Safety light access method based on two-stage spherical constellation masking

An optical access and constellation technology, applied in the field of communication, can solve problems such as low security and poor system bit error rate performance, and achieve improved security performance, physical layer security performance, and good system bit error rate performance Effect

Active Publication Date: 2020-07-14
NANJING UNIV OF INFORMATION SCI & TECH
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current studies on encryption for the constellation mapping process are concentrated on the two-dimensional constellation, which has low security and poor system bit error rate performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety light access method based on two-stage spherical constellation masking
  • Safety light access method based on two-stage spherical constellation masking
  • Safety light access method based on two-stage spherical constellation masking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]The secure optical access method based on the two-level spherical constellation masking of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0050] Such as figure 1 As shown, a secure optical access method based on two-level spherical constellation masking includes the following steps:

[0051] a. Using Chua's circuit model as the first chaotic model, it is used to generate the first-level masking factor based on constellation rotation;

[0052] Specifically, in step a, the expression of Chua's circuit model is:

[0053]

[0054] In formula (1), the parameters o, p, and q are all variables, and the value range is o∈(-3,3), p∈(-1,1), q∈(-5,5); t represents the step size , the value is an integer greater than zero; a, b, c, d are all constants. In this embodiment, the constants a, b, c, and d are respectively set to 10, 14.87, -1.27, -0.65; the initial values ​​of the variables o,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety light access method based on two-stage spherical constellation masking, which comprises the following steps: taking a Chua's circuit model as a first chaotic model for generating a first-stage masking factor based on constellation rotation; taking the Logistic model as a second chaotic model for generating a secondary masking factor based on constellation scaling;applying the two levels of masking factors to three-dimensional CAP encryption modulation; three-dimensional CAP decryption demodulation. According to the method disclosed in the invention, the two chaotic models are combined to respectively realize multi-chaotic combined encryption on constellation rotation and amplitude transformation, and therefore the safety performance of the optical accesssystem can be more effectively improved. Meanwhile, constellation masking is three-dimensional constellation encryption in a three-dimensional space; compared with a two-dimensional constellation, three-dimensional constellation is advantageous in that dimension improvement enables encryption transformation to be more flexible, the safety performance of a physical layer after constellation encryption is greatly improved, the Euclidean distance between three-dimensional constellation points is larger, and the bit error rate performance of the system is improved.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a safe optical access method based on two-stage spherical constellation masking. Background technique [0002] With the rapid increase in the demand for broadband services, the Passive Optical Network (PON) is considered as an effective and future-proof solution due to its advantages such as lower energy loss, higher data transmission rate, and wider coverage. The future network architecture has attracted a lot of attention. At the same time, carrier-free amplitude-phase modulation (CAP) can realize quadrature multiplexing based on signal pulse shaping and matched filtering, and does not require expensive RF sources and mixers. Applying the multi-dimensional CAP to the PON system can enhance the flexibility of the PON system and support more potential users in the high-speed PON system. These practical advantages make CAP technology increasingly attractive in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q11/00H04L9/00
CPCH04Q11/0067H04L9/001
Inventor 刘博忻向军任建新毛雅亚王瑞春沈磊李良川周锐王光全吴泳锋孙婷婷赵立龙
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products