ArticlePDF Available

Physical Layer Encryption for CO-OFDM Systems Enabled by Camera Projection Scrambler

Authors:

Abstract and Figures

In this paper, we propose a camera projection approach to enhance the physical layer security of coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems. The data are converted to the new location by the camera projection module in the encryption system, where the 5D hyperchaotic system provides the keys for the camera projection module. The simulated 16QAM CO-OFDM security system over 80 km SSMF is shown to provide a key space of about 9 × 10^90 through the five-dimensional (5D) hyperchaotic system, making it impossible for eavesdroppers to obtain valid information, and the peak-to-average power ratio (PAPR) is reduced by about 0.8 dB.
Content may be subject to copyright.
Citation: Li, Y.; Wang, D.; Ding, H.; Li,
Z.; Wang, X. Physical Layer
Encryption for CO-OFDM Systems
Enabled by Camera Projection
Scrambler. Mathematics 2024,12, 1807.
https://doi.org/10.3390/math12121807
Academic Editor: Jonathan
Blackledge
Received: 14 May 2024
Revised: 4 June 2024
Accepted: 7 June 2024
Published: 11 June 2024
Copyright: © 2024 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
mathematics
Article
Physical Layer Encryption for CO-OFDM Systems Enabled by
Camera Projection Scrambler
Yujin Li 1, Dongfei Wang 1,2,*, Haiyang Ding 1, Zhenzhen Li 1and Xiangqing Wang 3
1School of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China
2School of Electronics and Information, Nanchang Institute of Technology, Nanchang 330044, China
3School of Physics and Electronic Engineering, Fuyang Normal University, Fuyang 236037, China
*Correspondence: wdfchina@126.com
Abstract: In this paper, we propose a camera projection approach to enhance the physical layer
security of coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems. The
data are converted to the new location by the camera projection module in the encryption system,
where the 5D hyperchaotic system provides the keys for the camera projection module. The sim-
ulated 16QAM CO-OFDM security system over 80 km SSMF is shown to provide a key space of
about
9×1090
through the five-dimensional (5D) hyperchaotic system, making it impossible for
eavesdroppers to obtain valid information, and the peak-to-average power ratio (PAPR) is reduced
by about 0.8 dB.
Keywords: CO-OFDM; 5D hyperchaotic; camera projection; physical layer encryption
MSC: 37D05
1. Introduction
Coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems
are widely used in high-speed and long-distance transmission [
1
5
], and the importance of
solving security problems in the transmission process has emerged. The physical layer is
at the bottom of the open system interconnect (OSI) model, and to completely secure the
transmitted data, the advantages of research methods for encryption of the physical layer
are highlighted [6].
Various physical layer encryption methods, such as quantum key distribution (QKD) [
7
],
optical steganography [
8
], optical code division multiple access (OCDMA) [
9
], hardware
chaos encryption [
10
13
], and digital chaos encryption [
14
24
], etc., have all made signifi-
cant contributions to securing data. Zhang et al. used an implementation of high-speed
QKD in an SiP QKD encoder using a pass-block architecture and a dedicated SiP decoder
based on the polarization-based decoy state Bennett–Brassard 1984 protocol [
7
]. Su et al.
used a multi-user optical steganography transmission system based on filtered amplified
spontaneous emission (ASE) noise, in which stealth signals can be hidden in time and
frequency domains of a common channel to increase the capacity of the stealth chan-
nel [
8
]. Lu et al. used an electro-optical chaotic system with phase modules for time delay
signature elimination through deep learning to enhance nonlinearity. Long short-term
memory (LSTM) networks are trained with specially designed loss functions to enhance
the nonlinear effects [
10
]. Digital chaotic encryption with digital signal processing (DSP)
technology saves a lot of components and is easy to operate, and many researchers have
invested in the work. Zhang et al. enhanced the security of orthogonal frequency-division
multiple access passive optical network (OFDMA-PON) systems by deoxyribonucleic acid
(DNA) encoding and operational cryptographies through chaotic systems [
14
]. Liang et al.
used chaotic Hilbert motion encryption, and Hilbert motion on the key and used the hash
value generated from the encryption result as a digital signature to effectively secure the
Mathematics 2024,12, 1807. https://doi.org/10.3390/math12121807 https://www.mdpi.com/journal/mathematics
Mathematics 2024,12, 1807 2 of 8
OFDM-PON system [
15
]. Bai et al. used Chua’s circuit model to realize an OFDM-PON
security system with polarity-coded chaotic encryption [16].
In this paper, a scrambling method based on camera projection is proposed to offer a
low-complexity and novel design idea for enhancing the security of CO-OFDM systems.
The transmitted data are encrypted by the principle of camera projection mapping, in which
the camera projection matrix is controlled by keys generated by a five-dimensional (5D)
hyperchaotic system. Data in the subcarrier domain, symbol domain, and complex domain
of the three-domain coordinates are visualized in real-world three-dimensional space, and
the three-dimensional coordinates are projected through the camera to obtain homogeneous
coordinates so that the positional transformation of the coordinates reaches the role of data
perturbation. The feasibility and security of the encryption scheme are verified by running
back-to-back (BTB) and 80 km standard single-mode fiber (SSMF) computer simulations
of the CO-OFDM system. The results show that the encryption scheme has a decrease of
0.8 dB in peak-to-average power ratio (PAPR) and a key space size of about 9
×
10
90
and
the analysis of the bit error rate (BER) shows that the encryption scheme does not incur an
additional BER cost. These are good indications that the encryption scheme can effectively
secure the CO-OFDM system.
2. Proposed Algorithm
Figure 1demonstrates the physical layer encryption method to obtain the CO-OFDM
system employing camera projection. Firstly, the raw data are mapped into QAM symbols
after a serial-parallel (S/P) transformation such that the QAM symbols are arranged in
the subcarrier domain N = {1, 2,..., N}, the symbol domain S = {1, 2,..., S}, and the complex
number domain Q = {Re, Im}. Then, 5 keys are generated using the 5D hyperchaotic
system to participate in the encryption process. The projected homogeneous coordinates
are obtained by the method of camera projection of the three-dimensional coordinates
of the original data to realize the effect of data scrambling in the three domains. Finally,
encrypted data are passed through fast Fourier inverse transform (IFFT) and the cyclic
prefix (CP) is added to obtain the encrypted OFDM.
Mathematics 2024, 12, x FOR PEER REVIEW 2 of 8
deoxyribonucleic acid (DNA) encoding and operational cryptographies through chaotic
systems [14]. Liang et al. used chaotic Hilbert motion encryption, and Hilbert motion on
the key and used the hash value generated from the encryption result as a digital signature
to eectively secure the OFDM-PON system [15]. Bai et al. used Chua’s circuit model to
realize an OFDM-PON security system with polarity-coded chaotic encryption [16].
In this paper, a scrambling method based on camera projection is proposed to oer a
low-complexity and novel design idea for enhancing the security of CO-OFDM systems.
The transmied data are encrypted by the principle of camera projection mapping, in
which the camera projection matrix is controlled by keys generated by a ve-dimensional
(5D) hyperchaotic system. Data in the subcarrier domain, symbol domain, and complex
domain of the three-domain coordinates are visualized in real-world three-dimensional
space, and the three-dimensional coordinates are projected through the camera to obtain
homogeneous coordinates so that the positional transformation of the coordinates reaches
the role of data perturbation. The feasibility and security of the encryption scheme are
veried by running back-to-back (BTB) and 80 km standard single-mode ber (SSMF)
computer simulations of the CO-OFDM system. The results show that the encryption
scheme has a decrease of 0.8 dB in peak-to-average power ratio (PAPR) and a key space
size of about 90
910× and the analysis of the bit error rate (BER) shows that the encryp-
tion scheme does not incur an additional BER cost. These are good indications that the
encryption scheme can eectively secure the CO-OFDM system.
2. Proposed Algorithm
Figure 1 demonstrates the physical layer encryption method to obtain the CO-OFDM
system employing camera projection. Firstly, the raw data are mapped into QAM symbols
after a serial-parallel (S/P) transformation such that the QAM symbols are arranged in the
subcarrier domain N = {1, 2,..., N}, the symbol domain S = {1, 2,..., S}, and the complex
number domain Q = {Re, Im}. Then, 5 keys are generated using the 5D hyperchaotic sys-
tem to participate in the encryption process. The projected homogeneous coordinates are
obtained by the method of camera projection of the three-dimensional coordinates of the
original data to realize the eect of data scrambling in the three domains. Finally, en-
crypted data are passed through fast Fourier inverse transform (IFFT) and the cyclic prex
(CP) is added to obtain the encrypted OFDM.
Figure 1. Physical layer encryption method based on camera projection for CO-OFDM system.
2.1. Camera Skewed Projection
The camera coordinate system is a three-dimensional coordinate system established
at the position of the aperture. The P point under the camera coordinate system is mapped
to the P’ point in the two-dimensional image plane and according to the principle of small-
hole imaging to aain (, ,)Pxyz=, then '( /, /)Pfxzfyz=, where
f
is the focal length.
The origin of the coordinate system of the pixel plane is at the lower left corner, while the
origin of the coordinate system of the image plane is at the center, and an oset of the
origin is required, i.e., '( / , / )
x
y
P
fx z c fy z c=+ +
. Since the image plane is measured in m
and the pixel plane is measured in pixels, the pixel-to-meter conversion quantities k and l
Figure 1. Physical layer encryption method based on camera projection for CO-OFDM system.
2.1. Camera Skewed Projection
The camera coordinate system is a three-dimensional coordinate system established at
the position of the aperture. The Ppoint under the camera coordinate system is mapped to
the P
point in the two-dimensional image plane and according to the principle of small-
hole imaging to attain
P= (x
,
y
,
z)
, then
P= ( f x/z
,
f y/z)
, where
f
is the focal length.
The origin of the coordinate system of the pixel plane is at the lower left corner, while the
origin of the coordinate system of the image plane is at the center, and an offset of the
origin is required, i.e.,
P= ( f x/z+cx
,
f y/z+cy)
. Since the image plane is measured
in m and the pixel plane is measured in pixels, the pixel-to-meter conversion quantities k
and l need to be decided on for the characteristics of the imaging components to obtain
P= ( f kx/z+cx
,
f ly/z+cy)
. With
α=f k
,
β=f l
, and
α
,
β
as the camera parameters,
then the homogeneous coordinate is P= (αx/z+cx,βy/z+cy).
Mathematics 2024,12, 1807 3 of 8
The pixel blocks in the real case are not square, but parallelograms. There will be
angles
θ
between the pixels, and then the mapping relation from the spatial point Punder
the camera coordinate system to the image point Pin the pixel coordinate system will be:
P=
x
y
z
=
ααcot θcx0
0β/ sin θcy0
0 0 1 0
x
y
z
1
. (1)
The encryption method is to regard (N, S, Q) as (x,y,z) in the real space, and subse-
quently, the encrypted (x
,y
,z
), which is (N
, S
, Q
), is obtained by processing the camera
projection scrambler of Equation (1). The data scrambling encryption is realized by using
the positional changes on the coordinates of the equation.
2.2. Key Generation and Processing
To defend against strong attacks by eavesdroppers, a 5D hyperchaotic system is
introduced that allows the generation of unpredictable sequences, which is described as:
.
x1=a(x2x1)
.
x2=cx1+dx2x1x3+x5
.
x3=bx3+x12
.
x4=ex2+f x4
.
x5=rx1kx5
, (2)
where
{x1x5}
are state variables,
a>
0,
b>
0,
c
,
d
and fare constant parameters, e
is a coupling parameter, and rand kare two control parameters, where
d>c
,
er =
0.
