Cross-layer security based on optical CDMA and algorithmic cryptography
Title | Cross-layer security based on optical CDMA and algorithmic cryptography |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Li, W., Ji, J., Zhang, G., Zhang, W. |
Conference Name | 2016 IEEE Optoelectronics Global Conference (OGC) |
Date Published | Sept. 2016 |
Publisher | IEEE |
ISBN Number | 978-1-5090-3326-3 |
Keywords | Adaptive optics, algorithmic cryptography, code division multiple access, composability, Cross Layer Security, Cross-Layer Security, cryptography, Decoding, decryption algorithm, encoding, Multiaccess communication, optical CDMA, Optical code division multiple access (OCDMA), optical decoding, optical encoding, optical information processing, optical network, optical receivers, optical transmitters, physical layer encryption, pubcrawl, Resiliency, security, Signal to noise ratio, telecommunication security, Time complexity, transmitter |
Abstract | In this paper, we introduce an optical network with cross-layer security, which can enhance security performance. In the transmitter, the user's data is encrypted at first. After that, based on optical encoding, physical layer encryption is implemented. In the receiver, after the corresponding optical decoding process, decryption algorithm is used to restore user's data. In this paper, the security performance has been evaluated quantitatively. |
URL | https://ieeexplore.ieee.org/document/7590484 |
DOI | 10.1109/OGC.2016.7590484 |
Citation Key | li_cross-layer_2016 |
- optical decoding
- transmitter
- Time complexity
- telecommunication security
- Signal to noise ratio
- security
- Resiliency
- pubcrawl
- physical layer encryption
- optical transmitters
- optical receivers
- optical network
- optical information processing
- optical encoding
- Adaptive optics
- Optical code division multiple access (OCDMA)
- optical CDMA
- Multiaccess communication
- encoding
- decryption algorithm
- Decoding
- Cryptography
- Cross-Layer Security
- Cross Layer Security
- composability
- code division multiple access
- algorithmic cryptography