Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks

Jen Fa Huang, Kai Sheng Chen, Ting Ju Su

研究成果: Conference article同行評審

2 引文 斯高帕斯(Scopus)

摘要

In order to enhance data transmission security within internet network, this paper consider a signature reconfiguration scheme over wavelength-coded network coder/decoders (codecs). We propose the reconfiguration scheme of composite signatures in which optical network codecs reconfigure their signature keys in a tractable way to enhance system confidentiality for coded wavelength-division multiplexing (WDM) transmissions. Based on conventional maximal-length sequence (M-sequence) codes over arrayed-waveguide-grating (AWG) codecs, composite signatures of relative prime-length M-sequence codes are structured to identify network node users. Network codecs change their signatures dynamically such that eavesdroppers cannot keep up with the speed of code changing, and thus unable to detect the channel waveform to descramble the code. Evaluated results show the effectiveness of the proposed approach via composite signatures reconfiguration against practical eavesdropping.

原文English
頁(從 - 到)240-247
頁數8
期刊Procedia Computer Science
94
DOIs
出版狀態Published - 2016
事件11th International Conference on Future Networks and Communications, FNC 2016 / 13th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2016 - Montreal, Canada
持續時間: 2016 8月 152016 8月 18

All Science Journal Classification (ASJC) codes

  • 電腦科學(全部)

指紋

深入研究「Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks」主題。共同形成了獨特的指紋。

引用此