Skip to main content
Top

2020 | OriginalPaper | Chapter

Physical Layer Security in Optical Networks

Authors : Dimitris Syvridis, Evangelos Pikasis, Charidimos Chaintoutis

Published in: Optical Network Design and Modeling

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper we’ll discuss technological alternatives related to physical layer security of optical communication systems and networks. In the introduction, an overview of confidentiality and availability issues of the optical networks will be discussed, focusing mainly in the physical layer-related solutions. In the following paragraphs we’ll provide two distinct approaches for the physical layer encryption. The first is based on a One-Time-Pad implementation using synchronized true random sequences. The second uses cryptographic keys generated by Photonic Physical Unclonable Function devices for scrambling the Orthogonal Frequency Division Multiplexing subcarriers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rejeb, R., Leeson, M.S., Green, R.J.: Fault and attack management in all-optical networks. IEEE Commun. Mag. 44(11), 79–86 (2006)CrossRef Rejeb, R., Leeson, M.S., Green, R.J.: Fault and attack management in all-optical networks. IEEE Commun. Mag. 44(11), 79–86 (2006)CrossRef
2.
go back to reference Wang, Z., Fok, M.P., Prucnal, P.R.: Physical encoding in optical layer security. J. Cyber. Secur. Mob. 1, 83–100 (2012) Wang, Z., Fok, M.P., Prucnal, P.R.: Physical encoding in optical layer security. J. Cyber. Secur. Mob. 1, 83–100 (2012)
3.
go back to reference Schneier, B., et al.: The twofish team’s final comments on AES selection. AES Round 2(1), 1–13 (2000) Schneier, B., et al.: The twofish team’s final comments on AES selection. AES Round 2(1), 1–13 (2000)
4.
go back to reference Wang, Z., Xu, L., Chang, J., Wang, T., Prucnal, P.R.: Secure optical transmission in a point-to-point link with encrypted CDMA codes. IEEE Photonics Technol. Lett. 22(19), 1410–1412 (2010)CrossRef Wang, Z., Xu, L., Chang, J., Wang, T., Prucnal, P.R.: Secure optical transmission in a point-to-point link with encrypted CDMA codes. IEEE Photonics Technol. Lett. 22(19), 1410–1412 (2010)CrossRef
5.
go back to reference Argiris, A., Syvridis, D., Larger, L., Lodi, V.A., Colet, P., Fischer, I., et al.: Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 438(17), 343–346 (2006) Argiris, A., Syvridis, D., Larger, L., Lodi, V.A., Colet, P., Fischer, I., et al.: Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 438(17), 343–346 (2006)
6.
go back to reference Argyris, A., Pikasis, E., Deligiannidis, S., Syvridis, D.: Sub-Tb/s physical random bit generators based on direct detection of amplified spontaneous emission signals. J. Lightwave Technol. 30(9), 1329–1334 (2012)CrossRef Argyris, A., Pikasis, E., Deligiannidis, S., Syvridis, D.: Sub-Tb/s physical random bit generators based on direct detection of amplified spontaneous emission signals. J. Lightwave Technol. 30(9), 1329–1334 (2012)CrossRef
7.
go back to reference Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., et al.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503-1–010503-4 (2007)CrossRef Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., et al.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503-1–010503-4 (2007)CrossRef
8.
go back to reference Hadfield, R.H., Habif, J.L., Schlafer, J., Schwall, R.E., Nam, S.W.: Quantum key distribution at 1550 nm with twin superconducting single-photon detectors. Appl. Phys. Lett. 89, 241129-1 (2006)CrossRef Hadfield, R.H., Habif, J.L., Schlafer, J., Schwall, R.E., Nam, S.W.: Quantum key distribution at 1550 nm with twin superconducting single-photon detectors. Appl. Phys. Lett. 89, 241129-1 (2006)CrossRef
9.
go back to reference Scheuer, J., Yariv, A.: Giant fiber lasers: a new paradigm for secure key distribution. Phys. Rev. Lett. 97, 140502-1–140502-4 (2006)CrossRef Scheuer, J., Yariv, A.: Giant fiber lasers: a new paradigm for secure key distribution. Phys. Rev. Lett. 97, 140502-1–140502-4 (2006)CrossRef
