Abstract

Physical layer encryption methods are emerging as effective, low-latency approaches to ensure data confidentiality in wireless networks. The use of chaotic signals for data masking is a potential solution to prevent a possible eavesdropper to distinguish between noise and sensitive data. In this work, we experimentally demonstrate the W-band wireless transmission of a 1 Gb/s chaotic signal over 2 m in a radio-over-fiber architecture. The chaos encoding scheme is based on the transition between different states of a Duffing oscillator system, digitally implemented. The bit error rate achieved in all cases was below the forward error correction limit for 7 % overhead. The presented results validate the proposed chaos-based physical layer encoding solution for gigabit data transmissions in hybrid millimeter-wave/photonic networks.

Highlights

  • As the generation of wireless communications (5G) is getting closer, data transmission security challenges are gaining major importance and research focus

  • We have proposed the use of a Duffing oscillator system to encode data with chaotic signals and we have experimentally demonstrated the implementation of that scheme in two different radio-over-fiber architectures

  • The bit error rate (BER) achieved in all cases is below the limit set by forward error correction (FEC) techniques using a 7% overhead

Read more

Summary

Introduction

As the generation of wireless communications (5G) is getting closer, data transmission security challenges are gaining major importance and research focus. Traditional end-to-end approaches rely on symmetric algorithms which require to share a common key to assure that a message which is ciphered by a transmitter can only be decoded by the intended receivers [3]. This key must be updated periodically, adding extra complexity and latency by key distribution algorithms. These algorithms are based on the computing limitations of current technology, so that a brute force attack is unable to extract the secret information. The rapid improvement of computational technology and the development of efficient decryption algorithms compromise their safety [4, 5]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call