Professional Documents
Culture Documents
Abstract In this letter, we propose a quadrature amplitude OFDMA-PON, downstream signal coming from the optical
modulation (QAM) encryption method based on chaos coding for line terminal (OLT) is broadcasted to all the optical network
security improvement in orthogonal frequency-division multiple units (ONUs). As a result, malicious users can be disguised
access-based passive optical network (OFDMA-PON) systems.
In the encrypted QAM symbols, the real (I) and imaginary as legitimate ONUs to eavesdrop useful information from the
(Q) parts are separately coded with key sequences, which are downstream signal. Moreover, there are also other security
generated by a modified Logistic mapping. Iteration parameters threats such as jamming, physical infrastructure attacks, and
of the mapping formula are set as the security keys, which are interception [5]. In consequence, security is of great impor-
determined in each optical network unit (ONU) and then sent tance in an OFDMA-PON system.
to optical line terminal (OLT). The key sequences for different
ONUs are generated with their corresponding security keys. So far, several technologies have been proposed to improve
According to the subcarrier allocation information, downstream the security of an OFDM-PON. Conventional MAC-layer
signal is encrypted in the OLT and then decrypted in each encryption method encrypts the cryptographic protocols at the
ONU with distinct key sequences. Encryption of 10-Gb/s 16QAM high-layer, but lefts the control data or headers unprotected.
OFDM and 12.5-Gb/s 32QAM OFDM signals has been success- This is a risky practice to build security on top of an insecure
fully implemented over 30-km standard single mode fiber in the
security improved OFDMA-PON. foundation [5], [6]. Physical layer encryption has also been
proposed to secure the OFDM-PON, which can prevent the
Index Terms Passive optical network (PON), orthogonal network against threats at the lowest layer. Recently, a few
frequency-division multiple access (OFDMA), quadrature
amplitude modulation (QAM), chaos encryption. signal encryption and decryption methods in OFDM-PON
systems have been studied, such as constellation masking,
chaotic scrambling and chaotic permutation [7][9]. However,
I. I NTRODUCTION in these schemes, the interleaving of time domain and/or
Fig. 1. (a) Principle of security key transmission and key sequence generation. (b) Diagram of encryption in the OLT and decryption in the ONUs.
Fig. 3. The setup of the proposed secure OFDMA-PON (IM: intensity modulator; PSC: power splitter/coupler; PD: photodiode; RF: radio frequency).
V. C ONCLUSION
We have proposed and verified a novel QAM IQ-encryption
method to effectively improve the physical layer security of
Fig. 5. BER performance and the corresponding constellations of 16-QAM
and 32-QAM OFDM signals. an OFDMA-PON. The modified Logistic map is adopted as
the key sequence generator. A 10 Gb/s 16QAM OFDM signal
and a 12.5 Gb/s 32QAM OFDM signal using the proposed
N = 2000, x 0 = 0.655008, which are utilized as the encryption method have been successfully implemented for
security keys for ONU1 and ONU2 , respectively. It can be two legal ONUs and one illegal ONU, to verify the feasibility
seen that when = 0, the value of the auto-correlation of our proposal. The obtained results prove that the generated
functions of the key sequences are very small (around zero). key sequences have a good random characteristic and the
The cross-correlation functions of the chaos sequences for proposed encryption method can effectively prevent eaves-
N = 1000, x 0 = 0.655007 and x 0 = 0.655008 as well as dropping from any illegal ONUs. Furthermore, this encryption
N = 1000 and N = 2000, x 0 = 0.655008 are represented in method has high encryption efficiency and low implemen-
Figs. 4(c) and (d). Here N = 1000 and x 0 = 0.655008 are tation complexity. Hence, the proposed encryption method
set as the security keys utilized to eavesdrop the information is quite promising for the security improvement in future
from ONU1 by an illegal ONU. The values of cross-correlation OFDMA-PON systems.
functions are also around zero for all values of . As a result,
the generated sequences have a quite good random feature R EFERENCES
which is fundamentally important to cryptosystems. If the [1] J.-I. Kani et al., Next-generation PONPart I: Technology roadmap
adversary knows the modulated symbols Mk , both ak and and general requirements, IEEE Commun. Mag., vol. 47, no. 11,
bk can be recovered from (1). However, the adversary only pp. 4349, Nov. 2009.
