Chan Adrian, Khalil Mostafa, Shahriar Kh Arif, Plant David V, Chen Lawrence R, Kuang Randy
Quantropi Inc., Ottawa, ON, K1Z 8P8, Canada.
Department of Electrical and Computer Engineering, McGill University, Montreal, QC, H3A 0E9, Canada.
Sci Rep. 2023 Aug 10;13(1):12965. doi: 10.1038/s41598-023-39621-5.
Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties, etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure against a tapping attack if an attacker has no information of the phase modulator and pre-shared key.
对光纤通信网络的光层攻击是网络中加固最薄弱的环节之一,在未采取适当防护措施时,攻击者能够突破安全软件或防火墙。使用随机相位掩码加密数据是增强物理层数据安全性的一种简单而有效的方法。由于用于此类加密的随机相位的相互作用很大程度上取决于诸如数据速率、调制格式、距离、相位随机性程度、激光特性等系统属性,因此确定不同场景下的最佳操作条件非常重要。在这项工作中,假设发射机和接收机有一个预先共享的秘密密钥,我们通过互信息分析对这种系统的安全性进行了理论研究。接下来,我们通过数值模拟确定了确保4-PSK、16-PSK和128-QAM格式安全的操作条件。此外,我们提供了使用16-QAM调制的系统的实验演示。然后,我们使用数值模拟来验证加密的有效性,并研究针对不同调制格式的两种预防措施,这将防止窃听者获取任何数据。结果表明,如果攻击者没有相位调制器和预先共享密钥的信息,该系统对窃听攻击是安全的。