wireless comm (4)

25
Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques Author: Lei Deng, Mengfan Cheng, Xiaolong Wang, Hao Li, Ming Tang, Senior Member, IEEE, Songnian Fu, Ping Shum, Senior Member, IEEE, and Deming Liu Link to the video : https://youtu.be/rCJFGwSTmWo

Upload: rebecca-antonyraj

Post on 05-Jan-2016

226 views

Category:

Documents


0 download

DESCRIPTION

secure ofdm pon system based on chaos and fractional fourier transform techniques.

TRANSCRIPT

Page 1: Wireless Comm (4)

Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform

Techniques

Author: Lei Deng, Mengfan Cheng, Xiaolong Wang, Hao Li, Ming Tang, Senior Member, IEEE, Songnian Fu,

Ping Shum, Senior Member, IEEE, and Deming Liu

Link to the video : https://youtu.be/rCJFGwSTmWo

vamsi buddha
23,24,11
vamsi buddha
expand on PON with appropriate figure
Page 2: Wireless Comm (4)

Overview

OFDM-PON

Physical layer

Cryptography

Chaos

Fractional fourier transform

Implementation

Results

Extension

Page 3: Wireless Comm (4)

Passive Optical Network● A fiber optic access network to serve multiple end points from a

single optical fiber with unpowered optical splitters where it can serve upto 128 customers per fiber.

● In comparison to the Active Optical Network, the PON has low building and maintenance costs owing to the lesser number of moving electrical parts.

● The network has it’s origin from the Optical Network Terminal or the server through the Optical line terminal (OLT), to the fiber feeder reaching at the Optical splitter in the remote end where the optical power is split and reaches the Optical Network Terminal (ONT).

● A star topology is realized between the end users, with the OLT placed at the center node.

Page 4: Wireless Comm (4)

Orthogonal Frequency Division Multiplexing

Page 5: Wireless Comm (4)

OFDM-PON

OFDM is a FDM scheme, which employs orthogonal sub-carrier frequencies.

For Downstream transmission, the data streams are modulated signals for WDM-OFDM.

A demux is used to separate the channels and deliver to each ONU.

vamsi buddha
include basic Block diagram of OFDM, so the experimental setup can talk only about the modifications.
Page 6: Wireless Comm (4)

Security- Physical layer

Fiber tapping is a method that extracts the signal from an optical fiber without breaking the connection.

To access the core carrying the traffic, the fibers within the cable must be accessed physically. Once done, several methods to extract data include:

Fiber bending

Optical splitting

Evanescent Coupling

V-Groove Cut

There is a need for encryption of the data.

Page 7: Wireless Comm (4)

Cryptography

Involves rendering a message unintelligible to any unauthorised party.

Encryption involves combining a cipher to a message with some additional information. To unlock the cryptogram a key is required.

Symmetrical and Asymmetrical cryptosystems:

Secret key

Public key

Cryptoanalysis deals with the art of code breaking by performing statistical analysis on the encrypted data stream, to search for patterns in the message or cipher.

vamsi buddha
explain a bit more on this
Page 8: Wireless Comm (4)

Chaos based cryptography

Diffusion property : If a character of the plaintext or the ciphertext is changed, several characters of the other should change.

This property translates into a statistical structure involving long combinations of letters in the cryptogram. So, intercepting requires a large amount of material and analysis.

A chaotic system is sensitive to initial conditions and parameter values.

vamsi buddha
split into-chaotic systems-parameter sensitivity-initial condition sensitivity-key generation
Page 9: Wireless Comm (4)

Chaotic systems : Logistic map

A logistic map can be defined as below

xn+1 = rxn(1-xn)

0<x<1

The iterative process of updating the next value can be seen from the visualisation.

The parameter ‘r’ is the growth rate which determines the fluctuation.

vamsi buddha
insert eq and fig
Page 10: Wireless Comm (4)

Period doubling and chaotic nature

An attractor can be of fixed type or oscillatory in nature.

As the parameter increases, period doubling occurs.

For particular parameter values, the system enters deterministic chaos, which is statistically similar to randomness.

Page 11: Wireless Comm (4)

Lorenz chaotic system

Defined by the following set of differential equations.

x’ = a(y − x)

y’ = cx − xz − y

z’ = xy − bz

2 equilibria.

Page 12: Wireless Comm (4)

Attractors in phase plane : Chen’s chaotic system

Defined by the following set of differential equations:

x’ = a(y − x)

y’ = (c − a)x + cy + xz

z’ = bz + xy

3 equilibria.

