Next Article in Journal
VOILA on the LUVMI-X Rover: Laser-Induced Breakdown Spectroscopy for the Detection of Volatiles at the Lunar South Pole
Previous Article in Journal
Towards 100 Gbps over 100 km: System Design and Demonstration of E-Band Millimeter Wave Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Classification of Events Violating the Safety of Physical Layers in Fiber-Optic Network Infrastructures

Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9515; https://doi.org/10.3390/s22239515
Submission received: 2 November 2022 / Revised: 29 November 2022 / Accepted: 30 November 2022 / Published: 6 December 2022
(This article belongs to the Section Optical Sensors)

Abstract

:
Fiber-optic network infrastructures are crucial for the transmission of data over long and short distances. Fiber optics are also preferred for the infrastructure of in-building data communications. In this study, we use polarization analysis to ensure the security of the optical fiber/cables of the physical layer. This method exploits the changes induced by mechanical vibrations to polarization states, which can be easily detected using a polarization beam splitter and a balancing photodetector. We use machine learning to classify selected events that violate the safety of the physical layer, such as manipulation or temporary disconnection of connectors. The results show the resting state can be accurately distinguished from selected security breaches for a fiber route subjected to environmental disturbances, where individual events can be classified with nearly 99% accuracy.

1. Introduction

Most optical sensor systems are based on reflectometry or interferometry principles and are highly sensitive and accurate, but also extremely expensive. Systems based on commercial polarimeters can accurately measure polarization in optical fibers, but are costly and mostly have a low sampling rate [1]. Detection systems based on a simple analysis of changes in polarization states are a cost-effective solution that can be easily implemented for current security systems. Problems with data processing are also encountered using optical sensor systems. Algorithms have been developed that can increase the signal-to-noise ratio [2,3], filter signals [4,5], or amplify signals [6]. A threshold is then used mainly to determine the increase in the vibration intensity, which is suitable only for a certain type of event that occurs close to the optical fiber. The measurement results of polarization changes are therefore highly inaccurate. The measurement accuracy can be increased by using a simple polarization analyzer and a data acquisition device in conjunction with machine learning algorithms to identify changes in polarization states. It is important to process the data acquired from the polarization analyzer by using advanced event classification techniques rather than thresholding. The most suitable classification techniques involve the use of machine learning algorithms, which can also determine the type of event that occurs in the vicinity of a measured optical fiber.

2. Related Studies

Several technologies can be used to protect the physical layer consisting of optical fibers/cables. In [7], it was noted that most common attacks on the physical layer of fibers involve touching the fiber. Thus, vibration detection can be used to ensure the security of the physical layer consisting of optical fibers/cables. Special fibers, such as fiber Bragg gratings (FBG), can be used for vibration detection. These systems are very often used to provide perimeter security, such as in [8,9]. Vibrations in the secure zone can thus be detected, but unfortunately, the use of special fibers with Bragg gratings is necessary. Thus, FBG cannot be used in a real infrastructure.
Another potential technique for ensuring fiber security is distributed acoustic sensing (DAS) based on Φ-OTDR. These systems are very accurate and enable localization of events and measurements over long distances, while being complex, robust, and costly [3,10]. Consequently, these systems are often used to secure critical infrastructures [11,12].
Another option is to measure vibrations using interferometers. The most commonly used techniques employ the Mach–Zehnder interferometer (MZI), which can be used, for example, to secure gas turbines [13]; the Michelson interferometer (MI), which is commonly used for perimeter security [14]; or the Sagnac interferometer (SI), which is also used for perimeter security [15,16]. The use of the MZI and MI requires the use of reference fibers [17], which can be complex to implement in real infrastructures. Interferometric methods are very sensitive and hence can be disturbed by common traffic sounds near real cables in buildings (banging doors; noise from heating, ventilation, and air conditioning (HVAC); people moving in buildings, etc.).
An example of the enhanced sensitivity of interferometers is provided in [18] by comparison to the sensitivity of polarization detection, which constitutes another large group of sensing techniques based on the detection of polarization changes in a fiber. For example, polarization analysis can be performed using polarization-sensitive optical time domain reflectometry (POTDR) based on Rayleigh light scattering [19]. Another possibility is to use a polarimeter to measure the polarization of the light and use machine learning to detect polarization changes [20] or to use a polarization beam splitter (PBS) and a balanced photodetector (BPD) to directly measure polarization changes [21,22]. Measurements using a PBS can also be incorporated into reflectometry methods [23], that is, PBS can be used for POTDR sensing.
Sensing systems based on polarization detection appear to be an ideal solution because of low acquisition costs. These systems could be easily integrated into real infrastructures, either by employing unused fibers in cables or wavelength-division multiplexing in fiber networks with active data traffic. Paradoxically, these systems are less sensitive than interferometers and are therefore more robust to real-world conditions.
It has been proven in many research studies that optical networks are vulnerable to eavesdropping attacks [7,24,25]. However, various fiber optics sensing systems can detect or even localize the attacker. These methods can be extended by using machine learning algorithms to improve attacker detection. One example is a detection-and-localization system based on optical time domain reflectometry (OTDR) combined with a convolutional neural network [26] or a recurrent autoencoder neural network [27]. These methods achieved almost 100% accuracy in attacker detection and localization, demonstrating the efficacy of such a solution. A different approach is to focus on attacker detection without localization to reduce the size and price of the proposed solution. This kind of system can analyze optical side-channel information, such as transmission parameters obtained from eye diagrams using convolutional neural networks [28], or analyze polarization changes using simple threshold algorithms and data processing [29].

3. Methodology

The propagation of light can be described as a transverse electromagnetic wave with perpendicular electric and magnetic components. The propagation of these components can be described by Maxwell’s equations. Such a wave can be described as a superposition of two orthogonal and linearly polarized components along the x- and y-axes, where the respective amplitudes and initial phases are given by [30]
E x = a x cos ω t k z + δ x , E y = a y cos ω t k z + δ y ,
where k = ( 2 π / λ 0 ) n , n is the refractive index, λ 0 is the wavelength, z is the direction of propagation, and a and δ 0 are the amplitude and the initial phase, respectively [30].
The graphic progression is shown in Figure 1 [17].
Equation (1) can then be written using a Jones vector representation as a 2 × 1 matrix (column vector) [31]:
E ( z , t ) = E x E y = a x cos ω t k z + δ x a y cos ω t k z + δ y .
The polarization of light can also be described by Stokes parameters, which are defined as
S 0 = I 0 , S 1 = I H I V , S 2 = I + 45 I 45 , S 3 = I RCP I LCP ,
where I 0 denotes the intensity of the light beam and I H , I V , I + 45 , I 45 , I RCP and I LCP represent the transmitted intensities of a beam passing through a linear horizontal polarizer (LHP), a linear vertical polarizer (LHP), and a right-circular and left-circular polarizer, respectively.
Stokes parameters are very often represented by Stokes vectors represented by the 4 × 1 matrix [32]:
S = S 0 S 1 S 2 S 3 or S 0 , S 1 , S 2 , S 3 .
Figure 2 shows a Poincaré sphere as a measure of the current state of polarization or the evolution of polarization over time. The V(S) and H(F) markings on the axes show the values of vertical and horizontal polarization on the fast or slow axis, respectively. The other axes represent the right- and left-circled axes [33].
The polarization can be defined in terms of three basic states, i.e., linear, circular and elliptical [30].
  • Linear—electric field concentrated in one plane along the direction of propagation.
  • Circular—the electric field consists of two mutually perpendicular components with the same amplitude that are shifted by a phase π 2 .
  • Elliptic—The electric field can be described by an ellipse due to the different amplitudes and/or different phases of the components.
As mentioned in Section 2, vibrations around an optical fiber affect the polarization and can be measured in two ways. One option is to use a polarimeter to measure the current polarization state or to use a PBS to directly detect polarization changes. As we are designing our system to provide cost-effective security for a physical layer, it is more suitable and cheaper to use a polarization splitter to split the beam and then detect two separate orthogonal planes using a BPD [34,35].
We split the polarization into two planes and determine the signal intensity for both planes, where there are no changes at rest, i.e., the signal intensities in the two planes are probably different but constant. The action of an external force on the fiber changes the rotation of the polarization, thereby changing the ratio of the polarizations in the orthogonal planes. This change is detected by the BPD, which senses both planes and differentiates the signal. Even if there is a permanent change in the polarization, the proposed system will not be affected because the signal intensities from the PBS will also stabilize once the new state of polarization has stabilized. The resulting signal from the BPD is thus very similar to an audio mono signal, which would simplify conversion to this format.

4. Experimental Setup

The experimental setup used to test the proposed system consists of two parts. The first part is used for computation and consists of a computer and a device for sensing audio signals. The second part is an optical system with a laser source (a low-noise DFB laser with a 1550-nm wavelength and a typical spectral linewidth of 3 MHz), a PBS and a BPD (composed of InGaAs photodiodes with wavelengths of 900–1700 nm and a signal bandwidth of 100 MHz at 3 dB). The entire setup is located in a server room, from which an optical fiber leads out of the building within the test infrastructure. The whole design is shown in Figure 3, where the optical connections are marked in black, orange and blue. Signal and power connections are marked in red.
The computation section (marked in blue) originally consisted of a server and a myRIO DAQ board. However, the insufficiently low sampling rate of 8 bits/20 kHz resulted in the introduction of large errors into the measurements. To optimize the computing power and device size, the server was replaced by a microcomputer UP Board UP 4000 series with an Intel Pentium processor and 8 GB of RAM. The myRIO board was also replaced by an external sound card with a sampling rate of up to 24 bits/192 kHz. The final computational section is marked in green. The modified section ensures that the whole setup is almost pocket size.
A total of 3 ADCs were used for the measurements. A myRIO ADC board was used for signal conversion in the first version of the setup and was replaced in the second version by 2 external sound cards—Startech ICUSBAUDIO2D and Native Instruments Komplete Audio 2, with sampling rates of up to 96 kHz and 192 kHz, respectively. The most current version of the experimental setup is shown in Figure 4.
In [7], attacks on the physical layer are mainly considered to occur through tampering with an optical fiber. Therefore, measurement scenarios based on such situations were investigated. Measurements were performed under several scenarios. Specifically, direct manipulation of a fiber by touching and knocking, opening and closing of a manhole cover, disconnection of the fiber (which is particularly crucial for the safety of transmissions), and idle measurements were performed.
Measurements are performed on an optical fiber that passes through an entire building and then out around a road, as shown in Figure 5. The length of the optical route is approximately 2 km. There are many interference-producing elements along the fiber route. The measurement setup is located in a server room with a continuously operating HVAC. The fiber route passes above the ceiling along the corridor with a high turnover of people, continues to the lower floors of the building around a vertical riser, and then moves to an exterior manhole near the parking lot. The manhole is accessible to an operator or attacker, and the fiber is also accessible from the road along the fiber route to the server room. The proposed system targets direct manipulation in the vicinity of the cable/fiber by an attacker. The sensitivity of the system enables monitoring even in heavily disturbed surroundings and, therefore, in places where an interferometer could not be used because of high sensitivity.

5. Neural Network Architecture and Training

A neural network design consists of a simple architecture based on dense layers that can be easily offloaded into embedded systems for real-time analysis. The input layer has 8192 neurons (The window size is the optimal value considering the spectral resolution and computational difficulty.) to match the window-size generating spectrum vectors. The output layer matches the number of classes, which is equal to 5. The only optimized part is the middle layer. Based on the results of several experiments, the optimal number of neurons in this layer is 512. The activation function used between each layer is sigmoid, but the last layer uses a softmax function. The whole neural network and training are implemented using the PyTorch framework with graphics processing unit acceleration [36].

5.1. Dataset

The system described in Section 4 for analyzing changes in the polarization state is deployed to obtain a dataset. The system provides one-dimensional data in the time domain with a sampling rate of 44.1 kS/s that are not suitable for further analysis [29]. Therefore, the data are converted to the frequency domain using a single-side fast Fourier transform (FFT) and normalized by subtracting the mean value from each spectral vector.
Each abnormal event in the dataset is marked by starting and ending points, thereby generating arrays of different lengths for events. The data array for the FFT is generated by a sliding window with a size of 8192 elements that is shifted to 820 elements after each generated window. Thus, several spectral vectors are produced for each labeled abnormal event.
The dataset labels are converted into one-hot encoding, which a neural network can use to solve a classification problem.
The dataset is divided into three subsets in a ratio of 80:10:10 (This ratio is chosen to match the 10-fold cross-validation method described in Section 5.2.) as shown in Table 1. The training subset is used directly to modify the neural network weights, the validation subset only evaluates the loss of the neural network during learning to prevent overfitting, and the test subset is used only once after learning to evaluate the metrics and performance of the trained neural network.
Considering the problem to be solved and the neural network output, training is performed using the categorical cross-entropy loss function, which is defined as [37]
( y , y ^ ) = i = 1 N y i log y i ^ ,
where y is a true label, y ^ is a predicted output and N is the number of classes.
Table 1 clearly shows that the dataset is imbalanced. Therefore, the loss function is further enhanced using class weights to scale the output loss [38]. This modification decreases the losses for large classes and increases the losses for small classes.