Fix
a=
10,
c=
28,
e=
10,
f=
0,
r=
10,
k=
0, and
b[
2, 11
]
. The system has two or
three positive Lyapunov exponents of hyperchaotic attractors [
25
]. The resulting
{x1x5}
sequences are processed as Key1–Key5 by the following equation:
Key1=mod(ceil(abs(x1)), 10000)
Key2=mod(ceil(abs(x2)), 10000)
Key3=mod(ceil(abs(x3)), 10000)
Key4=mod(ceil(abs(x4)), 10000)
Key5=mod(ceil(abs(x5)), 10000)
, (3)
where Key1 and Key2 are the camera parameters
α
and
β
, respectively, Key3 is the skew
angle θ, and Key4 and Key5 are the coordinate offsets cxand cy.
3. Simulation Experiments and Results
The computer simulation experiment for encrypted transmission of camera projections
for 16QAM CO-OFDM is built according to Figure 2. A pseudo-random binary sequence
(PRBS) is generated at the transmitter side as the raw data, which has a length of 204,800 bits.
The original data are mapped into 16QAM symbols, and the signal is converted into a
symbol matrix of the number of subcarriers
×
the number of OFDM symbols by S/P con-
version, and the real and imaginary numbers are separated to obtain the three-dimensional
coordinates (N, S, Q). Next, the camera projection encryption technique obtains the coordi-
nates (N
, S
, Q
) after the perturbation, and the original data are placed according to the
coordinates to obtain the encrypted data. IFFT and added CP processing are performed to
obtain encrypted OFDM symbols, where the CP length is 1/16 of the length of an OFDM
symbol, a training sequence of 20 symbols, and 4 pilots. The encrypted OFDM symbols are
processed through an arbitrary waveform generator (AWG) to obtain an electrical signal.
An external cavity laser (ECL) with a center wavelength of 1550 nm is used as a light source
for an optical IQ modulator so that an encrypted electrical signal is modulated into an
encrypted optical signal by the IQ modulator. A 0 dBm optical signal is transmitted over
Mathematics 2024,12, 1807 4 of 8
80 km SSMF with fiber dispersion of dispersion factor 17
×
10
27
s
2
/m and Gaussian white
noise. The total attenuation of the optical signal is 15 dB. Optical filtering and coherent
receiver detection are performed to convert the signal into an electrical signal. Where the
laser coherent detection power is a
6 dBm optical signal, the linewidth of the local laser is
less than 100 kHz and the frequency offset is ~300 kHz. Perform digital storage oscilloscope
(DSO) sampling. Compensate for IQ timing bias. Perform GSOP compensation for receiver
IQ mismatch [
26
,
27
]. Perform electronic dispersion compensation (EDC) for distortion gen-
erated by dispersion. Carry out frequency bias estimation and phase noise [
28
]. Suppress
narrow-band interference caused by clock leakage of the DAC in the 20 GHz band with an
adaptive trap filter [
29
], and other treatments. After synchronization and S/P conversion
to obtain the signal matrix, the signal is converted to the frequency domain by FFT and the
data are decrypted by camera projection. The decrypted signal is channel estimated and
balanced [
30
], and the remaining phase noise is estimated with the help of the pilots. The
signal is de-mapped to obtain the bit data.
Mathematics 2024, 12, x FOR PEER REVIEW 4 of 8
according to the coordinates to obtain the encrypted data. IFFT and added CP processing
are performed to obtain encrypted OFDM symbols, where the CP length is 1/16 of the
length of an OFDM symbol, a training sequence of 20 symbols, and 4 pilots. The encrypted
OFDM symbols are processed through an arbitrary waveform generator (AWG) to obtain
an electrical signal. An external cavity laser (ECL) with a center wavelength of 1550 nm is
used as a light source for an optical IQ modulator so that an encrypted electrical signal is
modulated into an encrypted optical signal by the IQ modulator. A 0 dBm optical signal
is transmied over 80 km SSMF with ber dispersion of dispersion factor
27 2
17 10 s / m
×
and Gaussian white noise. The total aenuation of the optical signal is 15 dB. Optical l-
tering and coherent receiver detection are performed to convert the signal into an electri-
cal signal. Where the laser coherent detection power is a -6 dBm optical signal, the lin-
ewidth of the local laser is less than 100 kHz and the frequency oset is ~300 kHz. Perform
digital storage oscilloscope (DSO) sampling. Compensate for IQ timing bias. Perform
GSOP compensation for receiver IQ mismatch [26,27]. Perform electronic dispersion com-
pensation (EDC) for distortion generated by dispersion. Carry out frequency bias estima-
tion and phase noise [28]. Suppress narrow-band interference caused by clock leakage of
the DAC in the 20 GHz band with an adaptive trap lter [29], and other treatments. After
synchronization and S/P conversion to obtain the signal matrix, the signal is converted to
the frequency domain by FFT and the data are decrypted by camera projection. The de-
crypted signal is channel estimated and balanced [30], and the remaining phase noise is
estimated with the help of the pilots. The signal is de-mapped to obtain the bit data.
Figure 2. Simulated experimental plot of a security enhanced 16QAM CO-OFDM system based on
camera projection for transmission over 80 km SSMF. EA: electrical amplier; IQM: I/Q modulator;
EDFA: erbium-doped optical ber amplier; TOF: tunable optical lter; VOA: variable optical aen-
uator; ICR: integrated coherent receiver; FOE: frequency oset estimation; PN: phase noise.
The original and encrypted signals go through a transmission system of CO-OFDM
with BTB and 80 km SSMF, and the relationship between the optical signal noise ratio
(OSNR) and BER is observed in Figure 3. When data are passed through the camera pro-
jection encryption system, the BER of the data stolen by illegal users is about 0.5, which is
equivalent to invalid data. When the OSNR is greater than 21.5 dB, after the authorized
users use the key to decrypt the encrypted data transmied over the BTB and 80 km SSMF,
the data have a BER lower than the forward error correction (FEC), which is equivalent to
valid data. The curves of the original and encrypted signals are very close to each other,
which intuitively reects that the encryption system has a negligible eect on the BER.
Figure 2. Simulated experimental plot of a security enhanced 16QAM CO-OFDM system based on
camera projection for transmission over 80 km SSMF. EA: electrical amplifier; IQM: I/Q modulator;
EDFA: erbium-doped optical fiber amplifier; TOF: tunable optical filter; VOA: variable optical
attenuator; ICR: integrated coherent receiver; FOE: frequency offset estimation; PN: phase noise.
The original and encrypted signals go through a transmission system of CO-OFDM
with BTB and 80 km SSMF, and the relationship between the optical signal noise ratio
(OSNR) and BER is observed in Figure 3. When data are passed through the camera
projection encryption system, the BER of the data stolen by illegal users is about 0.5, which
is equivalent to invalid data. When the OSNR is greater than 21.5 dB, after the authorized
users use the key to decrypt the encrypted data transmitted over the BTB and 80 km SSMF,
the data have a BER lower than the forward error correction (FEC), which is equivalent to
valid data. The curves of the original and encrypted signals are very close to each other,
which intuitively reflects that the encryption system has a negligible effect on the BER.
The OFDM signals generated by the superposition of multiple subcarriers will have
the same phase signal modulation when the subcarriers are in the same phase, resulting
in the generation of a large PAPR. However, OFDM signals with large PAPR easily cause
nonlinear distortion, which makes the system performance degraded [
1
]. Figure 4depicts
the complementary cumulative distribution function (CCDF) of the PAPR of the original
and encrypted signals in the CO-OFDM system. It is demonstrated that the encryption
scheme can optimize the PAPR performance of the CO-OFDM system by about 0.8 dB,
which in turn reduces the signal impairment.
Mathematics 2024,12, 1807 5 of 8
Mathematics 2024, 12, x FOR PEER REVIEW 5 of 8
Figure 3. Measured BER curves for CO-OFDM signals in dierent congurations.
The OFDM signals generated by the superposition of multiple subcarriers will have
the same phase signal modulation when the subcarriers are in the same phase, resulting
in the generation of a large PAPR. However, OFDM signals with large PAPR easily cause
nonlinear distortion, which makes the system performance degraded [1]. Figure 4 depicts
the complementary cumulative distribution function (CCDF) of the PAPR of the original
and encrypted signals in the CO-OFDM system. It is demonstrated that the encryption
scheme can optimize the PAPR performance of the CO-OFDM system by about 0.8 dB,
which in turn reduces the signal impairment.
Figure 4. Comparison of the CCDFs for the CO-OFDM signals with and without encryption.
Figure 5a shows a comparison of the sequence 1(400 : 600)x after 1000 iterations of
varying the initial value of 1
x
by a gap of 15
10 in the chaotic system, and Figure 5b
shows a comparison of the sequence 1(400 : 600)x after 1000 iterations of varying the var-
iable parameter b by a gap of 15
10 in the chaotic system. These two plots adequately
illustrate the sensitivity of the 5D hyperchaotic system to initial values and variable pa-
rameter b. Slight variations in the initial values and the parameters of the system make
the resulting sequences dierent, reecting the unpredictability of the sequences
Figure 3. Measured BER curves for CO-OFDM signals in different configurations.
x
Figure 4. Comparison of the CCDFs for the CO-OFDM signals with and without encryption.
Figure 5a shows a comparison of the sequence
x1
(400:600) after 1000 iterations of
varying the initial value of
x1
by a gap of 10
15
in the chaotic system, and Figure 5b shows
a comparison of the sequence
x1
(400:600) after 1000 iterations of varying the variable
parameter b by a gap of 10
15
in the chaotic system. These two plots adequately illustrate
the sensitivity of the 5D hyperchaotic system to initial values and variable parameter b.
Slight variations in the initial values and the parameters of the system make the resulting
sequences different, reflecting the unpredictability of the sequences generated by the system.
The key space size of the camera projection encryption scheme is determined by the initial
values and parameters of the 5D hyperchaotic system, so the key space size provided by the
five initial values and variable parameters b is about (10
15
)
5×
(11
2)
×
10
15
= 9
×
10
90
,
which can effectively resist brute force attacks. Table 1shows the comparison of this paper
with some representative schemes in terms of key space. By comparison, it is concluded
that this scheme has superior key space size and low computational complexity compared
to most of the security schemes [
14
,
17
,
18
], some of which have large key space, but require
high computational complexity to achieve this effect [19].
Mathematics 2024,12, 1807 6 of 8
Mathematics 2024, 12, x FOR PEER REVIEW 6 of 8
generated by the system. The key space size of the camera projection encryption scheme
is determined by the initial values and parameters of the 5D hyperchaotic system, so the
key space size provided by the ve initial values and variable parameters b is about
15 5 15 90
(10 ) (11 2) 1 0 9 10×−× =× , which can eectively resist brute force aacks. Table 1
shows the comparison of this paper with some representative schemes in terms of key
space. By comparison, it is concluded that this scheme has superior key space size and
low computational complexity compared to most of the security schemes [14,17,18], some
of which have large key space, but require high computational complexity to achieve this
eect [19].
(a) (b)
Figure 5. Sequence 1
x
of the 5D hyperchaotic system and (a) 1'
x
varying with the initial value 1
x
and (b) with the parameter b when n is between 400 and 600.
