Do you want to publish a course? Click here

Dynamic physical layer equalization in optical communication networks

78   0   0.0 ( 0 )
 Added by Tianhua Xu
 Publication date 2016
and research's language is English




Ask ChatGPT about the research

In optical transport networks, signal lightpaths between two terminal nodes can be different due to current network conditions. Thus the transmission distance and accumulated dispersion in the lightpath cannot be predicted. Therefore, the adaptive compensation of dynamic dispersion is necessary in such networks to enable flexible routing and switching. In this paper, we present a detailed analysis on the adaptive dispersion compensation using the least-mean-square (LMS) algorithm in coherent optical communication networks. It is found that the variable-step-size LMS equalizer can achieve the same performance with a lower complexity, compared to the traditional LMS algorithm.



rate research

Read More

The non-orthogonal multiple access (NOMA) and millimeter-wave (mmWave) transmission enable the unmanned aerial vehicle (UAV) assisted wireless networks to provide broadband connectivity over densely packed urban areas. The presence of malicious receivers, however, compromise the security of the UAV-to-ground communications link, thereby degrading secrecy rates. In this work, we consider a NOMA-based transmission strategy in a mmWave UAV-assisted wireless network, and investigate the respective secrecy-rate performance rigorously. In particular, we propose a protected-zone approach to enhance the secrecy-rate performance by preventing the most vulnerable subregion (outside the user region) from the presence of malicious receivers. The respective secrecy rates are then derived analytically as a function of the protected zone, which verifies great secrecy rate improvements through optimizing shape of the protected zone in use. Furthermore, we show that the optimal protected zone shape for mmWave links appears as a compromise between protecting the angle versus distance dimension, which would otherwise form to protect solely the distance dimension for sub-6GHz links. We also numerically evaluate the impact of transmission power, protected-zone size, and UAV altitude on the secrecy-rate performance improvements as practical considerations.
We present experimental data on message transmission in a free-space optical (FSO) link at an eye-safe wavelength, using a testbed consisting of one sender and two receiver terminals, where the latter two are a legitimate receiver and an eavesdropper. The testbed allows us to emulate a typical scenario of physical-layer (PHY) security such as satellite-to-ground laser communications. We estimate information-theoretic metrics including secrecy rate, secrecy outage probability, and expected code lengths for given secrecy criteria based on observed channel statistics. We then discuss operation principles of secure message transmission under realistic fading conditions, and provide a guideline on a multi-layer security architecture by combining PHY security and upper-layer (algorithmic) security.
The performance of long-haul coherent optical fiber transmission system is significantly affected by the equalization enhanced phase noise (EEPN), due to the interaction between the electronic dispersion compensation (EDC) and the laser phase noise. In this paper, we present a comprehensive study on different chromatic dispersion (CD) compensation and carrier phase recovery (CPR) approaches, in the n-level phase shift keying (n-PSK) and the n-level quadrature amplitude modulation (n-QAM) coherent optical transmission systems, considering the impacts of EEPN. Four CD compensation methods are considered: the time-domain equalization (TDE), the frequency-domain equalization (FDE), the least mean square (LMS) adaptive equalization are applied for EDC, and the dispersion compensating fiber (DCF) is employed for optical dispersion compensation (ODC). Meanwhile, three carrier phase recovery methods are also involved: a one-tap normalized least mean square (NLMS) algorithm, a block-wise average (BWA) algorithm, and a Viterbi-Viterbi (VV) algorithm. Numerical simulations have been carried out in a 28-Gbaud dual-polarization quadrature phase shift keying (DP-QPSK) coherent transmission system, and the results indicate that the origin of EEPN depends on the choice of chromatic dispersion compensation methods, and the effects of EEPN also behave moderately different in accordance to different carrier phase recovery scenarios.
Physical-layer group secret-key (GSK) generation is an effective way of generating secret keys in wireless networks, wherein the nodes exploit inherent randomness in the wireless channels to generate group keys, which are subsequently applied to secure messages while broadcasting, relaying, and other network-level communications. While existing GSK protocols focus on securing the common source of randomness from external eavesdroppers, they assume that the legitimate nodes of the group are trusted. In this paper, we address insider attacks from the legitimate participants of the wireless network during the key generation process. Instead of addressing conspicuous attacks such as switching-off communication, injecting noise, or denying consensus on group keys, we introduce stealth attacks that can go undetected against state-of-the-art GSK schemes. We propose two forms of attacks, namely: (i) different-key attacks, wherein an insider attempts to generate different keys at different nodes, especially across nodes that are out of range so that they fail to recover group messages despite possessing the group key, and (ii) low-rate key attacks, wherein an insider alters the common source of randomness so as to reduce the key-rate. We also discuss various detection techniques, which are based on detecting anomalies and inconsistencies on the channel measurements at the legitimate nodes. Through simulations we show that GSK generation schemes are vulnerable to insider-threats, especially on topologies that cannot support additional secure links between neighbouring nodes to verify the attacks.
This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions.We focus on the secure transmission in two scenarios: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. We derive new compact expressions for the average secrecy rate in these two scenarios. We also derive a new compact expression for the overall average secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier wireless sensor networks. Our results show that increasing the number of access points decreases the average secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average secrecy rate, with a critical value beyond which the overall average secrecy rate then decreases. When increasing the number of active sensors, both the average secrecy rate between the sensor and its associated access point and the overall average secrecy rate decrease. In contrast, increasing the number of sinks improves both the average secrecy rate between the access point and its associated sink, as well as the overall average secrecy rate.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا