TY - GEN
T1 - Reconfiguring computer-generated holographic coding patterns to enhance optical access network security
AU - Huan, Jen-Fa
AU - Liu, Chun Chieh
AU - Yang, Chao Chin
AU - Li, Chung Hao
PY - 2019/1/1
Y1 - 2019/1/1
N2 - In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.
AB - In this paper, spatial light modulators (SLMs) are devised as a reconfigurable optical coding access device with computer-generated hologram (CGH) coding patterns scrambled over them for secure optical data communications. SLM is composed of many pixels arranged in an array which can be controlled by electrically triggered pulses to generate different coding patterns. By using SLMs we can modulate users’ data signal with different CGH pattern array to prevent from deciphering of eavesdropper. According to the transmitted holographic information from transmitter encoder to receiver decoder, symmetrical balanced decoders can be configured (and reconfigured) to recover coded data bit of each network user by correlating the received combined hologram patterns with the desired CGH pattern over photo-detector. In the proposed system, each user encodes the transmitted data bit with signature maximal-length sequence (M-sequence) code which are further mapped onto a CGH coding pattern. Due to the pseudo-orthogonal and reconfigurable characteristics of M-sequence codes, eavesdropper will suffer more difficulty in deciphering received data signal. On system analyses, as competing with arrayed-waveguide gratings (AWGs) devices, we conclude that the approach of CGH pattern array can largely improve network security performance for its characteristic advantages of larger capacity, more flexibility, higher confidentiality and easier implementation.
UR - http://www.scopus.com/inward/record.url?scp=85055906148&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85055906148&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-02683-7_52
DO - 10.1007/978-3-030-02683-7_52
M3 - Conference contribution
AN - SCOPUS:85055906148
SN - 9783030026820
T3 - Advances in Intelligent Systems and Computing
SP - 733
EP - 742
BT - Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2
A2 - Kapoor, Supriya
A2 - Arai, Kohei
A2 - Bhatia, Rahul
PB - Springer Verlag
T2 - Future Technologies Conference, FTC 2018
Y2 - 15 November 2018 through 16 November 2018
ER -