By Topic

Four-State Data Encoding for Enhanced Security Against Upstream Eavesdropping in SPECTS O-CDMA

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Chunxin Yang ; Dept. of Appl. Sci., Univ. of California, Davis, Davis, CA, USA ; Scott, R.P. ; Geisler, D.J. ; Fontaine, N.K.
more authors

This paper presents an implementation of a modulation technique which is effective in obscuring spectral phase encoded time-spreading (SPECTS) optical code division multiple access (O-CDMA) data streams from eavesdroppers tapping into single-user uplinks. This data modulation technique employs a finite-state Markov chain following a four-state trellis to encode user data in the electronic domain. The encoding redistributes the SPECTS O-CDMA user data bits across four different waveforms to defeat the eavesdropper attacks on upstream links via power detectors or differential phase-shift keying (DPSK) receivers. The four-state encoder-decoder is implemented in a field-programmable gate array (FPGA) with high-speed serial transceivers. A SPECTS O-CDMA testbed with four-state encoded data modulation at up to 2.5 Gb/s/user is demonstrated and its single user link security is tested using a DPSK demodulator to emulate the eavesdropping detection. The security test verifies that this modulation technique effectively prevented interception by DPSK detection. The four-state coding can be extended to be time variable through switching among several trellis state definitions to achieve more rigorous security.

Published in:

Lightwave Technology, Journal of  (Volume:29 ,  Issue: 1 )