Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

High-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme

Open Access Open Access

Abstract

This paper proposes a high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme. We utilize the fast Hartley algorithm instead of the fast fourier computation, and we employ chaotic sequences generated by the multi-winged chaotic system to achieve chaos-driven 3D constellation mapping, effectively integrating the chaotic system with the stochastic amplitude modulator. We reduce the signal’s peak-to-average power ratio (PAPR) by deploying a random amplitude modulator. Simultaneously, this approach enhances the security of the physical layer of the signal. The PAPR reduction can reach up to 2.6 dB, while the most robust and stable modulator scheme can gain 2 dB. Finally, in the Hartley frequency domain, the signal's frequency is disrupted, providing the entire system with a key space of 10131 to resist violent cracking and thus improving the system's overall security. To validate the feasibility of our scheme in comparison to conventional IFFT-based encrypted 3D orthogonal frequency division multiplexing, We achieved a transmission rate of 27.94 Gb/s over a 2 km multicore fiber. Experimental results show that since the random amplitude generator effectively reduces PAPR, our proposed encryption scheme increases the forward error correction threshold range by 1.1 dB, verifying that our proposed scheme has highly reliable security performance.

© 2024 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Modern communication technology is advancing rapidly, and information technology has become deeply ingrained in daily life. The widespread use of intelligent terminal devices has significantly increased the demand for channel capacity in communication systems. Meanwhile, traditional time, frequency, and spatial multiplexing techniques are approaching their limits [1]. Orthogonal frequency division multiplexing (OFDM) stands out as a multicarrier modulation technique recognized for its resistance to channel dispersion and high spectral efficiency [2,3]. In optical communications, intensity modulation and direct detection orthogonal frequency division multiplexing (IMDD-OFDM) systems are extensively employed in passive optical networks (PONs) owing to their straightforward and cost-effective configuration [46]. However, a significant drawback of OFDM systems in optical communications is the high peak-to-average power ratio (PAPR). The elevated PAPR in optical OFDM signals can result in nonlinear distortion, particularly at high transmit power levels, due to the inherent nonlinearity of the transmission fiber. Additionally, excessively high PAPR in optical OFDM signals might cause nonlinear effects in devices like Mach-Zehnder modulators (MZM), Digital-to-analog converters (DAC), Analog-to-digital converters (ADC), and optical fibers. This, in turn, could result in intermodulation among subcarriers, introducing nonlinear distortion.

To address the challenges associated with optical OFDM signals, researchers have proposed several techniques to effectively mitigate the PAPR in optical OFDM systems [715]. Two primary methods are selective mapping (SLM) and partial transmission sequence (PTS), while clipping is a simpler method achieved by truncating the peaks of the OFDM signal.In the SLM method, the transmitted data sequence is directed to multiple independent scramblers utilizing different phase rotations to reduce the PAPR before transmission. However, both methods encounter high computational complexity. Moreover, to generate a genuine OFDM symbol meeting the IFFT input requirements, the signal must exhibit Hermitian symmetry (HS), commonly known as discrete multitone modulation (DMT) [16]. This results in only half of the subcarriers being utilized to carry data.Furthermore, to guarantee HS, the DC and Nyquist frequencies are both set to zero. Similarly, employing the fast Hartley transform (FHT) for generating OFDM symbols is a viable method. With FHT modulation, bit sequences are mapped to real constellations, ensuring that the resulting OFDM symbols are real-valued, and all N subcarriers support data symbols [1719]. This technique effectively satisfies the Hermitian symmetry condition. We use a method that combines a random amplitude modulator with a fast Hartley algorithm, which can completely accommodate the impact of signal distortion, thereby greatly improving the fault tolerance rate.

An alternative method for transmitting information over a communication channel is based on the real Hartley transform (HT) [20]. R. V. L. Hartley introduced the continuous Hartley transform in 1942 [21]. This approach serves as an alternative to address certain challenges encountered by the conventional Fourier transform while ensuring the efficient channel information transmission. The fast computation of the discrete Hartley transform is typically slightly faster than the fast Fourier transform, especially in specific application scenarios such as OFDM systems. This acceleration in computation speed expedites the data processing efficiency and reduces the probability of errors, which is crucial for high-speed communication systems. The Hartley transform can be converted to the Fourier transform for Nth addition and multiplication, which is faster than post-processing in real numbers. By expressing Fourier coefficients as The fast Hartley transform (DHT), the discrete Hartley transform provides convenient computational expressions. Moreover, the accuracy of the fast Hartley transform is generally slightly higher than that of the fast Fourier transform [22]. Additionally, this increase in speed is essential for high-speed communication systems like OFDM systems, enabling quick data processing with a reduced number of errors, making the fast Hartley transform advantageous for communication systems. To enhance the channel capacity of communication systems, multi-core fiber (MCF) has been proposed as a space division multiplexing (SDM) fiber, showing great promise. The design concept of MCF aims to boost the capacity of each fiber by increasing the number of cores within it. This technique has been extensively studied [23,24]. In addition, with the rapid development of society, every industry has a higher impact on communication quality. The requirements for and information security are also getting higher and higher. The security of communication and information is not only related to the privacy of users, but also has an impact on the security of enterprises and even countries. Therefore, it has become very necessary to improve the security performance of communication systems. Especially for PON As network access users increase, security issues become particularly important. Illegal optical network units (ONUs) may disguise themselves as legitimate ONUs, and when optical line terminals (OLTs) transmit downlink data in the form of broadcasts, these illegal ONUs may Downlink data signals will be stolen or tampered with. Therefore, it is necessary to impose physical layer security encryption schemes on passive optical networks (PON) [25,26]. Traditional upper-layer encryption has some limitations. For example, the data header is easily exposed during data transmission, which will pose a major security threat. Physical layer encryption plays a key role in ensuring transmission security by encrypting data signals at high speed and low latency, while minimizing the impact on network systems. As a supplement and improvement to the upper-layer encryption mechanism, physical layer security encryption technology has broad research prospects and application potential. Presently, physical layer digital domain chaotic encryption is of significant interest in high-speed multicarrier optical communication systems [27]. Physical layer encryption, widely used in digital signal processing (DSP) for its low cost, high flexibility, and compatibility, is based on chaotic systems with traits such as traversal, pseudo-randomness, and parameter sensitivity, making it ideal for data encryption [28]. This approach effectively protects transmitted information from brute-force attacks. Liu et al. proposed a security enhancement technique based on symbol-level and bit-level chaotic scrambling for OFDM-PON at the physical layer [2932]. L. Deng and his coworkers experimentally validated that the fixed-point digital chaos algorithm [33] and fractional-order Fourier transform chaos technique [34] meet the requirements of low implementation complexity and high-security performance for OFDM-PON. Combining digital chaotic encryption with specific fields holds promises for achieving higher security and improved system performance [35].

This paper presents a novel multidimensional data protection and chaotic driving scheme based on the Hartley transform, applied to OFDM in optical communications for the first time, facilitating the transition from 2D to 3D constellations. Our approach employs a multi-wing chaotic model for the 3D constellation mapping module's chaotic driving and successfully integrates the random amplitude modulator's chaotic input. Compared to the traditional OFDM 3D chaotic encrypted modulation scheme, our method significantly improves the system's BER and transmission security performance while effectively reducing the PAPR of signals. In our experiments, we implement hexadecimal modulation at the transmitter side, showcasing the successful implementation of our proposed Hartley transform-based multidimensional data protection and chaos-driven scheme. Comparative analysis with the conventional OFDM 3D chaotic encrypted modulation scheme reveals a 1.1 dB performance improvement in our approach, accompanied by a substantial 2.6 dB reduction in the signal's PAPR performance. The most stable random modulation scheme similarly attains a 2 dB improvement. This experiment substantiates the optical transmission security of the signal in the Hartley frequency domain and affirms the feasibility of our proposed scheme.

2. Principles

Figure 1 illustrates the main schematic framework diagram of the high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme. The system comprises a three-dimensional constellation mapping module driven by chaos, a random amplitude modulator, and a multi-wing chaotic system. In the transmitter side of high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic system, the pseudo-random binary sequence (PRBS) generated by DSP serves as the original input data. It undergoes serial/parallel (S/P) conversion to generate a matrix. A multi-wing chaotic system generates chaotic sequences to complete the three-dimensional constellation mapping driven by chaos. In this process, every four bits carry a set of 3D dimensional information, resulting in four sets of mutually distinguishable mappings. All signals with coordinate information then pass through a fast Hartley modulation module to complete the OFDM modulation. The two pairs of chaotic sequences generated by the multi-wing chaotic system, and the modulated OFDM signals undergo modulation by a random amplitude modulator to reduce the PAPR. This PAPR reduction process achieves random disruption of the signal amplitude and completes the chaotic scrambling of symbols in the Hartley frequency domain, realizing constellation masking. Subsequently, the signals with constellation masking are augmented with cyclic prefixes, and finally, the encrypted signals undergo parallel to serial (P/S) conversion to transform into single-channel real signals for transmission, completing the 3D-OFDM modulation.

 figure: Fig. 1.

Fig. 1. Schematic diagram of the high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme.

Download Full Size | PDF

2.1 Hartley transform and random amplitude modulator

The Hartley transform can be converted to a Fourier transform for Nth addition and multiplication, which is faster than post-processing in complex numbers. If the source data is valid, the FHT may be more efficient than the FFT. DHT is an efficient transform algorithm for real sequences and is closely related to the fast Fourier transform (DFT). The DHT does not require operations with the imaginary part. This algorithm maps real-valued sequences to real-valued spectra by preserving some useful parts of the DFT. If $x(n),n = 0,1,2, \cdots ,N - 1$ is an N-point real sequence, then its DHT is defined as follows:

$${X_H}(k) = \textrm{DHT[}x\textrm{(}n\textrm{)}{\textrm{]}_N} = \sum\limits_{n = 0}^{N - 1} {x(n)} cas(\frac{{2\pi }}{N}kn),{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} k = 0,1,2, \cdots ,N - 1$$

The corresponding IDHT is defined as:

$$x(n) = \textrm{IDHT[}{X_H}\textrm{(}k\textrm{)}{\textrm{]}_N} = \frac{1}{N}\sum\limits_{n = 0}^{N - 1} {{X_H}(k)} cas(\frac{{2\pi }}{N}kn),{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} n = 0,1,2, \cdots ,N - 1$$

Thus, recomputation of the DHT to the DFT can sometimes be avoided, e.g., by multiplying by a long number [36] The Hartley transform in the form of the positive and the negative can be written as a pair of transformations,where $cas\alpha = \cos \alpha + \sin \alpha$, the Hartley transform, is a real triangular transform with the property of self-inversion. As evident from the formula, modulation involves the Hartley inverse transform, and demodulation involves the direct Hartley transform. Signal processing algorithms for modulation and demodulation are precisely identical, thereby significantly simplifying the hardware and software implementation of the communication system. However, there are some differences. The code for the FHT is simpler. The inverse transformation formula is the same as the direct transformation formula, except that the factor 1/N is different. In contrast,an additional parameter must be introduced for the FFT, or a new function must be created to compute the inverse. When computing the FFT for real vectors, the half-length “integral” FFT is computed first, leading to post-processing that does not exist in the FHT. This provides additional code simplification for the FHT compared to the FFT and affects the efficiency for shorter length vectors. However, the longer the vector, the weaker the effect. The following is the basic principle of the base 2DIT-FHT operation. Figure 2 shows the flowchart of 8-point 2DIT-FFT computation and 8-point 2DIT-FHT computation, respectively.

 figure: Fig. 2.

