Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

High-security SCMA-OFDM multi-core fiber transmission system based on a regular hexagon chaotic codebook

Open Access Open Access

Abstract

Sparse code multiple access (SCMA), a new code-domain non-orthogonal technology in the fifth-generation mobile communication (5G), can be modulated by orthogonal frequency division multiplexing (OFDM) to improve the link quality of a single user. In this paper, a high-security SCMA-OFDM multi-core fiber transmission system based on a regular hexagonal chaotic codebook is proposed for next-generation passive optical network (PON). The whole encryption process consists of a regular hexagon chaotic codebook design and frequency domain block scrambling. In designing the regular hexagon chaotic codebook, the optimization of constellation points on orthogonal resources are considered as the starting point. Firstly, the chaos factor generated by the four-dimensional Rossler chaos model is deployed to disturb the mother constellation, and then the corresponding chaotic book is formed by rotating the mother constellation and multiplying the sparse matrix. The designed codebook logically avoids the degradation of transmission performance caused by the rough scrambling of codebook constellation, to find a balance between codebook disturbance and bit error rate (BER). The security and reliability of the transmission system have been verified by performing 42 Gb/s encrypted SCMA-OFDM data transmission experiments in a 2km multi-core fiber. The key space of the encryption scheme can reach 10178, which effectively ensures the security of the transmission system. Furthermore, the performance of the transmission system with a regular hexagon chaotic codebook is improved by 2.5 dB compared with the traditional codebook when the BER is 1 × 10−3. Moreover, the SCMA-OFDM-based transmission architecture and the detection effects of different multi-user detection algorithms in the SCMA-OFDM multi-core fiber transmission system are also studied.

© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

At present, due to the continuous development and improvement of networking technologies, the core network can provide various broadband services. The development of access networks is relatively lagging, unable to carry large capacity and fast data communication between users and core network. Therefore, the passive optical network (PON) has become a popular access network due to its advantages of low capital costs, low transmission energy consumption, simple network structure, and simple management and maintenance. With the rapid development of the internet of things, mobile Internet, and other new-generation information technologies, the craze for higher spectral efficiency, lower latency, and large-scale connectivity by the end-user is exponentially increasing. Introducing new technologies for the next generation of optical access networks is the need of the hour. Space division multiplexing (SDM) allows signals to be multiplexed in the spatial dimension, thereby increasing system capacity and the number of users. Compared with the inter-mode dispersion and mode coupling of mode multiplexing, SDM based on multi-core fiber is more suitable for application in the access network. Using a weakly coupled multi-core fiber with low inter-core crosstalk, transmission performance can be even comparable to that of using multiple single-mode fibers at the same time. To meet the requirements of large-scale access to next-generation access networks and further tap the potential of multi-core fiber in the access systems, the sparse code multiple access orthogonal frequency division multiplexing (SCMA-OFDM) multi-core fiber transmission system is studied here in this article.

SCMA is a promising non-orthogonal multiple access technology proposed by Huawei [1]. It combines multi-dimensional modulation and sparse spreading techniques to map bit-level data streams directly to a complex domain multi-dimensional codewords in a pre-defined codebook, thus achieving additional shaping gain as well as coding gain. Owing to the non-orthogonal sparse coding overlay scheme, SCMA can support more users under the same number of time-frequency resources, to meet the demand of 5G for massive access. Most of the research in the SCMA is focused on the codebook design on the transmitter side [2] and the multi-user detection algorithm on the receiver side [3,4]. Recently, it has been applied to optical communications. A series of SCMA transmission systems with superior performances [5,6] and multi-user detection algorithms [7] have been proposed and implemented. These results often apply to large-scale access scenarios. In such a large optical access network, hijacking of the data is inevitable, and its security should be worth considering. Digital chaos encryption is used by researchers for secure communications because of its flexibility and stability. Jianxin Ren et al. proposed a probabilistic shaping orthogonal frequency division multiplexing passive optical network based on chaotic constant composition distribution matching by using a four-dimensional hyperchaotic Lv system [8]. Similarly, Mingye Li et al. proposed a novel five-dimensional data-iteration-based encryption model based on a multi-wavelength optical frequency division multiplexing passive optical network (OFDM-PON) by using the hyperchaotic system [9]. In addition, some scholars have also applied it to SCMA encryption, e.g. Ke Lai et al. proposed a novel physical layer transmission scheme with code-word level interleaving at the transmitter by introducing the Tent map [10].

