z-logo
open-access-imgOpen Access
Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks
Author(s) -
Jen-Fa Huang,
Kai-Sheng Chen,
Ting-Ju Su
Publication year - 2016
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2016.08.037
Subject(s) - computer science , control reconfiguration , computer network , eavesdropping , signature (topology) , embedded system , geometry , mathematics
In order to enhance data transmission security within internet network, this paper consider a signature reconfiguration scheme over wavelength-coded network coder/decoders (codecs). We propose the reconfiguration scheme of composite signatures in which optical network codecs reconfigure their signature keys in a tractable way to enhance system confidentiality for coded wavelength-division multiplexing (WDM) transmissions. Based on conventional maximal-length sequence (M-sequence) codes over arrayed-waveguide-grating (AWG) codecs, composite signatures of relative prime-length M-sequence codes are structured to identify network node users. Network codecs change their signatures dynamically such that eavesdroppers cannot keep up with the speed of code changing, and thus unable to detect the channel waveform to descramble the code. Evaluated results show the effectiveness of the proposed approach via composite signatures reconfiguration against practical eavesdropping

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom