{"title":"在模式分割多路复用光纤系统中利用标签优化实现安全传输的映射变化调制技术","authors":"Yi Lei;Qi Lu;Bin Chen;Zhongyi Guo","doi":"10.1364/JOCN.512467","DOIUrl":null,"url":null,"abstract":"To improve the physical-layer security of mode-division multiplexing (MDM) systems, a simple security scheme named mapping-varied modulation (MVM) is proposed in this paper by combining cryptographic and information-theoretic security. Specifically, on top of the information-theoretic security provided by the less-conditioned wiretap channel due to the larger mode-dependent loss induced by fiber-bend tapping, the proposed MVM security method varies the mapping rules of the adopted constellations for the subchannels (one subchannel corresponds to one mode) by using the inherently time-varying random channel state information (CSI) of the MDM fiber, under the assumption that an eavesdropper does not know the exact instantaneous CSI of the legitimate link. To maximize the difference among the binary labels of the constellation points in the same position for each subchannel, a labeling optimization method is proposed as well. Numerical results demonstrate the effectiveness of the proposed MVM method via bit-error ratio performance and secrecy rate, showing a potential way to improve the security of the MDM link for high-speed data transmission.","PeriodicalId":50103,"journal":{"name":"Journal of Optical Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.0000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mapping-varied modulation with labeling optimization for secure transmission in mode-division-multiplexed fiber-optic systems\",\"authors\":\"Yi Lei;Qi Lu;Bin Chen;Zhongyi Guo\",\"doi\":\"10.1364/JOCN.512467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To improve the physical-layer security of mode-division multiplexing (MDM) systems, a simple security scheme named mapping-varied modulation (MVM) is proposed in this paper by combining cryptographic and information-theoretic security. Specifically, on top of the information-theoretic security provided by the less-conditioned wiretap channel due to the larger mode-dependent loss induced by fiber-bend tapping, the proposed MVM security method varies the mapping rules of the adopted constellations for the subchannels (one subchannel corresponds to one mode) by using the inherently time-varying random channel state information (CSI) of the MDM fiber, under the assumption that an eavesdropper does not know the exact instantaneous CSI of the legitimate link. To maximize the difference among the binary labels of the constellation points in the same position for each subchannel, a labeling optimization method is proposed as well. Numerical results demonstrate the effectiveness of the proposed MVM method via bit-error ratio performance and secrecy rate, showing a potential way to improve the security of the MDM link for high-speed data transmission.\",\"PeriodicalId\":50103,\"journal\":{\"name\":\"Journal of Optical Communications and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Optical Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10485229/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Optical Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10485229/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Mapping-varied modulation with labeling optimization for secure transmission in mode-division-multiplexed fiber-optic systems
To improve the physical-layer security of mode-division multiplexing (MDM) systems, a simple security scheme named mapping-varied modulation (MVM) is proposed in this paper by combining cryptographic and information-theoretic security. Specifically, on top of the information-theoretic security provided by the less-conditioned wiretap channel due to the larger mode-dependent loss induced by fiber-bend tapping, the proposed MVM security method varies the mapping rules of the adopted constellations for the subchannels (one subchannel corresponds to one mode) by using the inherently time-varying random channel state information (CSI) of the MDM fiber, under the assumption that an eavesdropper does not know the exact instantaneous CSI of the legitimate link. To maximize the difference among the binary labels of the constellation points in the same position for each subchannel, a labeling optimization method is proposed as well. Numerical results demonstrate the effectiveness of the proposed MVM method via bit-error ratio performance and secrecy rate, showing a potential way to improve the security of the MDM link for high-speed data transmission.
期刊介绍:
The scope of the Journal includes advances in the state-of-the-art of optical networking science, technology, and engineering. Both theoretical contributions (including new techniques, concepts, analyses, and economic studies) and practical contributions (including optical networking experiments, prototypes, and new applications) are encouraged. Subareas of interest include the architecture and design of optical networks, optical network survivability and security, software-defined optical networking, elastic optical networks, data and control plane advances, network management related innovation, and optical access networks. Enabling technologies and their applications are suitable topics only if the results are shown to directly impact optical networking beyond simple point-to-point networks.