In this paper, we propose a high-security SCMA-OFDM multi-core fiber transmission system based on a regular hexagonal chaotic codebook by using PON transmission architecture and introducing Logistic chaos models. In chaotic encryption of the codebook, considering that any small perturbation to the mapped constellation points can have a significant impact on the bit error rate (BER) [11], we attempt to find a breakthrough point from the design process of codebook. In the multi-stage optimization process, the chaotic model can be used to rotate the special mother constellations randomly in a certain range when the structure of the codebook is determined. Experimental results show that this method can improve transmission security without degrading transmission performance. Then, we further enhance the security of physical layer data transmission by implementing secondary encryption of the frequency domain signal after chaotic coding through a chunking cycle. Experiments show that our encrypted transmission scheme brings a gain of around 2.5 dB to the system compared with the classical Huawei codebook [12] at a BER of $1 \times {10^{ - 3}}$. The scheme also achieves the expected encryption effect very well and has high key sensitivity.

2. Principles

2.1 Encrypted SCMA-OFDM Transmission Architecture

The detailed architecture of the proposed encrypted SCMA-OFDM transmission is depicted in Fig. 1, the whole structure includes the SCMA-OFDM-PON transmission module and encryption module. In this module, it is considered that an SCMA-OFDM system consists of Z OFDM subcarriers. In the SCMA block, J users share K subcarriers. Therefore, $Z$ subcarriers can be evenly divided into ${N_B} = Z/K$ SCMA blocks of size $K$. A single SCMA encoder is discussed in detail since each SCMA block is encoded using the same codebook. Here the chaotic codebooks generated by the encryption module are deployed. An SCMA encoder can be regarded as a map from ${\log _2}^M$ bits to a $K$-dimensional complex codebook of size $M$. There are ${d_v}({d_v} < K)$ non-zeros elements in a codeword. All J users superimpose the transmitted codewords on $K$ subcarriers to achieve overload communication and the overloading factor of the code is defined as $\lambda \textrm{ = }J/K$. The encrypted SCMA signal is then generated by cyclically scrambling the synthesis matrix of the ${N_B}$SCMA blocks using the frequency domain and symbol perturbation factors generated by the encryption module. As complex signals cannot be transmitted directly in short-range intensity modulation/direct detection (IM/DD) systems, we need to use special operations to convert the complex signal into a real signal. A common approach is the Discrete MultiTone (DMT) modulation used in the literature [13]. It performs Hermite transform on the frequency domain signal before the Inverse Fast Fourier Transform (IFFT), such that the transformed time domain symbols are all real numbers. Instead of DMT modulation, we perform digital up-conversion after OFDM modulation. This step includes interpolation, filtering, and mixing. First, the signal is interpolated 4 times, and the spectrum is extended 4 times accordingly. Then, the interpolated signal is filtered. At last, the filtered signal is mixed with the high-frequency signal to complete up-conversion. The entire process is implemented by digital signal processing (DSP), which effectively avoids additional devices and noise interference. At the receiving end, it is necessary to perform digital down conversion before OFDM demodulation and transform the real signal into a complex signal. The process of digital down-conversion is mixing, filtering, and extracting. In the SCMA decoding operation of the demodulated signal, we use the common message passing algorithm (MPA). The essence of MPA is the iterative update of external messages between resource nodes and variable nodes. Its working principle is shown in Fig. 2.

 figure: Fig. 1.

Fig. 1. encrypted SCMA-OFDM transmission architecture

Download Full Size | PDF

 figure: Fig. 2.

Fig. 2. MPA algorithm schematic diagram

Download Full Size | PDF

Compared with Maximum A Posteriori (MAP) [1], the algorithm does not require exhaustive detection of codebook combinations for all users. It uses the sparsity of the SCMA codebook to select local probability updates on each sub-channel according to the criterion of conditional probability. Although the algorithm can reduce the computational complexity from $O({{M^J}} )$ to $O({{M^{{d_f}}}} )$ while approaching the MAP decoding effect, this complexity is still the main bottleneck of the system. For this reason, optimization algorithms such as SD-MPA [3] and Log-MPA [4] have been proposed one after another. All these algorithms have shown good detection results in the wireless domain, but they are not effectively deployed in optical communications. Several of these typical optimization algorithms will be experimentally verified in Section 3, which helps us to better discover the performance differences of different detection algorithms in optical communications.

