Optical identification using physical unclonable functions

In this work, the concept of optical identification (OI) is introduced for the first time. The OI assigns an optical fingerprint and the corresponding digital signature to each sub-system of the network and estimates its reliability in different measures. We highlight the large potential applications of OI as a physical layer approach for security, identification, authentication, and monitoring purposes. To identify most of the sub-systems of a network, we propose to use the Rayleigh backscattering pattern, which is an optical physical unclonable function and allows to achieve OI with a simple procedure and without additional devices. The application of OI to fiber and path identification in a network, and to the authentication of the users in a quantum key distribution system are described.

[1]  P. D. Lakshmijayasimha,et al.  A Field Trial of Multi-Homodyne Coherent Detection Over Multi-Core Fiber for Encryption and Steganography , 2023, Journal of Lightwave Technology.

[2]  M. Fischlin,et al.  Quantum key distribution with post-processing driven by physical unclonable functions , 2023, Applied Sciences.

[3]  L. Potí,et al.  Optical Network Authentication through Rayleigh Backscattering Fingerprints of the Composing Fibers , 2022, Global Communications Conference.

[4]  R. Giddings,et al.  DSP-Based Physical Layer Security for Coherent Optical Communication Systems , 2022, IEEE Photonics Journal.

[5]  L. Potí,et al.  Network Authentication, Identification, and Secure Communication through Optical Physical Unclonable Function , 2022, European Conference on Optical Communication.

[6]  Anil K. Jain,et al.  Biometrics: Trust, But Verify , 2021, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[7]  Penghua Mu,et al.  Research on methods of enhancing physical layer security of optical fiber communication system in the smart grid , 2022 .

[8]  D. Sadot,et al.  Stealth and secured optical coherent transmission using a gain switched frequency comb and multi-homodyne coherent detection. , 2021, Optics Express.

[9]  Ulrich Rührmair,et al.  Recent Advances in Photonic Physical Unclonable Functions , 2021, 2021 IEEE European Test Symposium (ETS).

[10]  Arsenia Chorti,et al.  Physical Layer Security: Authentication, Integrity and Confidentiality , 2020, Physical Layer Security.

[11]  Craig Gidney,et al.  How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits , 2019, Quantum.

[12]  Yuncai Wang,et al.  Scheme of coherent optical chaos communication. , 2020, Optics letters.

[13]  Kun Qiu,et al.  Injection-locking chaos synchronization and communication in closed-loop semiconductor lasers subject to phase-conjugate feedback. , 2020, Optics express.

[14]  Luca Poti,et al.  Secure Quantum Communication Technologies and Systems: From Labs to Markets , 2020 .

[15]  Jiubin Tan,et al.  Performance Investigation of OFDR Sensing System With a Wide Strain Measurement Range , 2019, Journal of Lightwave Technology.

[16]  Haroldo Maestre,et al.  Incoherent Optical Frequency-Domain Reflectometry Based on Homodyne Electro-Optic Downconversion for Fiber-Optic Sensor Interrogation , 2019, Sensors.

[17]  Ibrahim T. Ozbolat,et al.  Biological physically unclonable function , 2019, Communications Physics.

[18]  Bin Chen,et al.  Asymmetric cryptography with physical unclonable keys , 2018, Quantum Science and Technology.

[19]  Damien Rontani,et al.  Spying on chaos-based cryptosystems with reservoir computing , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[20]  D. Syvridis,et al.  Physical Unclonable Function based on a Multi-Mode Optical Waveguide , 2018, Scientific Reports.

[21]  Chen Zhu,et al.  Unclonable Optical Fiber Identification Based on Rayleigh Backscattering Signatures , 2017, Journal of Lightwave Technology.

[22]  Rina Mishra,et al.  A review on steganography and cryptography , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[23]  Brojo Kishore Mishra,et al.  Pros and Cons of Cryptography , Steganography and Perturbation techniques , 2015 .

[24]  S. A. Goorden,et al.  Quantum-secure authentication of a physical unclonable key , 2014, CLEO 2015.

[25]  Chip-Hong Chang,et al.  Highly reliable memory-based Physical Unclonable Function using Spin-Transfer Torque MRAM , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).

[26]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[27]  Xiaoyi Bao,et al.  Long-Range High Spatial Resolution Distributed Temperature and Strain Sensing Based on Optical Frequency-Domain Reflectometry , 2014, IEEE Photonics Journal.

[28]  Farinaz Koushanfar,et al.  Processor-Based Strong Physical Unclonable Functions With Aging-Based Response Tuning , 2014, IEEE Transactions on Emerging Topics in Computing.

[29]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[30]  Changhuei Yang,et al.  Physical key-protected one-time pad , 2013, Scientific Reports.

[31]  Tiegen Liu,et al.  Compensation of laser frequency tuning nonlinearity of a long range OFDR using deskew filter. , 2013, Optics express.

[32]  Paul R. Prucnal,et al.  Phase-mask covered optical steganography based on amplified spontaneous emission noise , 2013, 2013 IEEE Photonics Conference.

[33]  Xinyu Fan,et al.  Long-Range Coherent OFDR With Light Source Phase Noise Compensation , 2012, Journal of Lightwave Technology.

[34]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[35]  José Capmany Francoy,et al.  Practical Quantum Key Distribution based on the BB84 protocol , 2011 .

[36]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[37]  Boris Skoric,et al.  Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets , 2009, IACR Cryptol. ePrint Arch..

[38]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[39]  Shibin Jiang,et al.  Narrow linewidth fiber laser for 100-km optical frequency domain reflectometry , 2005, IEEE Photonics Technology Letters.

[40]  A. Zeilinger,et al.  A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY , 2004, quant-ph/0407131.

[41]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[42]  Yahei Koyamada,et al.  Coherent optical frequency domain reflectometry using phase-decorrelated reflected and reference lightwaves , 1997 .

[43]  T. Horiguchi,et al.  Coherent optical frequency domain reflectometry for a long single-mode optical fiber using a coherent lightwave source and an external phase modulator , 1995, IEEE Photonics Technology Letters.

[44]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.