Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

A method for secure communications over a public fiber-optical network

Open Access Open Access

Abstract

We develop a spread-spectrum based approach to secure communications over existing fiber-optical networks. Secure transmission for a dedicated user is achieved by overlaying a covert channel onto a host channel in the existing active fiber link. The covert channel is optically encoded and temporally spread, and has average power below the noise floor in the fiber, making it hidden for a direct detection thus allowing for cryptographic and steganographic security capabilities. The presence for the host channel in the network provides an ad hoc security expansion and increases the difficulty for an eavesdropper to intercept and decode the secure signal.

©2006 Optical Society of America

1. Introduction

Spread spectrum (SS) communication technology [1] has been used extensively in military radio communication and navigation systems in which covert operation is a major objective, as SS techniques allow low detectability of transmitted signal by an unintended receiver and provide excellent robustness to interference. In these systems, low probability of interception is realized whereby a user’s signal is spread by a unique code, and transformed into noise-like signal of low power density. SS signal is consequently cloaked within background noise, making it difficult to detect and intercept by a hostile eavesdropper. The communication privacy is ensured as the transmitted signal is hidden and moreover can only be recovered properly into the original signal if the receiver knows the same code.

With many of the advantages offered by SS techniques, spread spectrum systems were soon adopted for applications in wireless telephony systems to meet an ever-accelerating worldwide demand for mobile and personal portable communications. The use of SS code division multiple access (CDMA) permits asynchronous multiple access communication for a large population of users, thereby enabling higher bandwidth efficiency for a given wireless spectrum allocation. With these in mind, the SS CDMA technique was recently applied to optical communications [2–4] referred to as optical CDMA (OCDMA) with the aim of applying the advantages of SS to optical systems. It was also demonstrated that OCDMA could be supported by the spectral gaps between WDM channels if appropriate filters are used, thus allowing hybrid CDMA-WDM networks [see Fig. 1(a) and Fig. 1(b)] [5, 6].

In the present work, we exploit the security advantages offered by SS techniques for optical communications and develop the SS-based method for secure transmission over an existing public fiber-optical network. Secure transmission for a dedicated user is achieved by overlaying a covert signal onto a host channel in the existing active fiber link. Secure signal is encoded and temporally spread, and has average power below the noise floor in the communication channel, hence making it hidden for a direct detection. The underlying approach provides both enhanced cryptographic and steganographic [7] security, which inherently comes from the encryption and hiding of the signal.

Furthermore, the presence of the host channel in the network provides an ad hoc security enhancement and increases the difficulty for an eavesdropper to intercept and decode the secure signal, since any slight imperfection in the decoding scheme would cause the host signal to mask over the secure signal to be detected. In contrast to the earlier work [5, 6] (see Fig. 1), the CDMA signal in our proposed technique supports the exact bandwidth interval, which carries most of the power of the host network; see Fig. 1(c).

In the present paper, we will analyze the performance of the proposed integrated network and show that by controlling the initial input power of the signal transmitted by the secure user and the code length (which determines the amount of time spreading) we can achieve a given BER (bit-error-rate) for the required level of performance.

The paper is organized as follows. In Section 2 we describe the configuration of the system and the underlying key technologies to achieve secure transmission. We develop the analytical description of the proposed system in Section 3 and compare it to the results of numerical simulations in Section 4. We illustrate the system performance in Section 5 and discuss the security of the proposed network in Section 6. Section 7 summarizes the main results of the paper.

 figure: Fig. 1.

Fig. 1. (In color) Optical Spectrum of different hybrid CDM-WDM networks using the methods of a) Ref. [6], b) Ref. [5] and c) Scheme employed in this paper

Download Full Size | PDF

 figure: Fig. 2.

Fig. 2. Schematic diagram of the proposed secure transmission over public fiber-optical communication network. The transmitter can be e.g. a mode locked fiber laser.

Download Full Size | PDF

 figure: Fig. 3.