2.2 High-security transmission scheme based on regular hexagon chaotic codebook

The encryption module is divided into codebook encryption and block scrambling encryption. We introduce the Rossler four-dimensional hyperchaotic model and one-dimensional Logistic chaotic model in the encryption module. The Rossler chaotic model is a hyperchaotic system defined by a fourth-order differential equation. Its function is defined as follows:

$$\left\{ \begin{array}{l} \overline x = a(y - x)\\ \overline y ={-} xz + dx + cyw\\ \overline z = xy - bz\\ \overline w = x + k \end{array} \right.$$
where $({x, y, z, w} )$ are state variables and $({a, b, c, d, k} )$ are system parameters. When $a = 36$, $b = 3$, $c = 28$, $d ={-} 16$, $k = 0.5$, the system is in a chaotic state. This article sets the initial value of the state variable to ${x_0} ={-} 11, {y_0} ={-} 7, {z_0} = 26, {w_0} = 0.1$. The phase diagram of the $Rossler$ chaotic model is shown in Fig. 3(a). The generated chaotic sequences $\{x \}$ and $\{y \}$ are used to encrypt codebooks. The remaining chaotic sequences $\{z \}$, $\{w \}$ and $\{q \}$ generated by a one-dimensional Logistic chaotic model are scrambled by block. The expression of the one-dimensional Logistic chaotic model is:
$${q_{n + 1}} = \mu {q_n}(1 - {q_n}){\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} ({\kern 1pt} {\kern 1pt} n = 0,1, \cdots ,N - 1{\kern 1pt} {\kern 1pt} )$$
where $\mu$ is a control parameter with the value of 3.6, satisfying $\mu \in (0{\kern 1pt} {\kern 1pt} , {\kern 1pt} {\kern 1pt} {\kern 1pt} 4]$. The initial value ${q_0} = 0.6$ and the range of the chaotic sequence $\{q \}$ is $(0{\kern 1pt} {\kern 1pt} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} 1]$. Figure 3(b) is the bifurcation diagram of a one-dimensional Logistic map.

 figure: Fig. 3.

Fig. 3. Chaotic model (a) phase diagram of Rossler chaotic map (b) bifurcation diagram of a Logistic map

Download Full Size | PDF

Firstly, the codebook is chaotically encrypted, and to reduce the impact of chaotic encryption on the transmission performance, the detailed design process of the SCMA codebook is considered here [2]. The overall structure of the SCMA codebook can be represented by a factor graph matrix defined as $F = ({{f_1},{f_2}, \cdots ,{f_J}} )$. Its optimization steps include mapping matrix, constellation points, multi-dimensional mother constellation, and constellation function operators. The mapping matrix ${V_j}$ determines the set of resources occupied by the layer j. Its non-zero rows correspond to the index of the non-zero elements of the binary indicator vector ${f_j}$. Each useŕs narrowband data is converted to spread spectrum by multiplying the mapping matrix. The mapping matrix depends on the structure of the SCMA codebook. And a good codebook can be obtained if the SCMA codebook structure is optimized by combining multi-dimensional constellation and constellation function operations. Due to the sparsity of the SCMA codebook, the optimization of constellation points and multi-dimensional mother constellation can follow the principle of maximizing the minimum Euclidean distance (MED). The most common method is to maximize the MED between the mother constellation [14] or to maximize the MED between the constellation points superimposed on the orthogonal resources [15]. Here a structured encryption scheme for resource-level constellation is designed to maximize the MED of constellation points based on lattice theory. Phase rotation is used as the constellation function operator during this process. The constellation pool of each multiplexed resource is superimposed by ${d_f}$ complex constellation sets ${S_u}(u = 0,1, \cdots ,{d_f})$ corresponding to the user. The cardinality of ${S_u}$ is M. Among all elements, ${S_0}$ are reals and other ${S_u} = {e^{j{\theta _u}}}{S_0}$. ${S_0}$ is expressed as:

$${S_0} = \left\{ { - {r_{\frac{M}{2}}}, \cdots , - {r_1},{r_1}, \cdots ,{r_{\frac{M}{2}}}} \right\}$$

