Novel encryption technique for security enhancement in optical code division multiple access

被引:4
作者
Bhanja, Urmila [1 ]
Singhdeo, Sutikshna [2 ]
机构
[1] IGIT, Dept ETC, Sarang, Sarang, India
[2] IISER, Mohali, India
关键词
Eavesdropper; Encryption; Multiple access interference (MAI); Two-dimensional wavelength; time (2D W; T) code; Multi-diagonal prime hopping code (MDPHC); COHERENT OCDMA SYSTEM; COMMUNICATION; DESIGN; SCHEME;
D O I
10.1007/s11107-020-00883-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel two dimensional (2D) wavelength/time (W/T) optical code division multiple access (OCDMA) code with zero cross-correlation property to minimize multiple access interface (MAI) is addressed. The code is constructed using various features of two different one-dimensional codes, i.e., multi-diagonal code and prime hop code referred as multi-diagonal prime hopping (MDPHC) code. The proposed 2D W/T MDPHC code is generated using java software version 8.1, which is found to be optimal. In this paper, the code complexity of the proposed 2D code is also derived. In addition to the novel 2D code design, security provision at the photonic layer of the OCDMA network is also addressed by transmitting the data through a novel encrypted circuit in order to prevent attacks by an eavesdropper. In this work, the proposed encryption circuit is integrated with the proposed 2D (W/T) MDPHC OCDMA encoder to enhance the overall security performance. The proposed model is validated using optisystem software version 14. Robustness of the proposed technique against different types of attacks such as ciphertext-only attack, known plain text attack, chosen plaintext attack, energy detection attack in on off keying optical code division multiple access, Brute-force search attack is investigated theoretically. Bit error rate is also estimated for different fiber distances.
引用
收藏
页码:195 / 222
页数:28
相关论文
共 50 条
[41]   Enhancing security in resource-constrained environments: a fast multiple image encryption technique [J].
Patro, K. Abhimanyu Kumar ;
Agrawal, Bhaskar ;
Acharya, Bibhudendra .
JOURNAL OF ELECTRONIC IMAGING, 2025, 34 (02)
[42]   Spreading code allocation strategy for downlink multicarrier code division multiple access transmission in a correlated Rayleigh fading channel [J].
Garnier, Christelle ;
Delignon, Yves ;
El Ghazi, Hassan ;
Septier, Francois .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (06) :659-672
[43]   Cloud Data Security Solution Based on Data Access Classification, Advanced Encryption Standard and Message Authentication Code [J].
Jawad, Mohammed Saeed .
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 :141-157
[44]   Space-Time Coded Generalized Spatial Modulation for Sparse Code Division Multiple Access [J].
Liu, Yusha ;
Xiang, Luping ;
Yang, Lie-Liang ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (08) :5359-5372
[45]   Carrier sense random packet code division multiple access protocol and its intra-cluster multiple access interference performance analysis [J].
Du, Chuan-Bao ;
Quan, Hou-De ;
Ma, Wan-Zhi ;
Cui, Pei-Zhang ;
Wang, Xiao-Ming .
Binggong Xuebao/Acta Armamentarii, 2015, 36 (07) :1256-1265
[46]   Optical code-division multiple access (O-CDMA) interconnects and telecommunication networks based on temporally accessed spectral multiplexing (TASM™) [J].
Grunnet-Jepsen, A ;
Johnson, AE ;
Maniloff, ES ;
Mossberg, TW ;
Munroe, MJ ;
Sweetser, JN .
OPTOELECTRONIC INTERCONNECTS VI, 1999, 3632 :36-44
[47]   Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme [J].
Singh, Simranjit ;
Kaur, Ramandeep ;
Singh, Amanvir ;
Kaler, R. S. .
OPTICAL FIBER TECHNOLOGY, 2015, 22 :84-89
[48]   A novel chaotic image encryption technique based on multiple discrete dynamical maps [J].
Khan, Majid ;
Masood, Fawad .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) :26203-26222
[49]   An efficient hybrid chaotic map-based encryption technique for multiple image security systems [J].
Jaber, Mohanad J. ;
Jaber, Zahraa Jasim ;
Obaid, Ahmed J. .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (05) :1507-1522
[50]   Space Time Regularized Zero Forcing in Downlink Code Division Multiple Access Systems with Complementary Codes [J].
Judson, D. ;
Bhaskar, Vidhyacharan ;
Arun, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (01) :333-347