Fig. 3. Spectral phase encoder (left) and decoder (right)

Download Full Size | PDF

2. The system

An overview of the configuration of the proposed system is illustrated in Fig. 2 with two channels shown, a single WDM channel employing OOK (on-off keying) for the host of the public network and a secure M-ary [8] (M=2) channel for the secure user. For simplicity, we consider only one WDM channel in the public network, where many users access the network via time division multiple access (TDMA). Similar analysis can easily be extended to multiple WDM channels. To increase the security of the “covert” channel, the secure signal has the frequency spectrum profile identical to that in the host channel described in Fig. 1(c). The secure signal is initially encoded and time spread by an OCDMA encoder and consequently becomes noise-like with low power density. The signals from both channels are independently coupled into the optical fiber-optical link where noise from amplifiers due to spontaneous emission adds to the composite signal. In this illustrative example, the system provides dispersion compensation (using e.g. dispersion compensating fiber and/or other dispersion compensators). At the receiving end, a photoreceiver is used for data recovery for the user in the host channel, while a relevant decoder is additionally required for the secure user to recover the secure data. The OCDMA encoder/decoder consists of a coherent spectral phase encoder/decoder shown in Fig. 3, which follows the implementation of pulse shaping technique [9]. The decoder is the same as the encoder with the phase mask replaced with its conjugate [4].

Note that the larger is the number of chips in the phase mask, the longer the code length for encoding and also the greater is the spreading of the secure signal. A random phase assignment to the different Fourier components (“chips”) is preferred in order to maximize the security of the system.

3. Theoretical description

In this section, we develop the analytical description of the bit-error-rate (BER) in the proposed communication systems. We assume that the effect of dispersion is properly compensated and the effect of nonlinearity is negligible for small peak powers in our signals [4].

 figure: Fig. 4.

Fig. 4. Amplitude distribution of the real part of an encoded waveform

Download Full Size | PDF

3.1. Probability density function

The performance in both the host and secure channels is limited by the effective noise defined by the contributions due to amplified spontaneous emission, and multi-access interference. While the former can be adequately represented by Gaussian white noise [10], the statistics of the latter is more complicated. However, if C is the number of chips in the phase mask of the SS encoder, in the limit when C >> 1, by virtue of the central limit theorem, the multi-access interference noise distribution (in both host and secure channels) approaches zero mean Gaussian with the spectrum defined by the original pulse [11, 12]. Figure 4 demonstrates the Gaussian distribution behavior of the real part of the encoded waveform.

The detected optical field amplitude A at location R and S for the host and secure channel shown in Fig. 3 is given by Eq. (1) where √P denotes the signal amplitude, θ∈ |-π,π| is the random phase and n is the complex noise amplitude characterized by zero mean Gaussian distribution.

A=n+Pe

In the case when a bit zero is sent in the host channel where OOK is employed, or when a secure bit is incorrectly decoded (constituting effective noise) due to a wrong code used in the secure channel (i.e. eavesdropper situation), A = n. The corresponding intensity probability density function (PDF) has a negative exponential distribution [13]:

fI0(I)=1N̄e1N̄0

where the average noise intensity N̄0 =〈|n|2〉 and n ∈ {nhost, neav} for the host and secure channel respectively. In order to compute the intensity PDF of a bit one in the host channel or a correctly decoded bit in the secure channel, we first rewrite and decompose the components of Eq. (1) into its real and imaginary parts with:

A=U+iV

where U=nRe+PCos(θ)andV=nIm+PSin(θ). The noise components nRe and nIm are independent and identically Gaussian distributed with zero mean and standard deviation N̄12whereN̄1=n2=nRe2+nIm2 is the average noise intensity and n ∈{nhost, nsecure} for the host and secure channel respectively. Note that in this case the secure user noise component is no longer neav due to correct decoding. The distribution functions of U and V are identical and can be calculated using the Gaussian distribution of the noise and uniform distribution of θ. E.g. the cumulative distribution function of U is given by:

FU(u)=P{nRe+PCos(θ)u}=ππuPCos(θ)en2N̄1πN̄112πdn

By taking the derivative with respect to u in Eq. (4), the PDF fU(u) is given in Eq. (5a) and similarly the PDF fV(v) is given in Eq. (5b).

