Performance Analysis Of Secured Fiber Optics Communication Technologies In Computer Networking And Security Challenges

Authors

  • Dr Rajamohan Parthasarathy SEGi University, Malaysia, 4Faculty of EBE, SEGi University, Malaysia Author

DOI:

https://doi.org/10.61841/vv4my466

Keywords:

Fiber optic communication,, Optical Fiber Tapping,, Advanced Encryption Standard,, Optical Transmitter and Rceiver,, Optical Regenerator, Wavelength Division Multiplexing

Abstract

Fiber Optics Communication is also one of the major branch which is widely used in current communication world. Due to several advantages of fiber optics communication over different conventional wired communication method it is having higher priority. Though fiber optic transmits large amount of data quickly over long distance, it is vulnerable to various security attacks. The fiber optic cable can be easily tapped. Fundamental improvements can be achieved for the entire network by increasing the optical network’s performance in terms of channel capacity, data rate, and processing speed. Furthermore, the security of the optical network has an impact on the security of the entire communication system. Optical network security can be effectively protected by fiber-based methods, including all optical signal processing, optical key distribution, optical steganography, and optical chaos-based communication. Fiber-based devices do not radiate an electromagnetic signature and are immune to electromagnetic interference. To provide end to end secure fiber optic communication, a special encryption algorithm based on Advanced Encryption Standard (AES) is employed. The proposed encryption algorithm is simulated and the performance is analyzed. In this paper we are mostly dealing with the basics of fiber optics working principle, priority over other conventional communication system and role of fiber optics communication in computer networking and its vulnerabilities.

 

 

Downloads

Download data is not yet available.

References

[1] Soumya, Shivangi Singh. (2014). Fiber Optics Communication In Computer Networking And Security. International Journal of Electrical, Electronics and Data Communication, 2(3), 62-64.

[2] D.C. Agarwal. (1993). Fiber Optic Communication, New Delhi: Wheeler Publishing, second edition.

[3] Kimberlie Witcher. (2005). Fiber optics and its security. Vulnerabilities. SANS Institute, Version 1.4c.

[4] N.I. of Standards and Technology (1999). Data Encryption Standards (DES), Processing standards publication.

[5] Abhijeet Badapanda, M K Badapanda. ( 2014). Optical fibers for computer applications. International Journal of Engineering and Innovative Technology, 4(5), 169-175.

[6] Raghavendra A.M.V, Srinivasas Rao B.V. (2010)., Fiber Optics Based Parallel Computer Architecture. International Journal of Scientific & Engineering Research, 1(2), 1-10.

[7] Stephen Shankland. (2014), Fast Fiber Optic Broadband Spreads Across Developed World. Retrieved from http://www.cnet.com/news.

[8] eBay (2014). How to connect a computer network with fiber optic cables published by eBay. Retrieved from from http://www.ebay.com.

[9] S. Babani, A. A. Bature, M. I. Faruk, N. K. Dankadai. (2014). Comparative Study Between Fiber Optic And Copper In Communication Link. International Journal of Technical Research and Applications, 2(2), 59-63.

[10] Agrawal, G.P. (2010). Fiber-optic communication systems. John Wiley & Sons. 222 (2010).

[11] Amaku Amaku, Raphael E.Watti, John Joshua. (2014). Optic Fiber as a Reliable Medium for Metropolitan Area Networking (MAN) Connectivity. International Journal of Engineering and Technology Volume 4 No. 9,542-547.

[12] Kurose, J.F., and Ross, K. W., (2012). Computer Networking: A Top-Down Approach. Pearson Addison- Wesley, Fifth Edition.

[13] Bates, Regis J (2001). Optical Switching and Networking Handbook.Ochie Romero. (FOA). Reference Guide To Fiber Optics: The Fiber Optic Association, Inc

Downloads

Published

30.06.2020

How to Cite

Parthasarathy, D. R. (2020). Performance Analysis Of Secured Fiber Optics Communication Technologies In Computer Networking And Security Challenges. International Journal of Psychosocial Rehabilitation, 24(6), 6296-6307. https://doi.org/10.61841/vv4my466