Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks

Jen Fa Huang, Kai Sheng Chen, Ting Ju Su

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)

Abstract

In order to enhance data transmission security within internet network, this paper consider a signature reconfiguration scheme over wavelength-coded network coder/decoders (codecs). We propose the reconfiguration scheme of composite signatures in which optical network codecs reconfigure their signature keys in a tractable way to enhance system confidentiality for coded wavelength-division multiplexing (WDM) transmissions. Based on conventional maximal-length sequence (M-sequence) codes over arrayed-waveguide-grating (AWG) codecs, composite signatures of relative prime-length M-sequence codes are structured to identify network node users. Network codecs change their signatures dynamically such that eavesdroppers cannot keep up with the speed of code changing, and thus unable to detect the channel waveform to descramble the code. Evaluated results show the effectiveness of the proposed approach via composite signatures reconfiguration against practical eavesdropping.

Original languageEnglish
Pages (from-to)240-247
Number of pages8
JournalProcedia Computer Science
Volume94
DOIs
Publication statusPublished - 2016
Event11th International Conference on Future Networks and Communications, FNC 2016 / 13th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2016 - Montreal, Canada
Duration: 2016 Aug 152016 Aug 18

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks'. Together they form a unique fingerprint.

Cite this