z-logo
open-access-imgOpen Access
Security weaknesses of underwater wireless optical communication
Author(s) -
Meiwei Kong,
Jiongliang Wang,
Yifei Chen,
Tariq Ali,
Rohail Sarwar,
Yang Qiu,
Shilian Wang,
Jun Han,
Jing Xu
Publication year - 2017
Publication title -
optics express
Language(s) - Uncategorized
Resource type - Journals
SCImago Journal Rank - 1.394
H-Index - 271
ISSN - 1094-4087
DOI - 10.1364/oe.25.021509
Subject(s) - eavesdropping , computer science , underwater , information leakage , transmission (telecommunications) , bit error rate , optics , demodulation , signal (programming language) , orthogonal frequency division multiplexing , electronic engineering , telecommunications , channel (broadcasting) , physics , computer security , engineering , oceanography , programming language , geology
In this work, for the first time, we uncover that the level of security we have traditionally taken for granted on underwater wireless optical communication (UWOC) may not always be there. We first numerically investigate the security weaknesses of UWOC via Monte Carlo simulation. With the link distance increasing or the water becoming more turbid, the simulation results indicate that the possibility of information leakage increases, which may pose a great threat to the security of UWOC. By using a high-sensitivity multi-pixel photon counter (MPPC) placed aside the water tank, a 5-MHz square wave signal is successfully tapped at 1-m, 3-m, and 5-m underwater transmission distances, which preliminarily verifies the probability of information leakage. We further experimentally demonstrate an UWOC system with potential eavesdropping employing a 2.5-Gb/s orthogonal frequency division multiplexing (OFDM) signal. After transmitting through a 15-m underwater channel, the OFDM signal is eavesdropped by a mirror at 7.8 m. Both the normal receiver at 15 m and the eavesdropping receiver at 7.8 m can achieve a bit error rate (BER) below the forward error correction (FEC) limit of 3.8 × 10 -3 , which validates that UWOC indeed suffers potential safety hazard.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here