Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Analysis of stealth communications over a public fiber-optical network

Open Access Open Access

Abstract

We evaluate the security performance of the recently proposed “stealth” approach to covert communications over a public fiber-optical network. We present quantitative security analysis to assess the vulnerability of such systems against different attacks executed by an eavesdropper. We demonstrate the security advantage of the system by examining the BER/SNR performance as a function of the fidelity of the decoder used by an eavesdropper. Effective key length is constructed as a security metric to gauge the level of confidentiality implicit in the secure transmission.

©2007 Optical Society of America

1. Introduction

Transmission security (TRANSEC) [1] plays a vital role in today’s fiber-optical networks in safeguarding information transfer at the physical layer of the network and preventing hostile interception and exploitation by unauthorized eavesdroppers. TRANSEC implemented by spread spectrum (SS) techniques [2, 3] is efficient in achieving low probability of interception and detection of transmitted signal due to the noise-like and low power density nature of the spread signal, and thus is used extensively in military radio communications. The use of unique TRANSEC keys to spread and despread signals in SS systems additionally made CDMA modulation format possible in RF wireless networks [4] resulting in high spectral efficiency and security. Recently, considerable progress has been made to explore the possibility of an advanced optical network based on OCDMA [5, 6] with the vision of applying advantages and developments of SS RF communications to optical communications, and providing enhanced communication security, higher spectral efficiency, and simplified and decentralized network control in the next generation photonic networks.

 figure: Fig. 1

Fig. 1 Secure transmission over public fiber-optical communication network (Broadcast Star topology) Encryption of secure signal is performed at the physical layer by OCDMA encoder [3].

Download Full Size | PDF

With the objective of bolstering communication security, we previously proposed a method [3] (See Fig. 1) for performing secure transmission over a public fiber-optical network by overlaying an independent secure channel to an existing network. Such secure channel is designed to employ same spectrum as the public network, and is optically encoded and time spread at the physical layer by OCDMA encoding techniques [3] resulting in signals having average power below the noise floor in the fiber. This approach provides an extra depth of security namely steganography [1] by concealing the secure transmission in the network and preventing hostile detection by eavesdropper. It was demonstrated [3] that “direct” eavesdropping attempts such as analysis of spectrum, monitoring of signal power and statistical analysis of power fluctuations do not allow the detection of the secure signal in the proposed system. However, more efficient eavesdropping strategies that take advantage of the study of correlation [7, 8] have been recently suggested.

In the present work, we demonstrate the robustness of our proposed approach to eavesdropping strategy that is based on the autocorrelation of the signal tapped from the network. We show that under proper configuration, secure transmission will remain hidden and undetected by eavesdropper.

Furthermore, we develop a quantitative analysis to illustrate that even in the case when secure transmission is known to take place, our proposed approach is robust to a “brute force” code search attack executed by an eavesdropper. We show that the presence of the public network severely hinders and disrupts eavesdropper’s efficiency in obtaining secure data.

Also, we introduce the concept of effective key length and apply it to analyzing the security of the proposed approach. The effective key length metric is useful in evaluating the degree of confidentiality inherent in the proposed secure transmissions.

2. Intensity autocorrelation

Autocorrelation analysis is a useful tool in detecting regularly repeating signals, which have been buried under noise. For a low power noise-like secure CDMA signal embedded in the public network [3], an eavesdropper who has access to the public network can perform an intensity autocorrelation on signals tapped from the network, and uncover autocorrelation peaks which appear periodically at interval corresponding to the bit period of secure channel. Such peaks reveal the presence of active secure transmission and hence compromise the built-in steganographic security. Once secure communication is discovered to take place, an eavesdropper can isolate a part of the signal corresponding to the identified secure bit period and cross correlate it with the tapped signal to determine the secure bits transmitted (assuming bit by bit encoding code is fixed for particular user). However, as we demonstrate below such strategy is severely impaired by the presence of the public channel.

 figure: Fig. 2

Fig. 2 Intensity autocorrelation for a) secure signal and noise only, b) public signal and noise only, c) public signal, secure signal and noise. Simulations are performed where flat top band-limited pulses of bandwidth W (Sinc pulse profile in time domain) are used in both the public network and secure channel. The simulation parameters (see Appendix) are given by: Ps / Pp = 3, W = 0.6 rad /ps, C = 128 chips, Ts= 1320 ps, Tp = 60 ps and Nadd / Pp = 0.01.

