Loading…

Security mesh-based optical network exploiting the double masking scheme

In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous v...

Full description

Saved in:
Bibliographic Details
Published in:Optics express 2022-11, Vol.30 (24), p.43826-43841
Main Authors: Feng, Manying, Xie, Yiyuan, Dai, Li, Liu, Bocheng, Jiang, Xiao, Chai, Junxiong, Tang, Qianfeng, Yang, Rong, Yuan, Haodong
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3
container_end_page 43841
container_issue 24
container_start_page 43826
container_title Optics express
container_volume 30
creator Feng, Manying
Xie, Yiyuan
Dai, Li
Liu, Bocheng
Jiang, Xiao
Chai, Junxiong
Tang, Qianfeng
Yang, Rong
Yuan, Haodong
description In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.
doi_str_mv 10.1364/OE.471213
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2755576666</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2755576666</sourcerecordid><originalsourceid>FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</originalsourceid><addsrcrecordid>eNpNkLtOw0AQRVcIREKg4AeQSygc9uldlygKBClSCqC29jEmJnbWeNeC_D2OEhDTzNzR0S0OQtcETwnL-P1qPuWSUMJO0JjgnKccK3n67x6hixA-MCZc5vIcjVgmKMOSjdHiBWzfVXGXNBDWqdEBXOLbWFldJ1uIX77bJPDd1r6K1fY9iWtInO9NDUmjw2b_CnYNDVyis1LXAa6Oe4LeHuevs0W6XD09zx6WqaUKxzQzMldWaQEKG-OAl9iZIWGeZ6W23ApFudFcU1CWG-6cEMxkuWN56RTVbIJuD71t5z97CLFoqmChrvUWfB8KKoUQMhtmQO8OqO18CB2URdtVje52BcHFXlyxmhcHcQN7c6ztTQPuj_w1xX4Axr5pPA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2755576666</pqid></control><display><type>article</type><title>Security mesh-based optical network exploiting the double masking scheme</title><source>EZB Electronic Journals Library</source><creator>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</creator><creatorcontrib>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</creatorcontrib><description>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</description><identifier>ISSN: 1094-4087</identifier><identifier>EISSN: 1094-4087</identifier><identifier>DOI: 10.1364/OE.471213</identifier><identifier>PMID: 36523073</identifier><language>eng</language><publisher>United States</publisher><ispartof>Optics express, 2022-11, Vol.30 (24), p.43826-43841</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/36523073$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Feng, Manying</creatorcontrib><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Dai, Li</creatorcontrib><creatorcontrib>Liu, Bocheng</creatorcontrib><creatorcontrib>Jiang, Xiao</creatorcontrib><creatorcontrib>Chai, Junxiong</creatorcontrib><creatorcontrib>Tang, Qianfeng</creatorcontrib><creatorcontrib>Yang, Rong</creatorcontrib><creatorcontrib>Yuan, Haodong</creatorcontrib><title>Security mesh-based optical network exploiting the double masking scheme</title><title>Optics express</title><addtitle>Opt Express</addtitle><description>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</description><issn>1094-4087</issn><issn>1094-4087</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNkLtOw0AQRVcIREKg4AeQSygc9uldlygKBClSCqC29jEmJnbWeNeC_D2OEhDTzNzR0S0OQtcETwnL-P1qPuWSUMJO0JjgnKccK3n67x6hixA-MCZc5vIcjVgmKMOSjdHiBWzfVXGXNBDWqdEBXOLbWFldJ1uIX77bJPDd1r6K1fY9iWtInO9NDUmjw2b_CnYNDVyis1LXAa6Oe4LeHuevs0W6XD09zx6WqaUKxzQzMldWaQEKG-OAl9iZIWGeZ6W23ApFudFcU1CWG-6cEMxkuWN56RTVbIJuD71t5z97CLFoqmChrvUWfB8KKoUQMhtmQO8OqO18CB2URdtVje52BcHFXlyxmhcHcQN7c6ztTQPuj_w1xX4Axr5pPA</recordid><startdate>20221121</startdate><enddate>20221121</enddate><creator>Feng, Manying</creator><creator>Xie, Yiyuan</creator><creator>Dai, Li</creator><creator>Liu, Bocheng</creator><creator>Jiang, Xiao</creator><creator>Chai, Junxiong</creator><creator>Tang, Qianfeng</creator><creator>Yang, Rong</creator><creator>Yuan, Haodong</creator><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20221121</creationdate><title>Security mesh-based optical network exploiting the double masking scheme</title><author>Feng, Manying ; Xie, Yiyuan ; Dai, Li ; Liu, Bocheng ; Jiang, Xiao ; Chai, Junxiong ; Tang, Qianfeng ; Yang, Rong ; Yuan, Haodong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feng, Manying</creatorcontrib><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Dai, Li</creatorcontrib><creatorcontrib>Liu, Bocheng</creatorcontrib><creatorcontrib>Jiang, Xiao</creatorcontrib><creatorcontrib>Chai, Junxiong</creatorcontrib><creatorcontrib>Tang, Qianfeng</creatorcontrib><creatorcontrib>Yang, Rong</creatorcontrib><creatorcontrib>Yuan, Haodong</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics express</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feng, Manying</au><au>Xie, Yiyuan</au><au>Dai, Li</au><au>Liu, Bocheng</au><au>Jiang, Xiao</au><au>Chai, Junxiong</au><au>Tang, Qianfeng</au><au>Yang, Rong</au><au>Yuan, Haodong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security mesh-based optical network exploiting the double masking scheme</atitle><jtitle>Optics express</jtitle><addtitle>Opt Express</addtitle><date>2022-11-21</date><risdate>2022</risdate><volume>30</volume><issue>24</issue><spage>43826</spage><epage>43841</epage><pages>43826-43841</pages><issn>1094-4087</issn><eissn>1094-4087</eissn><abstract>In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption. Each network node can output its individual chaotic signals separately with different time delay markers. By regulating different internal parameter mismatches, the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient. Simulation results show that the chaos synchronization between transceivers enjoys fantastic robustness to mismatched parameters. Meanwhile, the tolerance of the DM scheme to the inherent parameter mismatch is excellent, so it is suitable for constructing secure networks in optical networks. Besides, based on the high quality synchronization with a correlation coefficient of 0.983, the communication performances of the longest path channel are investigated for a given metropolitan area network scale. Two pieces of 10 Gb/s messages can be effectively concealed in the chaos and decoded gratifyingly behind 100 km transmission, and the system has reliable security to resist illegal attacks. Finally, the network performance simulation is conducted for diverse configurations of the mesh-based optical networks. All the results confirmed the chaotic encryption scheme provides a novel way for any two legitimate nodes to establish security keys in optical networks.</abstract><cop>United States</cop><pmid>36523073</pmid><doi>10.1364/OE.471213</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1094-4087
ispartof Optics express, 2022-11, Vol.30 (24), p.43826-43841
issn 1094-4087
1094-4087
language eng
recordid cdi_proquest_miscellaneous_2755576666
source EZB Electronic Journals Library
title Security mesh-based optical network exploiting the double masking scheme
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T16%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20mesh-based%20optical%20network%20exploiting%20the%20double%20masking%20scheme&rft.jtitle=Optics%20express&rft.au=Feng,%20Manying&rft.date=2022-11-21&rft.volume=30&rft.issue=24&rft.spage=43826&rft.epage=43841&rft.pages=43826-43841&rft.issn=1094-4087&rft.eissn=1094-4087&rft_id=info:doi/10.1364/OE.471213&rft_dat=%3Cproquest_cross%3E2755576666%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c280t-6b798c8a5e80bbde4f0dba5e0496fac4c5824ba4a2e8c4b4dd553b69d39fd82a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2755576666&rft_id=info:pmid/36523073&rfr_iscdi=true