fU(u)=ππe(uPCos(θ))2N̄12N̄1π32
fV(v)=ππe(vPSin(θ))2N̄12N̄1π32

With Eq. (5a) and Eq. (5b), we can calculate the intensity PDF I1 = U2 + V2 using:

fI1(I)=ddI(1v21v2fU(u)fV(v)dudv)
=IIeI+P2PvN1N̄1π1v2dv

The PDF in Eq. (6) approaches Gaussian when P becomes large. The expressions for N̄0 and N̄1 for both secure and host users are obtained in the next subsection.

3.2. Statistical description of the signal

In the secure channel, to encode a band-limited pulse f(t) which has a bandwidth W and arbitrary spectrum F(ω) (Fig. 5 with a phase mask of C chips, the spectrum of the pulse is divided into C equally spaced sections, each having a bandwidth of Ω = W/C. Each chip acquires an independent random phase ϕne[-π, π]. The general expression for the encoded signal is given by:

h(t)=12πWF(ω)G(ω)Exp(iωt)

where

G(ω)=n=1Crect(ωΩ+(C+12n)Ω)Exp(n)

and rect(x) = 1 for |x| ≤ 0.5 and equal to zero otherwise.

 figure: Fig. 5

Fig. 5 The pulse spectrum of the band-limited pulse f(t)

Download Full Size | PDF

Equation (8) defines the frequency domain representation of the phase mask, which constitutes the code used by secure user. The number of chips C defines the code length.

Since the noise amplitude for both bit zero and bit one in the host channel is equivalent, to compute its average noise intensity we define the noise amplitude nhost(t) for the host channel as:

nhost(t)=qsecure(t)+qadd(t)

The noise amplitude in the host channel is composed of qsecure(t) (the noise contributed by the secure user’s spread signal) and q add(t) the additive Gaussian noise present in the fiber. The average noise intensity <N host(t)> in Eq. (9) is given by:

Nhost(t)=nhost(t)2=Qsecure(t)+Qadd

where Q secure(t) = |q secure(t)|2 and Q add is the average additive Gaussian noise power coming from the optical amplifier.

To calculate <Q secure(t)>, we need to take into account of the contributions from adjacent bits. In the general case, sufficient number of neighboring slots should be included in q secure(t) which depends on the amount of spreading and the bit period of secure user. In the case if spreading is limited to the nearest neighboring slots. The signal sent by secure user is given by:

qsecure(t)=[ψ1h(t+Ts)+(1ψ1)k(t+Ts])e1+h(t)e3+[ψ2h(tTs)+(1+ψ2)k(tTs)]e2

where TS is the bit period of secure user, θ’s are the random phases between different time frames, ψ’s are random Bernoulli variable with mean 0.5 for the different code keying and the functional form h( ) and k( ) represent the amplitude function for the encoded bit 1 and bit 0 and are defined by Eq. (7–8).

The bit period TS is approximately on the order of the time spreading of the pulse ~ 2π/Ω. Ω is defined by W/C, where W is the pulse bandwidth and C is the number chips in the phase mask. The random phases θ’s between different time frames are based on the assumption that the bit intervals are much longer than the coherence time of the laser. The functional form of h( ) and k( ) generally depends on the pulse spectrum used. The ensemble average of the intensity of Eq. (11) is given as:

Qsecure(t)=h(t)2+12(h(t+Ts)2+h(tTs)2+k(t+Ts)2+k(tTs)2)

Since the ensemble average of the encoded pulses will yield the same functional form we rewrite Eq. (12a) as:

Qsecure(t)=h(t)2+h(t+Ts)2+h(tTs)2

We further take the time average of <Q secure(t)> with respect to Ts to account for the different positions of host signal under the secure time spread signal, hence Eq. (12b) becomes:

Qsecure(t)Ts=1TsTsQsecure(t)

Finally, the average noise intensity of the host user is given by:

