Loading…
Security mesh-based optical network exploiting the double masking scheme
In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous v...
Saved in:
Published in: | Optics express 2022-11, Vol.30 (24), p.43826-43841 |
---|---|
Main Authors: | , , , , , , , , |
Format: | Article |
Language: | English |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3 |
container_end_page | 43841 |
container_issue | 24 |
container_start_page | 43826 |
container_title | Optics express |
container_volume | 30 |
creator | Feng, Manying Xie, Yiyuan Dai, Li Liu, Bocheng Jiang, Xiao Chai, Junxiong Tang, Qianfeng Yang, Rong Yuan, Haodong |
description | In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks. |
doi_str_mv | 10.1364/OE.471213 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2755576666</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2755576666</sourcerecordid><originalsourceid>FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</originalsourceid><addsrcrecordid>eNpNkLtOw0AQRVcIREKg4AeQSygc9uldlygKBClSCqC29jEmJnbWeNeC_D2OEhDTzNzR0S0OQtcETwnL-P1qPuWSUMJO0JjgnKccK3n67x6hixA-MCZc5vIcjVgmKMOSjdHiBWzfVXGXNBDWqdEBXOLbWFldJ1uIX77bJPDd1r6K1fY9iWtInO9NDUmjw2b_CnYNDVyis1LXAa6Oe4LeHuevs0W6XD09zx6WqaUKxzQzMldWaQEKG-OAl9iZIWGeZ6W23ApFudFcU1CWG-6cEMxkuWN56RTVbIJuD71t5z97CLFoqmChrvUWfB8KKoUQMhtmQO8OqO18CB2URdtVje52BcHFXlyxmhcHcQN7c6ztTQPuj_w1xX4Axr5pPA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2755576666</pqid></control><display><type>article</type><title>Security mesh-based optical network exploiting the double masking scheme</title><source>EZB Electronic Journals Library</source><creator>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</creator><creatorcontrib>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</creatorcontrib><description>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</description><identifier>ISSN: 1094-4087</identifier><identifier>EISSN: 1094-4087</identifier><identifier>DOI: 10.1364/OE.471213</identifier><identifier>PMID: 36523073</identifier><language>eng</language><publisher>United States</publisher><ispartof>Optics express, 2022-11, Vol.30 (24), p.43826-43841</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/36523073$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Feng, Manying</creatorcontrib><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Dai, Li</creatorcontrib><creatorcontrib>Liu, Bocheng</creatorcontrib><creatorcontrib>Jiang, Xiao</creatorcontrib><creatorcontrib>Chai, Junxiong</creatorcontrib><creatorcontrib>Tang, Qianfeng</creatorcontrib><creatorcontrib>Yang, Rong</creatorcontrib><creatorcontrib>Yuan, Haodong</creatorcontrib><title>Security mesh-based optical network exploiting the double masking scheme</title><title>Optics express</title><addtitle>Opt Express</addtitle><description>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</description><issn>1094-4087</issn><issn>1094-4087</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNkLtOw0AQRVcIREKg4AeQSygc9uldlygKBClSCqC29jEmJnbWeNeC_D2OEhDTzNzR0S0OQtcETwnL-P1qPuWSUMJO0JjgnKccK3n67x6hixA-MCZc5vIcjVgmKMOSjdHiBWzfVXGXNBDWqdEBXOLbWFldJ1uIX77bJPDd1r6K1fY9iWtInO9NDUmjw2b_CnYNDVyis1LXAa6Oe4LeHuevs0W6XD09zx6WqaUKxzQzMldWaQEKG-OAl9iZIWGeZ6W23ApFudFcU1CWG-6cEMxkuWN56RTVbIJuD71t5z97CLFoqmChrvUWfB8KKoUQMhtmQO8OqO18CB2URdtVje52BcHFXlyxmhcHcQN7c6ztTQPuj_w1xX4Axr5pPA</recordid><startdate>20221121</startdate><enddate>20221121</enddate><creator>Feng, Manying</creator><creator>Xie, Yiyuan</creator><creator>Dai, Li</creator><creator>Liu, Bocheng</creator><creator>Jiang, Xiao</creator><creator>Chai, Junxiong</creator><creator>Tang, Qianfeng</creator><creator>Yang, Rong</creator><creator>Yuan, Haodong</creator><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20221121</creationdate><title>Security mesh-based optical network exploiting the double masking scheme</title><author>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feng, Manying</creatorcontrib><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Dai, Li</creatorcontrib><creatorcontrib>Liu, Bocheng</creatorcontrib><creatorcontrib>Jiang, Xiao</creatorcontrib><creatorcontrib>Chai, Junxiong</creatorcontrib><creatorcontrib>Tang, Qianfeng</creatorcontrib><creatorcontrib>Yang, Rong</creatorcontrib><creatorcontrib>Yuan, Haodong</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics express</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feng, Manying</au><au>Xie, Yiyuan</au><au>Dai, Li</au><au>Liu, Bocheng</au><au>Jiang, Xiao</au><au>Chai, Junxiong</au><au>Tang, Qianfeng</au><au>Yang, Rong</au><au>Yuan, Haodong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security mesh-based optical network exploiting the double masking scheme</atitle><jtitle>Optics express</jtitle><addtitle>Opt Express</addtitle><date>2022-11-21</date><risdate>2022</risdate><volume>30</volume><issue>24</issue><spage>43826</spage><epage>43841</epage><pages>43826-43841</pages><issn>1094-4087</issn><eissn>1094-4087</eissn><abstract>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</abstract><cop>United States</cop><pmid>36523073</pmid><doi>10.1364/OE.471213</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1094-4087 |
ispartof | Optics express, 2022-11, Vol.30 (24), p.43826-43841 |
issn | 1094-4087 1094-4087 |
language | eng |
recordid | cdi_proquest_miscellaneous_2755576666 |
source | EZB Electronic Journals Library |
title | Security mesh-based optical network exploiting the double masking scheme |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T16%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20mesh-based%20optical%20network%20exploiting%20the%20double%20masking%20scheme&rft.jtitle=Optics%20express&rft.au=Feng,%20Manying&rft.date=2022-11-21&rft.volume=30&rft.issue=24&rft.spage=43826&rft.epage=43841&rft.pages=43826-43841&rft.issn=1094-4087&rft.eissn=1094-4087&rft_id=info:doi/10.1364/OE.471213&rft_dat=%3Cproquest_cross%3E2755576666%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2755576666&rft_id=info:pmid/36523073&rfr_iscdi=true |