Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Flexible non-linear physical security coding scheme combined with chaotic neural network for OFDM-WDM-PON

Open Access Open Access

Abstract

In this paper, a flexible physical security coding scheme integrating chaotic neural network (CNN) and non-linear encryption is proposed for orthogonal frequency division multiplexing wavelength division multiplexing passive optical network (OFDM-WDM-PON). The scheme improved the flexibility, adjustability and the key space of chaotic encryption system by introducing chaos into neural networks. The system will encrypt the bit series, probability shaping points, and subcarriers position of the OFDM signal through linear encryption and non-linear encryption concurrently. Results show that a key sensitivity of 10−15 and a key space of more than 10279 can be achieved. The encrypted system's Lyapunov is 5.2631, along with 12 parameters can be dynamically changed in the range of 0∼5. Furthermore, when the bit error rate (BER) is less than 3.8×10−3, probabilistic shaping (PS) technology decreases power loss by around 0.5 dB. A 20.454 Gb/s data transmission experiment was successfully verified for a span of 25 Km single-mode fiber. According to the experimental results, the proposed encryption scheme is likely to be used in future OFDM-WDM-PON transmission systems.

© 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

In recently years, due to the continuous increase in communication demand, the capacity and optimization algorithms of optical communication have been extensively studied [1,2]. The author designs algorithms for both transparent and opaque virtual optical network embedding (VONE) over flexible-grid elastic optical networks in [3,4] investigates how to serve multicast requests over EONs with multicast-capable routing, modulation level, and spectrum assignment (RMSA). [5] introduces the spectrum fragmentation issue, which undermines the bandwidth efficiency in elastic optical networks.

Among these technologies, WDM-OFDM-PON has been widely used due to its excellent performance 69]. OFDM can achieve high-speed serial-parallel transmission, and due to the orthogonality of its carriers can ensure that it has a better ability to resist multipath fading, its ultra-high frequency utilization rate can transmit a large amount of data under narrowband bandwidth. The passive optical network (PON) system don’t need expensive active devices, is one of promising access network system in the industry, consisting of an optical line terminal (OLT) linked to various optical network units (ONU) [10,11]. Among them, the security of the entire optical communication system has recently been extensively studied by researchers. However, the security research of communication systems is often concentrated in the upper structure of the OSI model, and various confidentiality protocols are used for encryption, but there is a lack of corresponding research on security transmission of the physical layer [12,13]. In OFDM-WDM-PON physical layer, every ONU node shares the same data frame. If a third-party listener maliciously intercepts the data packet and decodes it, it will cause information leakage, password loss or even a lot of money damage. As a result, one of the big research hotspots in the optics communication field is how to improve the information security of the physical layer. In [14], the strategy proposed three-dimensional Brownian motion and chaos in cell. In [15], an approach for peak-to-average-power ratio reduction and security improvement in OFDM-PON system is analyzed. [16] proposed a chaotic multilevel separated encryption scheme. The security of the physical layer is constantly being improved and developed.

The chaotic mechanism is similar to the principle of encryption because it has pseudo-randomness, sensitivity to initial values, and a large iteration space [1720]. Many researchers have been involved in chaos communication in recent years. In [21], the logistic model is proposed to encrypt the physical layer, and [22] proposes the use of chaos to achieve DNA encryption. In terms of compressing data and enhancing transmission security, [23] propose chaotic compressive sensing (CS) encryption algorithms for OFDM-PON. In [24], A chaotic multilevel separated encryption (CMSE) scheme is proposed. [15] proposes the use of high-dimensional chaos to swap sub-carriers. [25] proposes a chaotic constellation transformation (CCT) technique for physical-layer security. In addition, due to the rise of PS, the encryption of constellation points after PS has also been studied by many scholars. In [26], the scheme proposed a novel physical layer encryption method based on digital and encrypt the PS signal. Nevertheless, these OFDM-PON encryption schemes are iterated by nonlinear equations. The number of their variable parameter values are generally less than 3, which leads to poor flexibility. The adjustable parameter value is range in 0 to 0.5, which has poor adjustability. The key space is less than 10100, so the encryption effect is still defective [27]. At the same time, in the past OFDM-PON encryption methods, the encryption schemes are linear encryption. After the encryption results and initial parameters, the newest neural network can be used to train the data and fit the encryption model, so there will be great security flaws [28].

