1 / 14

Transmission Security via Fast Time-Frequency Hopping

Transmission Security via Fast Time-Frequency Hopping. PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali. UCLA Electrical Engineering Department. Four users, each with four bits. Alice’s Data: A1, A2, A3, A4 Bob’s Data: B1, B2, B3, B4

aselders
Download Presentation

Transmission Security via Fast Time-Frequency Hopping

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical Engineering Department

  2. Four users, each with four bits • Alice’s Data: A1, A2, A3, A4 • Bob’s Data: B1, B2, B3, B4 • Carol’s Data: C1, C2, C3, C4 • Dave’s Data: D1, D2, D3, D4

  3. Random Hopping on a Time-Wavelength Grid • A user appears on zero, one, or more wavelengths each symbol. • Users select positions in grid in an unpredictable fashion. A1 D2 C1 D4 Wavelength 1 A2 C2 C3 B1 Wavelength 2 D1 A4 D3 B2 Wavelength 3 C4 A3 B3 B4 Wavelength 4 Time

  4. A1 A2 A3 A4 1616 Switch B1 B2 B3 B4 A1 D2 C1 D4 C1 C2 C3 C4 A2 C2 C3 B1 D1 D2 D3 D4 D1 A4 D3 B2 C4 A3 B3 B4 Grid-to-Grid Mapping is a Switch User Wavelength Bit Index Time • There are 16! possible configurations of this switch. • The switch configuration may be specified by log2(16!)=44.25 bits

  5. 1616 Switch Grid-to-Grid Mapping is a Switch 16 Users (A-P) Wavelength Switch also supports 16 users on 16 wavelengths with wavelength-only hopping at a total rate of 10 Gbps.

  6. Code bit = 0 Code bit = 1 A Pipelined Switch • There are 16! possible configurations (44.25 bits). • There are 56 switches, but four can be fixed so that 52 bits specify the configuration. • Thinking about future feasibility, for a 100100 switch, not all switch positions need to be randomized.

  7. Pat. Gen Four Switches Taking Turns 155MHz 2.5Gbps 2.5Gbps 16X16 Switch 1:16 16:1 User 1 Modulator Each 16X16 switch (the blue box) runs at 155 MHz, which is ¼ times 1/16 times 10 GHz. l1 16X16 Switch 1:16 16:1 User 2 Modulator l2 4:1 1:16 16:1 16X16 Switch User 3 Modulator l3 16X16 Switch 1:16 16:1 User 4 Modulator l4 Serializer 1:16 16:1 de-Serializer

  8. A1 A2 A3 A4 1616 Switch B1 B2 B3 B4 A1 D2 C1 D4 C1 C2 C3 C4 A2 C2 C3 B1 D1 D2 D3 D4 D1 A4 D3 B2 C4 A3 B3 B4 The Big Picture User Wavelength Bit Index Time We need 52 bits or 9 Gbits/sec (We can do about 20 Gbits/sec) Advanced Encryption Standard Random bit generator (initially just a linear feedback shift register)

  9. What Kinds of Security Are Possible? • Security by Obscurity • This is no security at all. Obscurity is fleeting. • Security by computational difficulty • Standardized systems like DES and AES rely on this. • Must consider attacks where plain-text is known. • The one-time pad that nobody else knows • Perfect as long as the pad remains secret.

  10. Hopping versus Spreading • Our technique focuses on the addition of cryptographic security in the context of relatively straightforward frequency-hopped CDMA. • Certainly, similar techniques could be applied to the other OCDMA techniques described during this meeting. • However, in every case, the real security comes from (high speed) cryptographic security rather than obscure optical techniques.

  11. Network Security • Most sophisticated security techniques add security at the source only (application layer). • Our technique adds security at the physical layer (or at the network layer).

  12. Why Have Network Security? • Increase the difficulty of attack, even with plaintext available. (The ciphertext of an individual stream is now difficult to receive.) • Adds security with minimal latency (the latency inherent in the timespan of the permutation) because AES processing is not in the real-time path..

  13. Synchronous vs. Asynchronous • Our original vision was for a system with 100% spectral efficiency (assuming dense wavelength packing), but with synchronous operation (and a universally known key) as a requirement. • However, our system concept can easily trade spectral efficiency to operate asynchronously. In this case each transmitter can have it’s own key. When overhead is low, collisions are rare, and may be handled by a light error correction code. • In one scenario 5% spectral efficiency yields a 1% bit error rate that is easily handled with error correction.

  14. Improving Multicast Throughput with Network Coding • Consider a Multicast of b1 and b2 from S to R1& R2.. • Conventional “Replicate & Forward” Routing needs at least 2 transmission times. • Linear Combination of Data at intermediate Nodes requires only one transmission time. S b1 b2 b1 b2 B1` + b2 b1 b2 b1 + b2 b1 + b2 R1 R2

More Related