5.2. Training

In the training process, 10-fold cross-validation is used to splits the dataset into 10 distinct subsets. Thus, the training is repeated 10 times, where the training, validation, and testing subsets vary according to the cross-validation method. In each iteration, the training process uses the Adam [39] gradient descent algorithm with a learning rate of 5 × 10 4 for 50 epochs. The number of epochs is evaluated in advance by using an early stopping mechanism to prevent overfitting. The learning process is terminated if the validation loss does not improve for more than 10 epochs. The proposed model contains 2,100,741 trainable parameters requiring approximately 5 seconds per epoch.
In Figure 6, the mean values of the accuracy and loss metrics for all the learning processes are shown by solid lines, and the 25th and 75th quantiles in each epoch are highlighted in the background. The training curves have low errors and converge to the lowest loss. By comparison, the validation curves, particularly the validation loss curve, have higher errors resulting from the use of the cross-entropy loss with class weights. A classification accuracy of almost 99% is achieved for both datasets. The performance evaluation for the test dataset is described in Section 6.

6. Results and Discussion

The measured results can be used to identify individual events. For example, fiber manipulation has a very significant effect on the acquired signal, as shown in Figure 7. This event can be observed in both the time domain (see Figure 7a) and the frequency domain (see Figure 7b), which is primarily used for machine learning and dataset labeling. The frequency domain is mainly used for labeling to improve visibility of events, such as knocking on a manhole. The visibility of these events need to be improved because the events only affect the polarization slightly.
As signal changes are visible on all acquisition devices, we performed an experiment to qualitatively assess the accuracy of the proposed method.
To compare the ADCs, a method was used to calculate the SNR in the frequency domain (i.e., the SNR was compared at each frequency in a predefined test signal, where sine functions were generated at a given frequency for 0.7 s, where the frequency increased in 1/12-octave steps). Figure 8 shows that the sound cards have a higher SNRfthan the myRIO board.
The parameters of each converter are presented in Table 2. Most sound cards use delta–sigma converters, whereas myRIO integrates an XADC directly into a Zynq 7010 processor. Thus, myRIO has a lower SNRf and bit resolution than sound cards.
We can easily compute the SNRf for a specific frequency f as
SNRf ( f ) = 10 log 10 m = 1 M | x ^ m | 2 m = 1 M | x m x ^ m | 2 ,
where x ^ m is the sine signal with a given frequency and x m is the acquired signal. The value of the SNRf is expressed in decibels. Thus, it can be concluded that a sound card is more suitable for acquiring data than myRIO.
The aforementioned conclusion is confirmed by the spectrogram of the acquired signals shown in Figure 9. At first glance, the spectrum of the signal acquired by myRIO only contains frequencies up to 2 kHz, whereas higher frequencies appear in the spectrum of the signal obtained using the sound card. Both spectrograms contain strongly colored low frequencies. In myRIO, the higher frequencies are captured with very weak intensities or not at all, whereas higher frequencies are more prominent in the spectrum obtained using the Startech sound card. For this reason, we used the sound card data for machine learning. The steps at higher frequencies are generally clearly visible because the spectrum is computed using the partial frequencies in the test signal, i.e., equidistant frequencies are not used. This effect becomes more pronounced at higher frequencies because of the logarithmic nature of the steps.
The classification performance is estimated using a confusion matrix evaluated on the test dataset, which is shown in Figure 10. The proposed method is 100% accurate for deciding between the regular-state samples and the rest of the samples corresponding to abnormal events. Therefore, the network should not produce any false alarms. Satisfactory accuracy is obtained for identifying the remaining classes, except for the Knocking class, which is misclassified with Manipulation. An in-depth analysis shows that Manipulation events also contain knocking events, particularly at the beginning.
Unfortunately, the designed system cannot directly locate the origin of vibrations. It is possible to indirectly locate some types of vibration based on the known route along which the fiber is deployed. An example is the disconnection and possible reconnection of a fiber, which in our case can only occur in the server room, because there are no connectors elsewhere along the fiber route. Rack door disruption can also be determined by a class extension (e.g., the opening of a rack door in Server Room 1 and the opening of a door in Server Room 2) because server rooms frequently have different designs (e.g., sliding doors vs. opening doors).
The simultaneous classification of two different phenomena can also occur under real conditions, which we will investigate in the future. Primarily, we will extend the datasets while modifying machine learning algorithms, especially concerning frequency analysis, because events are frequency specific.
A unique feature of the proposed system is that polarization detection is used for protecting the physical layer and complemented by using machine learning algorithms for event classification, enabling the system to be easily deployed. The greatest advantages of the proposed system are a low cost, the ability to be deployed in real infrastructure, and compactness. The system can sense unused fiber in a cable to ensure the security of the entire cable. In the future, we would like to perform wavelet multiplexing or data traffic analysis.