This paper proposes a flexible approach for the OFDM-WDM-PON physical security based on chaotic neural network and non-linear encryption. By introducing a multi-frequency cosine function, the ordinary neural network structure will have a wealth of chaotic phenomena, and a six-dimensional chaotic sequence can be generated at one time for encryption. This OFDM-WDM-PON encrypted system has a Lyapunov index of 5.2631, along with 13 parameters can be dynamically combined in the range of 0∼5, and its key space is 10279. The randomness, adjustability and key space are substantially higher than other current OFDM-WDM-PON encrypted systems. The encrypted scheme realizes non-linear encryption by using S-box. While sacrificing 1/3 of the encryption sequence, the key space is increased by about 264 times, and the non-linear encryption with irreversible restoration is realized, which improve the security of the physical layer further. Furthermore, when the bit error rate (BER) is less than 3.8×10−3, probabilistic shaping (PS) technology decreases power loss by around 0.5 dB. A 20.454 Gb/s data transmission experiment was successfully verified for a span of 25 Km single-mode fiber. Compared with tradition OFDM system, the encryption efficiency has been improved by cubed, without any negative impact on peak-to-average-power ratio (PAPR). According to the experimental results, the proposed encryption scheme is likely to be a feasible solution used in future OFDM-WDM-PON transmission systems.

2. Principles of secure OFDM-WDM-PON system

The proposed non-linear physical layer encryption based on a chaotic neural network is shown in Fig. 1. After serial-to-parallel (S/P) conversion, a pseudo-random binary sequence (PRBS) data stream is mapped onto a 16-quadrature-amplitude-modulation (QAM) mapper at the transmitter. Following that, the signals are encrypted using three separate methods: XOR transformation, probability shaping points replacement, and sub-carrier replacement. These three dimensions are the original information, time domain information and frequency domain information of the signal, which have vital effect on the whole system. At the receiving end, decryption goes through the same steps to decode the subcarriers, probability shaping points and bits respectively, and finally obtain the initial signal.

 figure: Fig. 1.

Fig. 1. Secure OFDM-WDM-PON system based on nonlinear encryption

Download Full Size | PDF

In our transmission scheme, the PS technology is used to reduce the overall optical power loss by increasing the probability of the four points in the inner circle and reducing the probability of the four points in the outer circle. The specific probability distribution uses the Maxwell-Boltzmann distribution:

$${P_X}({x_i}) = {e^{ - \mu x_i^2}}/\sum {{x_i}{e^{ - \mu x_i^2}}} .$$

In the entire encryption process, the CNN algorithm is crucial. Different from general neural network, the activation function is composed of the multi-frequency cosine signal (MFCS) and the piecewise linear function. Activation function of CNN is f(x)=h(x)+g(x). h(x) is the mathematical expression of MFCS, which expresses as:

$$h(x) = Ac{e^{ - q|x |}}[\sin (\frac{{x\pi }}{{{\varepsilon _{1}}{e^{ - m|x |}}}} + {\varphi _{1}}) + \sin (\frac{x}{{{\varepsilon _{2}}{e^{ - n|x |}}}} + {\varphi _{2}})],$$
g(x) is the piecewise linear function, which expresses as g(x)=(|x+1|-|x−1|)/2, where x is the internal independent variable of the neuron, A is the amplitudes, q, m, and n are the positive parameters, ɛ1 and ɛ2 are the steepness parameters of two different sine functions, and φ1, φ2 are the initial phases. In ordinary neural network, the activation only has g(x), which can’t form chaos. After the superposition of MFCS, a function with a strong nonlinear effect can be formed.

As shown in Figs. 2(a) and 2(b), the role of the piecewise linear function is to make the whole monotonic function, but due to the non-monotonicity of MFCS, the activation function is locally non-monotonic. This feature can make the neuron more prone to chaotic dynamics.

 figure: Fig. 2.