Download Full Size | PDF

 figure: Fig. 3

Fig. 3 a) Autocorrelation for composite signal obtain in simulations (red) and using analytical theory (blue) where Ps / Pp = 15, C=128 chips, Ts = 1320 ps and Nadd / Pp = 0.01. b) Autocorrelation comparison before (blue) and after (green) secure signal is applied to the public network (with the public signal and noise). Secure signal uses a spreading factor C=2048 chips, Ts = 21420 ps, Ps / Pp = 15 and Nadd / Pp = 0.01. (See Appendix)

Download Full Size | PDF

Figure 2(a) shows the autocorrelation when only the secure signal is transmitted under the noise floor in the network. The secure signal is modulated with M-ary (M=2) codes and operated at 758 Mb/s [3]. Although the time spread noise-like secure signal is hidden under the noise, an autocorrelation peak is observed to occur at a time delay of 1320 ps corresponding to the bit period of the secure signal. Note that the observation of an autocorrelation peak would inevitably allow the eavesdropper to detect the presence of secure transmission, which is basis for efficient autocorrelation attack against OCDMA based systems.

Shown in Fig. 2(b) is the autocorrelation when only the public signal and noise is present in the network. The public signal is an on-off keying signal operating at a bit rate of 16.7 Gb/s. Autocorrelation peaks matched to an integral number of the bit period (60 ps) of public signal are displayed. The fluctuations experienced by the autocorrelation peaks are due to the presence of noise in the network.

However, the situation changes dramatically as shown in Fig. 2(c) when the public signal is simultaneously present in the network while secure transmission takes place. Notice that no significant autocorrelation peak can be observed at a lag time of 1320 ps (corresponding to the secure bit interval) and as a result secure transmission remains well undetected. Efficient secure channel hiding in this case can be achieved when the periods of both public and secure channels commensurate and the fluctuation in the peak magnitudes due to noise is large enough to mask over that from the secure channel.

Although the autocorrelation peak caused by the secure channel is safely concealed in the situation above, it is possible that an apparent peak can occur in the case when (e.g. in an effort to improve BER performance) an overly high peak power is used in the secure channel, as illustrated in Fig. 3(a). However, even in such conditions the security vulnerability can be minimized and readily removed by the use of higher time spreading in the secure channel as the average energy occupied per public user bit interval is reduced. This argument is illustrated in Fig. 3(b) where we apply a higher spreading factor to the secure signal while maintaining the same high peak power ratio used in Fig. 3(a). Shown in Fig. 3(b) are the autocorrelations (Blue) before and (Green) after the secure channel is applied to the public network. Both plots follow closely to one another and as a result this clearly demonstrates the hidden secure channel is well protected from the autocorrelation attack. Using the theory developed in [3] (see also section 3) and the autocorrelation expression (Eq. 3), one can compute the required data rate (which relates to the amount of time spreading used) for the secure channel. We note that for a large time spreading the BER performance of both channels and the communication privacy of the secure channel will improve at the expense of lower operating bit rate for secure user.

The stealth characteristic of the secure channel can always be adequately protected given that sufficient large time spreading can be attained. While the OOK modulation in the public signal might potentially allow an eavesdropper to extract useful information for time intervals when public signal transmits a bit zero, the secure stealth channel will remain hidden as the communication takes place under the noise floor of the system. Furthermore, due to the random access time between the two channels and M-ary modulation (M=2) of the secure signal where a different code is assigned for a bit zero and bit one (See [3]) so they have distinct noise-like waveforms, the reconstruction of the secure signal (both its amplitude and phase) over a full period is severely inhibited. This will not allow an efficient cross-correlation attack (which is the most efficient method of the recovery of the information transmitted under the noise floor).

We now provide the analytical framework that will allow us to analyze the performance of the proposed system. We first define the ensemble average of the intensity autocorrelation Rff(τ) of the signal f(t) as

Rff(τ)=1ΓτΓ2+τΓ2f(t)f(tτ)dt

where τ specifies the value of delay, Γ is the length of the stream of signal and f(t) represents the signal intensity tapped from the public network and is given by

f(t)=s(t)+p(t)+n(t)2

where s(t), p(t) and n(t) represent the signal amplitude of secure channel, public channel and additive white Gaussian noise respectively. Substitution of Eq. (2) into Eq. (1) and expansion of <f(t)f(t-τ) > yields

Rff(τ)=1ΓτΓ2+τΓ2dt·s(t)2s(tτ)2+p(t)2p(tτ)2+n(t)2n(tτ)2+s(t)2(p(tτ)2+n(tτ)2)+p(t)2(s(tτ)2+n(tτ)2)+n(t)2(s(tτ)2+p(tτ)2)+(s(t)s(tτ)*p(t)*p(tτ)+c.c)+[n(t)n(tτ)*(s(t)*s(tτ)+p(t)*p(tτ))+c.c]

where <n(t) n(t-τ)*> = 0 when τ ≠ 0 for uncorrelated noise.

The first three terms in Eq. (3) relate to the intensity autocorrelation of the secure signal, public signal and noise respectively. Other terms correspond to the cross-correlation between various intensity signal components. Note that Eq. (3) is applicable for any arbitrary pulse spectrum used in the public and secure channel. In the appendix we derive equations to compute various terms in Eq. (3).

