2018 14th International Computer Engineering Conference (ICENCO) 2018
DOI: 10.1109/icenco.2018.8636110
|View full text |Cite
|
Sign up to set email alerts
|

Undetectable Tapping Methods for Gigabit Passive Optical Network (GPON)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The aforementioned research has shown that polarization fiber-optic sensors are increasingly utilized, especially for security technology in dangerous environments, while in some cases, they are supplemented or combined with fiber Bragg gratings [9]. Additional sources of information for the scientific results presented in this paper can be found in the literature [19][20][21][22][23], and an excellent overview of known and used sensors is described in [24]. Current measurement methods do not allow the use of polarization sensors over long distances as it is not possible to ensure the symmetrical excitation of both polarization planes.…”
Section: Introductionmentioning
confidence: 98%
“…The aforementioned research has shown that polarization fiber-optic sensors are increasingly utilized, especially for security technology in dangerous environments, while in some cases, they are supplemented or combined with fiber Bragg gratings [9]. Additional sources of information for the scientific results presented in this paper can be found in the literature [19][20][21][22][23], and an excellent overview of known and used sensors is described in [24]. Current measurement methods do not allow the use of polarization sensors over long distances as it is not possible to ensure the symmetrical excitation of both polarization planes.…”
Section: Introductionmentioning
confidence: 98%
“…However, the security factor is still an existing challenge in such networks. The passive nature of widely deployed Gigabit Passive Optical Networks (GPONs) gives eavesdroppers the opportunity to extract sensitive information, since data in the downstream direction is transmitted to every user [7]. This highlights the need to claim quantum-level security in an end-to-end network implementation and until now, QKD has been the most efficient solution.…”
Section: Introductionmentioning
confidence: 99%