Performance Analysis Of Secured Fiber Optics Communication Technologies In Computer Networking And Security Challenges
DOI:
https://doi.org/10.61841/vv4my466Keywords:
Fiber optic communication,, Optical Fiber Tapping,, Advanced Encryption Standard,, Optical Transmitter and Rceiver,, Optical Regenerator, Wavelength Division MultiplexingAbstract
Fiber Optics Communication is also one of the major branch which is widely used in current communication world. Due to several advantages of fiber optics communication over different conventional wired communication method it is having higher priority. Though fiber optic transmits large amount of data quickly over long distance, it is vulnerable to various security attacks. The fiber optic cable can be easily tapped. Fundamental improvements can be achieved for the entire network by increasing the optical network’s performance in terms of channel capacity, data rate, and processing speed. Furthermore, the security of the optical network has an impact on the security of the entire communication system. Optical network security can be effectively protected by fiber-based methods, including all optical signal processing, optical key distribution, optical steganography, and optical chaos-based communication. Fiber-based devices do not radiate an electromagnetic signature and are immune to electromagnetic interference. To provide end to end secure fiber optic communication, a special encryption algorithm based on Advanced Encryption Standard (AES) is employed. The proposed encryption algorithm is simulated and the performance is analyzed. In this paper we are mostly dealing with the basics of fiber optics working principle, priority over other conventional communication system and role of fiber optics communication in computer networking and its vulnerabilities.
Downloads
References
[1] Soumya, Shivangi Singh. (2014). Fiber Optics Communication In Computer Networking And Security. International Journal of Electrical, Electronics and Data Communication, 2(3), 62-64.
[2] D.C. Agarwal. (1993). Fiber Optic Communication, New Delhi: Wheeler Publishing, second edition.
[3] Kimberlie Witcher. (2005). Fiber optics and its security. Vulnerabilities. SANS Institute, Version 1.4c.
[4] N.I. of Standards and Technology (1999). Data Encryption Standards (DES), Processing standards publication.
[5] Abhijeet Badapanda, M K Badapanda. ( 2014). Optical fibers for computer applications. International Journal of Engineering and Innovative Technology, 4(5), 169-175.
[6] Raghavendra A.M.V, Srinivasas Rao B.V. (2010)., Fiber Optics Based Parallel Computer Architecture. International Journal of Scientific & Engineering Research, 1(2), 1-10.
[7] Stephen Shankland. (2014), Fast Fiber Optic Broadband Spreads Across Developed World. Retrieved from http://www.cnet.com/news.
[8] eBay (2014). How to connect a computer network with fiber optic cables published by eBay. Retrieved from from http://www.ebay.com.
[9] S. Babani, A. A. Bature, M. I. Faruk, N. K. Dankadai. (2014). Comparative Study Between Fiber Optic And Copper In Communication Link. International Journal of Technical Research and Applications, 2(2), 59-63.
[10] Agrawal, G.P. (2010). Fiber-optic communication systems. John Wiley & Sons. 222 (2010).
[11] Amaku Amaku, Raphael E.Watti, John Joshua. (2014). Optic Fiber as a Reliable Medium for Metropolitan Area Networking (MAN) Connectivity. International Journal of Engineering and Technology Volume 4 No. 9,542-547.
[12] Kurose, J.F., and Ross, K. W., (2012). Computer Networking: A Top-Down Approach. Pearson Addison- Wesley, Fifth Edition.
[13] Bates, Regis J (2001). Optical Switching and Networking Handbook.Ochie Romero. (FOA). Reference Guide To Fiber Optics: The Fiber Optic Association, Inc
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.