7. Conclusions

In this article, the problem of vibration detection using optical fibers was described, and a complete system was designed and tested for detecting disturbances to a physical layer by measuring polarization changes using a PBS. The feasibility of securing a physical layer by a vibration detection system has been demonstrated, and events have been classified using a simple neural network based only on dense layers for potential attempts to violate the integrity of a physical layer consisting of optical fibers and cables. Experimental results prove that our proposed cost-effective system can prevent simple attempts at security breaches. The system can classify events with an accuracy of nearly 99%.

Author Contributions

Conceptualization, M.R. and P.D.; methodology, P.D. and V.S.; software, M.R., A.T. and P.D.; validation, V.S., P.D., A.T. and P.M.; formal analysis, P.M. and P.D.; investigation, M.R., L.J. and P.D.; resources, M.R., L.J., P.D. and V.S.; data curation, P.D. and V.S.; writing—original draft preparation, M.R., L.J., P.D. and P.M.; writing—review and editing, P.D., A.T. and P.M.; visualization, V.S., A.T. and P.D.; supervision, P.M.; project administration, M.R.; funding acquisition, M.R. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported by the Grant Research in the field of fiber optic monitoring systems using advanced data processing techniques (FEKT-K-22-7731) realized within the project Quality Internal Grants of BUT (KInG BUT), Reg. No. CZ.02.2.69/0.0/0.0/19_073/0016948, which is financed from the OP RDE. This work was partially supported by the Ministry of the Interior of the Czech Republic, program Security Research, under grant Cyber security of fiber photonic infrastructures—CEFON, no. VJ01030012.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dejdar, P.; Hanak, P.; Munster, P.; Horvath, T. Polarization Monitor for High-speed State of Polarization Changes Detection. Int. J. Adv. Telecommun. Electrotech. Signals Syst. 2021, 10, 13–17. [Google Scholar] [CrossRef]
  2. Li, J.; Zhou, X.; Zhang, M.; Zhang, J.; Qiao, L.; Zhao, L.; Yin, Z. Temperature Resolution Improvement in Raman-Based Fiber-Optic Distributed Sensor Using Dynamic Difference Attenuation Recognition. Sensors 2020, 20, 6922. [Google Scholar] [CrossRef]
  3. Dejdar, P.; Záviška, P.; Valach, S.; Münster, P.; Horváth, T. Image Edge Detection Methods in Perimeter Security Systems Using Distributed Fiber Optical Sensing. Sensors 2022, 22, 4573. [Google Scholar] [CrossRef]
  4. Ershov, I.A.; Stukach, O.V. Choice of Wavelet for Filtering of Signal from Fiber-Optic Temperature Sensor. In Proceedings of the 2022 Moscow Workshop on Electronic and Networking Technologies (MWENT), Moscow, Russia, 9–11 June 2022; pp. 1–4. [Google Scholar] [CrossRef]
  5. Zhou, R.; Gao, H.; Feng, Z.; Qiao, X. Simulation and hardware implementation of demodulation for fiber optic seismic sensor with linear edge filtering method. Opt. Fiber Technol. 2020, 60, 102384. [Google Scholar] [CrossRef]
  6. Lou, K.; Peng, C.Y.; Tang, W.S.; Hu, Z.L.; Xu, P.; Tie, X. Application of Acoustic Horns for the Amplification of Fiber Optic Vector Hydrophone Signal. In Proceedings of the 2021 4th International Conference on Information Communication and Signal Processing (ICICSP), Shenzhen, China, 26–28 November 2021; pp. 139–142. [Google Scholar] [CrossRef]
  7. Spurny, V.; Munster, P.; Tomasov, A.; Horvath, T.; Skaljo, E. Physical layer components security risks in optical fiber infrastructures. Sensors 2022, 22, 588. [Google Scholar] [CrossRef] [PubMed]
  8. Liu, F.; Zhang, H.; Li, X.; Li, Z.; Wang, H. Intrusion identification using GMM-HMM for perimeter monitoring based on ultra-weak FBG arrays. Opt. Express 2022, 30, 17307–17320. [Google Scholar] [CrossRef] [PubMed]