Fig. 2. (a) 8-point base 2DIT-FHT computational flow diagram (b) 8-point base 2DIT-FFT computational flow diagram.

Download Full Size | PDF

Compared to the FFT algorithm, the fast algorithm FHT for DHT reduces the computational effort by almost half [22]. The number of real multiplications for the N-point base-2 time-domain extraction fast DHT (base-2DIT-FHT) algorithm is:

$${M_{FHT}} = NM - 3N + 4$$

The total count of actual additions in the N-point base 2DIT-FHT algorithm is:

$${A_{FHT}} = 3N\frac{{M - 1}}{2} + 2$$
where $M = {\log _2}^N$. According to Eq. (3), it is easy to know that the number of real multiplication of base 2DIT-FHT algorithm is about half of base 2DIT-FFT algorithm, while the FFT requires up to ${{MN} / 2}$ complex operations.Therefore, the FHT algorithm can reduce complexity and simplify communication. In this paper there are two different designs of random amplitude modulators. The random amplitude modulator works as follows: In this article, there are N subcarriers, and each subcarrier's minimum instantaneous signal transmission power and maximum instantaneous signal transmission power are calculated. Compare their modulus values to determine their relatively smaller power values, and then calculate the signal power ratio by comparing the transmission power of two instantaneous signals. Then multiply all the data on this subcarrier whose instantaneous power mode values are greater than the smaller power value by the calculated signal power ratio. The new data will be obtained to replace the original signal amplitude, to obtain a new amplitude value. At this point a threshold for the random amplitude modulator is introduced, the principle of which is given in the following Eq (56).
$$P = {\raise0.7ex\hbox{${{M_{\min }}}$} \!\mathord{/ {\vphantom {{{M_{\min }}} {{M_{\max }}}}}}\!\lower0.7ex\hbox{${{M_{\max }}}$}}$$
$$x(t) = \left\{ {\begin{array}{{c}} {x(t)\begin{array}{{cc}} {}&{x(t) \le {P_{\max }}} \end{array}}\\ {x(t) \cdot P\begin{array}{{cc}} {}&{x(t) > {p_{\max }}} \end{array}} \end{array}} \right.$$

In the second design, after comparing the comparison of the minimum and maximum instantaneous signal transmitting power of each subcarrier, all values greater than the instantaneous signal transmitting power at that moment are directly substituted with the relatively smaller power values. Both designs concentrate on reducing the PAPR of the signal from two perspectives. One emphasizes power control across the entire spectrum range, while the other emphasizes subcarriers to control power in each subcarrier finely. All the comparisons can be found in the experimental setup and results in section III.

In a random amplitude modulator, all the Hartley frequency domain information on each of its subcarriers due to its coordinates and the influence of the multi-wing chaotic system. should all have a maximum and minimum value and the modal values should be the same. After the data has been subjected to the fast Hartley operation, the maximum and minimum modal values on each of its subcarriers are not necessarily the same. The reason for the occurrence of non-identity may be due firstly to the fact that the modulation scheme involves an element of randomness, using pseudo-random sequences for spreading. In this scenario, it's worth noting that the same input data may yield different outputs during each modulation. If the binary data is quantized before modulation (meaning the analog signal is sampled into digital data), quantization errors may lead to minor inconsistencies. These inconsistencies can arise from quantizer setting variations, rounding errors, or quantization noise. In a typical OFDM system, the FFT is a transformation method employed to convert a signal from the time domain to the frequency domain. This transformation decomposes the signal into a series of components represented by sine and cosine functions, thereby revealing the spectral information of the signal in the frequency domain. FHT is a transformation similar to FFT, but it executes the Hartley transform, converting a signal from the time domain to the Hartley frequency domain. In contrast to the Fourier transform, the Hartley transform employs a combination of sine and cosine functions. The FFT typically performs a complex-to-complex transform, as it generates a complex spectrum, necessitating the handling of complex operations within the FFT algorithm. On the other hand, the FHT is a transformation method specifically designed for real signals, transforming them from the time domain to the Hartley frequency domain. Unlike the Fourier transform, the Hartley transform preserves both the amplitude and phase of the signal. Instead of altering the amplitude or phase, it represents the signal in the frequency domain using a set of coefficients of sine and cosine functions.

From a mathematical analysis standpoint, the Hartley transform serves as a frequency domain representation of a real-number signal, and its mathematical properties are similar to the Fourier transform. The formula for the Hartley transform is expressed as follows:

$$H(k) = \sum\nolimits_{n = 0}^{N - 1} {h(n)\cos \left( {\frac{{2\pi kn}}{N}} \right)} + \sum\nolimits_{n = 0}^{N - 1} {h(n)\sin \left( {\frac{{2\pi kn}}{N}} \right)} $$
where h(n) represents the real values of the input signal, and H(k) is the coefficient in the Hartley frequency domain. In the Hartley transform, only sine and cosine functions are employed. An interesting property of the Hartley transform is that if two input data points have the same real values, i.e., h1(n)==h2(n) for all n, then they will yield the same Hartley coefficients after the Hartley transform. This is due to the fact that the Hartley transform is a linear transformation of the input signal, and does not involve a change in magnitude or phase. When analyzed in terms of the time-frequency domain, the input data is represented in the time domain as a series of real values. Therefore, when considering signal conditioning mechanisms, one does not change the numerical value of the input data, but only adjusts the frequency domain representation. Based on the Hartley transform, replacing high power values does not affect the signal transmission correctness or reduce the bit error rate (BER).

