Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/91827
標題: 運用多碼鍵移加密提升光纖分碼多工系統及網路之實體層保密性
Enhancing Physical-Layer Confidentiality in Optical-CDMA Systems and Networks Using Multicode-Keying Encryption
作者: Wen-Hao Chang
張文豪
關鍵字: Confidentiality;encryption;multicode keying;optical code division multiple access (O-CDMA);保密性;加密;多碼鍵移;光纖分碼多工
引用: [1] F. R. K. Chung, J. A. Salehi, and V. K. Wei, “Optical orthogonal codes: Design, analysis, and applications,” IEEE Trans. Info. Theory, vol. 35. no. 3, pp. 595–604, May 1989. [2] W.C. Kwong, P. A. Perrier, and P. R. Prucnal, “Performance comparison of asynchronous and synchronous code-division multiple-access techniques for fiber-optic local area networks,” IEEE Trans. Commun., vol. 39, no. 11, pp. 1625– 1634, Nov. 1991. [3] G.-C. Yang and T. Fuja, “Optical orthogonal codes with unequal autoand cross-correlation constraints,” IEEE Trans. Info. Theory, vol. 41, no. 1, pp. 96–106, Jan. 1995. [4] G.-C. Yang and W.C. Kwong, “Performance comparison of multiwavelength CDMA and WDMA+CDMA for fiber-optic networks,” IEEE Trans. Commun., vol. 45, no. 11, pp. 1426– 1434, Nov. 1997. [5] G.-C. Yang and W.C. Kwong, Prime Codes with Applications to CDMA Optical and Wireless Networks, Norwood, MA: Artech House, 2002. [6] W.C. Kwong and G.-C. Yang, “Design of multilength optical orthogonal codes for optical CDMA multimedia networks,” IEEE Trans. Commun., vol. 50, no. 8, pp. 1258–1265, Aug. 2002. [7] W.C. Kwong and G.-C. Yang, “Multiple-length, multiple- wavelength optical orthogonal codes for optical CDMA systems supporting multirate, multimedia services,” IEEE J. Select. Areas Commun., vol. 22, no. 9, pp. 1640–1647, Nov. 2004. [8] W.C. Kwong, G.-C. Yang, V. Baby, C.-S. Brès, and P. R. Prucnal, “Multiple-wavelength optical orthogonal codes under prime-sequence permutations for optical CDMA,” IEEE Trans. Commun., vol. 53, no. 1, pp. 117–123, Jan. 2005. [9] E. Narimanov, W.C. Kwong, G.-C. Yang, and P. R. Prucnal, “Shifted carrier-hopping prime codes for multicode keying in wavelength-time O-CDMA,” IEEE Trans. Commun., vol. 53, no. 12, pp. 2150–2156, Dec. 2005. [10]C.-Y. Chang, G.-C. Yang, and W.C. Kwong, “Wavelength-time codes with maximum cross-correlation function of two for multicode-keying optical CDMA,” J. Lightw. Technol., vol. 24, no. 3, pp. 1093–1100, Mar. 2006. [11]R. Omrani, G. Garg, P. V. Kumar, P. Elia, and P. Bhambhani, “Large families of asymptotically optimal two- dimensional optical orthogonal codes,” IEEE Trans. Info. Theory, vol. 58, no. 2, pp. 1163–1185, Feb. 2012. [12]C.-H. Hsieh, G.-C. Yang, C.-Y. Chang, and W.C. Kwong, “Multilevel prime codes for optical CDMA systems,” J. Opt. Commun. Netw., vol. 1, no. 7, pp. 600–607, Dec. 2009. [13]C.-C. Sun, G.-C. Yang, C.-P. Tu, C.-Y. Chang, and W.C. Kwong, “Extended multilevel prime codes for optical CDMA,” IEEE Trans. Commun., vol. 58, no. 5, pp. 1344–1350, May 2010. [14]W.C. Kwong and G.-C. Yang, Optical Coding Theory with Prime, New York: CRC Press, 2013. [15]Y.-F. Li, G.-C. Yang, H. Chen, and W.C. Kwong, “Extended Reed- Solomon codes for optical CDMA,” IEEE Trans. Commun., vol. 61, no. 6, pp. 2498–2507, Jun. 2013. [16]W.C. Kwong, C.-Y. Chang, and G.-C. Yang, “Extended multilevel prime codes for optical-CDMA networks with algebraic code switching,” in Proc., IEEE Malaysia Inter. Conf. Commun. (MICC), Kuala Lumpur, Malaysia, pp. 304–309, Nov. 26–28, 2013. [17]J.-C. Liu, G.-C. Yang, H. Chen, and W.C. Kwong, “Applications and constructions of optical codes with large cardinality and multiple tree structures,” J. Lightw. Technol., vol. 32, no. 7, pp. 2451–2460, Jul. 2014. [18]T. H. Shake, “Security performance of optical CDMA against eavesdropping,” J. Lightw. Technol., vol. 23, no. 2, pp. 655–670, Feb. 2005. [19]Z. Jiang, D. E. Leaird, and A. M. Weiner, “Experimental investigation of security issues in O-CDMA,” J. Lightw. Technol., vol. 24, no. 11, pp. 4228–4234, Nov. 2006. [20]Y.-T. Chang, C.-C. Sue, and J.