For the selection of the rotation parameters ${\theta _u}$, we divide them into ${\theta _u}^{\prime}$ and $\Delta {\theta _u}$, so that an approximate average plane angle (${180^\circ }$) angle can be achieved. ${\theta _u}^{\prime}$ is the rotation angle of the mean plane angle, while $\Delta {\theta _u}$ is the randomly generated rotation angle based on the chaotic model. Considering that too large $\Delta {\theta _u}$ will cause the MED of the constellation pool on the multiplexed resource to become sharply smaller, the range of $\Delta {\theta _u}$ is controlled to be $[{0{\kern 1pt} {\kern 1pt} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} {{10}^\circ }} ]$. In addition, to further enhance the difficulty of decoding the codebook, we also consider the rotation direction of $\Delta {\theta _u}$. This design can achieve secure transmission of information in the physical layer without degrading transmission performance compared to [16]. The constellation pool of chaotic codebook is designed in the following way:

λ Use ${S_0}$ as a basic constellation set

λ Obtain the rotation angle of the average plane angle $\{{{\theta_1},{\theta_2}, \cdots ,{\theta_{{d_f} - 1}}} \}$:

$${\theta _u}^{\prime} = u \times \frac{\pi }{{{d_f}}}$$

λ Generate four groups of sequences $\{{{x_n},{y_n},{z_n},{w_n}} \}$ by Rossler chaotic model. Then extract the first two groups to generate chaotic factors X and $Y$. The specific operations are as follows:

$$\begin{array}{l} X = round\{{10\ast [{({{10}^5}\ast {x_n}) - fix({{10}^5}\ast {x_n})} ]} \}\\ Y = round\{{10\ast [{({{10}^5}\ast {y_n}) - fix({{10}^5}\ast {y_n})} ]} \}\end{array}$$

λ Parity judgment for chaos factor $Y$. The directional key is generated by the following mapping relationship:

$$direction{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} key{\kern 1pt} {\kern 1pt} = \left\{ \begin{array}{l} - 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} mod(Y,2) = 1\\ {\kern 1pt} {\kern 1pt} {\kern 1pt} 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} mod(Y,2) = 0 \end{array} \right.$$

λ Using the chaos factor $X$ as the rotation key, the following operation is performed to obtain the rotation parameter ${\theta _u}$:

$${\theta _u} = {\theta _u}^{\prime} + direction{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} key \ast (X/180){\kern 1pt} {\kern 1pt} {\kern 1pt} (u = 1,\textrm{2,} \cdots ,{d_f} - 1)$$

λ Calculate $\{{{S_1},{S_2}, \cdots ,{S_{{d_f} - 1}}} \}$ based on ${S_u} = {e^{j{\theta _u}}}{S_0}(u = 1,2, \cdots ,{d_f} - 1)$

In sum, the design of the constellation pool for the chaotic codebook is summarized as follows:

Algorithm 1: Design of constellation pool
Input: chaotic parameter ${x_n}$; chaotic parameter ${y_n}$; basic constellation:${S_0}$
     The number of layers occupying a resource:${d_f}$
Output: the constellation of different layers:{${S_1},{S_2}, \cdots ,{S_{{d_f} - 1}}$}
1. ${\theta _u}^{\prime} = u \times \frac{\pi }{{{d_f}}}(u = 1,2, \cdots ,{d_f})$
2. $\begin{array}{l} X = round\{{10\ast [{({{10}^5}\ast {x_n}) - fix({{10}^5}\ast {x_n})} ]} \}\\ Y = round\{{10\ast [{({{10}^5}\ast {y_n}) - fix({{10}^5}\ast {y_n})} ]} \}\end{array}$
3. $direction{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} key{\kern 1pt} {\kern 1pt} = \left\{ \begin{array}{l} - 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} mod(Y,2) = 1\\ {\kern 1pt} {\kern 1pt} {\kern 1pt} 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} mod(Y,2) = 0 \end{array} \right.$
4. ${\theta _u} = {\theta _u}^{\prime} + direction{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} key \ast (X/180){\kern 1pt} {\kern 1pt} {\kern 1pt} (u = 1,\textrm{2}, \cdots ,{d_f} - 1)$
5. ${S_u} = {e^{j{\theta _u}}}{S_0}(u = 1,2, \cdots ,{d_f} - 1)$

