ALL >> Technology,-Gadget-and-Science >> View Article
Optical Wireless Security
Introduction
Network security is one of the major concerns for any business or organization transporting sensitive and confidential information over the network. Such network security concerns involve the lowest network layer, typically referred to as
the physical layer (layer one), as well as higher software layers of the networking protocols. Most of the interception activity by outside intruders occurs within higher protocol software layers. Password protection or data encryption are
examples of counter measures to protect the network from outside and unwanted tampering. Intrusion of the physical layer itself can be another concern for network operators, although it is a far less likely target for unauthorized access
to networking data. This can be a threat if information is transported over a copperbased infrastructure that can be easily intercepted, but optical wireless transmissions are among the most secure connectivity solutions, regarding network interception
of the actual physical layer. LightPointe's optical wireless networking equipment is based on physical layer transport. This white ...
... paper discusses security aspects involving the physical layer.
Optical Wireless Systems and Network Security
With its cost-effective and high-bandwidth qualities, optical wireless products operating in the near infrared wavelength range are an alternative transport technology to interconnect highcapacity networking segments. These optical wireless products, based on free-space optics (FSO) technology, are license-free worldwide. Optical wireless system installations are very simple, and
the equipment requires very little maintenance. These features make optical wireless solutions appealing to end-users and service providers globally. As a result, the number of optical wireless system installations to for enterprise, cellular, and metropolitan area network traffic demands has increased significantly—even during the recent telecommunications sector slowdown.
Because optical wireless systems send and receive data through the air between remote networking locations, network operators and administrators are naturally concerned about the
security aspects. One of the main reasons for this concern is based on the fact that wireless networking solutions is a category in which security and interference problems are very common in radio frequency (RF) or microwave-based communication systems. Such concerns are not valid for optical wireless systems.
Optical wireless systems operate in the near infrared wavelength range slightly above the visible spectrum. Therefore, the human eye cannot visibly see the transmission beam. The
wavelength range around 1 micrometer that is used in optical wireless transmission systems is actually the same wavelength range used in fiber-optic transmission systems. The wavelength range around 1 micrometer translates into frequencies of several hundred terahertz (THz). These frequencies are significantly (roughly three to four orders of magnitude) higher than the highest frequencies used in commercially available microwave communications systems operating around 40 GHz. This difference in frequency of operation is one of the main reasons why
optical wireless systems belong into the equipment category of optical communication systems first rather than wireless, RF or microwave, transmission solutions. While typical RF and microwave antennas used to interconnect two remote networking locations in a point-to-point
architecture spread out the radiation over angles between 5 and 25 degrees, optical wireless systems use very narrow beams that are typically much less than 0.5 degrees. For example, a
radial beam pattern of 10 degrees roughly corresponds to a beam diameter of 175 meters at a distance of 1 kilometer from the originating source, whereas a beam of 0.3 degrees divergence angle typically used in optical wireless systems corresponds to a beam diameter of 5 meters at
the same distance.1 This wide spreading of the beam in microwave systems, combined with the fact that microwave antennas launch very high power level is the primary reason for security concerns. An outside intruder can easily intercept the beam or power reflected from the target location and pick up sensitive network information by using a spectral scanner tuned to
the specific RF or microwave transmission frequency. To overcome these security concerns, the microwave industry uses wireless encryption protocols (WEP) to protect the transmission path from being intercepted. Although it is extremely unlikely that it is possible to break into a sophisticated encryption code, there is always the concern that it can be done.
The interception of optical wireless systems operating with narrow beams in the infrared spectral wavelength range is far more difficult. In fact, military organizations or government
entities that rely heavily on extremely secure transmission technologies were among the earliest
users of optical wireless communication systems as a way to avoid signal interception. Therefore,
it is understandable why the study of FSO technology in military labs and security agencies dates back several decades. In the early days of FSO development, the ability to transmit information at high data rates was actually a less important factor than the fact that FSO technologies
offered one of the easiest and most secure ways to exchange information between remote locations. The small diameter of the beam of typically only a few meters in diameter at the target location is one of the reasons why it is extremely difficult to intercept the communication path of an FSO-based optical wireless system: The intruder must know the exact origination or target location of the (invisible) infrared beam and can only intercept the beam within the very narrow angle
of beam propagation. Even more difficult, the intruder must have free and undisturbed access to the installation location of the optical wireless transceiver and be able to install electronic equipment without being observed. In the majority of cases, the installation location does not allow free access to a potential intruder because the installation location is part of the customer
premise such as the roof or an office (when optical wireless equipment is installed behind
windows).
The direct interception of an optical wireless beam between the two remote networking locations is basically impossible because the beam typically passes through the air at an elevation well above ground level. Due to the fact that the transmission beam is invisible and that any attempts to block the beam would occur near the optical wireless equipment terminus points, the transmission process imposes another obstacle. Picking up the signal from a location that
is not directly located within the light path by using light photons scattered from aerosol, fog, or rain particles that might be present in the atmosphere is virtually impossible because of the extremely low infrared power levels used during the optical wireless transmission process. The
main reason for excluding this possibility of intrusion is the fact that light is scattered isotropically
and statistically in different directions from the original propagation path. This specific scattering mechanism keeps the total number of photons or the amount of radiation that can potentially
be collected onto a detector that is not directly placed into the beam path well beyond the detector noise level
Summary
Optical wireless communication systems are among the most secure networking transmission technologies. Unlike microwave systems, it is extremely difficult to intercept the optical wireless light beam carrying networking data because the information is not spread out in space but rather kept in a very narrow cone of light. To intercept this invisible light beam, the intruder must be able to obtain direct access to the light beam. Due to the very narrow beam diameter, interception of the beam can virtually only be accomplished at the customer premise where the system is installed. At that point, it would be certainly easier for an intruder to plug directly into the network by using the existing copper-based infrastructure (e.g. unplug a CAT 5 networking cable and plug it into a laptop). Scattered light can not be used as a method of interception.
Moreover, higher protocol layers can be used in conjunction with layer one optical wireless physical transport technology to encrypt sensitive network information and provide additional.
About the Author
Lightpointe are a pioneer in the development of Optical Wireless products based on free-space optics (FSO) technology. Lightpointe's wireless solutions are installed and supported in the UK by WAN Partnership Ltd. For more information and discussion about Wireless technologies please visit http://www.wanpartnership.co.uk
Add Comment
Technology, Gadget and Science Articles
1. The Economics Of Final-stage Package Delivery: A Comprehensive Market OverviewAuthor: Shreya
2. Growth Outlook Of The South Korea Cytogenetics Market: Clinical Applications And Technological Innovations
Author: Shreya
3. U.s. Water And Wastewater Treatment Technologies Market 2025–2035: Growth Trends And Future Opportunities
Author: Shreya
4. Instashop Egypt Real-time Api - Sku-level Stock & Availability Mapping
Author: Actowiz Solutions
5. Web Scraping Canadian Grocery Retailer Pricing Data
Author: REAL DATA API
6. Why Erp Is Critical For Manufacturing Innovation
Author: Focus Softnet
7. Umbraco Vs Wordpress: Choosing The Right Cms For Your Business
Author: Addact Technologies
8. How Web Development Enables Seamless Integration With Third-party Tools And Apis
Author: jessika
9. E-commerce Growth By Jumia Data Scraping For Market Research
Author: Web Data Crawler
10. Web Scraping Api For Minibar Delivery Liquor Data In Usa
Author: Food Data Scraper
11. Web Scraping Hulu Ratings And Engagement Data
Author: REAL DATA API
12. Christmas Liquor Demand Data Scraper
Author: Actowiz Solutions
13. Best Buy Product Price & Item Data Scraping Guide
Author: Retail Scrape
14. Top 100 Christmas Gifts 2025 Data Analytics
Author: Actowiz Metrics
15. Scrape Ezpawn Store Locations To Map Pawn Industry Trends
Author: REAL DATA API