3. Eavesdropper detector

The security advantages of the proposed system however are not limited to its steganographic capability. In the event when the existence of secure transmission a priori known to the eavesdropper, a possible strategy which an eavesdropper can implement to break the security of the system and identify the code, is to use a tunable decoder and look for a possible increase in the opening of the eye diagram by tuning the phase of particular chip to match the correct value in the true phase mask [3]. The larger is the contrast in the eye opening between the “correct” and “wrong” choices of a particular phase, the faster and more efficient would be such a search of the “stealth” systems.

We would like to point out that the presence of the public network drastically inhibits and slows down an eavesdropper’s ability to obtain the code used for encoding. This is because the decoded bit performance increases very slowly with respect to the percentage of correctly tuned code. As a result, the method of obtaining the secure code by iterative code tuning is very inefficient, as eavesdropper can’t see significant eye opening to justify and decide on the correct code.

In this section we develop an analytical description to demonstrate the robustness of our proposed transmission against such eavesdropping strategy. We evaluate the eavesdropper’s BER/SNR performance of the proposed system using the standard Q-factor [9] versus the fidelity of the eavesdropper decoder, defined by ∏ the percentage of correct code chips present in an imperfect decoder. The Q-factor is defined by

Q=II0σ+σ0

where (I , σ) and (I 0, σ0) denote the mean and standard deviation of the detected intensity from the network using a decoding phase mask that contains the fraction of ∏ of the correct phase chips, and no correct phase chips respectively.

Shown in Fig. 4 is the dependence of the Q-factor on the ∏ parameter, comparing the Q-factor of the secure channel with and without the presence of the public network. (Note excellent agreement of the analytical results with numerical simulations.) As clearly seen from the plot, the Q-factor is generally smaller when the public network is present due to increase in effective noise seen by the eavesdropper with an imperfect decoder. As low Q-factors imply a low probability of detecting the correct bit, this effectively translates into enhancement in security. Note that the rate of increase of the Q-factor (lower red curve) is much slower in the presence of the public network, making it difficult to achieve a large eye opening - especially in the case when ∏ is small. This constitutes significant difficulty for an eavesdropper who attempts to use a tunable decoder to determine the correct code for individual phase chip. As an efficient iterative strategy to breaking the code would necessarily rely on the “feedback” from the opening eye diagram (needed to decide whether a correct phase code has been reached to justify a lock down on any specific phase code in a particular chip), the proposed approach enables a significant increase of the confidentially of the secure signal.

 figure: Fig. 4

Fig. 4 The comparison of Q-factor for the secure channel vs. the fraction of correct chips (∏) present in an eavesdropper phase mask with public network (red, lower curve) and without public network (blue, upper curve). Symbols represent the simulation values and curves represent analytical values. The parameters are C=128 chips, Ts = 1320 ps and Ps : Pp = 3, Nadd : Pp = 0.01.

Download Full Size | PDF

We now derive the expressions for I and σ (note that I 0 and σ0 follows when ∏ is set to 0), we first define the signal amplitude after the eavesdropper’s imperfect decoder here onwards referred as ∏-Decoder, which is given by

a(t)=s˜(t)+p˜(t)+n(t)

where s̃(t), p̃(t) and n(t) represent the decoded amplitude of the secure channel, public channel and additive white Gaussian noise respectively. The ensemble averages of the intensity of Eq. (5) and its second moment are given by

I(t)=s˜(t)2+p˜(t)2+n(t)2
I(t)2=s˜(t)4+p˜(t)4+n(t)4+4(s˜(t)2n(t)2+p˜(t)2n(t)2+s˜(t)2p˜(t)2)

Using Eq. (6a) and Eq. (6b), the standard deviation of the decoded intensity can be calculated and is given by

σ(t)=s˜(t)4+p˜(t)4+n(t)4(s˜(t)22+p˜(t)22+n(t)22)+2(s˜(t)2n(t)2+p˜(t)2n(t)2+s˜(t)2p˜(t)2)

The pair of equations in Eq. (6a) and Eq. (7) are used to compute the Q-factor in Eq. (4). We first consider the decoded secure amplitude taking into account of neighboring contributions, we have

s˜(t)=(ψ1h˜(t+Ts)+(1ψ1)k˜(t+Ts))e1+h˜(t)e3+(ψ2h˜(tTs)+(1ψ2)k˜(tTs))e2

where TS is the bit period of secure user, θ’s are the random phases between different time frames, ψ´ s∈ {0, 1} depicts the code keying for bit 1 and bit 0 and the signals h̃(t) and k̃(t) represent the decoded bit 1 and bit 0 after the ∏-Decoder where by construction it is devised to decode h̃(t) specifically (when ∏=l h̃(t) is perfectly decoded back to original signal). The ensemble average of the intensity and its square of Eq. (8) are given by

s˜(t)2=h˜(t)2+12(h˜(t+Ts)2+h˜(tTs)2+k˜(t+Ts)2+k˜(tTs)2)
s˜(t)4=h˜(t)4+12(h˜(t+Ts)4+h˜(tTs)4+k˜(t+Ts)4+k˜(tTs)4)
+2h˜(t)2(k˜(t+Ts)2+k˜(tTs)2)+h˜(t+Ts)2k˜(tTs)2+h˜(tTs)2k˜(t+Ts)2
+2h˜(t)2h˜(tTs)2+2h˜(t)2h˜(t+Ts)2+h˜(tTs)2h˜(t+Ts)2+k˜(tTs)2k˜(t+Ts)2