Complex and nonlinear chaotic sequences are generated using a multi-wing chaotic system in random amplitude modulators. Generate a random 1 and -1 sequence related to a chaotic sequence through linear operation, which is embedded in a random amplitude modulator. This results in a random sequence of positive and negative 1's associated with the chaotic sequence. The signal is then amplitude modulated and multiplied element by element with the random 1 and -1 sequence. This multiplication operation introduces a randomness modulation to the original data, causing each data point to undergo a unique random amplitude modulation. Consequently, the signal becomes complex, with its amplitude constantly fluctuating during transmission, ensuring randomness throughout the system. Given that the chaotic sequence comprises an unordered series of numbers, the signal inherits its extremely high complexity and nonlinear characteristics. A peak occurs when N subcarriers are added in the same phase, and its power can be N times the average power. The ratio of the maximum peak power to the average power of an OFDM frame is defined as the signal PAPR.

$$PAPR = \frac{{\max {}_{0 \le m \le S - 1}{{|{{x_m}} |}^2}}}{{E[{{|{{x_m}} |}^2}]}}$$

The theoretical limit of PAPR (in dB) can be derived from the above equation, given in [37]: $PAPR = 10{\log _{10}}N$ where xm is the OFDM frame that will be transmitted through the channel. The complementary cumulative distribution function (CCDF) is commonly used to evaluate the performance of PAPR reduction techniques with the following equation. This function gives the probability that the PAPR of an OFDM frame exceeds the threshold PAPR0.

$$CCDF = {P_r}({PAPR > PAP{R_0}} )$$

2.2 Multi-wing chaotic system and chaotic-driven three-dimensional constellation mapping

In the chaos-driven 3D constellation mapping module, random amplitude modulator, and Hartley frequency domain, the multi-wing chaotic model is used to complete the chaotic drive for both modules and the Hartley frequency domain. The equations of the multi-wing chaotic model are as follows:

$$\left\{ {\begin{array}{{c}} {\mathop x\limits^ \cdot{=} \textrm{ay - x}}\\ {\mathop y\limits^ \cdot{=} by - xz}\\ {\mathop z\limits^ \cdot{=}{-} c + k{y^2}(1 - d\sin (ey))} \end{array}} \right.$$
where x, y, z are state variables and a, b, d, e, k are system parameters. When a = 2, b = 1, c = 1, d = 3, e = 4, k = 0.4, the system can become hyperchaotic, and the present chaotic model is a new type of multi-wing chaotic system with some unusual properties, The amplitude of the multi-wing chaotic attractor and the number of wings are not up to the fixed chaotic attractor as in the case of the other chaotic systems such as Lorentz. On the flip side, the chaotic attractor's amplitude and number of wings vary with simulation time, regardless of system parameters and initial conditions, and the Lyapunov exponent remains constant. Additionally, as initial conditions and system parameters change, the amplitude and wing number of the chaotic attractor continuously change over simulation time. A positive Lyapunov exponent implies that even a minute difference in the initial values of two orbits will exponentially diverge over time, resulting in local instability and global stability in the system. Meanwhile, the Lyapunov exponent is an important parameter to describe the sensitivity of chaotic systems to initial values.

The positive Lyapunov exponent implies that even if the difference between the initial values of two orbits is extremely small, the difference separates exponentially over time, thus making the system locally unstable and globally stable. Variation of chaotic attractor wing number with initial conditions multi-stability of a system holds when different attractors are obtained from systems with different initial conditions. The butterfly effect can be realized in systems with multiple stability in the time response and phase diagram. That is why estimating the system parameters of such chaotic systems is quite difficult. Therefore, this property of chaotic systems makes them suitable candidates for different chaos-based applications, and data encryption processing. When a signal encrypted by these complex chaotic trajectories (chaotic sequences) is received, decryption can only be accomplished by having the exact initial value (private key), thus ensuring high security. The three chaotic sequences X, Y, Z, (as shown in Fig. 3) generated by the multi-winged chaotic system are processed to generate the masking factors A, B, and C, which are used in the chaos-driven three-dimensional constellation mapping module, the random amplitude chaotic scrambling modulation module in the modulator. The specific rules are as follows:

$$\left\{ \begin{matrix} A = floor(\bmod (X + 0.5,2)) \\ A(A = = 0) = -1 \\ B = fix(\bmod (Y\cdot 10\wedge 4,4)) \\ C = Tra[\bmod (Z\cdot 10\wedge 5,5) \times {\left( {\displaystyle{1 \over {sort(Z)}}} \right)}^T]\end{matrix}\right.$$

 figure: Fig. 3.

Fig. 3. Model of a multi-wing chaotic system (a)x-y-z projection (b) x-y projection(c)x-z projection (d) y-z projection.