Fig. 2. (a). Activation function Multiple. (b). frequency cosine signals

Download Full Size | PDF

The mathematical model of the neural network can be described as:

$$\frac{{d{x_j}}}{{dt}} ={-} {x_j} + {a_j}f({x_j}) + \sum\limits_{k = i}^n {{A_{jk}}f({x_k})} + \sum\limits_{k = i}^n {{S_{jk}}{x_k}} ,$$
among them, f(x) is activation function. The CNN model is turned into:
$$\left\{ \begin{array}{l} {{\dot{x}}_1} = {S_{13}}{x_3} + {S_{14}}{x_4}\\ {{\dot{x}}_2} = {S_{22}}{x_2} + {S_{23}}{x_3} + {A_{24}}f({x_4})\\ {{\dot{x}}_3} = {S_{31}}{x_1} + {S_{32}}{x_2}\\ {{\dot{x}}_4} = {S_{41}}{x_1} + {S_{44}}{x_4}\\ {{\dot{x}}_5} = {S_{51}}{x_1} + {S_{52}}{x_2} + {S_{55}}{x_5}\\ {{\dot{x}}_6} = {S_{62}}{x_2} + {S_{65}}{x_5} + {S_{66}}{x_6} \end{array} \right..$$
where x1, x2, x3, x4, x5, x6 are getting an initial value at the beginning, and iterate through the equation continuously, the newly generated value is used as the initial value for the next time. The system will generate 6 sets of independent chaotic sequences {x}, {y}, {z}, {μ}, {ν}, {ω}. Si,j are adjustable parameters, whose adjustment range is within 5. A24 is the parameter that controls the sine function. f(x) is the activation function. The chaotic sequence can be used as the initial data for generating the encryption key. The data order from 1 to m of the chaotic series will be discarded to remove the transient effect of chaos. The six sequences are divided into two groups that encrypt the I and Q signals, respectively.

As Fig. 3, three encryption dimensions are respectively encrypted with S-box non-linear encryption and two linear encryption. The first sequence is used to generate the key for bit XOR transformation, and the second and the third sequences are used to generate keys for probability shaping points permutation and subcarriers permutation. Make the following transformation to the first set of chaotic sequences Tr1 :

$$\begin{array}{l} {A_1} = {f_1}(\bmod (round({T_{r1}}(m:{m_0} + m) \times 1040),8),\\ Y = {f_1}(x) \to Y(i) = \left\{ \begin{array}{l} 1,if\;x(i) < 4\\ 0,else \end{array} \right.. \end{array}$$
where mod() means find the remainder of the value, round() means round the sequence, f1(x) is the mapping rule, and m is the starting point of a useful sequence. 1∼m points are discarded to eliminate the temporary stability effect of chaos. Among them, multiply the original sequence by 1040, because chaotic sequences have several decimal places. For the reason of 8 is a divisor of 1040, so it is divide by 8 in Eq. (5) x can only be taken from 0 to 7, so the judgment condition is whether x is less than 4. The first set of chaotic sequence is processed into a binary stream after the above transformation, then S-box transformation is performed on this set of data. The sequence is divided into eight groups of 48 bits each, and each group is put in a S box for replacement. The highest and lowest bits of the 6-bit data in each box are used as rows of new data. The middle 4 bits are used as data columns. There are 4 rows and 16 columns of data in each S box, and each row is composed of 16 numbers 0–15. This step is a nonlinear transformation in the encryption process, which can greatly increase the complexity of the key and determine the level of encryption. Take one of the S-boxes as in Table 1.

 figure: Fig. 3.

Fig. 3. Schematic diagram of 3D encryption scheme

Download Full Size | PDF

Origin data is 100110. Combine the highest and lowest digits is 10, which represents decimal 2, and the middle 4 bits (0011) represents decimal 3, which means the second row and the third column. The value of (2,3) is 0, so the key is turned into 0000. XOR the compressed key with the bitstream and we can get a non-linearly mapped encrypted OFDM signal. Through the S-box encryption method that maps 6 bits to 4 bits, and the encryption reliability is improved by 264 times with 1/3 of the encoding cost, which can enhance the security ability of the system.

