{"title":"利用二维蜂窝自动机和图灵模式级联扰码辅助定点扩展逻辑混沌加密增强 NOMA-PON 的安全性","authors":"Yun Wang;Qi Zhang;Xiangjun Xin;Meng Sun;Ran Gao;Haipeng Yao;Feng Tian;Qinghua Tian;Yongjun Wang;Fu Wang;Sitong Zhou;Zuolin Li;Zhipei Li","doi":"10.1364/JOCN.525848","DOIUrl":null,"url":null,"abstract":"The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision \n<tex>$f$</tex>\n, the length \n<tex>$l$</tex>\n of the transmitted bit, and the size \n<tex>$T$</tex>\n of the TP, with the value of \n<tex>${2^{2f + l + T \\times T}}$</tex>\n. The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.","PeriodicalId":50103,"journal":{"name":"Journal of Optical Communications and Networking","volume":"16 12","pages":"1204-1217"},"PeriodicalIF":4.0000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption\",\"authors\":\"Yun Wang;Qi Zhang;Xiangjun Xin;Meng Sun;Ran Gao;Haipeng Yao;Feng Tian;Qinghua Tian;Yongjun Wang;Fu Wang;Sitong Zhou;Zuolin Li;Zhipei Li\",\"doi\":\"10.1364/JOCN.525848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision \\n<tex>$f$</tex>\\n, the length \\n<tex>$l$</tex>\\n of the transmitted bit, and the size \\n<tex>$T$</tex>\\n of the TP, with the value of \\n<tex>${2^{2f + l + T \\\\times T}}$</tex>\\n. The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.\",\"PeriodicalId\":50103,\"journal\":{\"name\":\"Journal of Optical Communications and Networking\",\"volume\":\"16 12\",\"pages\":\"1204-1217\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Optical Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10753339/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Optical Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10753339/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption
The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision
$f$
, the length
$l$
of the transmitted bit, and the size
$T$
of the TP, with the value of
${2^{2f + l + T \times T}}$
. The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.
期刊介绍:
The scope of the Journal includes advances in the state-of-the-art of optical networking science, technology, and engineering. Both theoretical contributions (including new techniques, concepts, analyses, and economic studies) and practical contributions (including optical networking experiments, prototypes, and new applications) are encouraged. Subareas of interest include the architecture and design of optical networks, optical network survivability and security, software-defined optical networking, elastic optical networks, data and control plane advances, network management related innovation, and optical access networks. Enabling technologies and their applications are suitable topics only if the results are shown to directly impact optical networking beyond simple point-to-point networks.