Download Full Size | PDF

Three-dimensional constellation mapping is a method of mapping data into three-dimensional space and is commonly used in digital communication systems, especially in optical communications. Typically, the data transmitted is binary, such as 00, 01, 10, and 11. each binary data corresponds to a specific three-dimensional coordinate. The 3D coordinates are used to represent each data combination. In order to map data into a 3D constellation, each binary data needs to be mapped to a unique 3D coordinate. For example, 00 can be mapped to coordinates (1, 1, 1), 01 can be mapped to coordinates (-1, -1, 1), 10 can be mapped to coordinates (-1, 1, -1), and 11 can be mapped to coordinates (1, -1, -1). A chaotic sequence is first obtained using a multi-wing chaotic system. Next, we divide the chaotic sequence into four disjoint parts. Each is identified by the letters A, B, C, and D, respectively. This segmentation process can be based on specific algorithms or rules that ensure that each part contains a different part of the chaotic sequence. This segmentation process has a key impact on the nature of the chaotic sequence because each part represents a different fragment of the nonlinear sequence. Now, each letter (A, B, C, D) represents a different part of the chaotic sequence, and each partial sequence can be mapped to a coordinate point in 3D space. In this step, we use four mappings, applying different weights for each partial sequence or employing different constellations of mappings (e.g., mappings 1, 2, 3, and 4). In this way, the position of the letters determines how the data will be mapped, and each partial sequence will be mapped to a different coordinate point in 3D space, and the mapping method is determined by the bit data as in Fig. 4.

 figure: Fig. 4.

Fig. 4. Chaos driven 3D mapping module.

Download Full Size | PDF

This paper has a total of N subcarriers; one subcarrier contains F symbols, each symbol carrying four bits of information. Convert all the bit data in parallel series to four lines of data information. It means the overall conveyed information is: N*F symbols information. Weight the data in each row. The first way: weight each line of bits, the first line is the heaviest, the fourth line is the lightest; the second way: the same weighting process for each line of bits, but the starting line is different, and then loop in order. The third way: a similar weighting method is used, but the starting row is different again, and then the cycle is in order; the fourth way: the same weighting method is used, starting from the fourth row, and then the cycle is in order. These four processing methods can produce different results depending on the data and the order of weighting. Based on this, the chaos-driven 3D constellation mapping module is formed. The final weighted numbers can be expressed as 16 different numbers from a-p, linking the 16 numbers to 16 3D coordinate points in 3D space. The chaos-driven 3D constellation mapping module thus formed, i.e., four bits determine one 3D coordinate point information (x, y, z) in 3D space. The principle of the chaos-driven 3D constellation mapping module is shown in Fig. 5 below.

 figure: Fig. 5.

Fig. 5. Chaos-driven 3D constellation mapping module schematic disassembly diagrams.

Download Full Size | PDF

3. Experiment setup and results

The practical efficacy of the multidimensional data protection and chaotic encryption system based on Hartley's algorithm, as depicted in Fig. 6, is experimentally validated over a 2 km weakly coupled seven-core fiber. The experimental setup employs a direct modulation and direct detection (IM/DD) system. At the optical line terminal (OLT), encrypted OFDM signals are generated offline using a digital signal processor (DSP). For comparison, the receiver is divided into legitimate and illegitimate receivers. The OFDM configuration includes 150 subcarriers, 128 symbols, 512 Fourier points for FFT, and a guard interval of 1/4 of the signal length. For digital-to-analog conversion of the encrypted 3D-OFDM signal, an arbitrary waveform generator (AWG, TekAWG70002A) with a sampling rate of 10 GSa/s is utilized. The light source is a continuous wave (CW) laser with a wavelength of 1550 nm and a power of 2 dBm. After passing through an electrical amplifier, the electrical signals are injected into the Mach-Zehnder modulator (MZM) to achieve intensity modulation and electro-optical conversion. Further amplification of the laser light is necessary through an erbium-doped fiber amplifier (EDFA) before the optical signals are coupled into the seven-core fiber via a 1:8 beam splitter and fan-in device. In the case of a legitimate optical network unit (ONU), the received optical power is adjusted by utilizing a variable optical attenuator (VOA). The received optical signal is then converted into an electrical signal through a photodetector (PD). The acquired electrical signal undergoes processing using a mixed signal oscilloscope (MSO, TexMSO73304DX) with a sampling rate of 50 GS/s. Following analog-to-digital conversion, the received data are decrypted using the same key employed by the transmitter. Without the proper key, unauthorized users attempting illegal access cannot obtain correct data through offline digital signal processing (DSP).

 figure: Fig. 6.

Fig. 6. High-security multi-dimensional data protection system based on the Hartley algorithm with chaotic drive scheme system.

Download Full Size | PDF

Addressing the issue of limiting the instantaneous power range of a signal involves two distinct algorithms, both aimed at reducing the PAPR of the signal. The comparison of bit error rate (BER) performance is conducted from two separate perspectives. Specifically, the PAPR performance of the random amplitude modulator is analyzed for all designs in various scenarios using the CCDF. To assess our proposed High-security multi-dimensional data protection system based on the Hartley algorithm with chaotic drive scheme system, we compare the PAPR performance of 3D-OFDM signals with different threshold selections based on various random amplitude modulator designs, as illustrated in Fig. 7. The first algorithm concentrates on power control across the entire spectral range. In contrast, the second algorithm provides finer control within each subcarrier. The four algorithms under consideration are the full probabilistic replacement method (FPRM), the all-cropping method (ACM), the subcarrier probabilistic replacement method (SPRM), and the subcarrier cropping method (SCM).

 figure: Fig. 7.

Fig. 7. PAPR plots for different threshold selections with different randomized method amplitude modulator designs.

Download Full Size | PDF

As observed in Fig. 7, after comparison, the PAPR performance of the signal is enhanced across all four approaches, accompanied by lower computational complexity. The approach focusing on power control operations in each subcarrier with finer control of power operations across the entire spectral range demonstrates substantial improvement and increased stability.Specifically, the performance of the full probabilistic replacement method improves by 0.6 dB, the full cropping method improves by 2.6 dB, and both the subcarrier probabilistic replacement and subcarrier cropping methods exhibit a 2.0 dB improvement. Importantly, there is no significant performance loss in the BER under the same received optical power. The stability of the proposed method under various approaches is verified, and the PAPR performance under the four methods is significantly enhanced, reaching up to 2.6 dB. The PAPR reduction performance is commendable and warrants affirmation.