Nhost(t)=h(t)2+h(t+Ts)2+h(tTs)2TS+Qadd

Following the same approach, we find the expressions for the noise amplitudes of secure user:

neav(t)=qhost(t)+qincorrect(t)+qadd(t)
nsecure(t)=qhost(t)+qadd(t)

neav(t) and nsecure(t) are the noise amplitudes when incorrect and correct decoding takes place respectively. qhost(t) is the effective noise from the spreading of the host signal during the decoding stage, qincorrect(t) is the effective noise originating from the secure user due to incorrect decoding and qadd(t) is the same as before. We take the average of the noise intensities in Eqs. (15) and (16) and obtain:

Neav(t)=Qhost(t)+Qincorrect(t)+Qadd
Nsecure(t)=Qhost(t)+Qadd

To calculate <Qhost(t), the time spread signal amplitude qhost(t) of the host user after decoding is given by:

qhost(t)=kψkh(tkTH)ek

where k spans over adjacent slots to take into account of neighboring contributions, ψ’s and θ’s have identical definitions as before, TH is the bit period of the host user and the function h() again represents the functional form of the spread signal amplitude of host user. As a result the ensemble average of the intensity is given as:

Qhost(t)=12kh(tkTH)2

The expression for <Qincorrect(t)> is given by the first component of Eq. (12b) i.e., the ensemble average of the intensity of encoded waveform:

Qincorrect(t)=h(t)2

Finally the time average values:

Neav(t)=12kh(tkTH)2TH+h(t)2TH+Qadd
Nsecure(t)=12kh(tkTH)2TH+Qadd

Eqs. (14) and Eqs. (22–23) provide the complete description of the average noise intensities in our system for both host and secure users. The theoretical analysis for them can be performed for any arbitrary pulse spectrum, in the specific case of the band-limited pulse with the spectrum shown in Fig. 6 (corresponding to the Sinc profile in the time domain f(t)=P0Sinc(Wt2), where Sinc(t) = Sin(t)/t)

 figure: Fig. 6

Fig. 6 Band-limited pulse spectrum

Download Full Size | PDF

We have:

N̄0host=N̄1host=Nhost(t)=PsCSinc2(Ω2[t+Ts])+PsCSinc2(Ω2t)+PsCSinc2(Ω2[t+Ts])TS+Qadd

where PS is the initial peak power of secure signal.

N̄0secure=Neav(t)=k12PHCSinc2Ω2(Ω2[tkTH])TH+PsCSinc2(Ω2t)TH+Qadd
N̄1secure=Nsecure(t)=k12PHCSinc2(Ω2[tkTH])TH+Qadd

where PH is the initial peak power of host signal.

3.3 Bit-error rate

By using Eqs. (2) and (6) the expression for BER is given as:

BER=(120IthdIIIExp(I+P2PyN̄1)N̄1πIy2dy)+eIthN̄02

where Ith is the optimal threshold power defined by:

IthIthExp(Ith+P2PyN̄1)N̄1πIthy2dy=eIthN̄0N̄0

The BER for host and secure user can be calculated accordingly by appropriate substitution of Eqs. (24–26) and P = PS or PH. Eq. (27) can be used to compute the bit-error-rate of the system subject to different code lengths, amounts of additive noise in the fiber, and operating signal powers and bit rates between secure and host users.

4. Simulation results

We verify our theoretical analysis by comparing the theoretical PDFs with the results of the simulations of decoded signal power for both secure and host users shown in Fig. 7. To allow for enhanced security, random phase assignments in the phase mask are employed for the encoding of the secure user. The frequency spectrum profiles for both users are identical, and the signal detection for both channels is performed with their corresponding clock signals. The effect of dispersion is properly compensated and nonlinearity is assumed to be negligible. It can be seen that the simulation results fit almost perfectly with the underlying theoretical probability density functions.

