Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption

IF 4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Yun Wang;Qi Zhang;Xiangjun Xin;Meng Sun;Ran Gao;Haipeng Yao;Feng Tian;Qinghua Tian;Yongjun Wang;Fu Wang;Sitong Zhou;Zuolin Li;Zhipei Li
{"title":"Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption","authors":"Yun Wang;Qi Zhang;Xiangjun Xin;Meng Sun;Ran Gao;Haipeng Yao;Feng Tian;Qinghua Tian;Yongjun Wang;Fu Wang;Sitong Zhou;Zuolin Li;Zhipei Li","doi":"10.1364/JOCN.525848","DOIUrl":null,"url":null,"abstract":"The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision \n<tex>$f$</tex>\n, the length \n<tex>$l$</tex>\n of the transmitted bit, and the size \n<tex>$T$</tex>\n of the TP, with the value of \n<tex>${2^{2f + l + T \\times T}}$</tex>\n. The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.","PeriodicalId":50103,"journal":{"name":"Journal of Optical Communications and Networking","volume":"16 12","pages":"1204-1217"},"PeriodicalIF":4.0000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Optical Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10753339/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision $f$ , the length $l$ of the transmitted bit, and the size $T$ of the TP, with the value of ${2^{2f + l + T \times T}}$ . The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.
利用二维蜂窝自动机和图灵模式级联扰码辅助定点扩展逻辑混沌加密增强 NOMA-PON 的安全性
非正交多址无源光网络(NOMA-PON)面临着主用户干扰和未经授权的第三方用户窃听的双重安全威胁,因此高效的数据安全增强技术至关重要。为了解决这些问题,我们提出了一种定点扩展(FE)-逻辑混沌映射来降低计算复杂度,同时采用二维(2D)蜂窝自动机(CA)和图灵模式(TP)级联扰码(CA-TPCS)加密算法来进一步提高 NOMA-PON 系统的灵敏度。CA-TPCS 由 2D-CA 动态位加密和图灵符号置换(TSS)组成。通过使用 FE 混沌构建 2D-CA 和采用索引排序提取 TSS 矩阵,实现了比特的动态扩散和 2D 符号矩阵的加扰。为确保密钥的私密性,我们采用了双密钥机制,并引入上行数据作为私钥。为了验证所提方法的可行性,我们在通过 25 千米标准单模光纤(SSMF)传输的 17.6 Gb/s 功率分复用-正交频分复用(PDM-OFDM)NOMA-PON 系统上进行了仿真验证。结果表明,拟议方案对最佳功率分配率(PAR)值没有影响,其值均为 3。同时,加密后高功率和低功率用户的接收器灵敏度分别提高了 0.2 和 0.3 dB。密文具有良好的扩散性和统计性,密钥空间由FE精度$f$、传输比特长度$l$和TP大小$T$灵活控制,其值为{2^{2f + l + T \times T}}$。结果表明,所提出的方案不仅与 PDM 技术有很好的兼容性,而且可以实现内部攻击和外部攻击的双重防御。该方案在未来的 NOMA-PON 中具有良好的应用前景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
9.40
自引率
16.00%
发文量
104
审稿时长
4 months
期刊介绍: The scope of the Journal includes advances in the state-of-the-art of optical networking science, technology, and engineering. Both theoretical contributions (including new techniques, concepts, analyses, and economic studies) and practical contributions (including optical networking experiments, prototypes, and new applications) are encouraged. Subareas of interest include the architecture and design of optical networks, optical network survivability and security, software-defined optical networking, elastic optical networks, data and control plane advances, network management related innovation, and optical access networks. Enabling technologies and their applications are suitable topics only if the results are shown to directly impact optical networking beyond simple point-to-point networks.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信