Structuring reconfigurable composite signature codecs to enhance OCDMA network confidentiality

Jen-Fa Huan, Chung Yu Li, Kai Sheng Chen, Tsing Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In views of reconfiguring optical code-division multiple-access (OCDMA) network coder/decoders (codecs), a dynamic signature coding scheme structured over arrayed-wave guide gratings (AWGs) is devised. Such scheme of signature reconfigurations can find applications on enhancing OCDMA network confidentiality. The code reconfiguration can be achieved by exclusively assigning to each network user a set of composite signatures made up of pseudo-orthogonal maximal-length sequence (M-sequence) codes and randomly selecting one among them to represent each user's signature. On the basis of cyclic and periodic characteristics of M-sequence codes compatible with those of the same dimension AWGs, numerical design examples are illustrated throughout the network codecs configuration and operation.

Original languageEnglish
Title of host publicationProceedings - 2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2012
Pages440-445
Number of pages6
DOIs
Publication statusPublished - 2012 Dec 1
Event2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2012 - Victoria, BC, Canada
Duration: 2012 Nov 122012 Nov 14

Publication series

NameProceedings - 2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2012

Other

Other2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2012
CountryCanada
CityVictoria, BC
Period12-11-1212-11-14

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Structuring reconfigurable composite signature codecs to enhance OCDMA network confidentiality'. Together they form a unique fingerprint.

Cite this