  9. Wang, M.; Sun, Z.; Zhang, F.; Min, L.; Li, S.; Jiang, S. Application Research of FBG Vibration Sensor Used for Perimeter Security. In Proceedings of the 2018 IEEE 3rd Optoelectronics Global Conference (OGC), Shenzhen, China, 4–7 September 2018; pp. 94–97. [Google Scholar] [CrossRef]
  10. Cai, Y.; Yan, W.; Liu, H.; Sun, Y.; Zhou, X. Security monitoring of smart campus using distributed fiber optic acoustic sensing. In Proceedings of the AOPC 2020: Optical Information and Network; Zhang, J., Fu, S., Zhang, H., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2020; Volume 11569, p. 115690L. [Google Scholar] [CrossRef]
  11. Duckworth, G.L.; Ku, E.M. OptaSense distributed acoustic and seismic sensing using COTS fiber optic cables for infrastructure protection and counter terrorism. In Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XII; Carapezza, E.M., Ed.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2013; Volume 8711, p. 87110G. [Google Scholar] [CrossRef]
  12. Kishida, K.; Imai, M.; Kawabata, J.; Guzik, A. Distributed Optical Fiber Sensors for Monitoring of Civil Engineering Structures. Sensors 2022, 22, 4368. [Google Scholar] [CrossRef]
  13. Stepanov, K.V.; Zhirnov, A.A.; Sazonkin, S.G.; Pnev, A.B.; Bobrov, A.N.; Yagodnikov, D.A. Non-Invasive Acoustic Monitoring of Gas Turbine Units by Fiber Optic Sensors. Sensors 2022, 22, 4781. [Google Scholar] [CrossRef]
  14. Shi, J.; Cui, K.; Wang, H.; Ren, Z.; Zhu, R. An Interferometric Optical Fiber Perimeter Security System Based on Multi-Domain Feature Fusion and SVM. IEEE Sens. J. 2021, 21, 9194–9202. [Google Scholar] [CrossRef]
  15. Gu, X.; Wang, T.; Hou, S.; Peng, J.; Wang, H.; Xia, Q. Multi-Feature-Based Intrusion Detection for Optical Fiber Perimeter Security System: A Aase Study. In Proceedings of the 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Berkeley, CA, USA, 16–18 July 2018; pp. 448–453. [Google Scholar] [CrossRef]
  16. Wang, N.; Fang, N.; Wang, L. Intrusion recognition method based on echo state network for optical fiber perimeter security systems. Opt. Commun. 2019, 451, 301–306. [Google Scholar] [CrossRef]
  17. Yin, S.; Ruffin, P.B.; Yu, F.T.S. Fiber Optic Sensors, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2017; pp. 1–477, Cited By:11. [Google Scholar]
  18. Munster, P.; Horvath, T.; Vojtech, J. Distributed Sensing Based on Interferometry and Polarization Methods for Use in Fibre Infrastructure Protection. Sensors 2019, 19, 1810. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Yablochkin, K.A.; Dashkov, M.V.; Dashkov, V.M. Investigation of the vibration influences on the optical fiber polarization characteristics. In Proceedings of the Optical Technologies for Telecommunications 2018; Andreev, V.A., Bourdine, A.V., Burdin, V.A., Morozov, O.G., Sultanov, A.H., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2019; Volume 11146, p. 111461P. [Google Scholar] [CrossRef]
  20. Šlapák, M.; Vojtěch, J.; Havliš, O.; Slavík, R. Monitoring of Fibre Optic Links With a Machine Learning-Assisted Low-Cost Polarimeter. IEEE Access 2020, 8, 183965–183971. [Google Scholar] [CrossRef]
  21. Munster, P.; Horvath, T.; Sysel, P.; Vojtech, J.; Velc, R. Comparison of interferometry based and polarization based sensing systems for use in fiber infrastructure protection. In Proceedings of the 2017 International Workshop on Fiber Optics in Access Network (FOAN), Sarajevo, Bosnia and Herzegovina, 6–8 November 2017; pp. 1–3. [Google Scholar] [CrossRef]
  22. Wada, A.; Tanaka, S.; Takahashi, N. Simultaneous measurement of vibration and temperature using a Fabry-Perot interferometer in polarization maintaining fiber and laser diodes. In Proceedings of the 25th International Conference on Optical Fiber Sensors; Chung, Y., Jin, W., Lee, B., Canning, J., Nakamura, K., Yuan, L., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2017; Volume 10323, p. 1032326. [Google Scholar] [CrossRef]