To facilitate performance comparison with the Huawei codebook, we use the factor graph matrix of the codebook (as shown in Fig. 4(a)), where ${S_u}$ is assigned to non-zero locations in a Latin order, $M = 4,J = 6,K = 4,{d_v} = 2,{d_f} = 3$. Latin order requires that there are no identical vectors in the row and column directions of the codebook matrix. The use of Latin order enables the receiver to distinguish the individual user messages that collide on each resource block with a lower BER. Every user selects the set of constellations on the corresponding layer of the constellation pool as his constellation points according to the factor graph. Its mapping relationship is shown in Fig. 4(b). The whole process of forming a regular hexagon chaotic codebook can be vividly shown in Fig. 5.

 figure: Fig. 4.

Fig. 4. (a) Factor graph of the codebook (b) Constellation mapping diagram

Download Full Size | PDF

 figure: Fig. 5.

Fig. 5. The design process of regular hexagon chaotic codebook

Download Full Size | PDF

Next, we perform the second block scrambling encryption on the SCMA encoded matrix [17]. The rows of the matrix represent the subcarrier frequencies and the column represents the SCMA symbols. Here, we define eight matrix block formats: $16 \times 6$, $4 \times 15$, $8 \times 15$, $8 \times 30$, $16 \times 30$, $4 \times 30$, $8 \times 6$, $16 \times 15$, which correspond to eight index values from 0 to 7 respectively. The whole block encryption is divided into the following two steps:

  • (1) The sequences $({{z_u},{w_u}} )$ generated by the Rossler chaotic model are used for the following calculations to produce the index value T and divide the data into several matrices with the corresponding size of $A \times B$.
    $$T = \bmod (floor((({z_n} + {w_n})/2)\ast {10^8}),{\kern 1pt} {\kern 1pt} 8)$$
  • (2) The one-dimensional Logistic chaotic sequence ${q_n}$ is calculated as follows, and the chaotic parameters r and c are obtained to scramble the rows and columns in turn. The corresponding block scrambling flow chart is shown in Fig. 6. Firstly, r rows are cyclically disrupted upwards, then c columns are cyclically disrupted to the left. The receiver can achieve decryption by reverse operation.
    $$\begin{array}{l} r = \bmod (round({q_n}\ast {10^8} - round({q_n}\ast {10^8})\ast A),A) + 1\\ c = \bmod (round({q_n}\ast {10^8} - round({q_n}\ast {10^8})\ast B),B) + 1 \end{array}$$

 figure: Fig. 6.

Fig. 6. Block scrambling flow chart

Download Full Size | PDF

The entire chaotic encryption process does not involve too much interference at the constellation points, and the receiver can reverse the encrypted information with the known key to achieving the correct recovery of the message.

3. Experiment setup and results

In order to verify the high-security SCMA-OFDM transmission system, the IM/DD system is deployed as shown in Fig. 7. In the experiment, a continuous wave laser with a wavelength∼1550nm was used as the light source, and the power was set to 14.5 dBm. At the OLT transmitter, the encrypted SCMA-OFDM signal is generated by offline DSP. Then an arbitrary waveform generator (AWG, TekAWG70002A) with a sampling rate of 10 GSa/s is used for digital-to-analog conversion of the encrypted signal. An electrical signal through the electric amplifier is injected into the MZM to complete the IM. Before the optical signal is coupled into the seven-core fiber through the 1:8 splitter and fan-in device, it needs to be further amplified by the commercial erbium-doped fiber amplifier. At the receiving end, the optical network unit (ONU) is divided into legal access and illegal access. In the case of legal ONU, the received optical power is adjusted by using a variable optical attenuator and converting the received optical signal into an electrical signal through a photodiode. Then, the obtained electrical signal is passed through a mixed-signal oscilloscope (MSO, TexMSO73304DX) with a sampling rate of 50 GS/s. After analog-to-digital conversion, the received data is decrypted by using the same key as the transmitter. Users with illegal access will not be able to get the correct data through offline DSP because they do not know the key.

 figure: Fig. 7.