Assuming that flat top band-limited pulse of bandwidth W (Sinc pulse profile in time domain) is employed in both the public network and secure channel, the expression for h̃(t) is given by

h˜(t)=PsCSinc(Ω2t)n=1Cei(Ωt[nC+12]+θnφn)

where Ps is the initial peak power, C is the number of code chips in the encoding phase mask, Ω = W/C is the bandwidth of a code chip in the phase mask, φn∈ [-π, π] is the random phase in different spectral chips and θn ∈ {0,1} with a probability of ∏ being 0 and 1-∏ being 1. When θn is zero, it describes the case when eavesdropper is able to guess the correct phase code of chip n in the decoding phase mask such that the original phase of the chip is restored from that encoded.

For the intensity ensemble average of Eq. (10) we obtain

h˜(t)2=PsC2Sinc2(Ω2t)(C+nm=1C2eiΩt(nm))

Since the ∏-Decoder is tuned to h̃(t), for any ∏ the value of k̃(t) is given by

k˜(t)2=PsCSinc2(Ω2t)

To calculate the other terms in Eq. (9b), we use the following

h˜(t1)2h˜(t2)2=Ps2C4Sinc2(Ω2t1)Sinc2(Ω2t2).
(4nmrs=1CeiΩ(t1(nr)+t2(ms)))+(23(n=m)rs=1CeiΩ(t1(nr)+t2(ms)))+(2(n=r)ms=1(n=s)mr=1(m=r)ns=1(m=s)nr=1CeiΩ(t1(nr)+t2(ms)))+(22(n=m=r)s=1(n=m=s)r=1CeiΩ(t1(nr)+t2(ms)))+(2(n=m)(r=s)=1CeiΩ(t1(nr)+t2(ms)))+((n=s)(m=r)=1CeiΩ(t1(nr)+t2(ms)))+C2
k˜(t1)2k˜(t2)2=Ps2C4Sinc2(Ω2t1)Sinc2(Ω2t2).(C2+(n=s)(m=r)=1CeiΩ(t1(nr)+t2(ms)))

where t1 and t2 can be substituted accordingly for individual term in Eq. (9b).

For the public signal that has been time spread after the eavesdropper’s decoder, the expressions for the average of its intensity and intensity square are given by

p˜(t)2=Pp2CkSinc2(Ω2(tkTp))
p˜(t)4=uvPp22C4Sinc2(Ω2(tuTp))Sinc2(Ω2(tvTp)).(C2+(n=s)(m=r)=1CeiΩ((tuTp)(nr)+(tvTp)(ms)))+uPp22C4Sinc2(Ω2(tuTp))(2C2C)

where Pp and Tp represent the initial peak power and bit period of the public signal. We note that for the additive Gaussian amplifier noise, 〈|ñ(t)|2〉 and 〈|ñ(t)|4〉 are pnoise and 2Pnoise 2 respectively. The Q-factor can subsequently be computed by applying Eq. (9a), Eq. (9b), Eq. (11) - Eq. (16) to Eq. (6a) and Eq. (7).

4. Effective key length

In cryptography, the key length (usually measured in bits due to binary keys) provides a measure of the security and number of possible keys that can be used to encrypt secure data. Assuming that the only way for an eavesdropper to decrypt the encrypted data is to discover the unique key, the length of such a key is vital in determining the susceptibility of an exhaustive search attack. The length of a key should be long enough so that it becomes computationally and physically infeasible (due to large key space) for an attacker to break the encrypted data. Note that a large key length is a necessary but not a sufficient condition for a secure system. It is a necessary as since it is generally possible to run through the entire space of keys in what is known as a “brute force” search, the key space therefore should be large enough for the brute force search to take more time than available to the eavesdropper. However a long key length per se is not sufficient for system security, as there may exist an efficient search algorithm that would not rely on exploring the full key space.

In light of this, we construct a comparable quantitative metric that we term the effective key length, to evaluate the level of security for our proposed secure transmission systems. We define the effective key length as the minimum amount of information (calculated using the standard Shannon definition [10]) necessary to define the decoder.

 figure: Fig. 5

Fig. 5 Effective key length vs. C (number of chips in a phase mask) for various values of SNR signal-to-noise ratio.