5. System performance

This section illustrates the various features and advantages of the proposed system to secure transmission. Shown in Fig. 8(a) and Fig. 8(b) are the simulated waveforms found in various parts of the proposed system while secure communication is taking place. Once the secure signal S(t) passes through the encoder, it is time spread and becomes noise-like with much reduced intensity [S`(t) in Fig. 8(a)]. After propagation, the secure encoded signal (blue dashed line) appears similar to the noise component contributed by the amplifier (green). Moreover, the average power of the secure signal is much lower than the amplifier noise and as a consequence the secure signal is fully masked by the amplifier noise.

Figure 8(b) shows that for the standard power detector used in the host channel, the recovered signal (top panel in Fig. 8(b) is similar to the initial input signal (top left panel in Fig. 8(a). In the secure channel however, when an appropriate decoder is used, the secure signal (dotted blue line) gets properly recovered, while the component of the host signal is forced to time spread and become noise-like with intensity much lower than the recovered signal (bottom right panels in Fig. 8(b).

 figure: Fig. 7.

Fig. 7. Histogram of detected signal power (Top row: bit 0 and 1 (a, b) Host Channel), (Bottom Row: improperly and properly decoded bit (c, d) Secure Channel) (Phase mask has 128 chips, initial peak power of Psecure/Phost = 3 and Average Gaussian power = 0.01Phost)

Download Full Size | PDF

 figure: Fig. 8.(a)

Fig. 8.(a) Simulated waveforms before the detector

Download Full Size | PDF

 figure: Fig. 8.(b)

Fig. 8.(b) Simulated waveforms at the detector

Download Full Size | PDF

 figure: Fig. 9.

Fig. 9. BER vs. Peak power ratio of initial pulses of secure to host user under different levels of time spreading and noise regimes (No additive noise in the left column and average additive noise power equal to 0.01PH in the right column)

Download Full Size | PDF

Figure 9 summarizes the results for the BER in four different scenarios. There, the “columns” [Fig. 9(a), Fig. 9(c) vs. Fig. 9(b), Fig. 9(d)] correspond to different levels of additive noise power (due to e.g. spontaneous emission in the EDFA) present in the network while the “rows” [Fig. 9(a), Fig. 9(b) vs. Fig. 9(c), Fig. 9(d)] correspond to different time spreading applied to the secure user. As follows from Fig. 9, there exists an operating point whereby both users would enjoy the same BER, its value can be reduced by increasing the time spreading in the secure channel (albeit at the price of the corresponding reduction of the bit rate in the secure channel). In the limit of large time spreading introduced by the secure encoder, the ultimate performance of the system would only be limited by the amount of additive noise present in the fiber.

A particularly important feature of the proposed system is its increased security. As this represents the most important aspect of the work presented, we shall discuss it in detail in the next section.

6. Communication security

Generally, the presence of a covert signal can be detected by the analysis of the 1) Spectrum, 2) Monitoring of signal power and 3) Statistical analysis of power fluctuations. Below we demonstrate that a direct attack by any of these methods will not allow detection of the secure signal in the proposed system.

6.1 Analysis of spectrum

When an eavesdropper tries to confirm secure transmission by looking at the power spectrum shown in Fig. 10, because the secure signal occupies the same spectrum as the host channel with much lower magnitude (comparable to amplifier noise component), this makes it very difficult for an eavesdropper or the host user to find out if secure transmission is indeed taking place. The use of identical spectrum compared to that used in the public network is one of the major steganographic security advantages as opposed to [5, 6] where the use of appropriate filters may potentially allow the detection of secure signals.

6.2. Monitoring of signal power

As illustrated in Fig. 8(b), when an eavesdropper intercepts the signal and attempts to “brute-force” the encoding using a tunable decoder to detect the secure signal. Since the public channel is present and occupying identical frequency spectrum as the secure signal, no filtering is possible to filter out the unwanted public signal from the standpoint of the eavesdropper. As a result any imperfect decoding that comes from the brute-force approach, will cause massive spreading of the host “public” signal (red line) and “overwhelm” significantly the secure component (blue) - see middle panel in Fig. 8(b) hindering the determination of a correct code. The presence of the public channel increases the security of the secure channel by forcing the eavesdropper to suffer a lower SNR due to the extensive effective noise that comes from the spreading of public signals while decoding takes place.

