The Library
Tapping eavesdropper designs against physical layer secret key in point-to-point fiber communications
Tools
Hu, Wenxiu, Wei, Zhuangkun, Popov, Sergei, Leeson, Mark S. and Xu, Tianhua (2023) Tapping eavesdropper designs against physical layer secret key in point-to-point fiber communications. Journal of Lightwave Technology, 41 (5). pp. 1406-1414. doi:10.1109/JLT.2022.3223025 ISSN 0733-8724.
|
PDF
WRAP-Tapping-eavesdropper-designs-against-physical-layer-secret-key-in-point-to-point-fiber-communications-Xu-2023.pdf - Accepted Version - Requires a PDF viewer. Download (1423Kb) | Preview |
Official URL: https://doi.org/10.1109/JLT.2022.3223025
Abstract
With the growing demand for service access and data transmission, security issues in optical fiber systems have become increasingly important and the subject of increased research. Physical layer secret key generation (PL-SKG), which leverages the random but common channel properties at legitimate parties, has been shown to be a secure, low-cost, and easily deployed technique as opposed to computational-based cryptography, quantum, and chaos key methods that rely on precise equipment. However, the eavesdropper (Eve) potential for current PL-SKG in fiber communications has been overlooked by most studies to date. Unlike wireless communications, where the randomness comes from the spatial multi-paths that cannot be all captured by Eves, in fiber communications, all the randomness(from transmitted random pilots or channel randomness) is contained in the signals transmitted inside the fiber. This, therefore, enables a tapping Eve to reconstruct the common features of legitimate users from its received signals, and further decrypt the featured-based secret keys. To implement this idea, we designed two Eve schemes against polarization mode distortion (PMD) based PL-SKG and the two-way cross multiplication based PL-SKG. The simulation results show that our proposed Eves can successfully reconstruct the legitimate common feature and the secret key relied upon, leading to secret key rate (SKR) reductions of between three and four orders of magnitude in the PL-SKG schemes studied. As a result, we reveal and demonstrate a novel eavesdropping potential to provide challenges for current physical layer secret key designs. We hope to provide more insightful vision and critical evaluation on the design of new physical layer secret key schemes in optical fiber links, to provide more comprehensively secure, and intelligent optical networks
Item Type: | Journal Article | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
|||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > Engineering | |||||||||
Library of Congress Subject Headings (LCSH): | Optical fiber communication -- Security measures, Eavesdropping, Data encryption (Computer science), Public key cryptography | |||||||||
Journal or Publication Title: | Journal of Lightwave Technology | |||||||||
Publisher: | IEEE | |||||||||
ISSN: | 0733-8724 | |||||||||
Official Date: | 1 March 2023 | |||||||||
Dates: |
|
|||||||||
Volume: | 41 | |||||||||
Number: | 5 | |||||||||
Page Range: | pp. 1406-1414 | |||||||||
DOI: | 10.1109/JLT.2022.3223025 | |||||||||
Status: | Peer Reviewed | |||||||||
Publication Status: | Published | |||||||||
Reuse Statement (publisher, data, author rights): | © 2023 Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||
Access rights to Published version: | Restricted or Subscription Access | |||||||||
Copyright Holders: | IEEE | |||||||||
Date of first compliant deposit: | 15 November 2022 | |||||||||
Date of first compliant Open Access: | 16 November 2022 | |||||||||
RIOXX Funder/Project Grant: |
|
|||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year