Download Full Size | PDF

Neglecting nonlinear effects in the communication channel, the signal in the frequency domain can be represented as a frequency chip in an encoding phase mask [3] of C chips, the signal amplitude in frequency domain for a particular chip is given by

yω=xω+nω=yωei(ϕx+δϕ)

where xω and nω represent the secure signal and noise components respectively, ϕx is the original phase of the signal x. Note that for nω << xω, √〈δϕ2〉 ~ Pn/Pω, with the corresponding standard deviation √〈δϕ2〉 ~ Pn/Pω where Pω and Pn are the power of the signal and noise respectively. If x(t) corresponds to a single “chip” of a signal encoded with phase mask [3] of C chips, so that the corresponding phase can be defined on a interval from [-π , π], the number of different codes for one chip that can be effectively detected in the presence of the noise in the channel, is given by

Nω=2πδϕ2~2πPωPn

As there are C independent chips that define the secure signal, for the effective key length we therefore obtain

Neff=CLog2(Nω)=CLog2(2πSNR)

where SNR is the signal-to-noise ratio in the channel.

The effective key length improves with the increase of the number of chips, as illustrated in Fig. 5 for various values of SNR. In particular, a phase mask of C = 512 chips or more, can translate to an effective key length well above 1000 and effectively allowing the stealth system to reach the level of commercial cryptography.

5. Conclusion

We analyzed the security performance of the recently proposed stealth communications over a public fiber-optical network. We demonstrated the robustness of the secure transmission against intensity autocorrelation attacks where under optimal operating regime; eavesdropper will not be able to discover secure transmission taking place in the public network. We presented analytical theory with simulations and showed the BER/SNR performance represented by the Q-factor as a function of the fidelity in an imperfect decoder used by an eavesdropper. We showed that the use of public networks for secure stealth transmissions can increase the difficulty to perform an iterative code search to break the security of the system as the improvement in Q-factor is severely hindered by the presence of public channel(s). We derived the effective key length metric and compared the level of confidentiality offered by the proposed approach. We showed that for large number of encoding phase chips, security of the proposed system can approach commercial cryptographic level.

Appendix

In this appendix we derive the expressions for the terms in Eq. (3) where a flat top band-limited pulse of bandwidth W (Sinc pulse profile in time domain) is used in both secure and public channels. The signal amplitudes for secure and public user denoted by s(t) and p(t) [3] are given by

s(t)=u(ψuh(tuTs)+(1ψu)k(tuTs))eu
p(t)=rψr(PpSinc(W2(trTpε)))er

where the random Bernoulli variables ψu, r∈{0, 1} depicts the code keying and OOK modulation in secure and public channel respectively, θr and ϕu are the random phases between different time frames, (Ps, Ts, Pp, Tp) represent the initial peak powers and bit period of the secure and public signals, ε∈[-Tp/2,Tp/2 ] is the random time delay between the secure and public signal, the functional form h( ) and k( ) represents the encoded waveforms of bit “1” and bit “0” in the secure channel for M-ary [3] modulation (M=2) and have identical ensemble averages. An example of an encoded waveform h(t) is given by

h(t)=PsCSinc(Ω2t)n=1Cei(Ωt[nC+12]+φn)

where φn∈[-π, π] is the random phase coded to different spectral chips. C is the number of code chips in the encoding phase mask and Ω = W/C is the bandwidth of a code chip in the phase mask. The ensemble average of the signal intensity for secure user, public user and white Gaussian noise n(t) are

s(t)2=uPsCSinc2(Ω2(tuTs))
p(t)2=rTp2Tp2Pp2TpSinc2(W2(trTpε))
n(t)2=Nadd

where Nadd is the average additive amplifier noise power.

We now consider the individual terms in Eq. (3). The first term corresponds to the intensity autocorrelation of secure signal. By using Eq. (A1) and knowing that h( ) and k( ) have identical ensemble averages, we find

s(t)2s(tτ)2=12u,v(1+δuv)h(tuTs)2h(tτvTs)2
+(1δuv)[h(tuTs)2h(tτvTs)2+h(tuTs)h(tτuTs)*h(tvTs)*h(tτvTs)+h(tuTs)h(tτuTs)*h(tvTs)*h(tτνTs)]

To simplify Eq. (A7), we first define the following functions

A(t1)=PsCSinc2(Ω2t1)
B(t1,t2)=PsC2Sinc(Ω2t1)Sinc(Ω2t2)n=1CCos[Ω(nC+12)(t1t2)]
X(t1,t2,t3,t4)=Ps2C4Sinc(Ω2t1)Sinc(Ω2t2)Sinc(Ω2t3)Sinc(Ω2t4).
[(n,m=1CCos[Ω(n(t2t1)+m(t4t3)+(t1t2+t3t4)(C+1)2)])+(n,m=1nmCCos[Ω(n(t2t3)+m(t4t1)+(t1t2+t3t4)(C+1)2)])]

When the ensemble averages in Eq. (A7) are computed, we obtain

s(t)2s(tτ)2=12u,v(1+δuv)X(tuTs,tuTs,tvTs,tvTs)+(1δuv)(A(tuTs)A(tτvTs)+B(tuTs,tτuTs)B(tτvTs,tvTs)+X(tuTs,tτuTs,tτvTs,tvTs)

where the functions A, B and X are specified in Eq. (A8) - Eq. (A10).