-F. Huang, “Robust design for reconfigurable coder/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks,” J. Lightw. Technol., vol. 25, no. 8, pp. 1931– 1948, Aug. 2007. [21]Y. Du, F. Xue, S. J. B. Yoo, and Z. Ding, “Security enhancement of SPECTS O-CDMA through concealment against upstream DPSK eavesdropping,” J. Lightw. Technol., vol. 25, no. 9, pp. 2799–2806, Sep. 2007. [22]S. Etemad, A. Agarwal, T. Banwell, G. Di Crescenzo, J. Jackel, R. Menendez, and P. Toliver, “An overlay photonic layer security approach scalable to 100 Gb/s,” IEEE Commun. Mag., vol. 46, no. 8, pp. 32–39, Aug. 2008. [23]I. Glesk, Y.-K. Huang, C.-S. Br`es, and P. R. Prucnal, “Design and demonstration of a novel optical CDMA platform for use in avionics applications,” Opt, Commun., vol. 271, no. 1, pp. 65–70, Mar. 2007. [24]N. Kostinski, K. Kravtsov, and P. R. Prucnal, “Demonstration of an all-optical OCDMA encryption and decryption system with variable two-code keying,” IEEE Photon. Technol. Lett., vol. 2, no. 24, pp. 2045–2047, Dec. 2008. [25]Z. Wang, Y.-K. Huang, Y. Deng, J. Chang, and P. R. Prucnal, “Optical encryption with OCDMA code swapping using all-optical XOR logic gate,” IEEE Photon. Technol. Lett., vol. 21, no. 7, pp. 411–413, Apr. 2009. [26]Z. Wang, J. Chang, and P. R. Prucnal, “Theoretical analysis and experimental investigation on the confidentiality of 2-D incoherent optical CDMA system,” J. Lightw. Technol., vol. 28, no. 12, pp. 1761–1769, Jun. 2010. [27]C. Yang, R. P. Scott, D. J. Geisler, N. K. Fontaine, J. P. Heritage, and S. J. B. Yoo, “Four-state data encoding for enhanced security against upstream eavesdropping in SPECTS O-CDMA,” J. Lightw. Technol., vol. 29, no. 1, pp. 62–68, Jan. 1, 2011. [28]W.-H. Chang, G.-C. Yang, C.-Y. Chang, and W.C. Kwong, “Enhancing optical-CDMA confidentiality with multicode- keying encryption,” J. Lightw. Technol., vol. 33, no. 9, pp. 1708–1718, May 1, 2015. [29]M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, “Optical layer security in fiber-optic networks,” IEEE Trans. Info. Forensics Security, vol. 26, no. 3, pp. 725–735, Sep. 2011. [30]K.-I. Kitayama, M. Sasaki, S. Araki, M. Tsubokawa, A. Tomita, K. Inoue, K. Harasawa, Y. Nagasako, and A. Takada, “Security in photonic networks: Threats and security enhancement,” J. Lightw. Technol., vol. 29, no. 21, pp. 3210–3219, Nov. 2011. [31]K. Kravtsov, Z. Wang, W. Trappe, and P. R. Prucnal, “Physical layer secret key generation for fiber-optic networks,” Optics Express, vol. 21, no. 20, pp. 23756– 23771, Oct. 2013. [32]B. Wu, B. J. Shatri, and P. R. Prucnal, “Secure communication in fiber-optic networks,” in Emerging Trends in ICT Security (Emerging Trends in Computer Science and Applied Computing), B. Akhgar and H. R. Arabnia, Eds. Amsterdam, The Netherlands: Elsevier Inc., pp. 173–183, Dec. 2013. [33]J. H. Kim, Y. M. Jhon, Y. T. Byun, S. Lee, D. H. Woo, and S. H. Kim, “All-optical XOR gate using semiconductor optical amplifiers without additional input beam,” IEEE Photon. Technol. Lett., vol. 14, no. 10, pp. 1436–1438, Oct. 2002.
摘要: 
為了調整光纖碼之效能及使用者之數目,近年來許多研究在發展具有大容量及樹狀架構之光纖碼。本論文根據以上這些特性,採用多碼鍵移加密以提高光纖分碼多工系統和網路中實體層之保密性。除了提出多碼鍵移加密技術的概念,並採用OptiSystemTM來對相關之全光硬體設計作模擬與驗證。此外,我們也制定出經由快速碼轉換及多碼鍵移加密以提升保密性之理論分析。

Optical codes with large cardinality and tree structures of multiple subsets of codewords for adjustable code performance and cardinality have recently been proposed. As studied in this thesis, these characteristics support multicode-keying encryption for enhancing physical-layer confidentiality in optical code-division multiple-access (O-CDMA) systems and networks. The concept of the multicode-keying encryption technique is introduced. The associated all-optical hardware is designed and validated with OptiSystemTM simulation. The theoretical analyses of confidentiality improvement by means of rapid codeword switching and multicode-keying encryption are formulated.
URI: http://hdl.handle.net/11455/91827
Rights: 同意授權瀏覽/列印電子全文服務,2015-08-06起公開。
Appears in Collections:通訊工程研究所

Files in This Item:
File Description SizeFormat Existing users please Login
nchu-104-7102093005-1.pdf2.21 MBAdobe PDFThis file is only available in the university internal network    Request a copy
Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.