Abstract

We experimentally demonstrate the security vulnerability in the temporal phase coding single-user differential phase-shift keying (DPSK) and code-shift keying (CSK) OCDMA systems with a DPSK demodulator. In the experiment, we build up the 2.5Gbit/s DPSK- and CSK-OCDMA systems. In the systems, we use two 31-chip 640 Gchip/s superstructured fiber Bragg grating encoders for the signal encoding. In the receiving side, we remove the decoders and utilize the DPSK demodulator to detect the encoded signals directly. We successfully achieve the error-free BER performance and obtaine the clear open eye diagrams using the detection without the proper decoding. It indicates the existence of the eavesdropping vulnerability in the both systems. Furthermore, we also discuss the principle of DPSK demodulation attack.

© 2010 Optical Society of America

PDF Article
More Like This
Demonstration of Hybrid Using ±π/2- and 0/π-Phase-Shifted SSFBG En/decoders in the 4×10Gbit/s OCDMA system

Bo Dai, Zhensen Gao, Xu Wang, Nobuyuki Kataoka, and Naoya Wada
OWV6 Optical Fiber Communication Conference (OFC) 2011

Demonstration of 40 Gb/s secure optical communication system based on 40 Gchip/s SPE and symbol overlapping

Zhensen Gao, Bo Dai, Gerald Buller, and Xu Wang
Su1C.3 Asia Communications and Photonics Conference (ACPC) 2017

Experimental Investigation of Security Issues in OCDMA

Z. Jiang, D.E. Leaird, and A.M. Weiner
OThT2 Optical Fiber Communication Conference (OFC) 2006

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription