Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption

Yun Wang, Qi Zhang, Xiangjun Xin, Meng Sun, Ran Gao, Haipeng Yao, Feng Tian, Qinghua Tian, Yongjun Wang, Fu Wang, Sitong Zhou, Zuolin Li, Zhipei Li

Research output: Contribution to journalArticlepeer-review

Abstract

The non-orthogonal multiple access-passive optical network (NOMA-PON) is facing the dual security threats of primary user interference and unauthorized third-party user eavesdropping, so efficient data security enhancement techniques are crucial. To solve these problems, we propose a fixed-point extended (FE)-logistic chaotic mapping to reduce the computational complexity while employing a two-dimensional (2D) cellular automata (CA) and Turing pattern (TP) cascading scramble (CA-TPCS) encryption algorithm to further improve the sensitivity of the NOMA-PON system. The CA-TPCS consists of 2D-CA dynamic bit encryption and Turing symbol substitution (TSS). By using FE chaos to construct 2D-CA and adopting index sort to extract the TSS matrix, dynamic diffusion of bits and scrambling of a 2D symbol matrix are achieved. To ensure the key privacy, we employ a dual key mechanism, and uplink data is introduced as the private key. To verify the feasibility of the proposed method, a simulation validation is built on a 17.6 Gb/s power division multiplexing-orthogonal frequency division multiplexing (PDM-OFDM) NOMA-PON system transmitted over 25 km standard single mode fiber (SSMF). The results show that the proposed scheme has no effect on the optimal power allocation rate (PAR) values and the values are all 3. Meanwhile, the receiver sensitivity gains of 0.2 and 0.3 dB are obtained for high-power and low-power users after encryption. The ciphertext has good diffusion and statistical properties, and the key space is flexibly controlled by the FE precision f , the length l of the transmitted bit, and the size T of the TP, with the value of 22 f +l+T×T. The results show that the proposed scheme is not only very compatible with PDM technology but also can realize the dual defense of internal aggression and external aggression. It has a good application prospect in the future NOMA-PON.

Original languageEnglish
Pages (from-to)1204-1217
Number of pages14
JournalJournal of Optical Communications and Networking
Volume16
Issue number12
DOIs
Publication statusPublished - 2024

Fingerprint

Dive into the research topics of 'Security enhancement for NOMA-PON with 2D cellular automata and Turing pattern cascading scramble aided fixed-point extended logistic chaotic encryption'. Together they form a unique fingerprint.

Cite this