The BER performance of 3D-OFDM signals, based on various random amplitude modulator designs with different threshold selections, is compared at different received optical powers, as depicted in Fig. 8. The figure illustrates that all four methods have successfully enhanced the BER performance of the signal, achieving lower computational complexity, albeit with varying degrees of improvement. In comparison to the other methods, the power control operation focusing on each subcarrier exhibits a 0.73 dB improvement, demonstrating a more stable performance. This shows the advantages of the SPRM scheme in resisting channel interference and bit error rate.

 figure: Fig. 8.

Fig. 8. BER performance of fast Hartley algorithm based 3D-OFDM system system with different random amplitude modulators.

Download Full Size | PDF

In Fig. 8, the BER performance comparison based on the two approaches with different random amplitude modulators is also presented. The factor-carrier probability substitution method excels in the BER performance comparison. It is chosen for all subsequent comparisons of the FHT operations, including comparing of different systems with random amplitude modulators. To study the effects of the chaos-driven 3D constellation mapping module, random amplitude modulator, and each module of the multi-wing chaotic system on the 3D-OFDM signals, as well as the impact of the adopted seven-core fiber transmission system, Fig. 9 displays the BER performance of the 3D-OFDM signal after 2 km of transmission in a seven-core fiber. Remarkably, the measured BER curves of the seven cores almost overlap at a range of 2 km, indicating an excellent performance of the seven-core fiber transmission system. The system's BER reaches 3.8 × 10−3. Even at this high BER, the difference in received optical power among the individual fiber cores is very small, less than 0.2 dB. This observation indicates that the BER performance of the seven fiber cores is maintained within acceptable limits under the FEC threshold requirement. As the optical power continues to increase, the BER of each fiber core gradually decreases, strongly verifying that the proposed 3D-OFDM transmission scheme exhibits excellent transmission performance in a seven-fiber transmission system. This finding emphasizes the system's robustness, providing consistent performance even under unfavorable conditions, which is crucial for various applications.

 figure: Fig. 9.

Fig. 9. Error rate performance of 3D-OFDM signal system under different cores.

Download Full Size | PDF

Simultaneously, to examine the impact of multicore multiplexing on 3D-OFDM signals using different modulator designs and to validate the superiority of the proposed high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme, we conduct a performance comparison of the proposed 3D-OFDM transmission scheme employing different demodulation algorithms at the receiver side. Specifically, the power control operation within each subcarrier is selected for comparison with the OFDM system based on the IFFT operation.The experimental results are depicted in Fig. 10.

 figure: Fig. 10.

Fig. 10. BER performance of 3D-OFDM system based on fast Fourier algorithm and fast Hartley algorithm.

Download Full Size | PDF

In addition, the key space of the proposed encryption scheme is rigorously computed. After sensitivity testing, we calculate the critical space by adding tiny increments of 1 × 10^-N to a single initial value or parameter. Afterwards, experimental tests are performed to see if the data can be fully demodulated. Continuously adjust N until a high bit error rate node appears, which is one order of magnitude away from complete demodulation, which is the critical space. As shown in Fig. 11, the key consists of the initial value of the multi-wing chaotic system, the control parameters and the step size, i.e., {x, y, z, a, b, d, e, k}. Sensitivity analysis Fig. 12 evaluates the sensitivity of the proposed scheme to changes in the key. We change the values to 10-N accuracy in the analysis and plot the slight deviation trajectories in each direction. The BER value for the correct key is zero, and the parameter accuracy is very large, indicating that the encryption scheme has excellent sensitivity.If the step size is [1, 1*10−3], the key space can be experimentally calculated to be 1017 × 1017 × 1016 × 1015 × 1015 × 1015 × 1011 × 1011 × 1011 × 103 = 10131. Since the key space is so large, it takes a long time even to find the correct key, preventing prevents the hijacker from obtaining the key effectively.

 figure: Fig. 11.

Fig. 11. Chaos encryption sensitivity map.

Download Full Size | PDF

4. Conclusion

To enhance the physical layer security and reduce the computational complexity of the system while improving the performance of the PAPR system, we propose a high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme. The computational complexity of the system is reduced by using the fast Hartree algorithm instead of the fast fourier computation, while the chaotic sequence generated by the multi-wing chaotic system to complete the three-dimensional constellation mapping of the chaotic drive, and then use the random amplitude modulator to complete the reduction of the signal PAPR, the maximum reduction of 2.6 dB and relatively more stable subcarrier replacement method also shows an increase of 2 dB. At this time, the physical layer security of the signal is implemented while reducing the PAPR. Finally, the frequency interference of the signal is accomplished in the Hartley frequency domain, which provides a key space of 10131 and improves the security of the system. To verify the scheme's feasibility and compare it with the conventional IFFT-based encrypted 3D-OFDM, a transmission experiment with a 2 km MCF is established. The experimental results show that our proposed encryption scheme has less impact on the BER performance of the signal within the FEC threshold compared to the conventional IFFT-based 3D-OFDM, and there is a 1.1 dB improvement compared to the conventional IFFT-based 3D-OFDM scheme, which verifies that our proposed scheme has a very reliable and implementable performance.

Funding

National Key Research and Development Program of China (2023YFB2805301); National Natural Science Foundation of China (62275127, 61935011, U2001601, 62205151, U22B2009); Jiangsu Provincial Key Research and Development Program (BE2022079, BE2022055-2); Natural Science Research of Jiangsu Higher Education Institutions of China (22KJB510031); Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology (NUIST).

