83 research outputs found
Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber
Optical networks are vulnerable to physical layer attacks; wiretappers can
improperly receive messages intended for legitimate recipients. Our work
considers an aspect of this security problem within the domain of multimode
fiber (MMF) transmission. MMF transmission can be modeled via a broadcast
channel in which both the legitimate receiver's and wiretapper's channels are
multiple-input-multiple-output complex Gaussian channels. Source-channel coding
analyses based on the use of distortion as the metric for secrecy are
developed. Alice has a source sequence to be encoded and transmitted over this
broadcast channel so that the legitimate user Bob can reliably decode while
forcing the distortion of wiretapper, or eavesdropper, Eve's estimate as high
as possible. Tradeoffs between transmission rate and distortion under two
extreme scenarios are examined: the best case where Eve has only her channel
output and the worst case where she also knows the past realization of the
source. It is shown that under the best case, an operationally separate
source-channel coding scheme guarantees maximum distortion at the same rate as
needed for reliable transmission. Theoretical bounds are given, and
particularized for MMF. Numerical results showing the rate distortion tradeoff
are presented and compared with corresponding results for the perfect secrecy
case.Comment: 30 pages, 5 figures, accepted to IEEE Transactions on Communication
Joint Source-Channel Secrecy Using Hybrid Coding
The secrecy performance of a source-channel model is studied in the context
of lossy source compression over a noisy broadcast channel. The source is
causally revealed to the eavesdropper during decoding. The fidelity of the
transmission to the legitimate receiver and the secrecy performance at the
eavesdropper are both measured by a distortion metric. Two achievability
schemes using the technique of hybrid coding are analyzed and compared with an
operationally separate source-channel coding scheme. A numerical example is
provided and the comparison results show that the hybrid coding schemes
outperform the operationally separate scheme.Comment: 5 pages, 1 figure, ISIT 201
Jamming precoding in AF relay-aided PLC systems with multiple eavessdroppers
Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the jamming precoding and transmitting precoding matrices at both the source and the relay while adhering to transmit power constraints. We present a formulation of this problem and demonstrate that it can be efficiently solved using an effective block coordinate descent (BCD) algorithm. Simulation results are conducted to validate the convergence and performance of the proposed algorithm. These findings confirm the effectiveness of our approach. Furthermore, the numerical analysis reveals that our proposed algorithm surpasses traditional schemes that lack jamming to achieve higher secrecy rates. As a result, the proposed algorithm offers the benefit of guaranteeing secure communications in a realistic channel model, even in scenarios involving colluding eavesdroppers
Roadmap of optical communications
© 2016 IOP Publishing Ltd. Lightwave communications is a necessity for the information age. Optical links provide enormous bandwidth, and the optical fiber is the only medium that can meet the modern society's needs for transporting massive amounts of data over long distances. Applications range from global high-capacity networks, which constitute the backbone of the internet, to the massively parallel interconnects that provide data connectivity inside datacenters and supercomputers. Optical communications is a diverse and rapidly changing field, where experts in photonics, communications, electronics, and signal processing work side by side to meet the ever-increasing demands for higher capacity, lower cost, and lower energy consumption, while adapting the system design to novel services and technologies. Due to the interdisciplinary nature of this rich research field, Journal of Optics has invited 16 researchers, each a world-leading expert in their respective subfields, to contribute a section to this invited review article, summarizing their views on state-of-the-art and future developments in optical communications
Liquid Crystal on Silicon Devices: Modeling and Advanced Spatial Light Modulation Applications