Table 1. Scheme key space comparison.
Schemes Key Space
DNA encoding [14] 89
2.25 10×
Digital optical polarization scrambling [17] 60
10
Key concealment and distribution based on carrier scrambling [18] 82
10
Chaos key enhanced based on the convolutional long short-term
memory neural network [19]
241
10
The proposed scheme 90
910×
Figure 6 is obtained by adding the analysis of the ability to resist statistical aacks,
where the horizontal coordinate is the constellation points of 16QAM and the vertical co-
ordinate is the percentage of constellation points to the total data. This gure shows that
the distribution of the ciphertext data is uniform and the aacker cannot obtain the infor-
mation by statistical aack.
Figure 5. Sequence
x1
of the 5D hyperchaotic system and (a)
x1
varying with the initial value
x1
and
(b) with the parameter b when n is between 400 and 600.
Table 1. Scheme key space comparison.
Schemes Key Space
DNA encoding [14]2.25 ×1089
Digital optical polarization scrambling [17]1060
Key concealment and distribution based on carrier scrambling [18]1082
Chaos key enhanced based on the convolutional long short-term
memory neural network [19]10241
The proposed scheme 9×1090
Figure 6is obtained by adding the analysis of the ability to resist statistical attacks,
where the horizontal coordinate is the constellation points of 16QAM and the vertical
coordinate is the percentage of constellation points to the total data. This figure shows
that the distribution of the ciphertext data is uniform and the attacker cannot obtain the
information by statistical attack.
Mathematics 2024, 12, x FOR PEER REVIEW 7 of 8
Figure 6. Ver ication of encrypted signals against statistical aacks.
4. Conclusions
In this paper, we propose an approach that utilizes the idea of camera projection to
enhance the physical layer security and transmission performance of CO-OFDM systems.
The randomized keys obtained through the 5D hyperchaotic system control the camera
projection matrix and thus perturb the data. In the simulation experiments of the encryp-
tion scheme for a 16QAM CO-OFDM system over 80 km SSMF, the results show the fea-
sibility and security of the scheme, which provides a key space of about 90
910× . The
eavesdropper cannot obtain the valid data—only the authorized users can. Also, the PAPR
is reduced by about 0.8 dB.
Author Contributions: Conceptualization, Y.L. and D.W.; methodology, Y.L.; software, Y.L.; valida-
tion, Y.L., D.W. and X.W.; formal analysis, H.D.; resources, Z.L.; data curation, Y.L.; writingorigi-
nal draft preparation, Y.L.; writingreview and editing, D.W.; visualization, Y.L.; supervision, D.W.;
project administration, D.W.; funding acquisition, D.W. All authors have read and agreed to the
published version of the manuscript.
Funding: This work was supported by the R&D Program of Beijing Municipal Education Commis-
sion (KM202310015002), general research project of Beijing Association of Higher Education
(20240014), research project on digital education in Beijing (20240022), Jiangxi Provincial Natural
Science Foundation (20232BAB212006), Scientic Research Project of Fuyang Normal University
(2022KYQD0004), Anhui Education Department, University Natural Science Research Project of An-
hui Province (2022AH051338), Henan Key Laboratory of Visible Light Communications
(HKLVLC2023-B10), and the Youth Excellence Project of Beijing Institute of Graphic Communica-
tion (Ea202411).
Data Availability Statement: The original contributions presented in the study are included in the
article. Further inquiries can be directed to the corresponding author.
Conicts of Interest: The authors declare no conicts of interest.
References
1. William, S.; Djordjevic, I.B. OFDM for Optical Communications; Academic Press: Cambridge, MA, USA, 2009.
2. Chandrasekhar, S.; Liu, x. Ofdm Based Superchannel Transmission Technology. J. Light. Technol. 2012, 30, 3816–3823.
3. Wang, D.; Tang, X.; Xi, L.; Zhang, X.; Zhang, W.; Zhang, H. A scheme to generate 16QAM-OFDM vector mm-wave signal based
on a single MZM without optical lter and precoding. Opt. Commun. 2020, 475, 126227.
4. Agrawal, G.P. Fiber-Optic Communication Systems; John Wiley & Sons: Hoboken, NJ, USA, 2012.
5. Agrell, E.; Karlsson, M.; Chraplyvy, A.R.; Richardson, D.J.; Krummrich, P.M.; Winzer, P.; Roberts, K.; Fischer, J.K.; Savory, S.J.;
Eggleton, B.J.; et al. Roadmap of optical communications. J. Opt. 2016, 18, 063002.
6. Mitev, M.; Pham, T.M.; Chorti, A.; Barreto, A.N.; Feweis, G. Physical layer security-from theory to practice. IEEE BITS Inf.
Theory Mag. 2023, 1–12, doi:10.1109/MBITS.2023.3338569.
Figure 6. Verification of encrypted signals against statistical attacks.
4. Conclusions
In this paper, we propose an approach that utilizes the idea of camera projection to
enhance the physical layer security and transmission performance of CO-OFDM systems.
The randomized keys obtained through the 5D hyperchaotic system control the camera
projection matrix and thus perturb the data. In the simulation experiments of the encryption
Mathematics 2024,12, 1807 7 of 8
scheme for a 16QAM CO-OFDM system over 80 km SSMF, the results show the feasibility
and security of the scheme, which provides a key space of about 9
×
10
90
. The eavesdropper
cannot obtain the valid data—only the authorized users can. Also, the PAPR is reduced by
about 0.8 dB.
Author Contributions: Conceptualization, Y.L. and D.W.; methodology, Y.L.; software, Y.L.; valida-
tion, Y.L., D.W. and X.W.; formal analysis, H.D.; resources, Z.L.; data curation, Y.L.; writing—original
draft preparation, Y.L.; writing—review and editing, D.W.; visualization, Y.L.; supervision, D.W.;
project administration, D.W.; funding acquisition, D.W. All authors have read and agreed to the
published version of the manuscript.
Funding: This work was supported by the R&D Program of Beijing Municipal Education Commission
(KM202310015002), general research project of Beijing Association of Higher Education (20240014),
research project on digital education in Beijing (20240022), Jiangxi Provincial Natural Science Founda-
tion (20232BAB212006), Scientific Research Project of Fuyang Normal University (2022KYQD0004),
Anhui Education Department, University Natural Science Research Project of Anhui Province
(2022AH051338), Henan Key Laboratory of Visible Light Communications (HKLVLC2023-B10),
and the Youth Excellence Project of Beijing Institute of Graphic Communication (Ea202411).
Data Availability Statement: The original contributions presented in the study are included in the
article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. William, S.; Djordjevic, I.B. OFDM for Optical Communications; Academic Press: Cambridge, MA, USA, 2009.
2.
Chandrasekhar, S.; Liu, x. Ofdm Based Superchannel Transmission Technology. J. Light. Technol. 2012,30, 3816–3823. [CrossRef]
3.
Wang, D.; Tang, X.; Xi, L.; Zhang, X.; Zhang, W.; Zhang, H. A scheme to generate 16QAM-OFDM vector mm-wave signal based
on a single MZM without optical filter and precoding. Opt. Commun. 2020,475, 126227. [CrossRef]
4. Agrawal, G.P. Fiber-Optic Communication Systems; John Wiley & Sons: Hoboken, NJ, USA, 2012.
5.
Agrell, E.; Karlsson, M.; Chraplyvy, A.R.; Richardson, D.J.; Krummrich, P.M.; Winzer, P.; Roberts, K.; Fischer, J.K.; Savory, S.J.;
Eggleton, B.J.; et al. Roadmap of optical communications. J. Opt. 2016,18, 063002. [CrossRef]
6.
Mitev, M.; Pham, T.M.; Chorti, A.; Barreto, A.N.; Fettweis, G. Physical layer security-from theory to practice. IEEE BITS Inf. Theory
Mag. 2023, 1–12. [CrossRef]
7.
Zhang, G.; Zhao, Z.; Dai, J.; Yang, S.; Fu, X.; Yang, L. Polarization-Based Quantum Key Distribution Encoder and Decoder on
Silicon Photonics. J. Light. Technol. 2022,40, 2052–2059. [CrossRef]
8.
Su, G.; Pu, T.; Zheng, J.; Tan, Y. Performance Analysis of Multi-User Optical Steganography Transmission System Based on
Filtered Amplified Spontaneous Emission Noise. IEEE Access 2019,7, 170733–170741. [CrossRef]
9.
Ghafouri-Shiraz, H.; Karbassian, M.M. Optical Cdma Networks: Principles, Analysis and Applications; John Wiley & Sons: Hoboken,
NJ, USA, 2012.
10.
Lu, Y.; Wang, H.; Ji, Y. A Time-Delay Signature Elimination and Broadband Electro-Optic Chaotic System with Enhanced
Nonlinearity by Deep Learning. Opt. Express 2022,30, 17698–17712. [CrossRef] [PubMed]
11.
Lu, Y.; Wang, H.; Ji, Y.; Zhang, Y. Security-enhanced electro-optic chaotic communication system based on the logistic map
feedback and dynamic key. J. Opt. Soc. Am. B 2023,40, 1131–1140. [CrossRef]
12.
Tang, B.; Gao, X.; Su, B.; An, Y.; Wang, A.; Wang, Y.; Qin, Y.; Gao, Z. Time-delay signature concealment in a security-enhanced
optical system with dual-loop electro-optic self-feedback phase encryption. IEEE Photon-J. 2023,15, 7200508. [CrossRef]
13.
Bai, J.; Wang, H.; Ji, Y. Time-delay signature concealing electro-optic chaotic system with multiply feedback nonlinear loops. Opt.
Express 2021,29, 706–718. [CrossRef]
14.
Zhang, C.; Zhang, W.; Chen, C.; He, X.; Qiu, K. Physical-Enhanced Secure Strategy for Ofdma-Pon Using Chaos and Deoxyri-
bonucleic Acid Encoding. J. Light. Technol. 2018,36, 1706–1712. [CrossRef]
15.
Liang, X.; Zhang, C.; Luo, Y.; Wang, X.; Qiu, K. Secure Encryption and Key Management for OFDM-PON Based on Chaotic
Hilbert Motion. J. Light. Technol. 2023,41, 1619–1625. [CrossRef]
16.
Bai, Y.; Liu, B.; Ren, J.; Mao, Y.; Qi, Z.; Chen, S.; Song, X.; Zhu, S.; Yuan, L.; Han, S.; et al. Highly Secure and Reliable 7-Core Fiber
Optical OFDM Access System Based on Chaos Encryption Inside Polar Code. IEEE Photon-J. 2022,14, 7200506. [CrossRef]
17.
Tang, X.; Xu, Z.; Gao, C.; Xiao, Y.; Liu, L.; Zhang, X.; Xi, L.; Xu, H.; Bai, C. Physical layer encryption for coherent PDM system
based on polarization perturbations using a digital optical polarization scrambler. Opt. Express 2023,31, 26791–26806. [CrossRef]
[PubMed]
18.
Weng, Z.; Ren, J.; Bo, L.; Mao, Y.; Wu, X.; Song, X.; Chen, S.; Ma, Y.; Zhao, N.; Yu, Y.; et al. A physical layer security scheme for key
concealment and distribution based on carrier scrambling. Opt. Express 2024,32, 15053–15064. [CrossRef]
Mathematics 2024,12, 1807 8 of 8
19.