Probability shaping points and sub-carriers are important components of OFDM signals. For probability shaping points and subcarriers encryption in OFDM signal, they are processed as follows:

$$\begin{aligned} {M_{{2 \& 3}}}&={f_2}({T_{r2\& 3}} \times {(sort{({T_{r2\& 3}})^{ - 1}})^{\prime}}), \\ Y &= {f_2}(x) \to Y(i,j) = \left\{ \begin{array}{l} 1,if\;X(i,j) = 1\\ 0,else \end{array} \right.. \end{aligned}$$

Among them, M2&3 is the transformed key matrix, f2(x) is the mapping rule, and sort means sorting the data from small to large, ()−1 means the reciprocal of each element in the sequence. For example, given Tr=[0.11,0.88,−0.56,−0.23], we can get sort(Tr)−1=[−0.56,−0.23,0.11,0.88]−1. Using Eq. (6), we can get

$$M=\left[ \begin{array}{l} 0\;\;0\;\;1\;\;0\\ 0\;\;0\;\;0\;\;1\\ 1\;\;0\;\;0\;\;0\\ 0\;\;1\;\;0\;\;0 \end{array} \right].$$

In this example case of subcarriers is [f1, f2, f3, f4], and we have encrypted signal [f3, f4, f1, f2] after encryption. Faced with different dimensions, we only need to set the initial matrix size to the corresponding number of dimensions. After probability shaping points and subcarriers shifting, the inverse fast Fourier transform (IFFT) operation is performed and a cyclic prefix is appended to the OFDM signal for eliminating potential inter symbol interferences (ISI). After the above changes, the transformed OFDM signal becomes:

$$x(t) = \frac{1}{{\sqrt N }}\sum\limits_{i = 0}^{N - 1} {{x^{\prime}}(k) \cdot {e^{j\frac{{2\pi (m - 1){f_{\Delta k}}{T_S}}}{N}}}} ,m = 1,2,3\ldots N,$$
where N is the number of subcarriers, fΔk is the transformed subcarrier, and Ts is the time slot. The receiving end has the same chaotic generator as the transmitting end, and key mapping rules iteratively produce a chaotic sequence using the same initial parameters and generates three sets of keys through calculations. By decrypting the ciphertext with the key, the initial signal is finally obtained.

3. Experiment setup

As shown in Fig. 4, we performed legal ONU receiving ends and illegal ONU receiving end to check the efficacy of the system experimentally. The OLT is in charge of allocating the legal ONU's safe key. The encrypted OFDM signal is generated in the electrical domain at the OLT via offline DSP. A total of 128 subcarriers are used to carry the encrypted OFDM data, while another 128 subcarriers are used to carry the corresponding complex conjugates to fulfill hermitian symmetry. The size of IFFT is 512. The 1/4 of the OFDM symbol length is added as a cyclic prefix (CP) to reduce inter-symbol interference (ISI). The data rate of 20.454 Gb/s (subcarrier number× entropy × AWG sampling rate/(FFT + GI) ×Number of wavelengths) is produced by a 10 GSa/s arbitrary waveform generator (AWG, TekAWG70002A). After an electrical amplifier (EA), the electrical OFDM signal and optical signal are coupled through Mach-Zehnder modulator (MZM) for intensity modulation to generate a modulated optical signal for SSMF transmission. Three continuous-wave (CW) lasers with a wavelength of 1550 nm, 1549.4 nm and 1550.7 nm and optical power of 10 dBm functions as the light source. The wavelength division multiplexing (WDM) multiplexer (MUX) can multiplex multiple signals of different wavelengths into one signal for transmission. The WDM demultiplexer (DEMUX) can separate optical carriers of various wavelengths. The values of the CNN parameters are shown in Table  2.

 figure: Fig. 4.

Fig. 4. Experiment framework setup (AWG: arbitrary waveform generator; EA electrical amplifier; MZM: Mach-Zehnder modulator; SSMF: standard single-mode fiber; VOA: variable optical attenuator; PD: photodiode; MSO: mixed-signal oscilloscope; MUX: multiplexer; DEMUX: demultiplexer).