6.3. Statistical analysis of power fluctuations

A third method in which an eavesdropper can confirm secure transmission is by analyzing the statistics of power fluctuation and try to look for inconsistency in the underlying PDFs. It is shown in Fig. 11 that the distribution of normalized power for additive noise and secure encoded signal is by far similar, hence disallowing the detection of active secure communication. The use of random encoding especially for a large number of chips in the phase masks ensures the secure signal to have similar statistics as opposed to the amplifier noise which is always present in the network. As a result the nature of the secure signal by construction allows itself to be masked and avoid being detected.

 figure: Fig. 10.

Fig. 10. Power spectrum of various components at the fiber end (Visible fluctuations are due to interferences)

Download Full Size | PDF

 figure: Fig. 11.

Fig. 11. Statistics of genuine noise and secure signal

Download Full Size | PDF

 figure: Fig. 12.

Fig. 12. Q-factor for the secure channel vs. the fraction (in percents) of correct chips Π present in a decoding phase mask of the eavesdropper.

Download Full Size | PDF

6.4. Quantitative description

We further explore the security capabilities of the proposed system using the standard Q-factor [14] that describes the BER/SNR performance of a communication system (with the higher values of the Q-factor corresponding to better BER). Here we study the variation of the Q-factor with respect to the percentage of correct chips present in an imperfect decoder used by an eavesdropper.

The Q-factor is defined as

Q=IsecureIeavσsecure+σeav

where (I secure, σ secure) and (I eav, σ eav) represent the mean and the standard deviation of the intensity from decoding using a pseudo correct phase mask (superscripted by secure) and a totally incorrect phase mask (superscripted by eav).

We assume that the eavesdropper tries to determine the code by using a tunable detector. In one possible strategy, looking for a possible increase in the opening of the eye diagram vs. the value of the phase of a particular chip the eavesdropper can hope to identify its correct value. The larger is the contrast in the eye opening (or equivalently in the corresponding Q-factor) between the “correct” and “wrong” choices of the phase, the faster and more efficient would be such a search.

In Fig. 12 we plot the variation of the Q-factor with the fraction of the “chips” that the eavesdropper already identified, in two (otherwise equivalent) systems with (red) and without (blue) the public channel. As perfect refinement of each phase by the eavesdropper is not practically possible, in this simulation we assign a finite phase error to the “correct” chips (represented by the Gaussian random variable with the standard deviation 0.1 added to the actual phase value used by the encoder). The initial guess of the eavesdropper (the “incorrect” chips) is assumed to be chosen at random.

As expected, Fig. 12 demonstrates that in the presence of the public channel, there is a lower Q-factor. Since a lower Q-factor dictates a lower likelihood of detecting a correct bit, the decrease of the Q-factor implies security enhancement in the presence of the public channel. In addition, we observe a gentler slope when the public channel is present, representing a slow rate of increase in Q-factor with respect to % of correct chips present. As a result, it poses substantial difficulty to an eavesdropper who attempts to implement an iterative fine-tuning progressive search approach for determining a correct code to break the security of the system, since the improvement in Q is insufficient to justify a lock down on any specific phase code in a chip.

6. Conclusions

We have proposed and demonstrated a practical application of applying the coherent spectral phase encoding to secure transmission over an existing public fiber-optical network with enhanced security and acceptable BER performance. The key technologies addressed here provide a powerful and attractive way to use the existing optical networks for highly secure communications.

Acknowledgments

The authors would like to thank P. R. Prucnal and I. Glesk for valuable discussions.

