Visible Light Communication based on Chaos Encryption Scheme
Author:
Rumuh Huda Kadhim1, Mardas Ibrahim Abdullah1
Affiliation:
1. College of Engineering, Electrical Engineering, Babylon University, Babylon, IRAQ
Abstract
To accommodate extremely high levels of data traffic, today's communications networks are undergoing several different technical transformations. In addition to the already present video and voice services, newly created technologies and applications, such as internet services, interactive gaming, and telemedicine, are adding to the already tremendous amounts of traffic and vulnerability generated. The semiconductor laser chaos generation is now being utilized to improve data security and protect data from theft during its transmission from the transmitter to receivers a means of concealing multi-level data signals to address these concerns regarding data security. The incoming signals are concealed before the optical chaotic signal's transmission via the optical fiber medium by our suggested method, which makes use of the double delay feedback technique to create the optical chaotic signal. The additive chaos masking system is utilized to execute the mixing of incoming signals with chaos. This method demonstrates several valuable qualities, including simplicity and the ease with which a message may be recovered. To explore the propagation concerns that are related to secure signal transmission, chaotic data, which is a combination of incoming signals and random noise, is transmitted via the medium of optical fiber. To properly regulate the linear impairments of optical fiber, which is required for the efficient transmission of a secure signal, the plan is put into action for long-haul communication to facilitate the long-distance transfer of data. Adjustments are made to the parameters on both the transmitting and receiving ends to achieve synchronization between the two processes. This is done in such a way that the received signal may be restored to its original state by subtracting the broadcast signal from the same chaos on the receiving side. Obtaining Q-factors allows the method to be evaluated for a variety of optical fiber cable lengths, during which the Q-factors serve to evaluate the quality of the signal that is received.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)
Reference22 articles.
1. A. Lender, "Correlative Digital Communication Techniques," in IEEE Transactions on Communication Technology, vol. 12, no. 4, pp.128-135, December 1964, doi:10.1109/TCOM.1964.1088964. 2. C. Zhang, W. Zhang, X. He, C. Chen, H. Zhang, and K. Qiu, "Physically Secured Optical OFDM-PON by Employing Chaotic Pseudorandom RF Subcarriers," in IEEE Photonics Journal, vol. 9, no. 5, pp. 1-8, Oct. 2017, Art no. 7204408, doi 10.1109/JPHOT.2017.2754407. 3. S. C. Gupta, Textbook on optical fiber communication and its application, PHI Learning Pvt. Ltd, 2018. 4. C. Zhang, W. Zhang, X. He, C. Chen, H. Zhang, and K. Qiu, "Physical –Enhanced Secure Strategy for OFDM-PON Using Chaos and Deoxyribonucleic Acid Encoding, "in Journal of Light wave Technology, vol. 36, no. 9, pp. 1706-1712, 2018. 5. T. Wu, C. Zhang, C. Chen, H. Hou, H. Wei, S. Hu, and K. Qiu, "Security enhancement for OFDM-PON using Brownian motion and chaos in cell," in Optics express, vol.26, no. 18, pp. 22857-22865, 2018.
|
|