The second term in Eq. (3) relates to the intensity autocorrelation of the public signal. When the public signal correlates with itself, ε (the random time delay between public and secure channel) in Eq. (A2) is set to zero as it is redundant and merely shifts time of reference. We therefore obtain

p(t)2p(tτ)2
=14r,v(1+δrv)Pp2Sinc2(W2(trTp))Sinc2(W2(tτvTp))
+(1δrv)[Pp2Sinc(W2(trTp))Sinc(W2(tvTp)).Sinc(W2(tτrTp))Sinc(W2(tτvTp))]

The third term in Eq. (3) relates to the intensity autocorrelation of the additive amplifier noise given by

n(t)2n(tτ)2={2Nadd2τ=0Nadd2otherwise}

where the noise is uncorrelated with exponential distribution of the intensity [3].

The cross correlation terms in Eq. (3) between different signal components can be computed by using Eq. (A4) - Eq. (A6). Yet, the second to last term in Eq. (3) which contain the complex conjugate terms can be evaluated using the following

s(t)s(tτ)*=uB(tuTs,tτuTs)
p(t)p(tτ)*=rTp2Tp2Pp2TpSinc(W2(trTpε))Sinc(W2(trTpετ))

By using Eq. (A4) - Eq. (A15) and substituting them into Eq. (3) we can compute the ensemble average of the intensity autocorrelation Rff(τ) for signals tapped from the fiber.

References and links

1. T. Jamil, “Steganography: the art of hiding information in plain sight,” IEEE Potentials 18,10–12 (1999) [CrossRef]  

2. A.J. Viterbi, “Spread spectrum communications - myths and realities,” IEEE Commun. Mag. 17,11–18 (1979) [CrossRef]  

3. B. B. Wu and E. E. Narimanov, “A method for secure communications over a public fiber-optical network,” Opt. Express 14,3738–3751 (2006) [CrossRef]   [PubMed]  

4. A.J. Viterbi, CDMA: Principles of Spread Spectrum Communications, Addison-Wesley, Reading, Massachusetts (1995)

5. J. Shah, “Optical CDMA,” Opt. Photon. News 14,42–47 (2003) [CrossRef]  

6. Z. Jiang, D. S. Seo, S.-D. Yang, D. E. Leaird, A. M. Weiner, R. V. Roussev, C. Langrock, and M. M. Fejer, “Four user, 2.5 Gb/s, spectrally coded O-CDMA system demonstration using low power nonlinear processing,” J. Lightwave Technol. 23,143–158 (2005) [CrossRef]  

7. Z. Jiang, D.E. Leaird, and A.M. Weiner, “ Experimental Investigation of Security Issues in OCDMA,” OFC 2006 OThT2

8. T. H. Shake, “Confidentiality Performance of Spectral-Phase-Encoded Optical CDMA,” J. Lightwave Technol. 23,1652–1663

9. G. P. Agrawal, Fiber-Optical Communication Systems 3rd Edition (Wiley-Interscience, 2002) [PubMed]  

10. C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal27379–423,623–656 (1948).

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1 Secure transmission over public fiber-optical communication network (Broadcast Star topology) Encryption of secure signal is performed at the physical layer by OCDMA encoder [3].
Fig. 2
Fig. 2 Intensity autocorrelation for a) secure signal and noise only, b) public signal and noise only, c) public signal, secure signal and noise. Simulations are performed where flat top band-limited pulses of bandwidth W (Sinc pulse profile in time domain) are used in both the public network and secure channel. The simulation parameters (see Appendix) are given by: Ps / Pp = 3, W = 0.6 rad /ps, C = 128 chips, Ts = 1320 ps, Tp = 60 ps and Nadd / Pp = 0.01.
Fig. 3
Fig. 3 a) Autocorrelation for composite signal obtain in simulations (red) and using analytical theory (blue) where Ps / Pp = 15, C=128 chips, Ts = 1320 ps and Nadd / Pp = 0.01. b) Autocorrelation comparison before (blue) and after (green) secure signal is applied to the public network (with the public signal and noise). Secure signal uses a spreading factor C=2048 chips, Ts = 21420 ps, Ps / Pp = 15 and Nadd / Pp = 0.01. (See Appendix)
Fig. 4
Fig. 4 The comparison of Q-factor for the secure channel vs. the fraction of correct chips (∏) present in an eavesdropper phase mask with public network (red, lower curve) and without public network (blue, upper curve). Symbols represent the simulation values and curves represent analytical values. The parameters are C=128 chips, Ts = 1320 ps and Ps : Pp = 3, Nadd : Pp = 0.01.
Fig. 5
Fig. 5 Effective key length vs. C (number of chips in a phase mask) for various values of SNR signal-to-noise ratio.