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. P. J. Winzer, “From scaling disparities to integrated parallelism: a decathlon for a decade,” J. Lightwave Technol. 35(5), 1099–1115 (2017). [CrossRef]  

2. J. Armstrong, “OFDM for optical communications,” J. Lightwave Technol. 27(3), 189–204 (2009). [CrossRef]  

3. R. Deng, J. Yu, J. He, et al., “Twin-SSB-OFDM transmission over heterodyne W-band fiber-wireless system with real-time implementable blind carrier recovery,” J. Lightwave Technol. 36(23), 5562–5572 (2018). [CrossRef]  

4. Z. Wang, Y. Xiao, Y. Xiao, et al., “Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system,” Opt. Express 29(12), 17890–17901 (2021). [CrossRef]  

5. F. Sanya M, L. Djogbe, A. Vianou, et al., “DC-biased optical OFDM for IM/DD passive optical network systems,” J. Opt. Commun. Netw. 7(4), 205–214 (2015). [CrossRef]  

6. J. Ma, J. He, M. Chen, et al., “Cost-effective SFO compensation scheme based on TSs for OFDM-PON,” J. Opt. Commun. Netw. 11(6), 299–306 (2019). [CrossRef]  

7. H. T. Alrakah, T. Zerihun Gutema, S. Sinanovic, et al., “PAPR reduction in DCO-OFDM based WDM VLC,” J. Lightw. Technol. 40(19), 6359–6365 (2022). [CrossRef]  

8. Y. Wan and Y. Wang, “Efficient PAPR reduction through random constellation mapping,” 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, pp. 2625–2628 (2017).

9. P. Boontra, T. Mata, A. Dataesatu, et al., “A PAPR reduction for FBMC-OQAM signals using ABC-OPTS scheme,” 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea (South), pp. 115–119 (2019).

10. L. R. Nair, S. S. Pillai, and S. Shiny, “LFDMA PAPR minimization using advanced selective mapping-based phase factor optimization,” 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, pp. 1–7 (2022).

11. L. Liu, X. Tang, F. Li, et al., “Enhanced physical layer security and PAPR performance based on disturbance of data cluster under chaotic sequence color seeking mechanism in CO- OFDM system,” J. Lightwave Technol. 41(20), 6507–6513 (2023). [CrossRef]  

12. Z. Ni, S. Fu, H. Li, et al., “Code reservation enabled PAPR reduction of digital CDM based channel aggregation for mobile fronthaul,” Opt. Express 26(17), 21585–21593 (2018). [CrossRef]  

13. J. Xiao, J. Yu, X. Li, et al., “Hadamard transform combined with companding transform technique for PAPR reduction in an optical direct-detection OFDM system,” J. Opt. Commun. Netw. 4(10), 709–714 (2012). [CrossRef]  

14. X. Wang, Q. Zhang, R. Gao, et al., “Constellation reshaping method for PAPR reduction of SIM-OFDM based on SLM algorithm,” Asia Communications and Photonics Conference 2021, C. Chang-Hasnain, A. Willner, W. Shieh, P. Shum, Y. Su, G. Li, B. Eggleton, R. Essiambre, D. Dai, D. Ma, eds., Technical Digest Series (Optica Publishing Group), paper T4A.78 (2021). [CrossRef]  

15. C. Zhao, M. Tang, L. Wang, et al., “BOTDA using channel estimation with direct-detection optical OFDM technique,” Opt. Express 25(11), 12698–12709 (2017). [CrossRef]  

16. S. C. J. Lee, F. Breyer, S. Randel, et al., “High-speed transmission over multimode fiber using discrete multitone modulation,” J. Opt. Netw. 7(2), 183–196 (2008). [CrossRef]  

17. D. Zou, Z. Li, Y. Sun, et al., “Computational complexity comparison of single-carrier DMT and conventional DMT in data center interconnect,” Opt. Express 27(12), 17007–17016 (2019). [CrossRef]  

18. X.-Y. Xu and D.-W. Yue, “A novel non-hermitian symmetry orthogonal frequency division multiplexing system for visible light communications,” IEEE Photonics J. 13(6), 1–9 (2021). [CrossRef]  

19. A. E. Hajomer A, X. Yang, and W. Hu, “Secure OFDM transmission precoded by chaotic discrete Hartley transform,” IEEE Photonics J. 10(2), 1–9 (2018). [CrossRef]  

20. P. Tarasiuk, A. Wojciechowski, and M. Yatsymirskyy, “Iterative radix-2 FHT algorithm with DIF that minimizes number of computed twiddle factors,” 2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT), LVIV, Ukraine, pp. 283–286 (2021).

21. R. V. L. Hartley, “A more symmetrical Fourier analysis applied to transmission problems,” Proc. IRE 30(3), 144–150 (1942). [CrossRef]  

22. A. P. Averchenko and B. D. Zhenatov, “Comparison of computational costs of Hartley transform and Fourier transform,” 2016 13th International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), Novosibirsk, Russia, pp. 436–438 (2016).