Enters chaotic region when

a = 35

b = 3

c = [20,28.4]

Page 13: Wireless Comm (4)

Sensitivity to initial conditions

Control systems are based on linear systems.

Nearby points (initial states) converge over time.

In dynamical systems, the phase space is warped, leading to close points diverging in time.

This property is referred to as the so called Butterfly effect.

The measure of the divergence property of a dynamical system is given by Lyapunov exponent. The values for a few of the dynamical systems are given below:

CHAOTIC SYSTEMS

LORENZ CHEN HENON ROSSLER LOGISTIC

LARGEST LYAPUNOV EXPONENT

2.066 2.168 1.26 2.004 0.693

Page 14: Wireless Comm (4)

Logistic map based security

Logistic map has been implemented to introduce chaotic scrambling.

● A one dimensional logistic map chaos model is chosen.

● When r falls into the domain 3.569945<r≤4, the sequence will fall into chaos.

Page 15: Wireless Comm (4)

Fractional fourier transform

The mathematical operation is as below:

The interpretation is a counterclockwise axis rotation of the representation of the signal corresponding to p*pi/2 in the time-frequency distribution.

The parameter p is the measure of the rotation and is unique.

Page 16: Wireless Comm (4)

3-D security enhanced strategy

Chen’s chaotic system is employed based on its high Lyapunov exponent value.

3-D chaotic sequences are generated which are used for :

Time synchronization

Subcarrier masking

FrFT order

The differential equations are solved by fourth order Runge-Kutta method with time step k = 0.001

vamsi buddha
insert equations
Page 17: Wireless Comm (4)

Key extraction

The values for each frame is selected by solving for the following variables:

Dxi = mod (Extract (xi , 12, 13, 14) , 256)

Dyi = mod (Extract (yi , 12, 13, 14) , 256)

Dzi = mod (Extract (zi , 12, 13, 14) , 256)

Extract (α, m, n, p) returns an integer, which is constructed by the mth, nth, and pth digits in the decimal part of α.

Page 18: Wireless Comm (4)

Histogram

The distributions of Dx, Dy, Dz

are fairly uniform.

The sequences are statistically random.

Page 19: Wireless Comm (4)

Schematic and methodology of the proposed technique

Dx : Training sequence for

time synchronization.

Dy : Chaotic phase factors for

OFDM subcarriers.

Dz : Fractional order of FrFT.● Key Space 1050 ● With the fastest computing

speed 2.5 *1013/s, time taken to do a complete search is 1.27 * 1029 years!

Page 20: Wireless Comm (4)

Experimental Setup A PBRS of length 2^15 -

1

16-QAM

257 subcarriers

128 : Data

128 : Complex conjugate

1 : unfilled dc subcarrier

CP : 1/10

OFDM symbol size : 563

1 TS for every 9 data symbols.

Page 21: Wireless Comm (4)

Experimental Results : Transmission performance

Page 22: Wireless Comm (4)

Experimental Results : Security

Page 23: Wireless Comm (4)

Extension of the model

In the above model a 3-D chaotic system is used for encryption.

The model is further extended by employing a 4-D chaotic system.

Page 24: Wireless Comm (4)

References

[1] J. Kani, M. Teshima, K. Akimoto, N. Takachio, H. Suzuki, K. Iwatsuki, and M. Ishii, “A WDM-based optical access network for wide-area giga- bit access services,” IEEE Commun. Mag., vol. 41, no. 2, pp. S43–S48, Feb. 2003.

[2] J. Yu, M.-F. Huang, D. Qian, L. Chen, and G.-K. Chang, “Centralized lightwave WDM-PON employing 16-QAM intensity modulated OFDM downstream and OOK modulated upstream signals,” IEEE Photon. Tech- nol. Lett., vol. 20, no. 18, pp. 1545–1547, Sep. 2008.

[3] N. Cvijetic, “OFDM for next-generation optical access networks,” J. Lightw. Technol., vol. 30, no. 4, pp. 384–398, Feb. 2012.

Page 25: Wireless Comm (4)

[4] L. Zhang, X. Xin, B. Liu, and J. Yu, “Physical-enhanced secure strategy in an OFDM-PON,” Opt. Exp., vol. 20, no. 3, pp. 2255–2265, Jan. 2012.

[5] Nonlinear Dynamics and Chaos - Steven Strogatz

[6] Wikipedia