References and links

1. A. J. Viterbi, “Spread spectrum communications - myths and realities,” IEEE Commun. Mag. 17, 11–18 (1979) [CrossRef]  

2. P. R. Prucnal, M. A. Santoro, and T. R. Fan, “Spread spectrum fiber-optic local area network using optical processing,” J. Lightwave Technol. 4, 547 (1986). [CrossRef]  

3. J. Shah, “Optical CDMA,” Opt. Photon. Newslett. 14, 42–47 (2003) [CrossRef]  

4. J. A. Salehi, A. M. Weiner, and J. P. Heritage, “Coherent ultrashort light pulse code-division multiple access communication systems,” J. Lightwave Technol. 8, 478–491 (1990) [CrossRef]  

5. S. Galli, R. Menendez, P. Toliver, T. Banwell, J. Jackel, J. Young, and S. Etermad “Experimental results on the simultaneous transmission of two 2.5 Gbps optical-CDMA channels and a 10 Gbps OOK channel within the same WDM window,” Proc. OFC 2005 OWB3

6. S. Shen and A.M. Weiner “Suppression of WDM interference for error-free detection of ultrashort-pulse CDMA signals in spectrally overlaid hybrid WDM-CDMA operation,” IEEE Photonics Technol Lett. 13, 82–84 (2001) [CrossRef]  

7. Steganography defines the science of hiding information by embedding messages within other in such a way that no one apart from the intended recipient knows of the existence of the message.

8. E. E. Narimanov and B. B. Wu, “Advanced coding techniques for asynchronous fiber-optical CDMA,” Proc. CLEO 2005 JThE70

9. A. M. Weiner, D. E. Leaird, J. S. Patel, and J. R. Wullert, “Programmable shaping of femtosecond optical pulses by use of a 128-element liquid crystal phase modulator,” IEEE J. Quantum Electron. 28, 908–920 (1992) [CrossRef]  

10. E. Desurvire, Erbium-Doped Fiber Amplifiers, Principles and Applications (John Wiley & Sons, Inc., New York, 1994)

11. J. A. Salehi, A. M. Weiner, and J.P. Heritage, “Temporal and statistical analysis of ultrashort light pulse code-division multiple access communications network,” in Proceedings of IEEE Int. Conf. on Communications 2, 728–733 (1989)

12. E. E. Narimanov, “Information capacity of nonlinear fiber-optical systems: fundamental limits and OCDMA performance,” in Optical Code Division Multiple Access: Fundamentals and Applications, P. R. Prucnal, ed. (CRC, 2005)

13. S. M. Ross, Introduction To Probability Models 6th Edition (Academic Press, 1997) [PubMed]  

14. G. P. Agrawal, Fiber-Optical Communication Systems 3rd Edition (Wiley-Interscience, 2002) [PubMed]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (13)

Fig. 1.
Fig. 1. (In color) Optical Spectrum of different hybrid CDM-WDM networks using the methods of a) Ref. [6], b) Ref. [5] and c) Scheme employed in this paper
Fig. 2.
Fig. 2. Schematic diagram of the proposed secure transmission over public fiber-optical communication network. The transmitter can be e.g. a mode locked fiber laser.
Fig. 3.
Fig. 3. Spectral phase encoder (left) and decoder (right)
Fig. 4.
Fig. 4. Amplitude distribution of the real part of an encoded waveform
Fig. 5
Fig. 5 The pulse spectrum of the band-limited pulse f(t)
Fig. 6
Fig. 6 Band-limited pulse spectrum
Fig. 7.
Fig. 7. Histogram of detected signal power (Top row: bit 0 and 1 (a, b) Host Channel), (Bottom Row: improperly and properly decoded bit (c, d) Secure Channel) (Phase mask has 128 chips, initial peak power of Psecure/Phost = 3 and Average Gaussian power = 0.01Phost)
Fig. 8.(a)
Fig. 8.(a) Simulated waveforms before the detector
Fig. 8.(b)
Fig. 8.(b) Simulated waveforms at the detector
Fig. 9.
Fig. 9. BER vs. Peak power ratio of initial pulses of secure to host user under different levels of time spreading and noise regimes (No additive noise in the left column and average additive noise power equal to 0.01PH in the right column)
Fig. 10.
Fig. 10. Power spectrum of various components at the fiber end (Visible fluctuations are due to interferences)
Fig. 11.
Fig. 11. Statistics of genuine noise and secure signal
Fig. 12.
Fig. 12. Q-factor for the secure channel vs. the fraction (in percents) of correct chips Π present in a decoding phase mask of the eavesdropper.