Equations (43)

Equations on this page are rendered with MathJax. Learn more.

R ff ( τ ) = 1 Γ τ Γ 2 + τ Γ 2 f ( t ) f ( t τ ) dt
f ( t ) = s ( t ) + p ( t ) + n ( t ) 2
R ff ( τ ) = 1 Γ τ Γ 2 + τ Γ 2 dt · s ( t ) 2 s ( t τ ) 2 + p ( t ) 2 p ( t τ ) 2 + n ( t ) 2 n ( t τ ) 2 + s ( t ) 2 ( p ( t τ ) 2 + n ( t τ ) 2 ) + p ( t ) 2 ( s ( t τ ) 2 + n ( t τ ) 2 ) + n ( t ) 2 ( s ( t τ ) 2 + p ( t τ ) 2 ) + ( s ( t ) s ( t τ ) * p ( t ) * p ( t τ ) + c . c ) + [ n ( t ) n ( t τ ) * ( s ( t ) * s ( t τ ) + p ( t ) * p ( t τ ) ) + c . c ]
Q = I I 0 σ + σ 0
a ( t ) = s ˜ ( t ) + p ˜ ( t ) + n ( t )
I ( t ) = s ˜ ( t ) 2 + p ˜ ( t ) 2 + n ( t ) 2
I ( t ) 2 = s ˜ ( t ) 4 + p ˜ ( t ) 4 + n ( t ) 4 + 4 ( s ˜ ( t ) 2 n ( t ) 2 + p ˜ ( t ) 2 n ( t ) 2 + s ˜ ( t ) 2 p ˜ ( t ) 2 )
σ ( t ) = s ˜ ( t ) 4 + p ˜ ( t ) 4 + n ( t ) 4 ( s ˜ ( t ) 2 2 + p ˜ ( t ) 2 2 + n ( t ) 2 2 ) + 2 ( s ˜ ( t ) 2 n ( t ) 2 + p ˜ ( t ) 2 n ( t ) 2 + s ˜ ( t ) 2 p ˜ ( t ) 2 )
s ˜ ( t ) = ( ψ 1 h ˜ ( t + T s ) + ( 1 ψ 1 ) k ˜ ( t + T s ) ) e 1 + h ˜ ( t ) e 3 + ( ψ 2 h ˜ ( t T s ) + ( 1 ψ 2 ) k ˜ ( t T s ) ) e 2
s ˜ ( t ) 2 = h ˜ ( t ) 2 + 1 2 ( h ˜ ( t + T s ) 2 + h ˜ ( t T s ) 2 + k ˜ ( t + T s ) 2 + k ˜ ( t T s ) 2 )
s ˜ ( t ) 4 = h ˜ ( t ) 4 + 1 2 ( h ˜ ( t + T s ) 4 + h ˜ ( t T s ) 4 + k ˜ ( t + T s ) 4 + k ˜ ( t T s ) 4 )
+ 2 h ˜ ( t ) 2 ( k ˜ ( t + T s ) 2 + k ˜ ( t T s ) 2 ) + h ˜ ( t + T s ) 2 k ˜ ( t T s ) 2 + h ˜ ( t T s ) 2 k ˜ ( t + T s ) 2
+ 2 h ˜ ( t ) 2 h ˜ ( t T s ) 2 + 2 h ˜ ( t ) 2 h ˜ ( t + T s ) 2 + h ˜ ( t T s ) 2 h ˜ ( t + T s ) 2 + k ˜ ( t T s ) 2 k ˜ ( t + T s ) 2
h ˜ ( t ) = P s C Sinc ( Ω 2 t ) n = 1 C e i ( Ω t [ n C + 1 2 ] + θ n φ n )
h ˜ ( t ) 2 = P s C 2 Sinc 2 ( Ω 2 t ) ( C + n m = 1 C 2 e i Ω t ( n m ) )
k ˜ ( t ) 2 = P s C Sinc 2 ( Ω 2 t )
h ˜ ( t 1 ) 2 h ˜ ( t 2 ) 2 = P s 2 C 4 Sin c 2 ( Ω 2 t 1 ) Sin c 2 ( Ω 2 t 2 ) .
( 4 n m r s = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + ( 2 3 ( n = m ) r s = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + ( 2 ( n = r ) m s = 1 ( n = s ) m r = 1 ( m = r ) n s = 1 ( m = s ) n r = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + ( 2 2 ( n = m = r ) s = 1 ( n = m = s ) r = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + ( 2 ( n = m ) ( r = s ) = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + ( ( n = s ) ( m = r ) = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) ) + C 2