Zha, Y.; Ren, J.; Liu, B.; Mao, Y.; Wu, X.; Ullah, R.; Song, X.; Chen, S.; Ma, Y.; Wang, F.; et al. Chaos key enhanced physical
layer secure transmission method based on the convolutional long short-term memory neural network. Opt. Express 2024,32,
20515–20527. [CrossRef]
20.
Zhang, Y.; Jiang, N.; Zhao, A.; Liu, S.; Peng, J.; Chen, L.; Lavery, M.P.J.; Abbas, H.T.; Qiu, K. Security enhancement in coherent
OFDM optical transmission with chaotic three-dimensional constellation scrambling. J. Light. Technol. 2022,40, 3749–3760.
[CrossRef]
21. Liu, L.; Tang, X.; Li, F.; Xu, Z.; Zhang, X. Enhanced physical layer security and PAPR performance based on disturbance of data
cluster under chaotic sequence color seeking mechanism in CO-OFDM system. J. Light. Technol. 2023,41, 6507–6513. [CrossRef]
22.
Huang, X.; Zhang, L.; Hu, W.; Turkiewicz, J.P.; Leitgeb, E.; Yang, X. Secure OFDM-PON Using Chaotic Constellation Mapping
and Probabilistic Shaping. IEEE Photon-Technol. Lett. 2021,33, 1139–1142. [CrossRef]
23.
Zeng, W.; Zhang, C.; Liang, X.; Luo, Y.; Wang, X.; Qiu, K. Chaotic phase noise-like encryption based on geometric shaping for
coherent data center interconnections. Optics Express 2024,32, 1595–1608. [CrossRef]
24.
Wu, Y.; Yu, Y.; Hu, Y.; Sun, Y.; Wang, T.; Zhang, Q. Channel-based dynamic key generation for physical layer security in
OFDM-PON systems. IEEE Photon-J. 2021,13, 7900209. [CrossRef]
25.
Yang, Q.; Bai, M. A New 5D Hyperchaotic System Based on Modified Generalized Lorenz System. Nonlinear Dyn. 2016,88,
189–221. [CrossRef]
26.
Savory, S.J. Digital coherent optical receivers: Algorithms and subsystems. IEEE J. Sel. Top. Quantum Electron. 2010,16, 1164–1179.
[CrossRef]
27.
Chung, H.S.; Chang, S.H.; Kim, K. Effect of IQ mismatch compensation in an optical coherent OFDM receiver. IEEE Photon-Technol.
Lett. 2010,22, 308–310. [CrossRef]
28.
Jansen, S.L.; Morita, I.; Schenk, T.C.W.; Takeda, N.; Tanaka, H. Coherent optical 25.8-Gb/s OFDM transmission over 4160-km
SSMF. J. Light. Technol. 2008,26, 6–15. [CrossRef]
29.
Li, F.; Zou, D.; Ding, L.; Sun, Y.; Li, J.; Sui, Q.; Li, L.; Yi, X.; Li, Z. 100 Gbit/s PAM4 signal transmission and reception for 2-km
interconnect with adaptive notch filter for narrowband interference. Opt. Express 2018,26, 24066–24074. [CrossRef]
30.
Nguyen, T.-H.; Bramerie, L.; Gay, M.; Kazdoghli-Lagha, M.; Peucheret, C.; Gerzaguet, R.; Gorza, S.P.; Louveaux, J.; Horlin, F.
Experimental demonstration of the tradeoff between chromatic dispersion and phase noise compensation in optical FBMC/OQAM
communication systems. J. Light. Technol. 2019,37, 4340–4348. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
In this paper, we propose a method for training a key-enhanced chaotic sequence using the convolutional long short term memory neural network (CLSTM-NN) for secure transmission. This method can cope with the potential security risk posed by the degradation of chaotic dynamics when using chaotic model encryption in traditional secure transmissions. The simulation results show that the proposed method improves the key space by 10³⁶ compared to traditional chaotic models, reaching 10²⁴¹. The method was applied to orthogonal chirp division multiplexing (OCDM). To demonstrate the feasibility of the proposed scheme, we conducted transmission experiments of encrypted 16 quadrature amplitude modulation (QAM) OCDM signals at a speed of 53.25 Gb/s over a 2 km length of 7-core optical fiber and test different encryption schemes. After key enhancements, the overall number of keys in the system can increase from 18 to 10⁵.The results show that there is no significant difference between the bit error rate (BER) performance of the encryption method proposed in this paper and the traditional encryption method. The maximum performance difference between the different systems does not exceed 1 dBm. This fact proves the feasibility of the proposed scheme and provides new ideas for the next generation of secure transmission.
Article
Full-text available
The purpose of this study is to present a physical layer security scheme for key concealment and distribution based on carrier scrambling. The three-dimensional (3D) Lorenz system is used to generate independent chaotic sequences that encrypt the information with bit, constellation and subcarrier. In order to realize the flexible distribution of the key and ensure its security, the key information is loaded into a specific subcarrier. While key subcarrier and the ciphertext subcarrier are scrambled simultaneously. The encrypted key position information is processed and transmitted in conjunction with the training sequence (TS) to facilitate demodulation by the legitimate receiver. The processed TS can accommodate up to 10 key position information, thereby demonstrating the scheme's exceptional scalability. Experimental results show that the proposed scheme can safely transmit 131.80 Gb/s Orthogonal frequency division multiplexing (OFDM) signals across 2 km 7-core fiber. Meanwhile, the scheme enables simultaneous flexible distribution and concealment of the key, thereby offering a promising solution for physical layer security.
