1,270 research outputs found

    New challenges in wireless and free space optical communications

    Get PDF
    AbstractThis manuscript presents a survey on new challenges in wireless communication systems and discusses recent approaches to address some recently raised problems by the wireless community. At first a historical background is briefly introduced. Challenges based on modern and real life applications are then described. Up to date research fields to solve limitations of existing systems and emerging new technologies are discussed. Theoretical and experimental results based on several research projects or studies are briefly provided. Essential, basic and many self references are cited. Future researcher axes are briefly introduced

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research
    corecore