23. S. Tateno, H. Takeshita, K. Hosokawa, et al., “Capacity expansion in submarine cable systems with bidirectional transmission using 4-Core-or-More MCF and MC-EDFA,” J. Lightwave Technol. 41(12), 3943–3949 (2023). [CrossRef]  

24. G. Rademacher, B. J. Puttnam, R. S. Luís, et al., “10.66 peta-bit/s transmission over a 38-core-three-mode fiber,” Optical Fiber Communication Conference (OFC) 2020, OSA Technical Digest (Optica Publishing Group), paper Th3 H.1, (2020). [CrossRef]  

25. W. Xia, B. Liu, J. Ren, et al., “High-security transmission scheme of secure key generation and distribution based on polling-permutation encryption,” J. Lightwave Technol. 42(1), 149–157 (2024). [CrossRef]  

26. Y. Han, J. Ren, B. Liu, et al., “Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence,” Opt. Express 32(2), 1979–1997 (2024). [CrossRef]  

27. Y. Wang, W. Zhang, G. Chen, et al., “Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption,” Opt. Commun. 432, 39–43 (2019). [CrossRef]  

28. K. T. Alligood, T. D. Sauer, J. A. Yorke, et al., “An introduction to dynamical systems,” Phys. Today 50(11), 67–68 (1997). [CrossRef]  

29. L. Zhang, B. Liu, and X. Xin, “Secure optical generalized filter bank multicarrier system based on cubic constellation masked method,” Opt. Lett. 40(12), 2711–2714 (2015). [CrossRef]  

30. J. Cui, B. Liu, J. Ren, et al., “High-security three-dimensional optical transmission mechanism utilizing time-frequency-space interleaving disruption,” Opt. Express 31(23), 38640–38652 (2023). [CrossRef]  

31. X. Song, B. Liu, H. Zhang, et al., “Security-enhanced OFDM-PON with two-level coordinated encryption strategy at the bit-level and symbol-level,” Opt. Express 28(23), 35061–35073 (2020). [CrossRef]  

32. J. Zhao, B. Liu, Y. Mao, et al., “High security OFDM-PON with a physical layer encryption based on 4D-hyperchaos and dimension coordination optimization,” Opt. Express 28(14), 21236–21246 (2020). [CrossRef]  

33. S. Li, M. Cheng, L. Deng, et al., “Secure strategy for OFDM-PON using digital chaos algorithm with fixed-point implementation,” J. Lightwave Technol. 36(20), 4826–4833 (2018). [CrossRef]  

34. L. Deng, M. Cheng, X. Wang, et al., “Secure OFDM-PON system based on chaos and fractional Fourier transform techniques,” J. Lightwave Technol. 32(15), 2629–2635 (2014). [CrossRef]  

35. J. Ren, B. Liu, D. Zhao, et al., “Chaotic constant composition distribution matching for physical layer security in a PS-OFDM-PON,” Opt. Express 28(26), 39266–39276 (2020). [CrossRef]  

36. A. Solonina and D. Ulakhovich, “Algorithms and digital signal processors,” Petersburg: BHV-Petersburg (2001).

37. Z. Tong, Y. Hu, Y. Wang, et al., “A PAPR reduction rechnique using FHT with repeated companding and filtering in CO-OFDM systems,” 2017 16th International Conference on Optical Communications and Networks (ICOCN), Wuzhen, China, pp. 1–3 (2017).

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (11)

Fig. 1.
Fig. 1. Schematic diagram of the high-security multidimensional data protection system based on the Hartley algorithm-driven chaotic scheme.
Fig. 2.
Fig. 2. (a) 8-point base 2DIT-FHT computational flow diagram (b) 8-point base 2DIT-FFT computational flow diagram.
Fig. 3.
Fig. 3. Model of a multi-wing chaotic system (a)x-y-z projection (b) x-y projection(c)x-z projection (d) y-z projection.
Fig. 4.
Fig. 4. Chaos driven 3D mapping module.
Fig. 5.
Fig. 5. Chaos-driven 3D constellation mapping module schematic disassembly diagrams.
Fig. 6.
Fig. 6. High-security multi-dimensional data protection system based on the Hartley algorithm with chaotic drive scheme system.
Fig. 7.
Fig. 7. PAPR plots for different threshold selections with different randomized method amplitude modulator designs.
Fig. 8.
Fig. 8. BER performance of fast Hartley algorithm based 3D-OFDM system system with different random amplitude modulators.
Fig. 9.
Fig. 9. Error rate performance of 3D-OFDM signal system under different cores.
Fig. 10.
Fig. 10. BER performance of 3D-OFDM system based on fast Fourier algorithm and fast Hartley algorithm.
Fig. 11.
Fig. 11. Chaos encryption sensitivity map.

Equations (11)

Equations on this page are rendered with MathJax. Learn more.

X H ( k ) = DHT[ x ( n ) ] N = n = 0 N 1 x ( n ) c a s ( 2 π N k n ) , k = 0 , 1 , 2 , , N 1
x ( n ) = IDHT[ X H ( k ) ] N = 1 N n = 0 N 1 X H ( k ) c a s ( 2 π N k n ) , n = 0 , 1 , 2 , , N 1
M F H T = N M 3 N + 4
A F H T = 3 N M 1 2 + 2
P = M min / M min M max M max
x ( t ) = { x ( t ) x ( t ) P max x ( t ) P x ( t ) > p max
H ( k ) = n = 0 N 1 h ( n ) cos ( 2 π k n N ) + n = 0 N 1 h ( n ) sin ( 2 π k n N )
P A P R = max 0 m S 1 | x m | 2 E [ | x m | 2 ]
C C D F = P r ( P A P R > P A P R 0 )
{ x = ay - x y = b y x z z = c + k y 2 ( 1 d sin ( e y ) )
{ A = f l o o r ( mod ( X + 0.5 , 2 ) ) A ( A == 0 ) = 1 B = f i x ( mod ( Y 10 4 , 4 ) ) C = T r a [ mod ( Z 10 5 , 5 ) × ( 1 s o r t ( Z ) ) T ]
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.