Liquid Crystal on Silicon (LCoS) has become one of the most widespread technologies for spatial light modulation in optics and photonics applications. These reflective microdisplays are composed of a high-performance silicon complementary metal oxide semiconductor (CMOS) backplane, which controls the light-modulating properties of the liquid crystal layer. State-of-the-art LCoS microdisplays may exhibit a very small pixel pitch (below 4 ?m), a very large number of pixels (resolutions larger than 4K), and high fill factors (larger than 90%). They modulate illumination sources covering the UV, visible, and far IR. LCoS are used not only as displays but also as polarization, amplitude, and phase-only spatial light modulators, where they achieve full phase modulation. Due to their excellent modulating properties and high degree of flexibility, they are found in all sorts of spatial light modulation applications, such as in LCOS-based display systems for augmented and virtual reality, true holographic displays, digital holography, diffractive optical elements, superresolution optical systems, beam-steering devices, holographic optical traps, and quantum optical computing. In order to fulfil the requirements in this extensive range of applications, specific models and characterization techniques are proposed. These devices may exhibit a number of degradation effects such as interpixel cross-talk and fringing field, and time flicker, which may also depend on the analog or digital backplane of the corresponding LCoS device. The use of appropriate characterization and compensation techniques is then necessary
Tapping eavesdropper designs against physical layer secret key in point-to-point fiber communications
With the growing demand for service access and data transmission, security issues in optical fiber systems have become increasingly important and the subject of increased research. Physical layer secret key generation (PL-SKG), which leverages the random but common channel properties at legitimate parties, has been shown to be a secure, low-cost, and easily deployed technique as opposed to computational-based cryptography, quantum, and chaos key methods that rely on precise equipment. However, the eavesdropper (Eve) potential for current PL-SKG in fiber communications has been overlooked by most studies to date. Unlike wireless communications, where the randomness comes from the spatial multi-paths that cannot be all captured by Eves, in fiber communications, all the randomness (from transmitted random pilots or channel randomness) is contained in the signals transmitted inside the fiber. This, therefore, enables a tapping Eve to reconstruct the common features of legitimate users from its received signals, and further decrypt the featured-based secret keys. To implement this idea, we designed two Eve schemes against polarization mode distortion (PMD) based PL-SKG and the two-way cross multiplication based PL-SKG. The simulation results show that our proposed Eves can successfully reconstruct the legitimate common feature and the secret key relied upon, leading to secret key rate (SKR) reductions of between three and four orders of magnitude in the PL-SKG schemes studied. As a result, we reveal and demonstrate a novel eavesdropping potential to provide challenges for current physical layer secret key designs. We hope to provide more insightful vision and critical evaluation on the design of new physical layer secret key schemes in optical fiber links, to provide more comprehensively secure, and intelligent optical networks.European Union funding: 101008280 (DIOR) and UK Royal Society Grant: IES\R3\223068
Tapping eavesdropper designs against physical layer secret key in point-to-point fiber communications
With the growing demand for service access and data transmission, security issues in optical fiber systems have become increasingly important and the subject of increased research. Physical layer secret key generation (PL-SKG), which leverages the random but common channel properties at legitimate parties, has been shown to be a secure, low-cost, and easily deployed technique as opposed to computational-based cryptography, quantum, and chaos key methods that rely on precise equipment. However, the eavesdropper (Eve) potential for current PL-SKG in fiber communications has been overlooked by most studies to date. Unlike wireless communications, where the randomness comes from the spatial multi-paths that cannot be all captured by Eves, in fiber communications, all the randomness(from transmitted random pilots or channel randomness) is contained in the signals transmitted inside the fiber. This, therefore, enables a tapping Eve to reconstruct the common features of legitimate users from its received signals, and further decrypt the featured-based secret keys. To implement this idea, we designed two Eve schemes against polarization mode distortion (PMD) based PL-SKG and the two-way cross multiplication based PL-SKG. The simulation results show that our proposed Eves can successfully reconstruct the legitimate common feature and the secret key relied upon, leading to secret key rate (SKR) reductions of between three and four orders of magnitude in the PL-SKG schemes studied. As a result, we reveal and demonstrate a novel eavesdropping potential to provide challenges for current physical layer secret key designs. We hope to provide more insightful vision and critical evaluation on the design of new physical layer secret key schemes in optical fiber links, to provide more comprehensively secure, and intelligent optical network
- …