Design and Investigation on Image Transmission in Multi-User Cross-Layer Security Network

A multi-user cross-layer security network based on optical code division multiple access (OCDMA) and algorithmic cryptography is proposed, and its security performance is analyzed quantitatively for the first time. In this scheme, eavesdroppers have to not only intercept the optical code of OCDMA in physical-layer, but also break the algorithmic cryptography in data-layer. Thus, the information security will be enhanced effectively. Synchronous transmission system and asynchronous transmission system are analyzed respectively. It can be seen that the cross-layer security of asynchronous transmission is far greater than that of synchronous transmission when the number of users is large enough. OptiSystem simulation is used to investigate the image transmission in cross-layer security system. The transmission distance of single mode fiber is 100 km, and transmission rates are 10 Gbit/s and 1 Gbit/s respectively. It can be seen that legitimate user can recover original image correctly with matched decoder and correct encryption algorithm. However, eavesdroppers cannot recover the image correctly with matched decoder/wrong encryption algorithm or unmatched decoder/correct encryption algorithm. Therefore, our scheme can greatly enhance the security of image transmission system.

[1]  T.H. Shake Confidentiality performance of spectral-phase-encoded optical CDMA , 2005, Journal of Lightwave Technology.

[2]  Xiangyang Wang,et al.  A Novel Least-Mean Kurtosis Adaptive Filtering Algorithm Based on Geometric Algebra , 2019, IEEE Access.

[3]  Ting Wang,et al.  Secure Optical Transmission in a Point-to-Point Link With Encrypted CDMA Codes , 2010, IEEE Photonics Technology Letters.

[4]  Edward H. Sargent,et al.  The role of optical CDMA in access networks , 2002 .

[5]  Qian Huang,et al.  Performance Analysis and Experimental Investigation of Physical-Layer Security in OCDMA-Based Hybrid FSO/Fiber Wiretap Channel , 2019, IEEE Photonics Journal.

[6]  T.H. Shake,et al.  Security performance of optical CDMA Against eavesdropping , 2005, Journal of Lightwave Technology.

[7]  Xiangyang Wang,et al.  GA-ORB: A New Efficient Feature Extraction Algorithm for Multispectral Images Based on Geometric Algebra , 2019, IEEE Access.

[8]  Paul R Prucnal,et al.  Theoretical Analysis and Experimental Investigation on the Confidentiality of 2-D Incoherent Optical CDMA System , 2010, Journal of Lightwave Technology.

[9]  P.R. Prucnal,et al.  Optical Encryption With OCDMA Code Swapping Using All-Optical xor Logic Gate , 2009, IEEE Photonics Technology Letters.

[10]  Masahide Sasaki,et al.  Quantum Photonic Network: Concept, Basic Tools, and Future Issues , 2015, IEEE Journal of Selected Topics in Quantum Electronics.

[11]  P.R. Prucnal,et al.  Design and Demonstration of a Novel Optical CDMA Platform for Avionics Applications , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[12]  Alex Biryukov,et al.  Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware , 2012, Fundam. Informaticae.

[13]  Zhihai He,et al.  Hybrid representation learning for cross-modal retrieval , 2019, Neurocomputing.

[14]  Wenjun Li,et al.  Cross-layer security based on optical CDMA and algorithmic cryptography , 2016, 2016 IEEE Optoelectronics Global Conference (OGC).

[15]  A.M. Weiner,et al.  Experimental Investigation of Security Issues in O-CDMA , 2006, Journal of Lightwave Technology.

[16]  P. Humblet,et al.  On the bit error rate of lightwave systems with optical amplifiers , 1991 .

[17]  Qian Huang,et al.  Performance analysis of FSO/CDMA system based on binary symmetric wiretap channel , 2019, IET Commun..

[18]  P.R. Prucnal,et al.  Demonstration of an All-Optical OCDMA Encryption and Decryption System With Variable Two-Code Keying , 2008, IEEE Photonics Technology Letters.

[19]  Ke Wang,et al.  Performance analysis of physical-layer security in an OCDMA-based wiretap channel , 2017, IEEE/OSA Journal of Optical Communications and Networking.

[20]  Alex Biryukov,et al.  An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.