13.
go back to reference The British governmental white paper, “Quantum Key Distribution,” National Cyber Security Centre, a part of GCHQ in Britain, 4th Oct (2016) The British governmental white paper, “Quantum Key Distribution,” National Cyber Security Centre, a part of GCHQ in Britain, 4th Oct (2016)
14.
go back to reference Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738–3751 (2006)CrossRef Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738–3751 (2006)CrossRef
15.
go back to reference Argyris, A., Pikasis, E., Syvridis, D.: Gb/s one time pad data encryption with synchronised chaos based true random bit generation. J. Lightwave Technol. 34(22), 532–5331 (2016)CrossRef Argyris, A., Pikasis, E., Syvridis, D.: Gb/s one time pad data encryption with synchronised chaos based true random bit generation. J. Lightwave Technol. 34(22), 532–5331 (2016)CrossRef
16.
go back to reference Pappu, R., Recht, B., Taylor, J., et al.: Physical one-way functions. Science 297, 2026–2030 (2002)CrossRef Pappu, R., Recht, B., Taylor, J., et al.: Physical one-way functions. Science 297, 2026–2030 (2002)CrossRef
17.
go back to reference Gassend, B., Clarke, D., Van Dijk, M., et al.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148–160. ACM (2002) Gassend, B., Clarke, D., Van Dijk, M., et al.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148–160. ACM (2002)
19.
go back to reference Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM/IEEE Design Automation Conference DAC 2007, pp. 9–14 (2007) Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM/IEEE Design Automation Conference DAC 2007, pp. 9–14 (2007)
21.
go back to reference Kursawe, K., Sadeghi, A.-R., Schellekens, D., et al.: Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage (2009) Kursawe, K., Sadeghi, A.-R., Schellekens, D., et al.: Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage (2009)
22.
go back to reference Qiu, P., Lyu, Y., Zhai, D., et al.: Physical unclonable functions-based linear encryption against code reuse attacks. In: 2016 53rd ACM/EDAC/IEEE Design Automation Conference (DAC) (2016) Qiu, P., Lyu, Y., Zhai, D., et al.: Physical unclonable functions-based linear encryption against code reuse attacks. In: 2016 53rd ACM/EDAC/IEEE Design Automation Conference (DAC) (2016)
23.
go back to reference Chaintoutis, C., et al.: Optical PUFs as physical root of trust for blockchain-driven applications. IET Software 13, 182–186 (2018)CrossRef Chaintoutis, C., et al.: Optical PUFs as physical root of trust for blockchain-driven applications. IET Software 13, 182–186 (2018)CrossRef
24.
go back to reference Suh, G.E., Devadas, S.: Physical unclonable functions for device authentications and secret key generation. In: Proceedings of 44th Annual Conference on Design Automation, pp. 9–14 (2007) Suh, G.E., Devadas, S.: Physical unclonable functions for device authentications and secret key generation. In: Proceedings of 44th Annual Conference on Design Automation, pp. 9–14 (2007)
25.
27.
go back to reference Xu, X., Rahmati, A., Holcomb, D.E., Fu, K., Burleson, W.: Reliable physical unclonable functions using data retention voltage of SRAM cells. IEEE Trans. Comput. Des. Integr. Circuits Syst. 34, 903–914 (2015)CrossRef Xu, X., Rahmati, A., Holcomb, D.E., Fu, K., Burleson, W.: Reliable physical unclonable functions using data retention voltage of SRAM cells. IEEE Trans. Comput. Des. Integr. Circuits Syst. 34, 903–914 (2015)CrossRef
28.
go back to reference Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 641–646. IEEE (2015) Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 641–646. IEEE (2015)
29.
go back to reference Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65 nm Arbiter PUFs: accurate modeling poses strict bounds on usability. In: Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 37–42 (2012) Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65 nm Arbiter PUFs: accurate modeling poses strict bounds on usability. In: Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 37–42 (2012)
30.
go back to reference Tajik, S., Ganji, F., Seifert, J.P., Lohrke, H., Boit, C.: Laser fault attack on physically unclonable functions. In: Proceedings of 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 85–96. IEEE (2016). https://doi.org/10.1109/FDTC.2015.19 Tajik, S., Ganji, F., Seifert, J.P., Lohrke, H., Boit, C.: Laser fault attack on physically unclonable functions. In: Proceedings of 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 85–96. IEEE (2016). https://​doi.​org/​10.​1109/​FDTC.​2015.​19
31.
go back to reference Mahmoud, A., Ruhrmair, U., Majzoobi, M., Koushanfar, F.: Combined Modeling and Side Channel Attacks on Strong PUFs. IACR Cryptology ePrint Archive (2013) Mahmoud, A., Ruhrmair, U., Majzoobi, M., Koushanfar, F.: Combined Modeling and Side Channel Attacks on Strong PUFs. IACR Cryptology ePrint Archive (2013)
32.
go back to reference Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., Kavehei, O., Abbott, D.: Emerging Physica unclonable functions with nanotechnology. IEEE Access 4, 61–80 (2016)CrossRef Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., Kavehei, O., Abbott, D.: Emerging Physica unclonable functions with nanotechnology. IEEE Access 4, 61–80 (2016)CrossRef
33.
go back to reference Ruhrmair, U., Hilgers, C., Urban, S., et al.: Optical pufs reloaded. Eprint Iacr.org (2013) Ruhrmair, U., Hilgers, C., Urban, S., et al.: Optical pufs reloaded. Eprint Iacr.​org (2013)
34.
go back to reference Akriotou, M., Mesaritakis, C., Grivas, E., et al.: Random number generation from a secure photonic physical unclonable hardware module. In: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London (2018) Akriotou, M., Mesaritakis, C., Grivas, E., et al.: Random number generation from a secure photonic physical unclonable hardware module. In: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London (2018)
35.
go back to reference Mesaritakis, C., Akriotou, M., Kapsalis, A., et al.: Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8(1), 9653 (2018)CrossRef Mesaritakis, C., Akriotou, M., Kapsalis, A., et al.: Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8(1), 9653 (2018)CrossRef
36.
go back to reference Armknecht, F., Maes, R., Sadeghi, A.-R., et al.: A formalization of the security features of physical functions. In: 2011 IEEE Symposium on Security and Privacy, pp. 397–412 (2011) Armknecht, F., Maes, R., Sadeghi, A.-R., et al.: A formalization of the security features of physical functions. In: 2011 IEEE Symposium on Security and Privacy, pp. 397–412 (2011)
37.
go back to reference ITU-R SG05. Draft new Report ITU-R M. - Minimum requirements related to technical performance for IMT-2020 radio interface(s), February 2017 ITU-R SG05. Draft new Report ITU-R M. - Minimum requirements related to technical performance for IMT-2020 radio interface(s), February 2017
38.
go back to reference Lin, X., et al.: 5G new radio: Unveiling the essentials of the next generation wireless access technology. IEEE Commun. Stand. Mag. 3(3), 30–37 (2019)CrossRef Lin, X., et al.: 5G new radio: Unveiling the essentials of the next generation wireless access technology. IEEE Commun. Stand. Mag. 3(3), 30–37 (2019)CrossRef
39.
go back to reference TS 38.211. NR; Physical channels and modulation. V15.1.0, April 2018. http://www.3gpp.org/ftp//Specs/archive/38_series/38.211/38211-f10.zip. Accessed 18 June 2018 TS 38.211. NR; Physical channels and modulation. V15.1.0, April 2018. http://​www.​3gpp.​org/​ftp/​/​Specs/​archive/​38_​series/​38.​211/​38211-f10.​zip.​ Accessed 18 June 2018
Metadata
Title
Physical Layer Security in Optical Networks
Authors
Dimitris Syvridis
Evangelos Pikasis
Charidimos Chaintoutis
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-38085-4_35

Premium Partner