Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Secure semantic optical communication scheme based on the multi-head attention mechanism

Not Accessible

Your library or personal account may give you access

Abstract

In this paper, an artificial-intelligence-based secure semantic optical communication scheme is proposed. The semantic features of the original text information are extracted using Transformer. Compared with other networks, Transformer reduces the complexity of the structure and the associated training cost by using the multi-head attention mechanism. To solve the security problem, the encryption scheme is applied to an orthogonal frequency division multiplexed passive optical network (OFDM-PON). The proposed scheme applies chaotic sequences to produce masking vectors. We encrypt the constellation and frequency, achieving a large key space of 1 × 10270. To prove that Transformer can effectively extract the semantic features of text, we have computed the values of ROUGE-1, ROUGE-2, and ROUGE-L, which are 40.9, 18.02, and 37.17, respectively. An encrypted 16 quadrature amplitude modulation (16QAM) OFDM signal transmission over a 2 km seven-core fiber with a data rate of 78.5 Gbits/s was experimentally demonstrated. During the experiments, the bit error rate (BER) was analyzed and the results show that the proposed system improves efficiency and security in an OFDM-PON system.

© 2023 Optica Publishing Group

Full Article  |  PDF Article
More Like This
NOMA security scheme based on constellation camouflage and selective mapping

Yiming Ma, Jianxin Ren, Bo Liu, Yilan Ma, Rahat Ullah, Xiangyu Wu, Yaya Mao, Shuaidong Chen, Yibin Wan, Qing Zhong, Wenchao Xia, Yongfeng Wu, and Lilong Zhao
Opt. Lett. 48(15) 4101-4104 (2023)

Chaotic physical security strategy based on manifold learning-assisted GANs for SDM–OFDM–PONs

Xiaorong Zhu, Jianxin Ren, Xu Zhu, Yaya Mao, Xiangyu Wu, Suiyao Zhu, Yongfeng Wu, Lilong Zhao, Tingting Sun, Rahat Ullah, Feng Tian, and Bo Liu
Opt. Lett. 47(7) 1834-1837 (2022)

Coordinated-security based on probabilistic shaping and encryption in MMW-RoF system

Yaoqiang Xiao, Sitao Wang, Zhiyi Wang, Linrong Jiang, and Jing He
Opt. Lett. 48(11) 2989-2992 (2023)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (5)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.