Fig. 7. The experimental setup of the proposed scheme. (AWG: arbitrary waveform generator; EA: Electronic amplifier; MZM: Mach-Zehnder modulator; EDFA: Erbium-doped fiber amplifier; MCF: multicore fiber; PS: power splitter; VOA: variable optical attenuator; PD: photodiode; MSO: mixed-signal oscilloscope)

Download Full Size | PDF

Firstly, an experimental study has been conducted of different SCMA-OFDM transmission architectures. The transmission scheme with up and down-conversion, and the scheme based on the Hermitian conjugate structure are employed for data transmission on core 3 without encryption, the data rate transmission rate is kept at 42 Gb/s. The experimental result of Fig. 8 shows that compared with the Hermitian conjugate transmission scheme, the performance of the transmission scheme with up and down-conversion is improved by about 1 dB at the BER∼$1 \times {10^{ - 3}}$. There is no big difference between the two transmission architectures. The only obvious difference is that the transmission scheme with up and down-conversion is interpolated in the time domain and the transmission scheme based on the Hermitian conjugate structure is interpolated in the frequency domain.

 figure: Fig. 8.

Fig. 8. Performance comparison diagram of two different transmission architectures

Download Full Size | PDF

Secondly, we experimentally measure the BER performance of the encrypted SCMA-OFDM signal in different cores, the result is shown in Fig. 9. With the increase of received optical power, the BER of different cores tends to decrease. Moreover, the performance difference between the best core and the worst core is about 1 dB. Compared with legal users, Fig. 10 shows that illegal users are unable to obtain any useful information from encrypted signals because of the lack of corresponding keys and the BER remains around 0.5 at various receiving optical power. It is worth mentioning that since both legitimate users and illegal users will receive similar constellations, the receiving end cannot determine from the constellation diagrams whether the data has been encrypted or not. Hence the encryption process is hidden as well.

 figure: Fig. 9.

Fig. 9. BER curves of seven-core fiber transmission

Download Full Size | PDF

 figure: Fig. 10.

Fig. 10. BER curves for legal and illegal access

Download Full Size | PDF

Thirdly, the key space of the proposed encryption scheme is calculated conservatively, which can be divided into three parts: the control parameters, the initial values, and the iteration steps of $Rossler$ and $Logistic$ chaos models. According to the experimental result in Fig. 11, we estimate that the key space of our encrypted transmission scheme is ${({1 \times {{10}^{17}}} )^5} \times {({1 \times {{10}^{16}}} )^3} \times {10^{15}} \times {10^{14}} \times {10^{13}} \times {10^3} \times {10^0} = {10^{178}}$. This order of magnitude is almost impossible to break through violence, so it can provide a good level of security for data transmission at the physical layer.

 figure: Fig. 11.

Fig. 11. Sensitivity curves of chaotic encryption

Download Full Size | PDF

Finally, the transmission performance of the regular hexagonal chaotic codebook is tested. Figure 12 describes the BER performance of data transmission in core 7 using Huawei codebook and chaos codebook respectively. It is found that when the BER is $1 \times {10^{ - 3}}$, the system using a regular hexagonal chaotic codebook can improve nearly by 2.5 dB compared with the Huawei codebook. All this is attributed to the larger minimum Euclidean distance (MED) of the chaotic codebook. When passing through the fiber channel, it can reduce the influence of adjacent constellation points and then can prevent the interference of noise. In addition, we also experimentally test the detection effects of different multi-user detection algorithms. Take the experimental result of core 1 as an example. Figure 13 shows that the MPA algorithm is still relatively superior in optical communications, which is similar to the result in the wireless field. However, the other two algorithms Log-MPA and SD-MPA reduce the computational complexity at the expense of transmission reliability.

 figure: Fig. 12.

Fig. 12. (I) BER curves of Huawei codebook and chaos codebook after 2km MCF transmission. (II) Resource constellations at the transmitter using Huawei codebook(a); Resource constellations using Huawei codebook when the received optical power is −7dBm(b) and −17dBm(c) respectively; Resource constellations at the transmitter using chaos codebook (d); Resource constellations using chaos codebook when the received optical power is −7dBm(e) and −17dBm(f) respectively;

Download Full Size | PDF

 figure: Fig. 13.