Download Full Size | PDF

At the ONU, we use a variable optical attenuator (VOA) to adjust the received optical power. A photodiode (PD) and a mixed-signal oscilloscope (MSO, TekMSO73304DX) are used to capture the optical OFDM signal. After time synchronization, OFDM demodulation, key decryption, and BER test, we can get the original signal. In DSP processing, a large number of chaotic sequences are generated through the chaotic neural network, it is worth mentioning that after each time series, it will dynamically change the initial value and generate a different key to encrypt the signal.

4. Results and discussions

For a better explanation of the proposed method, it is essential to analyze the security performance and transmission performance. The exponential function of chaos, key space, and sensitivity analyses are all included in the security performance. The BER test and the image transmission test are two ways to assess transmission efficiency.

4.1 Security performance

4.1.1 Exponential feature

The relationship between the power spectrum and the entropy rate is defined by Spectral entropy(SE). The higher the entropy value, the more unpredictable the chaotic system's potential outcomes. As shown in Fig. 5, the maximum SE value of the four chaotic systems is similar; however, the average SE value of CNN is far higher than the other three chaotic models. This reflects that CNN's average level of sequence uncertainty is much higher than that of other systems, and it can provide more confidential chaotic sequences. The chaotic phase diagram does not converge to a single attractor due to the nonlinearity of the activation function. Lyapunov represents the average exponential divergence of adjacent trajectories in phase space. Lyapunov values of CNN are 5.2631, −0.0005, −0.9956, −4.01, −7.5025 and −104.034. In Table 3, CNN shows the largest Lyapunov exponent, which means CNN has a more discrete chaotic sequence. After each iteration, the system is separated deeply from the equilibrium point. The locations are more unstable, and the keys generated by CNN are more difficult to crack. In our encryption scheme, the adjustable parameters of CNN are as many as 12, while the common encryption scheme has only 2∼3. Therefore, CNN can provide more flexible control schemes instead of completely fixed models. Besides, the adjustable parameter range has also become more flexible, which can provide key space by more than 5 times.

 figure: Fig. 5.

Fig. 5. SE index spectrum (a) CNN (b) Logistic (c) Henon (d) Chens

Download Full Size | PDF

Tables Icon

Table 3. Security performance of different encrypted systems

4.1.2 Key space and sensitivity analyses

Since the Lyapunov exponent of the chaotic system is greater than 0, there is an exponential separation phenomenon in adjacent orbits. As shown in Fig. 6(a), the two sets of data whose initial values differ by 10−10 are completely separated in the phase space after only 3 iterations, becoming two seemingly unrelated orbitals. For encryption system, it should have high sensitivity to the initial values. As shown in Fig. 6(b), the keys turn to two different sequences by using CNN. After calculations, the chaotic sensitivity of the CNN system can reach up to 10−15. That is, a slight change in the initial value will cause the entire chaotic system to change. Therefore, the sensitivity of the confidentiality system can be guaranteed.

 figure: Fig. 6.

Fig. 6. (a) Exponential separation spectrum (b) The influence of the initial value on the sequence value

Download Full Size | PDF

In CNN system, the key secret of initial values of x, y, z, u, w, v are (−1.9,−1.4),(−2,−1),(0,3),(−1.8,1.3),(−31,−27),(−80,0). Si,j is the parameter that controls the change of chaotic frequency, range in (0,5). Besides, this encryption design combines a non-linear encryption scheme. Through the S-box encryption method that maps 6 bits to 4 bits, and the encryption reliability is improved by 264 times with 1/3 of the encoding cost. Only take Si,j, initial values and S-box into consideration, the key space of the CNN is beyond 10279((1015)18×232). The high key space also means that it is more difficult to decipher the ciphertext using the exhaustive method.

4.2 Transmission performance

Figure 7(a) shows the value of BER of the legal ONUs under 3 different situations. They are B2B transmission, 25 Km probabilistic shaping technology transmission, and 25 km without probabilistic shaping technology transmission. In the experiment, we reduced the sampling rate to achieve the same baud rate as PS and without PS. Experiments can verify that the chaotic neural network OFDM transmission system is feasible. And through the introduction of probability shaping technology, the BER is lower than 3.8×10−3, a gain of about 0.5 dB can be obtained. Figure 7(b) shows the difference between the legal receiving end and the illegal receiving end. At the illegal receiving end, the bit error rate is as high as 50%. This experiment also included three separate illegal receiving end experiments, in which no parameters were defined, the initial value differed by 10−10, and the iteration order differed by one. The results show that in all three situations, the error rate is as high as 50%, and the decryption fails.

 figure: Fig. 7.

