Mapping-varied modulation with labeling optimization for secure transmission in mode-division-multiplexed fiber-optic systems

IF 4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Yi Lei;Qi Lu;Bin Chen;Zhongyi Guo
{"title":"Mapping-varied modulation with labeling optimization for secure transmission in mode-division-multiplexed fiber-optic systems","authors":"Yi Lei;Qi Lu;Bin Chen;Zhongyi Guo","doi":"10.1364/JOCN.512467","DOIUrl":null,"url":null,"abstract":"To improve the physical-layer security of mode-division multiplexing (MDM) systems, a simple security scheme named mapping-varied modulation (MVM) is proposed in this paper by combining cryptographic and information-theoretic security. Specifically, on top of the information-theoretic security provided by the less-conditioned wiretap channel due to the larger mode-dependent loss induced by fiber-bend tapping, the proposed MVM security method varies the mapping rules of the adopted constellations for the subchannels (one subchannel corresponds to one mode) by using the inherently time-varying random channel state information (CSI) of the MDM fiber, under the assumption that an eavesdropper does not know the exact instantaneous CSI of the legitimate link. To maximize the difference among the binary labels of the constellation points in the same position for each subchannel, a labeling optimization method is proposed as well. Numerical results demonstrate the effectiveness of the proposed MVM method via bit-error ratio performance and secrecy rate, showing a potential way to improve the security of the MDM link for high-speed data transmission.","PeriodicalId":50103,"journal":{"name":"Journal of Optical Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.0000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Optical Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10485229/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

To improve the physical-layer security of mode-division multiplexing (MDM) systems, a simple security scheme named mapping-varied modulation (MVM) is proposed in this paper by combining cryptographic and information-theoretic security. Specifically, on top of the information-theoretic security provided by the less-conditioned wiretap channel due to the larger mode-dependent loss induced by fiber-bend tapping, the proposed MVM security method varies the mapping rules of the adopted constellations for the subchannels (one subchannel corresponds to one mode) by using the inherently time-varying random channel state information (CSI) of the MDM fiber, under the assumption that an eavesdropper does not know the exact instantaneous CSI of the legitimate link. To maximize the difference among the binary labels of the constellation points in the same position for each subchannel, a labeling optimization method is proposed as well. Numerical results demonstrate the effectiveness of the proposed MVM method via bit-error ratio performance and secrecy rate, showing a potential way to improve the security of the MDM link for high-speed data transmission.
在模式分割多路复用光纤系统中利用标签优化实现安全传输的映射变化调制技术
为了提高模分复用(MDM)系统物理层的安全性,本文提出了一种名为 "映射变化调制(MVM)"的简单安全方案,将密码安全和信息论安全相结合。具体来说,由于光纤弯曲窃听会导致较大的模式相关损耗,因此窃听信道的条件较差,在此基础上,在窃听者不知道合法链路的准确瞬时 CSI 的假设下,本文提出的 MVM 安全方法利用 MDM 光纤固有的时变随机信道状态信息(CSI),改变子信道(一个子信道对应一种模式)所采用的星座的映射规则。为了最大化每个子信道相同位置星座点的二进制标签之间的差异,还提出了一种标签优化方法。数值结果通过误码率性能和保密率证明了所提出的 MVM 方法的有效性,为提高高速数据传输 MDM 链路的安全性提供了一种潜在的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
9.40
自引率
16.00%
发文量
104
审稿时长
4 months
期刊介绍: The scope of the Journal includes advances in the state-of-the-art of optical networking science, technology, and engineering. Both theoretical contributions (including new techniques, concepts, analyses, and economic studies) and practical contributions (including optical networking experiments, prototypes, and new applications) are encouraged. Subareas of interest include the architecture and design of optical networks, optical network survivability and security, software-defined optical networking, elastic optical networks, data and control plane advances, network management related innovation, and optical access networks. Enabling technologies and their applications are suitable topics only if the results are shown to directly impact optical networking beyond simple point-to-point networks.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信