Reconfiguring computer-generated holographic coding patterns to enhance optical access network security

Jen-Fa Huan, Chun Chieh Liu, Chao Chin Yang, Chung Hao Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.

LanguageEnglish
Title of host publicationProceedings of the Future Technologies Conference (FTC) 2018 - Volume 2
EditorsSupriya Kapoor, Kohei Arai, Rahul Bhatia
PublisherSpringer Verlag
Pages733-742
Number of pages10
ISBN (Print)9783030026820
DOIs
Publication statusPublished - 2019 Jan 1
EventFuture Technologies Conference, FTC 2018 - Vancouver, BC, Canada
Duration: 2018 Nov 152018 Nov 16

Publication series

NameAdvances in Intelligent Systems and Computing
Volume881
ISSN (Print)2194-5357

Other

OtherFuture Technologies Conference, FTC 2018
CountryCanada
CityVancouver, BC
Period18-11-1518-11-16

Fingerprint

Network security
Holograms
Arrayed waveguide gratings
Transmitters
Pixels
Detectors
Communication
Spatial light modulators

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Huan, J-F., Liu, C. C., Yang, C. C., & Li, C. H. (2019). Reconfiguring computer-generated holographic coding patterns to enhance optical access network security. In S. Kapoor, K. Arai, & R. Bhatia (Eds.), Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2 (pp. 733-742). (Advances in Intelligent Systems and Computing; Vol. 881). Springer Verlag. https://doi.org/10.1007/978-3-030-02683-7_52
Huan, Jen-Fa ; Liu, Chun Chieh ; Yang, Chao Chin ; Li, Chung Hao. / Reconfiguring computer-generated holographic coding patterns to enhance optical access network security. Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. editor / Supriya Kapoor ; Kohei Arai ; Rahul Bhatia. Springer Verlag, 2019. pp. 733-742 (Advances in Intelligent Systems and Computing).
@inproceedings{c6cc3d90fab74e2185c18f9b0c7eab6f,
title = "Reconfiguring computer-generated holographic coding patterns to enhance optical access network security",
abstract = "In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.",
author = "Jen-Fa Huan and Liu, {Chun Chieh} and Yang, {Chao Chin} and Li, {Chung Hao}",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-030-02683-7_52",
language = "English",
isbn = "9783030026820",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "733--742",
editor = "Supriya Kapoor and Kohei Arai and Rahul Bhatia",
booktitle = "Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2",
address = "Germany",

}

Huan, J-F, Liu, CC, Yang, CC & Li, CH 2019, Reconfiguring computer-generated holographic coding patterns to enhance optical access network security. in S Kapoor, K Arai & R Bhatia (eds), Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Advances in Intelligent Systems and Computing, vol. 881, Springer Verlag, pp. 733-742, Future Technologies Conference, FTC 2018, Vancouver, BC, Canada, 18-11-15. https://doi.org/10.1007/978-3-030-02683-7_52

Reconfiguring computer-generated holographic coding patterns to enhance optical access network security. / Huan, Jen-Fa; Liu, Chun Chieh; Yang, Chao Chin; Li, Chung Hao.

Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. ed. / Supriya Kapoor; Kohei Arai; Rahul Bhatia. Springer Verlag, 2019. p. 733-742 (Advances in Intelligent Systems and Computing; Vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Reconfiguring computer-generated holographic coding patterns to enhance optical access network security

AU - Huan, Jen-Fa

AU - Liu, Chun Chieh

AU - Yang, Chao Chin

AU - Li, Chung Hao

PY - 2019/1/1

Y1 - 2019/1/1

N2 - In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.

AB - In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.

UR - http://www.scopus.com/inward/record.url?scp=85055906148&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85055906148&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-02683-7_52

DO - 10.1007/978-3-030-02683-7_52

M3 - Conference contribution

SN - 9783030026820

T3 - Advances in Intelligent Systems and Computing

SP - 733

EP - 742

BT - Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2

A2 - Kapoor, Supriya

A2 - Arai, Kohei

A2 - Bhatia, Rahul

PB - Springer Verlag

ER -

Huan J-F, Liu CC, Yang CC, Li CH. Reconfiguring computer-generated holographic coding patterns to enhance optical access network security. In Kapoor S, Arai K, Bhatia R, editors, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Springer Verlag. 2019. p. 733-742. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-030-02683-7_52