Equations (32)

Equations on this page are rendered with MathJax. Learn more.

A = n + P e
f I 0 ( I ) = 1 N ̄ e 1 N ̄ 0
A = U + iV
F U ( u ) = P { n Re + P Cos ( θ ) u } = π π u P Cos ( θ ) e n 2 N ̄ 1 π N ̄ 1 1 2 π dn
f U ( u ) = π π e ( u P Cos ( θ ) ) 2 N ̄ 1 2 N ̄ 1 π 3 2
f V ( v ) = π π e ( v P Sin ( θ ) ) 2 N ̄ 1 2 N ̄ 1 π 3 2
f I 1 ( I ) = d dI ( 1 v 2 1 v 2 f U ( u ) f V ( v ) du dv )
= I I e I + P 2 P v N 1 N ̄ 1 π 1 v 2 dv
h ( t ) = 1 2 π W F ( ω ) G ( ω ) Exp ( iωt )
G ( ω ) = n = 1 C rect ( ω Ω + ( C + 1 2 n ) Ω ) Exp ( n )
n host ( t ) = q sec ure ( t ) + q add ( t )
N host ( t ) = n host ( t ) 2 = Q sec ure ( t ) + Q add
q sec ure ( t ) = [ ψ 1 h ( t + T s ) + ( 1 ψ 1 ) k ( t + T s ] ) e 1 + h ( t ) e 3 + [ ψ 2 h ( t T s ) + ( 1 + ψ 2 ) k ( t T s ) ] e 2
Q sec ure ( t ) = h ( t ) 2 + 1 2 ( h ( t + T s ) 2 + h ( t T s ) 2 + k ( t + T s ) 2 + k ( t T s ) 2 )
Q sec ure ( t ) = h ( t ) 2 + h ( t + T s ) 2 + h ( t T s ) 2
Q sec ure ( t ) T s = 1 T s T s Q sec ure ( t )
N host ( t ) = h ( t ) 2 + h ( t + T s ) 2 + h ( t T s ) 2 T S + Q add
n eav ( t ) = q host ( t ) + q incorrect ( t ) + q add ( t )
n sec ure ( t ) = q host ( t ) + q add ( t )
N eav ( t ) = Q host ( t ) + Q incorrect ( t ) + Q add
N sec ure ( t ) = Q host ( t ) + Q add
q host ( t ) = k ψ k h ( t kT H ) e k
Q host ( t ) = 1 2 k h ( t kT H ) 2
Q incorrect ( t ) = h ( t ) 2
N eav ( t ) = 1 2 k h ( t kT H ) 2 T H + h ( t ) 2 T H + Q add
N sec ure ( t ) = 1 2 k h ( t kT H ) 2 T H + Q add
N ̄ 0 host = N ̄ 1 host = N host ( t ) = P s C Sin c 2 ( Ω 2 [t+ T s ] )+ P s C Sin c 2 ( Ω 2 t ) + P s C Sin c 2 ( Ω 2 [t+ T s ] ) T S + Q add
N ̄ 0 sec ure = N eav ( t ) = k 1 2 P H C Sinc 2 Ω 2 ( Ω 2 [ t kT H ] ) T H + P s C Sinc 2 ( Ω 2 t ) T H + Q add
N ̄ 1 sec ure = N sec ure ( t ) = k 1 2 P H C Sinc 2 ( Ω 2 [ t kT H ] ) T H + Q add
BER = ( 1 2 0 I th dI I I Exp ( I + P 2 P y N ̄ 1 ) N ̄ 1 π I y 2 dy ) + e I th N ̄ 0 2
I th I th Exp ( I th + P 2 P y N ̄ 1 ) N ̄ 1 π I th y 2 dy = e I th N ̄ 0 N ̄ 0
Q = I sec ure I eav σ sec ure + σ eav
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.