Fig. 7. (a) BER curves of the encrypted 16-QAM-OFDM with PS, 16-QAM-OFDM without PS, B2B 16-QAM-OFDM. (b) BER curves of legal ONUs and illegal ONUs.

Download Full Size | PDF

When transmitting images, Fig. 8 depicts the condition of the legal receiving end and the illegal receiving end. We can see from the image that the unauthorized receiving end cannot see any detail from the original image. However, at the legal receiving end, the original picture may be correctly decrypted. And using the CNN encryption scheme, a one-time encryption scheme can be realized which only need to add the initial parameters in the frame header position. This further proves the viability of our encryption scheme. Through Runge-Kutta methods of partial differential equations, a total of 51 additions and 20 multiplications are obtained. Since one iteration can generate 6 chaotic values, each chaotic value requires 8.5 adder operations and 3.3 multiplier operations on average. Compared with the current DNA encryption and multi-dimensional chaotic encryption, the cost is the same. Commonly used DSP processors, such as MFLOPS, can perform millions of floating-point operations per second, which is far greater than our calculation requirements.

 figure: Fig. 8.

Fig. 8. (a) Origin image (b) Illegal receiver (c) Legal receiver in B2B (d) Legal receiver in 25 Km SSMF

Download Full Size | PDF

5. Conclusion

We have proposed and experimentally demonstrated a novel secure strategy for the OFDM-WDM-PON system at the physical layer. The MFCS activation function is used to improve the nonlinear effect of the chaotic neural network. The Lyapunov values of the chaotic sequence are as high as 5.2631. Combining the S-box and permutation matrix, the OFDM bit information, probability shaping points, and subcarrier are respectively encrypted to ensure one encryption at a time. While using probability shaping technology to reduce the transmission power of 0.5 dB when the BER is lower than 3.8×10−3. In this way, the 20.454 Gbps encrypted OFDM-WDM-PON scheme is successfully transmitted over 25 km SSMF. Compared with the conventional encrypted signal, the transmission performance is improved by 0.5 dBm. The encrypted system's Lyapunov is 5.2631, along with 12 parameters can be dynamically changed in the range of 0∼5. The results also show that the proposed scheme is sensitive to the chaotic sequences on each dimension by 10−15, along with a key space of more than 10279. The proposed system has potential applications in future secure communications at the physical layer.

Funding

State Key Laboratory of Information Photonics and Optical Communications; Beijing University of Posts and Telecommunications; Jiangsu talent of innovation and entrepreneurship; National Natural Science Foundation of China (61720106015, 61727817, 61775098, 61822507, 61835005, 61875248, 61935005, 61935011, 61975084); National Key Research and Development Program of China (2018YFB1801703).

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in the paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. Z. Zhu, W. Lu, and L. Zhang, “Dynamic Service Provisioning in Elastic Optical Networks With Hybrid Single-/Multi-Path Routing,” J. Lightwave Technol. 31(1), 15–22 (2013). [CrossRef]  

2. P. Lu, L. Zhang, and X. Liu, “Highly efficient data migration and backup for big data applications in elastic optical inter-data-center networks,” IEEE Network 29(5), 36–42 (2015). [CrossRef]  

3. L. Gong and Z. Zhu, “Virtual Optical Network Embedding (VONE) Over Elastic Optical Networks,” J. Lightwave Technol. 32(3), 450–460 (2014). [CrossRef]  

4. L. Gong, “Efficient resource allocation for all-optical multicasting over spectrum-sliced elastic optical networks,” J. Opt. Commun. Netw. 5(8), 836–847 (2013). [CrossRef]  