  23. Wang, X.; Hu, J.; Wang, F.; Yong, Y.; Zhang, Y.; Xue, M.; Zhang, X.; Pan, S. Multi-vibration detection by probe pulses with ergodic SOPs in a POTDR system. Opt. Express 2018, 26, 28349–28362. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Shaneman, K.; Gray, S. Optical network security: Technical analysis of fiber tapping mechanisms and methods for detection & prevention. In Proceedings of the IEEE MILCOM 2004. Military Communications Conference, Monterey, CA, USA, 31 October–3 November 2004; Volume 2, pp. 711–716. [Google Scholar] [CrossRef]
  25. Skorin-Kapov, N.; Furdek, M.; Zsigmond, S.; Wosinska, L. Physical-layer security in evolving optical networks. IEEE Commun. Mag. 2016, 54, 110–117. [Google Scholar] [CrossRef]
  26. Song, H.; Li, Y.; Liu, M.; Wang, K.; Li, J.; Zhang, M.; Zhao, Y.; Zhang, J. Experimental study of machine-learning-based detection and location of eavesdropping in end-to-end optical fiber communications. Opt. Fiber Technol. 2022, 68, 102669. [Google Scholar] [CrossRef]
  27. Abdelli, K.; Cho, J.Y.; Azendorf, F.; Griesser, H.; Tropschug, C.; Pachnicke, S. Machine-learning-based anomaly detection in optical fiber monitoring. J. Opt. Commun. Netw. 2022, 14, 365–375. [Google Scholar] [CrossRef]
  28. Liu, M.; Li, Y.; Song, H.; Tu, Z.; Zhao, Y.; Zhang, J. Experimental Demonstration of Optical Fiber Eavesdropping Detection Based on Deep Learning. In Proceedings of the Asia Communications and Photonics Conference, Chengdu, China, 2–5 November 2019; Optical Society of America: Washington, DC, USA, 2019; p. T1H-4. [Google Scholar]
  29. Tomasov, A.; Dejdar, P.; Horvath, T.; Munster, P. Physical fiber security by the state of polarization change detection. In Proceedings of the Fiber Optic Sensors and Applications XVIII; Lieberman, R.A., Sanders, G.A., Scheel, I.U., Eds.; International Society for Optics and Photonics, SPIE: Orlando, FL, USA, 2022; Volume 12105, p. 1210507. [Google Scholar] [CrossRef]
  30. Kumar, A.; Ghatak, A. Basic Concepts of Polarization. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 19–46. [Google Scholar] [CrossRef]
  31. Kumar, A.; Ghatak, A. Jones Vector Representation of Polarized Light. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 75–97. [Google Scholar] [CrossRef]
  32. Kumar, A.; Ghatak, A. The Stokes Parameters Representation. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 97–120. [Google Scholar] [CrossRef]
  33. Padgett, M.J.; Courtial, J. Poincaré-sphere equivalent for light beams containing orbital angular momentum. Opt. Lett. 1999, 24, 430–432. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  34. Dejdar, P.; Tomasov, A.; Munster, P.; Horvath, T. Vibration caused by train detection using state-of-polarization changes measurement. In Proceedings of the Fiber Optic Sensors and Applications XVIII; Lieberman, R.A., Sanders, G.A., Scheel, I.U., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2022; Volume 12105, p. 1210506. [Google Scholar] [CrossRef]
  35. Xiao, L.; Wang, Y.; Li, Y.; Bai, Q.; Liu, X.; Jin, B. Polarization Fading Suppression for Optical Fiber Sensing: A Review. IEEE Sens. J. 2022, 22, 8295–8312. [Google Scholar] [CrossRef]
  36. Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32; Curran Associates, Inc.: Red Hook, NY, USA, 2019; pp. 8024–8035. [Google Scholar]
  37. Semenov, A.; Boginski, V.; Pasiliao, E.L. Neural Networks with Multidimensional Cross-Entropy Loss Functions. In Proceedings of the International Conference on Computational Data and Social Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 57–62. [Google Scholar]
  38. Phan, T.H.; Yamamoto, K. Resolving class imbalance in object detection with weighted cross entropy losses. arXiv 2020, arXiv:2006.01413. [Google Scholar]