Fig. 13. BER curves of different multi-user detection algorithms

Download Full Size | PDF

4. Conclusion

This paper proposes a high-security SCMA-OFDM multi-core fiber transmission system based on a regular hexagonal chaotic codebook. The transmission scheme includes a chaotic codebook and the domain block scrambling in the frequency domain, which can effectively improve the security of the system and prevent data from being broken by violence. This scheme is experimentally proven to be able to achieve 42 Gb/s data transmission in a seven-core fiber of 2 km. At the same time, a regular hexagonal chaotic codebook can bring a significant improvement to the transmission performance of the system. Therefore, this encrypted transmission scheme has a bright prospect for future applications in non-orthogonal optical access networks. In addition, the universality of different multi-user detection algorithms is experimentally verified. SD-MPA and Log-MPA can also detect the information of each user in optical communications. Although their computational complexity is reduced compared with MPA algorithm, their detection effect is still not as good as MPA algorithm under the same BER. This is no different from wireless communication.

Funding

National Key Research and Development Program of China (2018YFB1800901); National Natural Science Foundation of China (61720106015, 61727817, 61835005, 61875248, 61935005, 61935011, 61975084, 62035018, 62171227, U2001601); The Natural Science Foundation of the Jiangsu Higher Education Institutions of China (22KJB510031); Jiangsu team of innovation and entrepreneurship; The Startup Foundation for Introducing Talent of NUIST.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. H. Nikopour and H. Baligh, “Sparse code multiple access,” IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 332–336 (2013).

2. M. Taherzadeh, H. Nikopour, A. Bayesteh, and H. Baligh, “SCMA Codebook Design,” IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp. 1–5, (2014).

3. L. Yang, X. Ma, and Y. Siu, “Low Complexity MPA Detector Based on Sphere Decoding for SCMA,” IEEE Commun. Lett. 21(8), 1855–1858 (2017). [CrossRef]  

4. K. Xiao, B. Xiao, S. Zhang, Z. Chen, and B. Xia, “Simplified multiuser detection for SCMA with sum-product algorithm,” International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1–5 (2015).

5. C. Liu, L. Deng, J. He, D. Li, S. Fu, M. Tang, M. Cheng, and D. Liu, “Experimental demonstration of high spectral efficient MIMO SCMA-OFDM/OQAM radio over multi-core fiber system,” Opt. Express 25(15), 18431–18441 (2017). [CrossRef]  

6. B. Liu, L. Zhang, and X. Xin, “Non-orthogonal optical multicarrier access based on filter bank and SCMA,” Opt. Express 23(21), 27335–27342 (2015). [CrossRef]  

7. H. Yang, X. Zhang, B. Lin, P. Deng, and A. Yi, “Next-Generation Passive Optical Network Based on Sparse Code Multiple Access and Graph Neural Networks,” IEEE Photonics J. 14(1), 1–6 (2022). [CrossRef]  

8. J. Ren, B. Liu, D. Zhao, S. Han, S. Chen, Y. Mao, Y. Wu, X. Song, J. Zhao, X. Liu, and X. Xin, “Chaotic constant composition distribution matching for physical layer security in a PS-OFDM-PON,” Opt. Express 28(26), 39266–39276 (2020). [CrossRef]  

9. M. Li, B. Liu, R. Ullah, J. Ren, Y. Mao, S. Han, J. Zhao, R. Tang, S. Chen, and J. Ling, “5D data iteration in a multi-wavelength OFDM-PON using the hyperchaotic system,” Opt. Lett. 45(17), 4960–4963 (2020). [CrossRef]  

10. K. Lai, L. Wen, J. Lei, G. Chen, P. Xiao, and A. Maaref, “Secure Transmission With Interleaver for Uplink Sparse Code Multiple Access System,” IEEE Wireless Commun. Lett. 8(2), 336–339 (2019). [CrossRef]  

11. J. Zhao, B. Liu, Y. Mao, R. Ullah, J. Ren, S. Chen, L. Jiang, S. Han, J. Zhang, and J. Shen, “High security OFDM-PON with a physical layer encryption based on 4D-hyperchaos and dimension coordination optimization,” Opt. Express 28(14), 21236–21246 (2020). [CrossRef]  

12. Altera Innovate Asia website, Presentation, “1st 5G Algorithm Innovation Competition-ENV1.0-SCMA,” [Online]. Available:http://www.innovateasia.com/5 g/en/gp2.html.

13. H. Zhang, J. Ren, S. Chen, Y. Mao, X. Wu, F. Wu, L. Zhao, T. Sun, R. Ulah, F. Tian, and B. Liu, “Research on optical sparse code division multiple access encoding technology based on a multi-core fiber,” Opt. Express 30(6), 8526–8536 (2022). [CrossRef]  

14. D. Cai, P. Fan, X. Lei, Y. Liu, and D. Chen, “Multi-Dimensional SCMA Codebook Design Based on Constellation Rotation and Interleaving,” IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1–5 (2016).

15. H. Yan, H. Zhao, Z. Lv, and H. Yang, “A top-down SCMA codebook design scheme based on lattice theory,” IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5 (2016).

16. H. Huang, H. Zhao, F. Wang, and J. Li, “Uplink Grant-free Multi-codebook SCMA Based on High-overload Codebook Grouping,” IEEE/CIC International Conference on Communications in China (ICCC Workshops), pp. 112–116 (2018).

17. Y. Xiao, C. Long, J. Cao, Y. Chen, Y. Liu, J. He, and Z. Xiao, “Chaotic Pilot and Synchronization Encryption of Optical OFDM System Based on Polar Code,” IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 177–181 (2019).

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (13)

Fig. 1.
Fig. 1. encrypted SCMA-OFDM transmission architecture
Fig. 2.
Fig. 2. MPA algorithm schematic diagram
Fig. 3.
Fig. 3. Chaotic model (a) phase diagram of Rossler chaotic map (b) bifurcation diagram of a Logistic map
Fig. 4.
Fig. 4. (a) Factor graph of the codebook (b) Constellation mapping diagram
Fig. 5.
Fig. 5. The design process of regular hexagon chaotic codebook
Fig. 6.
Fig. 6. Block scrambling flow chart
Fig. 7.
Fig. 7. The experimental setup of the proposed scheme. (AWG: arbitrary waveform generator; EA: Electronic amplifier; MZM: Mach-Zehnder modulator; EDFA: Erbium-doped fiber amplifier; MCF: multicore fiber; PS: power splitter; VOA: variable optical attenuator; PD: photodiode; MSO: mixed-signal oscilloscope)
Fig. 8.
Fig. 8. Performance comparison diagram of two different transmission architectures
Fig. 9.
Fig. 9. BER curves of seven-core fiber transmission
Fig. 10.
Fig. 10. BER curves for legal and illegal access
Fig. 11.
Fig. 11. Sensitivity curves of chaotic encryption
Fig. 12.
Fig. 12. (I) BER curves of Huawei codebook and chaos codebook after 2km MCF transmission. (II) Resource constellations at the transmitter using Huawei codebook(a); Resource constellations using Huawei codebook when the received optical power is −7dBm(b) and −17dBm(c) respectively; Resource constellations at the transmitter using chaos codebook (d); Resource constellations using chaos codebook when the received optical power is −7dBm(e) and −17dBm(f) respectively;
Fig. 13.
Fig. 13. BER curves of different multi-user detection algorithms

Equations (9)

Equations on this page are rendered with MathJax. Learn more.

{ x ¯ = a ( y x ) y ¯ = x z + d x + c y w z ¯ = x y b z w ¯ = x + k
q n + 1 = μ q n ( 1 q n ) ( n = 0 , 1 , , N 1 )
S 0 = { r M 2 , , r 1 , r 1 , , r M 2 }
θ u = u × π d f
X = r o u n d { 10 [ ( 10 5 x n ) f i x ( 10 5 x n ) ] } Y = r o u n d { 10 [ ( 10 5 y n ) f i x ( 10 5 y n ) ] }
d i r e c t i o n k e y = { 1 m o d ( Y , 2 ) = 1 1 m o d ( Y , 2 ) = 0
θ u = θ u + d i r e c t i o n k e y ( X / 180 ) ( u = 1 , 2, , d f 1 )
T = mod ( f l o o r ( ( ( z n + w n ) / 2 ) 10 8 ) , 8 )
r = mod ( r o u n d ( q n 10 8 r o u n d ( q n 10 8 ) A ) , A ) + 1 c = mod ( r o u n d ( q n 10 8 r o u n d ( q n 10 8 ) B ) , B ) + 1
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.