Cart (Loading....) | Create Account
Close category search window
 

Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yao-Tang Chang ; Dept. of Inf. Technol., Kao Yuan Univ., Kaohsiung, Taiwan ; Chuen-Ching Wang

In order to overcome vulnerability to eavesdropping of on-off-keying based OCDMA scheme, a new multi-code keying reconfiguration is presented to enhance confidentiality over two dimensional time-spreading and wavelength-hopping (2D TS/WH) optical code division multiple access (OCDMA) schemes. The time-shifted carrier-hopping prime codes (CHPCs) are proposed and assigned as signature address code. This proposed scheme provides the integration of electronic and optical layer domain, which inherently comes from the data encryption and spectrum-spreading of the transmitted signals, and then achieve data-confidential enhancement in synchronous networks. Moreover, multi-code keying reconfiguration in a set of distinct codeword is assigned to each user and randomly selection by using thin film filter, tunable delay line and optical switch. Here, the proposed scheme using shifted CHPC appears to be a promising coding type for generating OCDMA code space that are large enough to prevent successful brute force code search attacks. In addition, the probability of interception performance in terms of various multi-code key numbers per user is analyzed. The result shows that the confidentiality is enhanced to combat against eavesdropping while signature address code number per uses is increased in proposed multi-code key reconfiguration scheme.

Published in:

Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on

Date of Conference:

4-7 Sept. 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.