k ˜ ( t 1 ) 2 k ˜ ( t 2 ) 2 = P s 2 C 4 Sinc 2 ( Ω 2 t 1 ) Sinc 2 ( Ω 2 t 2 ) . ( C 2 + ( n = s ) ( m = r ) = 1 C e i Ω ( t 1 ( n r ) + t 2 ( m s ) ) )
p ˜ ( t ) 2 = P p 2 C k Sin c 2 ( Ω 2 ( t kT p ) )
p ˜ ( t ) 4 = u v P p 2 2 C 4 Sin c 2 ( Ω 2 ( t uT p ) ) Sin c 2 ( Ω 2 ( t vT p ) ) . ( C 2 + ( n = s ) ( m = r ) = 1 C e i Ω ( ( t uT p ) ( n r ) + ( t vT p ) ( m s ) ) ) + u P p 2 2 C 4 Sin c 2 ( Ω 2 ( t uT p ) ) ( 2 C 2 C )
y ω = x ω + n ω = y ω e i ( ϕ x + δϕ )
N ω = 2 π δ ϕ 2 ~ 2 π P ω P n
N eff = C Log 2 ( N ω ) = C Log 2 ( 2 πSNR )
s ( t ) = u ( ψ u h ( t uT s ) + ( 1 ψ u ) k ( t uT s ) ) e u
p ( t ) = r ψ r ( P p Sin c ( W 2 ( t rT p ε ) ) ) e r
h ( t ) = P s C Sin c ( Ω 2 t ) n = 1 C e i ( Ω t [ n C + 1 2 ] + φ n )
s ( t ) 2 = u P s C Sin c 2 ( Ω 2 ( t uT s ) )
p ( t ) 2 = r T p 2 T p 2 P p 2 T p Sin c 2 ( W 2 ( t rT p ε ) )
n ( t ) 2 = N add
s ( t ) 2 s ( t τ ) 2 = 1 2 u , v ( 1 + δ uv ) h ( t uT s ) 2 h ( t τ vT s ) 2
+ ( 1 δ uv ) [ h ( t uT s ) 2 h ( t τ vT s ) 2 + h ( t uT s ) h ( t τ uT s ) * h ( t vT s ) * h ( t τ vT s ) + h ( t uT s ) h ( t τ u T s ) * h ( t vT s ) * h ( t τ ν T s ) ]
A ( t 1 ) = P s C Sin c 2 ( Ω 2 t 1 )
B ( t 1 , t 2 ) = P s C 2 Sin c ( Ω 2 t 1 ) Sin c ( Ω 2 t 2 ) n = 1 C Cos [ Ω ( n C + 1 2 ) ( t 1 t 2 ) ]
X ( t 1 , t 2 , t 3 , t 4 ) = P s 2 C 4 Sin c ( Ω 2 t 1 ) Sin c ( Ω 2 t 2 ) Sin c ( Ω 2 t 3 ) Sin c ( Ω 2 t 4 ) .
[ ( n , m = 1 C Cos [ Ω ( n ( t 2 t 1 ) + m ( t 4 t 3 ) + ( t 1 t 2 + t 3 t 4 ) ( C + 1 ) 2 ) ] ) + ( n , m = 1 n m C Cos [ Ω ( n ( t 2 t 3 ) + m ( t 4 t 1 ) + ( t 1 t 2 + t 3 t 4 ) ( C + 1 ) 2 ) ] ) ]
s ( t ) 2 s ( t τ ) 2 = 1 2 u , v ( 1 + δ uv ) X ( t uT s , t uT s , t vT s , t vT s ) + ( 1 δ uv ) ( A ( t uT s ) A ( t τ vT s ) + B ( t uT s , t τ uT s ) B ( t τ vT s , t vT s ) + X ( t uT s , t τ uT s , t τ vT s , t vT s )
p ( t ) 2 p ( t τ ) 2
= 1 4 r , v ( 1 + δ rv ) P p 2 Sin c 2 ( W 2 ( t rT p ) ) Sin c 2 ( W 2 ( t τ vT p ) )
+ ( 1 δ rv ) [ P p 2 Sin c ( W 2 ( t rT p ) ) Sin c ( W 2 ( t vT p ) ) . Sin c ( W 2 ( t τ rT p ) ) Sin c ( W 2 ( t τ vT p ) ) ]
n ( t ) 2 n ( t τ ) 2 = { 2 N add 2 τ = 0 N add 2 otherwise }
s ( t ) s ( t τ ) * = u B ( t uT s , t τ uT s )
p ( t ) p ( t τ ) * = r T p 2 T p 2 P p 2 T p Sin c ( W 2 ( t rT p ε ) ) Sin c ( W 2 ( t rT p ε τ ) )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.