[2] C. Chen, C. Zhang, D. Liu, K. Qiu, and S. Liu, Tunable optical
knows a subset of the messages and only some segments frequency comb enabled scalable and cost-effective multiuser orthogonal
of the sequences can be recovered. Moreover, the random frequency-division multiple access passive optical network with source-
characteristic and timeslot-varying security keys can guarantee free optical network units, Opt. Lett., vol. 37, no. 19, pp. 39543956,
Oct. 2012.
that the recovered key sequences in one time slot cannot be [3] N. Cvijetic, OFDM for next-generation optical access networks,
used to decrypt the encrypted signal in another time slot. J. Lightw. Technol., vol. 30, no. 4, pp. 384398, Feb. 15, 2012.
In this case, this encryption method is expected to be more [4] C. Chen, C. Zhang, Y. Feng, and K. Qiu, Bidirectional radio frequency
up-converted orthogonal frequency-division multiple access passive opti-
resistant against the known plaintext and cipher-text attack. cal network with novel source-free optical network units using four-wave
Then, the exhaustive search for brute-force attack from an mixing in semiconductor optical amplifier, IEEE Photon. Technol. Lett.,
illegal ONU is also considered. In this letter, for key sequences vol. 24, no. 24, pp. 22062209, Dec. 15, 2012.
[5] M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, Optical layer security
ak and bk , the security keys can be expressed as {x 0a , a , N a , in fiber-optic networks, IEEE Trans. Inf. Forensics Security, vol. 6,
x 0b , b , N b }. x 0 and can be arbitrary values in (-1, 1) and no. 3, pp. 725736, Sep. 2011.
[1.40015, 2], respectively. It has been shown in Fig (4) that [6] A. Harris, D. R. Jones, K. H. Horbatuck, and A. Sierra, A novel
wavelength hopping passive optical network (WH-PON) for provision
Rac and Rcc are sensitive to 106 difference for x 0 . Therefore, of enhanced physical security, J. Opt. Commun. Netw., vol. 4, no. 3,
the key space size will be above 41034 , which is much larger pp. 289295, Mar. 2012.
than 2100 and thus can provide a sufficient security against [7] B. Liu, L. Zhang, X. Xin, and Y. Wang, Physical layer security
in OFDM-PON based on dimension-transformed chaotic permutation,
brute-force attacks [11]. In addition, the security keys are IEEE Photon. Technol. Lett., vol. 26, no. 2, pp. 127130, Jan. 15, 2014.
timeslot-varying, which will introduce an exponential growth [8] L. Zhang, X. Xin, B. Liu, and Y. Wang, Secure OFDM-PON based
of the exhaustive trial for the illegal receiver. Consequently, on chaos scrambling, IEEE Photon. Technol. Lett., vol. 23, no. 14,
pp. 9981000, Jan. 15, 2011.
this scheme reveals significant potential to efficiently resist the [9] L. Zhang, B. Liu, X. Xin, Q. Zhang, J. Yu, and Y. Wang, Theory and
brute-force attack. performance analyses in secure CO-OFDM transmission system based
The bit-error-rate (BER) performance of both regular and on two-dimensional permutation, J. Lightw. Technol., vol. 31, no. 1,
pp. 7480, Jan. 1, 2013.
illegal ONUs is depicted in Fig. 5. It is observed that two [10] G. Heidari-Bateni and C. D. McGillem, Chaotic sequences for spread
legal ONUs, ONU1 and ONU2 , they have nearly the same spectrum: An alternative to PN-sequences, in Proc. IEEE ICSTWC,
performance for both 16QAM and 32QAM cases. The original Jun. 1992, pp. 437440.
[11] G. lvarez and S. Li, Some basic cryptographic requirements for
data have been well recovered after decryption and demodu- chaos-based cryptosystems, Int. J. Bifurcation Chaos, vol. 16, no. 8,
lation. However, for the illegal ONU, a BER of above 0.5 has pp. 21292151, Mar. 2006.