable. While accessing
the terminated ends of a fiber would be preferred, this is
also the area with the highest degree of security and Figure 3. Installation of an Optical Splitter
personnel scrutiny; so mid-span access to a cable is a
The biggest drawback to using an optical splitter is that
more likely threat. To perform a mid-span access, the
the installation of such it device will cause an
intruder would first have to cut through and strip away at
intemption of service which should result in a security
least 12-24” of the outer jacket in order to have enough response exposing the sytem breach, The loss of the
room to access the individual fibers in the center of the splitter will not necessarily be high. If the splitter is
cable. Once the individual fibers are accessed, an
installed in a part of the system where the optical power
intruder has several options in which to intercept or ‘tap’ in the fiber is relatively high it may only be necessary to
the optical signal. These methods include (1) Fiber
tap a few percent of the signal with less than 1 dB loss.
bending, (2) Optical Splitting, (3) Evanescent Coupling, A lossless splitter could be used to over come this loss if
(4) V-Groove Cut, and ( 5 ) Optical Scattering.
desired but then the optical splitter requires a source of
1) Fiber Bending: A fiber bend loss tap is the easiest power-making it even more noticeable during visual
tapping method to implement in the field. It involves inspections.
stripping an individual fiber down to the cladding and
bending it to compromise the Total Internal Reflection 3) Evanescent Coupling: Very similar to the Optical
and allowing a fraction of the optical signal to be Splitter method, Evanescent Coupling utilizes the same
coupled out. The power of the tapped signal will depend process without requiring the target fiber to be cut and
upon the radius (R) and angle (e) of the bend. field-constructs a 1x2 optical splitter rather than using a
pre-manufactured device. By polishing the cladding
P F p d EQlill very close to the fiber core on both the target and capture
fibers, it reduces the reflectivity of the core-cladding
boundary and allows a portion of the optical signal to be
captured by the tap fiber. While this approach appears to
have significant advantages over the Optical Splitter
method (i.e. no system interruption, no external splitter
device, etc.), it is extremely difficult to implement in a
Figure 2. Fiber Bend Tap Mechanics
field environment and still results in a noticeable optical
loss (1-2dl3). An optical fiber is smaller than a human
712
hair and the core size of singlemode fiber is less than an core. The grating then reflects a portion of the optical
eighth of a human hair-making it almost impossible to signal out of the target fiber into a capture fiber.
achieve the precision required in the field without
sophisticated and cumbersome equipment and a great
deal of uninterrupted time to install the tap,
713
received. By knowing the amount of optical signal
inserted into a network and the amount received on the TESTING EFFECTIVENESS VS. FIEER TAPS
other end, it is possible to derive the optical loss of the
segment as depicted below: Since the Optical Test Set and the OTDR perform very
differently, they each have varying degrees of
effectiveness in detecting and preventing optical
intercepts. The chart below provides a relative depiction
of each tools’ effectiveness in identifying the various
fiber tap methods discussed. The Optical Tester
provides fairly good detection capabilities for those fiber
T m d w Patch P e l PdChPMd Tra~aawr tap methods that are ‘easy’ to implement in the field.
2 f However, it is relatively weak in detecting the more
lntcrconwdQ&h Pard advanced fiber taps. The OTDR, however, provides
Figure 7. Calculating Optical Loss (dB) strong-to-moderate detection capabilities across the
By recording the various attenuation readings for each board because of its ability to identify discrete loss
individual fiber tested over time, it is possible to track points, possibly corresponding to a tap, along a fiber
network degradation and identify any discrepancies that link. Finally, specialized OTDRs, such as Brillouin-
may be indicative of optical network intercepts (i.e. fiber OTDR and polarization-OTDR, are available which test
for birefringence, stress and other optical deformities
W>*
caused by all forms of fiber taps. The specialized
Opticul Time Domain Reflectometer (OTDR): An OTDRs provided the best detection capability across all
OTDR acts very similar to radar in that it sends out very fiber tap methods.
precise and measured pulses of light at various
wavelengths and then measures the amount of time it
takes to receive the signal back and the intensity of the Effrdkenem uf Optical T e t Equipment for the
returning signal. By tracking both the time and intensity Oetedion L Prwvention of Fiber Taps
714
predominantly used by Department of Defense and tight-buffered cable designs provided any advantage for
Federal agencies in their LAN/WAN deployments. network security or monitoring. In fact, the only
significant attenuation change that was detected during
the experiment for loose-tube cables was when a
technician mistakenly crimped the buffer tube he was
trying to access fibers in.
I Mid-Span Fiber Fiber I
Loose-Tube Cable None LOW None
Tight-Buffered Cable None None None
Figure 10: Loose-Tube Cable Design Ribbon Cable None High None
Figure 13: Fiber-Tap Experiment Results
Tight-buffered cables are comprised of a circular
arrangement of individual 900um buffered fibers. This Because ribbon cables encapsulate 12 individual optical
composition is predominatly used by Department of fibers inside a ribbon matrix, the ribbon matrix must be
Defense and fecderal agencies in LAN deployments - removed prior to an individual fiber being accessed in
mostly inside of buildings. preparation for a fiber tap. It is during the removal of
the ribbon matrix that a significant attenuation change
can be detected as noted by the OTDR trace overlay
----
O U M
WCPPMFam
shown below:
ma--
715
As a resuIt of this experiment, it is clcar that ribbon into the network architecture and combined with an
cables offer a significant advantage over other cable optical switch to allow a single set of test equipment to
designs when it comes to enhancing network security be connected to multiple optical circuits in the facility.
andlor monitoring for unautorized cable access and Due to the increased equipment requirements and the
installation of fiber taps. need for an optical switch, the Automated Monitoring
approach is very costly-but is the onIy approach that
NETWORK INTEGRATION OF DETECTION &
can automatically monitor network performance and
PREVENTION CAPABILITIES
highlight any potential optical intercepts / fiber taps.
The different optical test equipment options can be UnfortunateIy, many equipment vendors have bundled
integrated into any network architecture. The only this capability with other capabilities that may be
questions that have to be addressed are how intrusive of extraneous to the management of secure optical
testing are end users willing to tolerate and how much networks.
the resulting solution will cost. There are two main
The highest level of security can only be achieved by
categories of network testing and monitoring: passive
continuous monitoring of the network. This could be
testing and automated monitoring.
achieved by propagating several wavelength channels
Passive Testing: Passive testing is the most cost- dedicated to monitoring the security of a system
effective method of documenting, testing, and alongside data carrying channels in a way analagous to
monitoring secure networks for degradation of service the optical supervisory channels ( O X ) in DWDM
and possible optical intercepts. This method also systems. For example, the loss of the bent fiber tap
provides a degree of protection directly corresponding to described above exhibits a strong wavelength
the amount of personnel resources dedicated to testing dependence. The power ratio of two well separated
optical networks using an OTDR or Optical Test Set. wavelengths propagating in the fiber would change
Passive testing is performed by having a stand-alone dramatically if a bent fiber tap was suddenly placed in
OTDR andor Optical Test Set to periodically test and the link. Continuous monitoring of this ratio would
document the optical circuits running between and immediately show that a tap was occuring and could
through secure facilities. Because this testing utilizes instruct the netwrk management system to shut down the
stand-alone equipment, it offers the most cost-effective link or re-route the data.
protection with varying degrees of transparency to
network operations. Passive testing has normally been CONCLUSION
viewed as very intrusive to network operations in that it While fiber optics are exponentially more secure than
required each network circuit to be dark and copper cables, there are still ways that enemies can tap
disconnected from the switch in order to facilitate into and intercept classified infomation traveling across
testing. While this approach is still valid today, it does optical networks. A majority of fiber tapping methods
create a great deal of complexity that has to be managed require some degree of access to an optical fiber’s core
and is not recommended. A better approach to Passive which is challenging if not impossible to discretely
Testing is the integration of passive test points into Red accomplish in the field. Regardless of the method used,
and Black . Equipment -areas. .These test . points are fiber taps and optical intercepts can be detected by using
continuously linked to the optical circuits and provide standard optical test equipment such as an OTDR or
ready access to the lit circuits without disrupting service Optical Test Set. Detection of fiber taps can also be
or requiring the circuit to be disconnected from the greatly enhanced by the use of ribbon cables instead of
switch. By utilizing different wavelengths for testing, an loose-tibe or tight-buffered cables. Depending on the
OTDR or Optical test Set can test a fiber while it is stiIl threat level or degree of protection desired, network
in operation. This alleviates the concern with taking a monitoring and testing can either be either passive using
network down for testing and enables Network testing stand-alone test equipment or automated using an
and Monitoring to be more random and not as forecasted integrated network monitoring capability. Regardless of
or predictable. the approach taken, network monitoring and testing has
to be an integral component of network management to
Automated Monitoring: To achieve a more proactive prevent and detect optical intercepts before they result in
and automated approach to Network Testing and the compromise of National Security Information .
Monitoring, test equipment can be directly integrated
716