Secure Communication in Fiber-Optic Networks

Providing data security in the optical layer enables low latency data encryption and enlarges the capacity for secure data transmission. As the demand for both secure and high speed transmission grows dramatically, secure data transmission is pushing the requirements for processing speed and network capacity. As fiber-optic systems form the backbone of communication networks, optical approaches for protecting the network security increases the available capacity of the network. Moreover, compared to electric circuits, fiber-optic systems are immune to electromagnetic interference and have high processing speeds. In this chapter, we discuss using fiber-optic-based techniques to defend against threats in the network, including optical encryption, optical code-division multiple access (CDMA), optical key distribution, optical steganography, anti-jamming, and optical chaos-based communication. These approaches are categorized by their different applications for protecting the properties of network security, including confidentiality, privacy, and availability.

[1]  Paul R Prucnal,et al.  Simple nonlinear interferometer-based all-optical thresholder and its applications for optical CDMA. , 2007, Optics express.

[2]  Sae Woo Nam,et al.  Quantum key distribution at 1550 nm with twin superconducting single-photon detectors , 2006 .

[3]  S. Goldberg,et al.  Towards a Cryptanalysis of Spectral-Phase Encoded Optical CDMA with Phase-Scrambling , 2007, OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference.

[4]  G. Buller,et al.  A short wavelength GigaHertz clocked fiber-optic quantum key distribution system , 2004, IEEE Journal of Quantum Electronics.

[5]  Paul R. Prucnal Optical Code Division Multiple Access : Fundamentals and Applications , 2005 .

[6]  Paul R Prucnal,et al.  All-optical encryption based on interleaved waveband switching modulation for optical network security. , 2009, Optics letters.

[7]  Jacob Scheuer,et al.  Giant fiber lasers: a new paradigm for secure key distribution. , 2006, Physical review letters.

[8]  B. Wu,et al.  Secure communications over a public fiber-optical network , 2006, QELS 2006.

[9]  Paul R Prucnal,et al.  Polarization Effect on Optical xor Performance Based on Four-Wave Mixing , 2010, IEEE Photonics Technology Letters.

[10]  Paul R. Prucnal,et al.  Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Ting Wang,et al.  Combining cryptographic and steganographic security with self-wrapped optical code division multiplexing techniques , 2007 .

[12]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[13]  P.R. Prucnal,et al.  Stealth Transmission over a WDM Network with Detection Based on an All-Optical Thresholder , 2007, LEOS 2007 - IEEE Lasers and Electro-Optics Society Annual Meeting Conference Proceedings.

[14]  K. Shaneman,et al.  Optical network security: technical analysis of fiber tapping mechanisms and methods for detection & prevention , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[15]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[16]  J P Heritage,et al.  Encoding and decoding of femtosecond pulses. , 1988, Optics letters.

[17]  Paul R. Prucnal,et al.  Scalable asynchronous incoherent optical CDMA , 2007 .

[18]  Chun-Kit Chan,et al.  Demonstration of 20-Gb/s all-optical XOR gate by four-wave mixing in semiconductor optical amplifier with RZ-DPSK modulated inputs , 2004, IEEE Photonics Technology Letters.

[19]  Paul R. Prucnal,et al.  Optical steganography for data hiding in optical networks , 2009, 2009 16th International Conference on Digital Signal Processing.

[20]  Paul R. Prucnal,et al.  Spread spectrum fiber-optic local area network using optical processing , 1986 .

[21]  Henry D. I. Abarbanel,et al.  Chaotic dynamics in erbium-doped fiber ring lasers , 1999 .

[22]  T Matsumoto,et al.  Ultrafast all-optical logic operations in a nonlinear Sagnac interferometer with two control beams. , 1991, Optics letters.

[23]  Paul R. Prucnal,et al.  Two dimensional encrypted optical steganography based on amplified spontaneous emission noise , 2013, CLEO: 2013.

[24]  Roy,et al.  Communication with chaotic lasers , 1998, Science.

[25]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[26]  S. Strogatz Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry and Engineering , 1995 .

[27]  Bernard B Wu,et al.  Analysis of stealth communications over a public fiber-optical network. , 2007, Optics express.

[28]  Avi Zadok,et al.  Secure key generation using an ultra-long fiber laser: transient analysis and experiment. , 2008, Optics express.

[29]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[30]  A.M. Weiner,et al.  Experimental Investigation of Security Issues in O-CDMA , 2006, Journal of Lightwave Technology.

[31]  P R Prucnal,et al.  Improving the privacy of optical steganography with temporal phase masks. , 2010, Optics express.

[32]  Sailing He,et al.  Demonstration of optical steganography transmission using temporal phase coded optical signals with spectral notch filtering. , 2010, Optics express.

[33]  P. Prucnal,et al.  Compact and low-latency scheme for optical steganography using chirped fibre Bragg gratings , 2009 .

[34]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[35]  P.R. Prucnal,et al.  Optical CDMA Code Wavelength Conversion Using PPLN to Improve Transmission Security , 2009, IEEE Photonics Technology Letters.

[36]  Ting Wang,et al.  Secure Optical Transmission in a Point-to-Point Link With Encrypted CDMA Codes , 2010, IEEE Photonics Technology Letters.

[37]  Zhenxing Wang,et al.  Optical Steganography Over a Public DPSK Channel With Asynchronous Detection , 2011, IEEE Photonics Technology Letters.

[38]  S. H. Kim,et al.  All-optical XOR gate using semiconductor optical amplifiers without additional input beam , 2002 .

[39]  P.R. Prucnal,et al.  Secure transmission over an existing public WDM lightwave network , 2006, IEEE Photonics Technology Letters.

[40]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[41]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[42]  Laurent Larger,et al.  Chaos-based communications at high bit rates using commercial fibre-optic links , 2005, Nature.

[43]  H. Soto,et al.  5-Gb/s XOR optical gate based on cross-polarization modulation in semiconductor optical amplifiers , 2001, IEEE Photonics Technology Letters.

[44]  E. Narimanov,et al.  Steganographic fiber-optic transmission using coherent spectral-phase-encoded optical CDMA , 2008, 2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science.

[45]  Lingzhen Yang,et al.  Chaotic dynamics of erbium-doped fiber laser with nonlinear optical loop mirror , 2012 .

[46]  Paul R. Prucnal,et al.  Physical Encoding in Optical Layer Security , 2012, J. Cyber Secur. Mobil..

[47]  Z. Sipus,et al.  Analysis of crosstalk in optical couplers and associated vulnerabilities , 2010, The 33rd International Convention MIPRO.

[48]  Paul R Prucnal,et al.  Theoretical Analysis and Experimental Investigation on the Confidentiality of 2-D Incoherent Optical CDMA System , 2010, Journal of Lightwave Technology.

[49]  Kerry J. Vahala,et al.  Ultrafast WDM logic , 1997 .