Article
Full-text available
The network traffic of data centers (DCs) has increased unprecedentedly with the rapid development of digital economy. However, the data transmission faces security threats in the distributed optical interconnection and intensive interaction of DC networks. In this paper, we propose a chaotic phase noise-like encryption algorithm using geometric shaping (GS) for coherent DC interconnections (DCIs). A GS constellation is used to improve transmission performance, and it is combined with coherent equalization algorithms to improve security performance. Then, a chaotic encryption is designed based on phase noise-like transformation (PNLT). The data are effectively scrambled, and the confusion level of phase can be increased. Finally, 216 Gb/s 8-quadrature amplitude modulation (8-QAM) encrypted data are successfully verified on a 240 km transmission link of DCIs. The results show that this scheme can achieve a bit error rate (BER) performance gain of 1.1 dB and provide a highly compatible solution for realizing security enhanced DCIs.
Article
Full-text available
In this paper, a security enhanced physical layer encryption scheme is proposed for coherent optical polarization division multiplexing (PDM) systems. The concept of a digital optical polarization scrambler (DOPS) is introduced to apply high speed rotation of state of polarization (RSOP) to the transmitted signal, which enables encryption based on polarization perturbations and offers superior flexibility in polarization management. By utilizing different combinations of digital polarization device matrices and adjusting their key parameters, four encryption modes are designed. The proposed encryption scheme is successfully implemented in a PDM-QPSK system at the data rate of 32 Gbps. Experimental results demonstrate that authorized users can successfully decrypt the received signal, while the eavesdroppers cannot derive useful information with a bit error rate (BER) at approximately 0.5. To enhance system security, a 5-D chaotic system is introduced with superior properties of high sensitivity to initial values and improved uniform distribution, which guarantees the large entropy and further the system’s security. This scheme can effectively prevent against brute attacks with the expanded key space of 10⁶⁰.
Article
Full-text available
In this paper, a novel electro-optic chaotic system based on the logistic map feedback (EOLM) is proposed. The logistic map is used to introduce additional nonlinear effects into the electro-optic feedback loop. The simulation results show that, with the increase of logistic map iterations $N$ N , the bandwidth and permutation entropy of the chaotic output can be significantly increased, and the spectrum is flatter. The time-delay signature (TDS) of the system can be concealed within the appropriate range of values of parameters, which ensures the security of the key. Synchronization results show that the system is not only sensitive to time delay $T$ T but is also sensitive to the feedback intensity $\beta$ β , so $\beta$ β is also the key of the system. Utilizing the sensitivity to $\beta$ β , a dynamic EOLM communication system with changing key (DEOLM) is designed. Based on chaotic self-control, the chaotic optical signal is transformed nonlinearly to generate the control signal, which drives the gain coefficient of the amplifier to change dynamically, so as to realize the changing of $\beta$ β . Simulation of communication performance shows that the DEOLM system greatly raises the difficulty for the eavesdropper to crack the message and improves the confidentiality of communication.
Article
Full-text available
In this paper, a novel phase encryption scheme based on a dual-loop electro-optic self-feedback structure is proposed for time-delay signature (TDS) concealment. As for a conventional single-loop feedback structure, the TDS is extremely vulnerable to exposure in the common link, resulting in a fatal weakness in the entire security system, whereas, the introduction of an additional feedback branch, brings about the mutual dynamics between the phase feedbacks, and effectively solves the problem. The modulation depth and dispersion values, which are two crucial variables affecting TDS concealment, are investigated in detail. In principle, the scheme is verified to have better robustness, more security, and can supply large key space. Error-free transmission of high-speed signals is possible. Thanks to the aforementioned benefits, the dual-loop electro-optic structure proposed could inspire fresh ideas for secure optical communication systems in the future.
Article
In this article we present the evolutionary journey of physical layer security (PLS), starting from its theoretical foundations in wiretap coding and secret key generation followed by to the revolutionary advancements in authentication using physical unclonable functions (PUFs), localization and RF fingerprinting. Since the middle of last century the theory behind PLS has been constantly evolving, however, practical solutions are still scarce. Through a critical review, we identify the key hurdles hindering the widespread adoption of PLS. Moreover, we highlight important research directions and possible solutions that can bridge the gap between theory and practice.
Article
This study proposes a physical layer encryption scheme based on disturbance of data cluster under color seeking mechanism of chaotic sequence which is generated by Brownian motion determined by keys aiming to improve security of coherent optical orthogonal frequency division multiplexing (CO-OFDM) system. Chaotic sequences with good randomness and unpredictability are endowed with a unique color composed of two primary colors and go through order transformation by sorting and seeking, which forms the chaotic sequence color seeking mechanism. The disturbance of transmitted data is realized according to chaotic sequence color seeking mechanism and PAPR performance is optimized simultaneously. The security of system is enhanced due to a key space of 10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">90</sup> and PAPR can be reduced by 0.5 dB. An experiment conducted in a 40 GHz 16QAM CO-OFDM system over an 80 km standard single mode fiber (SSMF) shows that the authorized user can successfully decrypt the received signal, while the eavesdroppers cannot derive valid information with bit error rate (BER) at approximately 0.5. Analyses of peak to average power ratio (PAPR) performance and time complexity of the scheme are further carried out under different cluster forming methods to derive the optimized configuration which is critical in encryption.
Article
We propose a novel security enhancement technique for physical layer secure orthogonal frequency division multiplexed-based passive optical network (OFDM-PON) using chaotic Hilbert motion. By using chaos to construct Hilbert motion, the traversal and the scrambling of two-dimensional (2D) symbol matrix are completed. To enhance the security of the key, we use the key space as an encryption object for the first time, and then we use it as a supporter for key generation and distribution. The Hash value generated by this encryption result is applied as a digital signature to verify the data integrity. An experiment that the signals of 35.29 Gb/s are successfully transmitted over 20 km standard single-mode fiber (SSMF) and a back-to-back (BTB) system. The experimental results show that this scheme provides an effective and widely applicable solution for realizing secure OFDM-PON with high security and low complexity.