5. Y. Yin, H. Zhang, and M. Zhang, “Spectral and Spatial 2D Fragmentation-Aware Routing and Spectrum Assignment Algorithms in Elastic Optical Networks,” J. Opt. Commun. Netw. 5(10), A100–A106 (2013). [CrossRef]  

6. J. Lian and M. Brandt, “Clipping-Enhanced Optical OFDM for Visible Light Communication Systems,” J. Lightwave Technol. 37(13), 3324–3332 (2019). [CrossRef]  

7. Q. C. Liu and C. M. Qiao, “Optical wireless communication networks for first- and last-mile broadband access,” J. Opt. Netw. 4(12), 807–828 (2005). [CrossRef]  

8. N. Cvijetic, “OFDM for next-generation optical access networks,” J. Lightw. Technol. 30(4), 384–398 (2012). [CrossRef]  

9. F. Carvalho and A. Cartaxo, “Multisignal OFDM-based hybrid optical wireless WDM LR-PON with colorless ONU,” IEEE Photonics Technol. Lett. 27(11), 1193–1196 (2015). [CrossRef]  

10. C. Zhang, “Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution,” Opt. Express 21(2), 2474–2479 (2013). [CrossRef]  

11. Y. G. Su, W. J. Xu, and J. Zhao, “Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis,” Applied optics. 59(2), 474–483 (2020). [CrossRef]  

12. B. Liu and L. J. Zhang, “Physical Layer Security in OFDM-PON Based on Dimension-Transformed Chaotic Permutation,” IEEE Photonics Technol. Lett. 26(2), 127 (2014). [CrossRef]  

13. T. Wei and C.-F. Zhang, “Security enhancement for OFDM-PON using Brownian motion and chaos in cell,” Optics express. 26(18), 22857–22865 (2018). [CrossRef]  

14. T. Wei and C.-F. Zhang, “PAPR and security in OFDM-PON via optimum block dividing with dynamic key and 2D-LASM,” Optics express. 27(20), 27946–27961 (2019). [CrossRef]  

15. H. Wei, C. Zhang, and T. Wu, “Chaotic multilevel separated encryption for security enhancement of OFDM-PON,” IEEE Access 99, 124452–124460 (2019). [CrossRef]  

16. H.-J. Wang and F.-M. Zhang, “Bifurcations, ultimate boundedness and singular orbits in a unified hyperchaotic Lorenz-type system,” Discrete and Continuous Dynamical Systems-Series B. 25(5), 1791–1820 (2020). [CrossRef]  

17. H. Y. Lu, L. Zhang, and M. Jiang, “High-Security Chaotic Cognitive Radio System With Subcarrier Shifting,” IEEE Commun. Lett. 19(10), 1726–1729 (2015). [CrossRef]  

18. M.-F. Danca and M. Feckan, “On Numerical Integration of Discontinuous Dynamical Systems,” Int. J. Bifurcation Chaos 27(14), 1750218 (2017). [CrossRef]  

19. J. Ni, L. Liu, and C. Liu, “Fast Fixed-Time Nonsingular Terminal Sliding Mode Control and Its Application to Chaos Suppression in Power System,” IEEE Trans. Circuits Syst. II 64(2), 151–155 (2017). [CrossRef]  

20. V. Raul and R. Claudio, “Simultaneous bidirectional message transmission in a chaos-based communication scheme,” Opt. Lett. 32(4), 403–405 (2007). [CrossRef]  

21. J. Y. Zhao, B. Liu, and Y. Y. Mao, “High-Security Physical Layer in CAP-PON System Based on Floating Probability Disturbance,” IEEE Photonics Technol. Lett. 32(14), C1 (2020). [CrossRef]  

22. K. C. Jithin and S. Sankar, “Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set,” Journal of Information Security and Applications 50, 102428 (2020). [CrossRef]  

23. C. Zhang, T. Wu, and Y. Chen, “Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission,” Opt. Express 29(3), 3669 (2021). [CrossRef]  

24. C. Zhang, W. Zhang, and C. Chen, “Physical-Enhanced Secure Strategy for OFDMA-PON Using Chaos and Deoxyribonucleic Acid Encoding,” J. Lightwave Technol. 36(9), 1706–1712 (2018). [CrossRef]  