  39. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
Figure 1. Polarization components of an electromagnetic wave E.
Figure 1. Polarization components of an electromagnetic wave E.
Sensors 22 09515 g001
Figure 2. Poincaré sphere used to represent polarization rotation.
Figure 2. Poincaré sphere used to represent polarization rotation.
Sensors 22 09515 g002
Figure 3. Schematic of the experimental setup.
Figure 3. Schematic of the experimental setup.
Sensors 22 09515 g003
Figure 4. Final version of the sensor system with real hardware.
Figure 4. Final version of the sensor system with real hardware.
Sensors 22 09515 g004
Figure 5. Drawing of a test route on a university polygon used to simulate a real infrastructure.
Figure 5. Drawing of a test route on a university polygon used to simulate a real infrastructure.
Sensors 22 09515 g005
Figure 6. Evolution of the loss (a) and accuracy (b) over learning epochs with 10-fold cross-validation, where the line indicates the median values and the filled surroundings indicate the 25th and 75th quantiles for each epoch.
Figure 6. Evolution of the loss (a) and accuracy (b) over learning epochs with 10-fold cross-validation, where the line indicates the median values and the filled surroundings indicate the 25th and 75th quantiles for each epoch.
Sensors 22 09515 g006
Figure 7. Example of a signal indicating two events of manipulation of fibers in a manhole.
Figure 7. Example of a signal indicating two events of manipulation of fibers in a manhole.
Sensors 22 09515 g007
Figure 8. Comparison of the SNR in the frequency domain for myRIO and sound cards.
Figure 8. Comparison of the SNR in the frequency domain for myRIO and sound cards.
Sensors 22 09515 g008
Figure 9. Spectrogram of test signals acquired by myRIO (a) and Startech (b).
Figure 9. Spectrogram of test signals acquired by myRIO (a) and Startech (b).
Sensors 22 09515 g009
Figure 10. Confusion matrix evaluated on the testing dataset after learning, which shows the true performance of the proposed event classification method.
Figure 10. Confusion matrix evaluated on the testing dataset after learning, which shows the true performance of the proposed event classification method.
Sensors 22 09515 g010
Table 1. The number of dataset samples per subset and label.
Table 1. The number of dataset samples per subset and label.
Label / SubsetTrainingValidationTestingTotal
Manipulation9181151151148
Physical disconnection6067676758
Re-connection4155251518
Knocking931010113
Regular state42475315305308
Total62797747727845
Table 2. Parameters and prices of acquisition boards.
Table 2. Parameters and prices of acquisition boards.
DAQ DeviceADCSample RateBit ResolutionPrice (EUR)
NI MyRIO 1950XADCup to 500 kHz12530
NI Komplete audio 2delta-sigmaup to 192 kHz24129
Startech ICUSBAUDIO2Ddelta-sigmaup to 96 kHz2443
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ruzicka, M.; Jabloncik, L.; Dejdar, P.; Tomasov, A.; Spurny, V.; Munster, P. Classification of Events Violating the Safety of Physical Layers in Fiber-Optic Network Infrastructures. Sensors 2022, 22, 9515. https://doi.org/10.3390/s22239515

AMA Style

Ruzicka M, Jabloncik L, Dejdar P, Tomasov A, Spurny V, Munster P. Classification of Events Violating the Safety of Physical Layers in Fiber-Optic Network Infrastructures. Sensors. 2022; 22(23):9515. https://doi.org/10.3390/s22239515

Chicago/Turabian Style

Ruzicka, Michal, Lukas Jabloncik, Petr Dejdar, Adrian Tomasov, Vladimir Spurny, and Petr Munster. 2022. "Classification of Events Violating the Safety of Physical Layers in Fiber-Optic Network Infrastructures" Sensors 22, no. 23: 9515. https://doi.org/10.3390/s22239515

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop