ALL >> Technology,-Gadget-and-Science >> View Article
Optical Wireless Security

Introduction
Network security is one of the major concerns for any business or organization transporting sensitive and confidential information over the network. Such network security concerns involve the lowest network layer, typically referred to as
the physical layer (layer one), as well as higher software layers of the networking protocols. Most of the interception activity by outside intruders occurs within higher protocol software layers. Password protection or data encryption are
examples of counter measures to protect the network from outside and unwanted tampering. Intrusion of the physical layer itself can be another concern for network operators, although it is a far less likely target for unauthorized access
to networking data. This can be a threat if information is transported over a copperbased infrastructure that can be easily intercepted, but optical wireless transmissions are among the most secure connectivity solutions, regarding network interception
of the actual physical layer. LightPointe's optical wireless networking equipment is based on physical layer transport. This white ...
... paper discusses security aspects involving the physical layer.
Optical Wireless Systems and Network Security
With its cost-effective and high-bandwidth qualities, optical wireless products operating in the near infrared wavelength range are an alternative transport technology to interconnect highcapacity networking segments. These optical wireless products, based on free-space optics (FSO) technology, are license-free worldwide. Optical wireless system installations are very simple, and
the equipment requires very little maintenance. These features make optical wireless solutions appealing to end-users and service providers globally. As a result, the number of optical wireless system installations to for enterprise, cellular, and metropolitan area network traffic demands has increased significantly—even during the recent telecommunications sector slowdown.
Because optical wireless systems send and receive data through the air between remote networking locations, network operators and administrators are naturally concerned about the
security aspects. One of the main reasons for this concern is based on the fact that wireless networking solutions is a category in which security and interference problems are very common in radio frequency (RF) or microwave-based communication systems. Such concerns are not valid for optical wireless systems.
Optical wireless systems operate in the near infrared wavelength range slightly above the visible spectrum. Therefore, the human eye cannot visibly see the transmission beam. The
wavelength range around 1 micrometer that is used in optical wireless transmission systems is actually the same wavelength range used in fiber-optic transmission systems. The wavelength range around 1 micrometer translates into frequencies of several hundred terahertz (THz). These frequencies are significantly (roughly three to four orders of magnitude) higher than the highest frequencies used in commercially available microwave communications systems operating around 40 GHz. This difference in frequency of operation is one of the main reasons why
optical wireless systems belong into the equipment category of optical communication systems first rather than wireless, RF or microwave, transmission solutions. While typical RF and microwave antennas used to interconnect two remote networking locations in a point-to-point
architecture spread out the radiation over angles between 5 and 25 degrees, optical wireless systems use very narrow beams that are typically much less than 0.5 degrees. For example, a
radial beam pattern of 10 degrees roughly corresponds to a beam diameter of 175 meters at a distance of 1 kilometer from the originating source, whereas a beam of 0.3 degrees divergence angle typically used in optical wireless systems corresponds to a beam diameter of 5 meters at
the same distance.1 This wide spreading of the beam in microwave systems, combined with the fact that microwave antennas launch very high power level is the primary reason for security concerns. An outside intruder can easily intercept the beam or power reflected from the target location and pick up sensitive network information by using a spectral scanner tuned to
the specific RF or microwave transmission frequency. To overcome these security concerns, the microwave industry uses wireless encryption protocols (WEP) to protect the transmission path from being intercepted. Although it is extremely unlikely that it is possible to break into a sophisticated encryption code, there is always the concern that it can be done.
The interception of optical wireless systems operating with narrow beams in the infrared spectral wavelength range is far more difficult. In fact, military organizations or government
entities that rely heavily on extremely secure transmission technologies were among the earliest
users of optical wireless communication systems as a way to avoid signal interception. Therefore,
it is understandable why the study of FSO technology in military labs and security agencies dates back several decades. In the early days of FSO development, the ability to transmit information at high data rates was actually a less important factor than the fact that FSO technologies
offered one of the easiest and most secure ways to exchange information between remote locations. The small diameter of the beam of typically only a few meters in diameter at the target location is one of the reasons why it is extremely difficult to intercept the communication path of an FSO-based optical wireless system: The intruder must know the exact origination or target location of the (invisible) infrared beam and can only intercept the beam within the very narrow angle
of beam propagation. Even more difficult, the intruder must have free and undisturbed access to the installation location of the optical wireless transceiver and be able to install electronic equipment without being observed. In the majority of cases, the installation location does not allow free access to a potential intruder because the installation location is part of the customer
premise such as the roof or an office (when optical wireless equipment is installed behind
windows).
The direct interception of an optical wireless beam between the two remote networking locations is basically impossible because the beam typically passes through the air at an elevation well above ground level. Due to the fact that the transmission beam is invisible and that any attempts to block the beam would occur near the optical wireless equipment terminus points, the transmission process imposes another obstacle. Picking up the signal from a location that
is not directly located within the light path by using light photons scattered from aerosol, fog, or rain particles that might be present in the atmosphere is virtually impossible because of the extremely low infrared power levels used during the optical wireless transmission process. The
main reason for excluding this possibility of intrusion is the fact that light is scattered isotropically
and statistically in different directions from the original propagation path. This specific scattering mechanism keeps the total number of photons or the amount of radiation that can potentially
be collected onto a detector that is not directly placed into the beam path well beyond the detector noise level
Summary
Optical wireless communication systems are among the most secure networking transmission technologies. Unlike microwave systems, it is extremely difficult to intercept the optical wireless light beam carrying networking data because the information is not spread out in space but rather kept in a very narrow cone of light. To intercept this invisible light beam, the intruder must be able to obtain direct access to the light beam. Due to the very narrow beam diameter, interception of the beam can virtually only be accomplished at the customer premise where the system is installed. At that point, it would be certainly easier for an intruder to plug directly into the network by using the existing copper-based infrastructure (e.g. unplug a CAT 5 networking cable and plug it into a laptop). Scattered light can not be used as a method of interception.
Moreover, higher protocol layers can be used in conjunction with layer one optical wireless physical transport technology to encrypt sensitive network information and provide additional.
About the Author
Lightpointe are a pioneer in the development of Optical Wireless products based on free-space optics (FSO) technology. Lightpointe's wireless solutions are installed and supported in the UK by WAN Partnership Ltd. For more information and discussion about Wireless technologies please visit http://www.wanpartnership.co.uk
Add Comment
Technology, Gadget and Science Articles
1. Syneron Laser Repair Services: Restore Performance, Protect Your InvestmentAuthor: Ryan
2. Sitecore Vs Optimizely: A Guide To Selecting The Right Dxp
Author: Addact Technologies
3. Hourly Price Insights: Amazon, Myntra, Meesho & Flipkart – 2025
Author: Den Rediant
4. Erp For Small Business: Fuel Growth With Smarter Systems
Author: Alex Forsyth
5. How To Implement Secure Authentication In Mern Stack Projects?
Author: Mukesh Ram
6. Uber Eats Menu Price Tracking For Ecosystem Analysis
Author: Retail Scrape
7. Ai Tracks Noon Vs Amazon.ae Price Gaps In Uae Retail Market
Author: Actowiz Solutions
8. Reimagine Brand Management With Wave: The Future-ready Platform
Author: 5Flow
9. Hire Virtual Receptionists And Let Them Do The Work For You
Author: Eliza Garran
10. Understanding Why A Virtual Answering Service Is Needful
Author: Eliza Garran
11. What Makes Helical Insight Unique Among Open-source Business Analytics Tools?
Author: Vhelical
12. The Event Management Website That India’s Top Event Companies Rely On
Author: Enseur Tech
13. Top 5 Reasons To Partner With App Developers Near Me
Author: brainbell10
14. How A Custom Mobile App Solves Real Business Problems?
Author: brainbell10
15. How App Developers Near Me Stands Out From The Competition?
Author: brainbell10