25. Z. Wei, C. Zhang, and C. Chen, “Experimental Demonstration of Security-Enhanced OFDMA-PON Using Chaotic Constellation Transformation and Pilot-Aided Secure Key Agreement,” J. Lightwave Technol. 35(9), 1524–1530 (2017). [CrossRef]  

26. B. Zhu, F. Wang, and J. Yu, “A Chaotic Encryption Scheme in DMT for IM/DD Intra-datacenter Interconnects,” IEEE Photon. Technol. Lett. 33(8), 383–386 (2021). [CrossRef]  

27. N. Q. Li, W. Pan, and S. Y. Xiang, “Hybrid chaos-based communication system consisting of three chaotic semiconductor ring lasers,” lasers. Appl. Opt. 52(7), 1523–1530 (2013). [CrossRef]  

28. J.-Z. Ai, L.-L. Wang, and J. Wang, “Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos,” Opt. Lett. 42(18), 3662–3665 (2017). [CrossRef]  

Data availability

Data underlying the results presented in the paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (8)

Fig. 1.
Fig. 1. Secure OFDM-WDM-PON system based on nonlinear encryption
Fig. 2.
Fig. 2. (a). Activation function Multiple. (b). frequency cosine signals
Fig. 3.
Fig. 3. Schematic diagram of 3D encryption scheme
Fig. 4.
Fig. 4. Experiment framework setup (AWG: arbitrary waveform generator; EA electrical amplifier; MZM: Mach-Zehnder modulator; SSMF: standard single-mode fiber; VOA: variable optical attenuator; PD: photodiode; MSO: mixed-signal oscilloscope; MUX: multiplexer; DEMUX: demultiplexer).
Fig. 5.
Fig. 5. SE index spectrum (a) CNN (b) Logistic (c) Henon (d) Chens
Fig. 6.
Fig. 6. (a) Exponential separation spectrum (b) The influence of the initial value on the sequence value
Fig. 7.
Fig. 7. (a) BER curves of the encrypted 16-QAM-OFDM with PS, 16-QAM-OFDM without PS, B2B 16-QAM-OFDM. (b) BER curves of legal ONUs and illegal ONUs.
Fig. 8.
Fig. 8. (a) Origin image (b) Illegal receiver (c) Legal receiver in B2B (d) Legal receiver in 25 Km SSMF

Tables (3)

Tables Icon

Table 2. Parameter value

Tables Icon

Table 3. Security performance of different encrypted systems

Equations (8)

Equations on this page are rendered with MathJax. Learn more.

P X ( x i ) = e μ x i 2 / x i e μ x i 2 .
h ( x ) = A c e q | x | [ sin ( x π ε 1 e m | x | + φ 1 ) + sin ( x ε 2 e n | x | + φ 2 ) ] ,
d x j d t = x j + a j f ( x j ) + k = i n A j k f ( x k ) + k = i n S j k x k ,
{ x ˙ 1 = S 13 x 3 + S 14 x 4 x ˙ 2 = S 22 x 2 + S 23 x 3 + A 24 f ( x 4 ) x ˙ 3 = S 31 x 1 + S 32 x 2 x ˙ 4 = S 41 x 1 + S 44 x 4 x ˙ 5 = S 51 x 1 + S 52 x 2 + S 55 x 5 x ˙ 6 = S 62 x 2 + S 65 x 5 + S 66 x 6 .
A 1 = f 1 ( mod ( r o u n d ( T r 1 ( m : m 0 + m ) × 1040 ) , 8 ) , Y = f 1 ( x ) Y ( i ) = { 1 , i f x ( i ) < 4 0 , e l s e .
M 2 & 3 = f 2 ( T r 2 & 3 × ( s o r t ( T r 2 & 3 ) 1 ) ) , Y = f 2 ( x ) Y ( i , j ) = { 1 , i f X ( i , j ) = 1 0 , e l s e .
M = [ 0 0 1 0 0 0 0 1 1 0 0 0 0 1 0 0 ] .
x ( t ) = 1 N i = 0 N 1 x ( k ) e j 2 π ( m 1 ) f Δ k T S N , m = 1 , 2 , 3 N ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.