Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks
Author(s) -
Jen-Fa Huang,
Kai-Sheng Chen,
Ting-Ju Su
Publication year - 2016
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2016.08.037
Subject(s) - computer science , control reconfiguration , computer network , eavesdropping , signature (topology) , embedded system , geometry , mathematics
In order to enhance data transmission security within internet network, this paper consider a signature reconfiguration scheme over wavelength-coded network coder/decoders (codecs). We propose the reconfiguration scheme of composite signatures in which optical network codecs reconfigure their signature keys in a tractable way to enhance system confidentiality for coded wavelength-division multiplexing (WDM) transmissions. Based on conventional maximal-length sequence (M-sequence) codes over arrayed-waveguide-grating (AWG) codecs, composite signatures of relative prime-length M-sequence codes are structured to identify network node users. Network codecs change their signatures dynamically such that eavesdroppers cannot keep up with the speed of code changing, and thus unable to detect the channel waveform to descramble the code. Evaluated results show the effectiveness of the proposed approach via composite signatures reconfiguration against practical eavesdropping
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom