Chinese Optics Letters, 2021, 19 (1): 010601, Published Online: Dec. 7, 2020  

Physical layer data encryption using two-level constellation masking in 3D-CAP-PON Download: 798次

Author Affiliations
1 Nanjing University of Information Science and Technology, Nanjing 210044, China
2 Beijing University of Posts and Telecommunications, Beijing 100876, China
3 University of Wollongong, NSW 2522, Australia
Abstract
A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional (3D) carrier-less amplitude and phase modulation (CAP) passive optical network (PON) is proposed in this Letter. The chaotic sequence generated by Chua’s circuit model realizes two-level encryption of displacement masking and constellation rotation for 3D constellations. We successfully conduct an experiment demonstrating 8.7 Gb/s 3D-CAP-8 data transmission over 25 km standard single-mode fiber. With two-level constellation masking, a key space size of 2.1 × 1085 is achieved to bring about high security and good encryption performance, suggesting broad application prospects in future short-range secure communications.

1. Introduction

Recently, due to the rapid development of information technologies such as 4K video, cloud computing, and virtual reality (VR) and due to the merging of optical and wireless communications, bandwidth demand by the end users is continuously increasing[1]. As far as the current access network is concerned, the passive optical network (PON) has proved to be a future-oriented network architecture due to its provision of high bandwidth, with low cost and high-speed data transmission rate across the long haul networks[2,3]. Further, various researches are proposed for introducing new and advanced modulation formats that are deployed in the PON system. A time division multiplexing (TDM) and wavelength division multiplexing (WDM)/TDM long reach 10 Gb/s PON architecture of 100 km reach with no infield amplification or dispersion compensation was achieved[4]. A colorless scheme supporting 40 Gb/s downlink and uplink transmissions-based differential phase shift keying (DPSK) and on–off keying (OOK), respectively, was produced[5]. Similarly, a symmetrical 50 Gb/s TDM-PON system for the O-band based on 25G optics was investigated[6]. A 100 Gb/s space-division multiplexing PON (SDM-PON) system using commercial 10G class directly modulated laser (DML) that is modulated with 25/28 Gb/s data signals was presented[7]. In addition, a traffic estimation based on a long short-term memory neural network for PON was proposed to improve the performance of the system[8]. Although the PON expands the scope of access, it usually sends downlink data in the form of a broadcast. All optical network units (ONUs) connected to the optical line terminal (OLT) can receive downlink data frames. Therefore, an illegal ONU can be disguised as a legal ONU to hijack the downlink data signal sent by the OLT, so it is extremely important to encrypt the information before its transmission via downlink of the PON system[9,10]. Among various current physical layer encryption schemes, chaotic-based secure communication technology has broad prospects in the field of secure communication due to its high initial sensitivity, large bandwidth, and noise-like characteristics. Encrypted communication schemes with chaotic systems have been widely studied and proved to have superior confidentiality and anti-deciphering capabilities. Therefore, applying chaotic systems to encrypt the communication at the physical layer is considered a promising encryption scheme[1114" target="_self" style="display: inline;">14].

However, these chaotic encryption methods for the PON at the physical layer are based on the quadrature amplitude modulation (QAM) constellation to perform random position change, phase compensation, position exchange between different constellation points, and rotation of the constellation points for encryption. In fact, the high-dimensional constellation can further expand the Euclidean distance between the constellation points, which makes the position of the constellation points more flexible and the encryption method more diverse. It can also improve the system’s bit error rate (BER) performance.

Compared to QAM, carrier-less amplitude and phase modulation (CAP) uses two fixed filters whose impulse responses are Hilbert transform pairs[15]. Two channels of signals are filtered and then superimposed and transmitted so that CAP does not need to use expensive mixer. At the receiver, QAM utilizes coherent reception with a complex structure, while CAP only needs to pass the received signal to the filter matched with the curing filter at the transmitting end that can restore the original signal. In Ref. [16], a novel constellation-shaping CAP modulation scheme was proposed to alleviate the systematic nonlinearity in visible light communication (VLC) systems. A CAP-PON downstream with enhanced bandwidth efficiency was proposed that can be translated into savings in cost and power consumption[17]. In Ref. [18], a high-security CAP-PON based on floating probability disturbance was presented, which combined probabilistic shaping (PS) and chaotic sequences to improve the security and performance of the CAP-PON. Designing more dimensional CAP filters can achieve more ONU access, and the expansion method is also very simple. It can be achieved by adding a few filters at both the transmitting and receiving ends. This multi-dimensional CAP meets the low cost and low energy consumption required by PON for capacity expansion. A security-enhanced three-dimensional (3D)-CAP-PON based on two-stage spherical constellation masking was proposed that used chaotic sequence to encrypt the signal to improve the security of CAP-PON[19]. It can be seen that 3D and even higher-dimensional CAP-PON will become a new research hotspot.

In this paper, to the best of our knowledge, we propose for the first time a physical layer data encryption scheme using two-level constellation masking in 3D-CAP-PON. Chua’s circuit model is used to generate three sets of chaotic sequences, which are then applied to generate displacement and rotation vectors, respectively. The original constellation points are encrypted by these vectors. Through two-level encryption, the constellation points are distributed into a noise-like spherical structure, which effectively improves the security performance of 3D-CAP-PON. To further test the system performance, 25 km standard single-mode fiber (SSMF) data transmission employing the proposed encrypted 3D-CAP-8 signal is successfully demonstrated in the experiment.

2. Principle

The principle diagram of the proposed physical layer data encryption using two-level constellation masking in 3D-CAP-PON is shown in Fig. 1. The original data is transformed into three-way signals through serial-parallel (S/P) conversion, which are then mapped onto a 3D constellation diagram. The initial key is subjected to Chua’s chaotic mapping to generate chaotic sequences. According to these chaotic sequences, the constellation displacement and rotation masking vectors are generated, respectively. After two-level encryptions, the positions of the constellation have all been disrupted. 3D-CAP processes the three signals and merges them into a symbol for transmission. At the receiver, after 3D-CAP demodulation, the original key is employed to rotate and restore the position of the constellation point. Lastly, the original data is obtained by demapping and parallel-serial (P/S) conversion. The 3D constellation diagram we use is shown in Fig. 2(a). This diagram of the constellation is a structure of two concentric tetrahedrons. The inner four constellation points are distributed on a regular tetrahedron, and the other four constellation points are distributed on the outer regular tetrahedron. The minimum Euclidean distance between adjacent constellation points is two.

Fig. 1. Schematic diagram of physical layer data encryption using two-level constellation masking in 3D-CAP-PON.

下载图片 查看所有图片

Fig. 2. Constellation diagram (a) before masking, (b) after constellation displacement masking, (c) after two-level constellation masking, and (d) with all of the correct keys.

下载图片 查看所有图片

Specifically, we utilize Chua’s circuit model to encrypt constellation points, which can be expressed as[20]x1/t=α[y1x1f(x)],y1/t=x1y1+z1,z1/t=βy1,f(x)=bx1+0.5(ab)(|x1+1||x11|).

Among them, α, β, a, b are constants, whose values are 8.8, 15, 1.3, 0.5. x1,y1,z1, t are the variables. The initial value of (x1,y1,z1) is set to (0.2, 0.15, 0.25). The ranges of the generated chaotic sequences are x1(4,4),y1(1,1),z1(5,5), respectively. The phase diagram and bifurcation diagram of Chua’s circuit model are shown in Fig. 3. It can be found from Fig. 3(a) that Chua’s circuit model has a double scroll attractor and has complex chaotic characteristics. Figure 3(b) is a bifurcation diagram of Chua’s circuit model. As can be seen from the figure, the distribution of the x1 value varies greatly with different α. The generated sequence is very sensitive to the initial value, which is precisely required for secure communication. In our scheme, in order to further improve the randomness of chaotic sequences, we introduce a sampling factor L = 5, which means that the generated sequence would be sampled with a sampling factor of 5. The masking vector of displacement change can be expressed asS=mod[x2,floor(x20.5)].

Fig. 3. (a) Phase diagram and (b) bifurcation diagram of the Chua’s chaotic model.

下载图片 查看所有图片

Here, x2 is the new sequence after sampling. Assuming that the coordinates of the original 3D constellation point are (xm,ym,zm), then the coordinates of the constellation point after the displacement vector encryption can be expressed as{x=xm+Sy=ym+Sz=zm+S,where (x,y,z) is the constellation point coordinates after displacement masking. The encrypted constellation points are shown in Fig. 2(b). It can be found from the figure that the encrypted constellation presents eight bar structures. In our encryption process, the displacement vectors added in three dimensions are consistent, which causes the slopes of these eight lines to be the same.

As can be seen from Fig. 2(b), the distribution of the constellation points after the displacement transformation is regular, and it is easy to be eavesdropped on by the illegal receiver. It is necessary to perform secondary encryption on the constellation points. Therefore, we utilize the transformation relationship between the Euler angle and quaternion to realize the rotation encryption of constellation points. In 3D graphics, the most commonly used rotation representation methods are quaternion and Euler angle, which has the advantages of saving storage space and easy interpolation compared to the matrix. Chua’s circuit model is also used to generate chaotic sequences in the rotation masking and deal with the produced chaotic sequence. Assuming that the original chaotic sequence is (xc,yc,zc) in order to rotate the Euler angle of 0–360 deg, the chaotic sequence is amplified in equal proportions, and the remainder is generated to produce a rotation angle of 0–360: {xr=floor[mod(xc×103,360)]yr=floor[mod(yc×103,360)]zr=floor[mod(zc×103,360)],where (xr,yr,zr) represents the angle of Euler angle transformation. These generated rotation sequences are used to encrypt the constellation points after the displacement masking:quaternion=angle2quat(zr,yr,xr),(x,y,z)=quatrotate[quaternion,(x,y,z)].

Equation (5) turns the 3D Euler angle into a quaternion, and Eq. (6) rotates the constellation point after the displacement masking, where (x,y,z) is the coordinates of the constellation point after the masking of displacement, and (x,y,z) is the coordinates of the constellation point after two-level encryptions. The encrypted constellation is shown in Fig. 2(c). After two-level encryptions, the 3D constellation has been completely disrupted, and its distribution is similar to noise so that illegal receivers cannot correctly eavesdrop and steal the transmitted information, which greatly improves the security of the system and transmission performance of the system. If you have all of the keys, you can accurately restore the constellation diagram, as shown in Fig. 2(d).

3. Experimental Setup and Results

The experimental setup of the proposed physical layer data encryption using two-level constellation masking 3D-CAP-8 is demonstrated in Fig. 4. At the transmitter side, the original data is mapped onto 3D constellation points. Then, the Chua’s model is utilized to generate masking vectors to change the position and rotation of constellation points. The masked symbol will be up-sampled with a factor of 7. Three orthogonal filters of CAP process the corresponding parts of the signal, respectively, and add the output of three orthogonal filters as a 3D-CAP-8 signal. The encrypted signals are loaded to an arbitrary waveform generator (AWG, TekAWG70002A) to produce the corresponding electrical waveform, which is amplified by an electric amplifier (EA). Onward, a Mach–Zehnder modulator (MZM) is utilized for riding over the encrypted information signal over the carrier, where a continuous wave (CW) laser source emits a light beam with a wavelength of 1550 nm. The modulated 3D-CAP-8 signal is transmitted with a 25 km SSMF. At the receiver side, a variable optical attenuator (VOA) is used for testing the BER behavior at different optical receiving powers. The signal is then detected by a photodetector (PD), and a mixed signal oscilloscope (MSO, TekMSO73304DX) is applied to record the data. The digital signal processing (DSP) unit at the receiver side performs the reverse process done at the transmitter side, including matched filters, down-sampling, constellation demasking, demapping, and, lastly, to restore the original data.

Fig. 4. Experimental setup (CW, continuous wave laser; MZM, Mach–Zehnder modulator; EA, electric amplifier; AWG, arbitrary waveform generator; SSMF, standard single-mode fiber; VOA, variable optical attenuator; PD, photodetector; MSO, mixed signal oscilloscope).

下载图片 查看所有图片

Figure 5 depicts the BER curve of the legal ONU and illegal reception before and after the transmission of 25 km. The legal ONU has the correct key including the control parameters, initial values, and step size of the chaotic model, while the illegal ONU does not know the key. For the encrypted 3D-CAP-8 signal, compared to back-to-back (b2b) configuration, the power penalty after 25 km SSMF transmission is about 0.45 dB at a BER of 1×103. At the same time, as the received optical power increases, the BER of the legal ONU gradually decreases, and the BER of the illegal ONU has been maintained at about 0.5. Obviously, the illegal ONU cannot obtain any information like the legal ONU without having the information about the correct key. Figure 5 also inserts the reception constellation diagrams of the legal ONU and the illegal ONU when the received optical power is −11 dBm. The legal ONU obtains a clear 3D constellation diagram, and the constellation diagram obtained by the illegal ONU is meaningless, dense, and disorderly in a spherical shape.

Fig. 5. BER curves of illegal receiver, 3D-CAP-8 for back-to-back (b2b) and 25 km transmission.

下载图片 查看所有图片

In order to further explore the encryption security level of the proposed scheme, we have explored the sensitivity of the initial value. The experiment tests the BER curve when the received optical power is set to 10dBm after a small initial value change, after 25 km SSMF transmission. The initial values (x0,y0,z0) of Chua’s circuit model are set to (0.2, 0.15, 0.25), respectively. For the three initial values, we test their impact on the BER curve under different small changes. It can be seen from Fig. 6 that when the initial value changes to 1017, there is no obvious change in the BER compared to the original correct parameter value. However, once the initial value changes to 1016, the BER of the system has been dramatically increased, and the value of the BER is close to 0.48. When the change of the initial value is 1015 or larger, the system’s BER has no significant change. This shows that our encryption method is very sensitive to the initial value. Therefore, for our system, a total of seven key parameters (α,β,a,b,x0,y0,z0) can at least achieve a key space of 231×231×231×231×1016×1016×1016=2.1×1085, which can effectively resist illegal attacks.

Fig. 6. BER measurements with a tiny change in initial value.

下载图片 查看所有图片

To investigate the performance of an illegal receiver with different keys, we did further experiments without key of displacement and without key of rotation. The measured BER curves are illustrated in Fig. 7. When all of the security keys are wrong, the BER of the illegal receiver is around 0.5. The received constellation is shown in Fig. 7, which is completely non-understandable. When the keys of displacement are obtained, the BER would be around 0.46. The constellation diagram is similar to the illegal receiver, which is also like the spherical structure.

Fig. 7. Measured BER curves at the illegal receiver with different keys.

下载图片 查看所有图片

However, compared with the illegal receiver, this constellation has a larger range of constellation distribution due to the displacement masking. When keys of rotation are known by the illegal receiver, the BER would be about 0.31. The constellation diagram is also shown in Fig. 7. Because of the rotating masking key, the entire constellation diagram is equivalent to only the displacement masking, and the constellation diagram is consistent with Fig. 2(b). With only the displacement masking, the constellation distribution is regular, and its BER is relatively low, which is the reason for second-level encryption. After two-level encryption, the constellation has a spherical distribution similar to noise whose key space reaches 2.1×1085, which can ensure high security in short-distance communication.

4. Conclusion

We have proposed a physical layer data encryption using two-level constellation masking in 3D-CAP-PON. Chua’s model is applied to generate chaotic sequences to produce the masking vector of two-level encryption. The use of 3D constellation points for encryption can increase the minimum Euclidean distance, thereby obtaining a larger constellation space and a more flexible and variable encryption scheme. With two encryption methods to encrypt the constellation twice, the 3D constellation points turn into a noise-like spherical structure, which can effectively improve the security of the system. The encryption scheme we propose has a key space of 2.1×1085, which can effectively resist attacks from illegal receiving ends. An experimental demonstration of encrypted 3D-CAP-8 signal transmission over 25 km SSMF is successfully conducted. The experimental results show that the proposed encryption system has very strong anti-attack performance and has good application prospects in future 3D-CAP-PON.

References

[1] Y. J. Guo, O. Alkhazragi, C. H. Kang, C. Shen, Y. Mao, X. B. Sun, T. K. Ng, B. S. Ooi. A tutorial on laser-based lighting and visible light communications: device and technology. Chin. Opt. Lett., 2019, 17: 040601.

[2] OharaK.TagamiA.TanakaH.SuzukiM.MiyaokaT.KodateT.AokiT.TanakaK.UchinaoH.ArugaS.OhnishiH.AkitaH.TaniguchiY.AraiK., “Traffic analysis of Ethernet-PON in FTTH trial service,” in Optical Fiber Communications Conference (2003), paper ThAA2.

[3] Y. Luo, X. Zhou, F. Effenberger, X. Yan, G. Peng, Y. Qian, Y. Ma. Time- and wavelength-division multiplexed passive optical network (TWDM-PON) for next-generation PON stage 2 (NG-PON2). J. Lightwave Technol., 2013, 31: 587.

[4] J. D. Downie, A. Boh Ruffin, J. Hurley. Ultra-low-loss optical fiber enabling purely passive 10 Gb/s PON systems with 100 km length. Opt. Express, 2009, 17: 2392.

[5] C. W. Chow, C. H. Yeh. 40-Gb/s downstream DPSK and 40-Gb/s upstream OOK signal remodulation PON using reduced modulation index. Opt. Express, 2010, 18: 26046.

[6] C. C. Li, J. Chen, Z. X. Li, Y. X. Song, Y. C. Li, Q. W. Zhang. Demonstration of symmetrical 50-Gb/s TDM-PON in O-band supporting over 33-dB link budget with OLT-side amplification. Opt. Express, 2019, 27: 18343.

[7] F. D. Bao, Y. H. Ding, M. Nooruzzaman, Y. Amma, Y. Sasaki, L. K. Oxenløwe, H. Hu, T. Morioka. DSP-free single-wavelength 100 Gbps SDM-PON with increased splitting ratio using 10G-class DML. Opt. Express., 2019, 27: 33915.

[8] M. Zhang, B. Xu, X. Y. Li, Y. Cai, B. J. Wu, K. Qiu. Traffic estimation based on long short-term memory neural network for mobile front-haul with XG-PON. Chin. Opt. Lett., 2019, 17: 070603.

[9] B. B. Wu, E. E. Narimanov. A method for secure communications over a public fiber-optical network. Opt. Express, 2006, 14: 3738.

[10] L. J. Zhang, X. J. Xin, B. Liu, J. J. Yu. Physical-enhanced secure strategy in an OFDM-PON. Opt. Express., 2012, 20: 2255.

[11] A. Sultan, X. Yang, A. A. Hajomer, W. Hu. Chaotic constellation mapping for physical-layer data encryption in OFDM-PON. IEEE Photon. Technol. Lett, 2018, 30: 339.

[12] A. Sultan, X. Yang, A. A. E. Hajomer, S. B. Hussain, W. Hu. Dynamic QAM mapping for physical-layer security using digital chaos. IEEE Access, 2018, 6: 47199.

[13] C. F. Zhang, W. Zhang, C. Chen, X. J. He, K. Qiu. Physical-enhanced secure strategy for OFDMA-PON using chaos and deoxyribonucleic acid encoding. J. Lightwave Technol., 2018, 36: 1706.

[14] L. J. Zhang, B. Liu, X. J. Xin, D. M. Liu. A novel 3D constellation-masked method for physical security in hierarchical OFDMA system. Opt. Express, 2013, 21: 15627.

[15] T. K. Zhong, X. Zhou, J. Huo, C. Yu, C. Lu, A. P. T. Lau. Digital signal processing for short-reach optical communications: a review of current technologies and future trends. J. Lightwave Technol., 2018, 36: 377.

[16] Z. X. Wang, M. J. Zhang, S. Y. Chen, N. Chi. Carrier-less amplitude and phase modulated visible light communication system based on a constellation-shaping scheme. Chin. Opt. Lett., 2017, 15: 030602.

[17] Z. Dong, J. Yu, J. Lu. Bandwidth-efficient WDM-CAP-PON using digital Hilbert single-sideband modulation. IEEE Photon. J., 2015, 7: 7903907.

[18] J. Y. Zhao, B. Liu, Y. Y. Mao, J. X. Ren, X. Xu, X. Y. Wu, L. Jiang, S. Han, J. Y. Zhang. High-security physical layer in CAP-PON system based on floating probability disturbance. IEEE Photon. Technol. Lett, 2020, 32: 367.

[19] J. X. Ren, B. Liu, X. Y. Wu, X. Xu, Y. Y. Mao, Y. F. Wu, X. M. Song, L. Jiang, J. Y. Zhang, Y. Zhang, X. J. Xin. Security-enhanced 3D-CAP-PON based on two-stage spherical constellation masking. IEEE Access, 2020, 8: 111966.

[20] M. J. Ogorzalek, Z. Galias, A. M. Dabrowski, W. R. Dabrowski. Chaotic waves and spatio-temporal patterns in large arrays of doubly-coupled Chua's circuits. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., 1995, 42: 706.

Shuaidong Chen, Bo Liu, Yaya Mao, Jianxin Ren, Xiumin Song, Rahat Ullah, Delin Zhao, Lei Jiang, Shun Han, Jianye Zhao, Jiajia Shen, Xueyang Liu. Physical layer data encryption using two-level constellation masking in 3D-CAP-PON[J]. Chinese Optics Letters, 2021, 19(1): 010601.

引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!