OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 4 — Feb. 14, 2011
  • pp: 3503–3512

Bit-by-bit optical code scrambling technique for secure optical communication

Xu Wang, Zhensen Gao, Xuhua Wang, Nobuyuki Kataoka, and Naoya Wada  »View Author Affiliations


Optics Express, Vol. 19, Issue 4, pp. 3503-3512 (2011)
http://dx.doi.org/10.1364/OE.19.003503


View Full Text Article

Enhanced HTML    Acrobat PDF (1634 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose and demonstrate a novel bit-by-bit code scrambling technique based on time domain spectral phase encoding/decoding (SPE/SPD) scheme using only a single phase modulator to simultaneously generate and decode the code hopping sequence and DPSK data for secure optical communication application. In the experiment, 2.5-Gb/s DPSK data has been generated, decoded and securely transmitted over 34km by scrambling five 8-chip, 20-Gchip/s Gold codes with prime-hop patterns. The proposed scheme can rapidly reconfigure the optical code hopping sequence bit-by-bit with the DPSK data, and thus it is very robust to conventional data rate energy detection and DPSK demodulation attack, exhibiting the potential to provide unconditional transmission security and realize even one-time pad.

© 2011 OSA

OCIS Codes
(060.5060) Fiber optics and optical communications : Phase modulation

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: November 29, 2010
Revised Manuscript: January 30, 2011
Manuscript Accepted: January 30, 2011
Published: February 8, 2011

Citation
Xu Wang, Zhensen Gao, Xuhua Wang, Nobuyuki Kataoka, and Naoya Wada, "Bit-by-bit optical code scrambling technique for secure optical communication," Opt. Express 19, 3503-3512 (2011)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-19-4-3503


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. K. Kitayama and M. Murata, “Versatile Optical Code-Based MPLS for Circuit, Burst, and Packet Switchings,” J. Lightwave Technol. 21(11), 2753–2764 (2003). [CrossRef]
  2. N. Wada, H. Furukawa, and T. Miyazaki, “Prototype 160Gbit/s/port optical packet switch based on optical code label processing,” IEEE J. Sel. Top. Quantum Electron. 13(5), 1551–1559 (2007). [CrossRef]
  3. X. Wang, K. Matsushima, K. Kitayama, A. Nishiki, N. Wada, and F. Kubota, “High-performance optical code generation and recognition by use of a 511-chip, 640-Gchip/s phase-shifted superstructured fiber Bragg grating,” Opt. Lett. 30(4), 355–357 (2005). [CrossRef] [PubMed]
  4. P. R. Prucnal, M. A. Santoro, and T. R. Fan, “Spread spectrum fiber-optic local area network using optical processing,” J. Lightwave Technol. 4(5), 547–554 (1986). [CrossRef]
  5. A. Stock and E. H. Sargent, “The role of optical CDMA in access networks,” IEEE Commun. Mag. 40(9), 83–87 (2002). [CrossRef]
  6. J. P. Heritage and A. M. Weiner, “Advances in Spectral Optical Code-Division Multiple-Access,” IEEE J. Quantum Electron. 13(5), 1351–1369 (2007). [CrossRef]
  7. X. Wang and K. Kitayama, “Analysis of beat noise in coherent and incoherent time-spreading OCDMA,” J. Lightwave Technol. 22(10), 2226–2235 (2004). [CrossRef]
  8. Y.-K. Huang, B. Wu, I. Glesk, E. E. Narimanov, T. Wang, and P. R. Prucnal, “Combining cryptographic and steganographic security with self-wrapped optical code division multiplexing techniques,” Electron. Lett. 43(25), 1449 (2007). [CrossRef]
  9. S. Etemad, A. Agarwal, T. Banwell, J. Jackel, R. Menendez, and P. Toliver, “OCDM-based photonic layer “security” scalable to 100 Gbit/s for existing WDM networks,” J. Opt. Netw. 6(7), 948–967 (2007). [CrossRef]
  10. I. Glesk, Y.-K. Huang, C.-S. Brès, and P. R. Prucnal, “OCDMA platform for avionics applications,” Electron. Lett. 42(19), 1115–1116 (2006). [CrossRef]
  11. I. Glesk, M. Sorel, A. E. Kelly, and P. R. Prucnal, “Enhancing Performance of Optical Communication Systems with advanced Optical Signal Processing,” J. Opt. Netw. 5(11), 1328–1334 (2010).
  12. T. H. Shake, “Confidentiality performance of spectral-phase-encoded optical CDMA,” J. Lightwave Technol. 23(4), 1652–1663 (2005). [CrossRef]
  13. T. H. Shake, “Security performance of optical CDMA against eavesdropping,” J. Lightwave Technol. 23(2), 655–670 (2005). [CrossRef]
  14. Z. Jiang, D. Seo, S. Yang, D. E. Leaird, R. V. Roussev, C. Langrock, M. M. Fejer, and A. M. Weiner, “Four-user 10-Gb/s spectrally phase-coded O-CDMA system operating at ~ 30 fJ/bit,” IEEE Photon. Technol. Lett. 17(3), 705–707 (2005). [CrossRef]
  15. X. Wang, N. Wada, T. Miyazaki, and K. Kitayama, “Coherent OCDMA System Using DPSK Data Format With Balanced Detection,” IEEE Photon. Technol. Lett. 18(7), 826–828 (2006). [CrossRef]
  16. D. E. Leaird, Z. Jiang, and A. M. Weiner, “Experimental investigation of security issues in OCDMA: a code-switching scheme,” Electron. Lett. 41(14), 817–819 (2005). [CrossRef]
  17. Z. Jiang, D. E. Leaird, and A. M. Weiner, “Experimental investigation of security issues in O-CDMA,” J. Lightwave Technol. 24(11), 4228–4234 (2006). [CrossRef]
  18. X. Wang and N. Wada, “Spectral phase encoding of ultra-short optical pulse in time domain for OCDMA application,” Opt. Express 15(12), 7319–7326 (2007). [CrossRef] [PubMed]
  19. Z. Gao, X. Wang, N. Kataoka, and N. Wada, “Demonstration of time-domain spectral phase encoding/DPSK data modulation using single phase modulator”, IEEE LEOS Summer Topical 2009, New port, CA, USA, Paper TuA3.1.
  20. X. Wang, Z. Gao, N. Kataoka, and N. Wada, “Time domain spectral phase encoding/DPSK data modulation using single phase modulator for OCDMA application,” Opt. Express 18(10), 9879–9890 (2010). [CrossRef] [PubMed]
  21. B. Schneier, Applied cryptography, Second edition, (John Wiley & Sons, 1996), Chapter 7.
  22. Z. Wang, A. Chowdhury, and P. R. Prucnal, “Optical CDMA Code Wavelength Conversion Using PPLN to Improve Transmission Security,” IEEE Photon. Technol. Lett. 21(6), 383–385 (2009). [CrossRef]
  23. C. E. Shannon, “Communication theory on secrecy systems,” J. Bell Syst. Tech. 28(4), 656–715 (1949).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited