Visible to the public Biblio

Filters: Keyword is optical receivers  [Clear All Filters]
Morapitiya, Sumali S., Furqan Ali, Mohammad, Rajkumar, Samikkannu, Wijayasekara, Sanika K., Jayakody, Dushantha Nalin K., Weerasuriya, R.U..  2020.  A SLIPT-assisted Visible Light Communication Scheme. 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS). :368–375.
Simultaneous Wireless Information and Power Transfer (SWIPT) technique is introduced in Radio Frequency (RF) communication to carry both information and power in same medium. In this approach, the energy can be harvested while decoding the information carries in an RF wave. Recently, the same concept applied in Visible Light Communication (VLC) namely Simultaneous Light Wave Information and Power Transfer (SLIPT), which is highly recommended in an indoor applications to overcome the problem facing in RF communication. Thus, SLIPT is introduced to transmit the power through a Light Emitting Diode (LED) luminaries. In this work, we compare both SWIPT and SLIPT technologies and realize SLIPT technology archives increased performance in terms of the amount of harvested energy, outage probability and error rate performance.
Li, C.-Y., Chang, C.-H., Lu, D.-Y..  2020.  Full-Duplex Self-Recovery Optical Fibre Transport System Based on a Passive Single-Line Bidirectional Optical Add/Drop Multiplexer. IEEE Photonics Journal. 12:1–10.
A full-duplex self-recovery optical fibre transport system is proposed on the basis of a novel passive single-line bidirectional optical add/drop multiplexer (SBOADM). This system aims to achieve an access network with low complexity and network protection capability. Polarisation division multiplexing technique, optical double-frequency application and wavelength reuse method are also employed in the transport system to improve wavelength utilisation efficiency and achieve colourless optical network unit. When the network comprises a hybrid tree-ring topology, the downstream signals can be bidirectionally transmitted and the upstream signals can continuously be sent back to the central office in the reverse pathways due to the remarkable routing function of the SBOADM. Thus, no complicated optical multiplexer/de-multiplexer components or massive optical switches are required in the transport system. If a fibre link failure occurs in the ring topology, then the blocked network connections can be recovered by switching only a single optical switch preinstalled in the remote node. Simulation results show that the proposed architecture can recover the network function effectively and provide identical transmission performance to overcome the impact of a breakpoint in the network. The proposed transport system presents remarkable flexibility and convenience in expandability and breakpoint self-recovery.
Besser, K., Lonnstrom, A., Jorswieck, E. A..  2020.  Neural Network Wiretap Code Design for Multi-Mode Fiber Optical Channels. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). :8738–8742.
The design of reliable and secure codes with finite block length is an important requirement for industrial machine type communications. In this work, we develop an autoencoder for the multi-mode fiber wiretap channel taking into account the error performance at the legitimate receiver and the information leakage at potential eavesdroppers. The estimate of the mutual information leakage includes AWGN and fading channels. The code design is tailored to the specific channel setup where the eavesdropper experiences a mode dependent loss. Numerical simulations illustrate the performance and show a Pareto improvement of the proposed scheme compared to the state-of-the-art polar wiretap codes.
Zhan, Z., Zhang, Z., Koutsoukos, X..  2020.  BitJabber: The World’s Fastest Electromagnetic Covert Channel. 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). :35—45.

An air-gapped computer is physically isolated from unsecured networks to guarantee effective protection against data exfiltration. Due to air gaps, unauthorized data transfer seems impossible over legitimate communication channels, but in reality many so-called physical covert channels can be constructed to allow data exfiltration across the air gaps. Most of such covert channels are very slow and often require certain strict conditions to work (e.g., no physical obstacles between the sender and the receiver). In this paper, we introduce a new physical covert channel named BitJabber that is extremely fast and strong enough to even penetrate concrete walls. We show that this covert channel can be easily created by an unprivileged sender running on a victim’s computer. Specifically, the sender constructs the channel by using only memory accesses to modulate the electromagnetic (EM) signals generated by the DRAM clock. While possessing a very high bandwidth (up to 300,000 bps), this new covert channel is also very reliable (less than 1% error rate). More importantly, this covert channel can enable data exfiltration from an air-gapped computer enclosed in a room with thick concrete walls up to 15 cm.

Guri, M..  2020.  CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). :808—816.

Air-gapped networks are isolated from the Internet, since they store and process sensitive information. It has been shown that attackers can exfiltrate data from air-gapped networks by sending acoustic signals generated by computer speakers, however this type of covert channel relies on the existence of loudspeakers in the air-gapped environment. In this paper, we present CD-LEAK - a novel acoustic covert channel that works in constrained environments where loudspeakers are not available to the attacker. Malware installed on a compromised computer can maliciously generate acoustic signals via the optical CD/DVD drives. Binary information can then be modulated over the acoustic signals and be picked up by a nearby Internet connected receiver (e.g., a workstation, hidden microphone, smartphone, laptop, etc.). We examine CD/DVD drives and discuss their acoustical characteristics. We also present signal generation and detection, and data modulation and demodulation algorithms. Based on our proposed method, we developed a transmitter and receiver for PCs and smartphones, and provide the design and implementation details. We examine the channel and evaluate it on various optical drives. We also provide a set of countermeasures against this threat - which has been overlooked.

Qiu, Yu, Wang, Jin-Yuan, Lin, Sheng-Hong, Wang, Jun-Bo, Lin, Min.  2019.  Secrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals. 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP). :1–6.
This paper investigates the physical-layer data secure transmission for indoor visible light communications (VLC) with simultaneous wireless information and power transfer (SWIPT) and random terminals. A typical indoor VLC system including one transmitter, one desired information receiver and one energy receiver is considered. The two receivers are randomly deployed on the floor, and the random channel characteristics is analyzed. Based on the possibility that the energy receiver is a passive information eavesdropper, the secrecy outage probability (SOP) is employed to evaluate the system performance. A closed-from expression for the lower bound of the SOP is obtained. For the derived lower bound of SOP, the theoretical results match the simulation results very well, which indicates that the derived lower bound can be used to evaluate the secrecy performance. Moreover, the gap between the results of the lower bound and the exact simulation results is also small, which verifies the correctness of the analysis method to obtain the lower bound.
Ge, Hong, Dai, Jianxin, Huang, Bo, Wang, Jin-Yuan.  2019.  Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation. 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). :1241–1248.
This paper mainly investigates the physical layer security for visible light communication (VLC) based on spatial modulation (SM). The indoor VLC system includes multiple transmitters, a legitimate receiver and an eavesdropper. In the system, we consider two constraints of the input signal: non-negative and dimmable average optical intensity constraints. According to the principle of information theory and the spatial modulation scheme of uniform selection (US), the upper and the lower bounds on the secrecy rate for SM based VLC are derived, respectively. Numerical results show that the performance gap between the upper and lower bounds of the secrecy rate is small and relatively close, which indicates that the derived secrecy rate bounds can be used to evaluate the system performance. Moreover, when the number of transmitters is set to be one, the spatial modulation disappears, and the secrecy rate bounds in this paper are consistent with the existing results. To further improve the secrecy performance, a channel adaptive selection (CAS) scheme is proposed for selecting the active transmitter. Numerical result indicates that the CAS scheme has better performance than the US scheme.
Hajomer, A. A. E., Yang, X., Sultan, A., Sun, W., Hu, W..  2018.  Key Generation and Distribution Using Phase Fluctuation in Classical Fiber Channel. 2018 20th International Conference on Transparent Optical Networks (ICTON). :1–3.

We propose a secure key generation and distribution scheme for data encryption in classical optical fiber channel. A Delay interferometer (DI) is used to track the random phase fluctuation inside fiber, while the reconfigurable lengths of polarization-maintaining (PM) fiber are set as the source of optical phase fluctuations. The output signals from DI are extracted as the secret key and shared between the two-legal transmitter and receiver. Because of the randomness of local environment and the uniqueness of fiber channel, the phase fluctuation between orthogonal polarization modes (OPMs) can be used as secure keys to enhance the level of security in physical layer. Experimentally, we realize the random key generation and distribution over 25-km standard single-mode fiber (SSMF). Moreover, the proposed key generation scheme has the advantages of low cost, compatible with current optical fiber networks and long distance transmission with optical amplifiers.

Yongdong, C., Wei, W., Yanling, Z., Jinshuai, W..  2018.  Lightweight Security Signaling Mechanism in Optical Network for Smart Power Grid. 2018 IEEE International Conference on Computer and Communication Engineering Technology (CCET). :110–113.

The communication security issue brought by Smart Grid is of great importance and should not be ignored in backbone optical networks. With the aim to solve this problem, this paper firstly conducts deep analysis into the security challenge of optical network under smart power grid environment and proposes a so-called lightweight security signaling mechanism of multi-domain optical network for Energy Internet. The proposed scheme makes full advantage of current signaling protocol with some necessary extensions and security improvement. Thus, this lightweight security signaling protocol is designed to make sure the end-to-end trusted connection. Under the multi-domain communication services of smart power grid, evaluation simulation for the signaling interaction is conducted. Simulation results show that this proposed approach can greatly improve the security level of large-scale multi-domain optical network for smart power grid with better performance in term of connection success rate performance.

Cho, S., Chen, G., Chun, H., Coon, J. P., O'Brien, D..  2018.  Impact of multipath reflections on secrecy in VLC systems with randomly located eavesdroppers. 2018 IEEE Wireless Communications and Networking Conference (WCNC). :1–6.
Considering reflected light in physical layer security (PLS) is very important because a small portion of reflected light enables an eavesdropper (ED) to acquire legitimate information. Moreover, it would be a practical strategy for an ED to be located at an outer area of the room, where the reflection light is strong, in order to escape the vigilance of a legitimate user. Therefore, in this paper, we investigate the impact of multipath reflections on PLS in visible light communication in the presence of randomly located eavesdroppers. We apply spatial point processes to characterize randomly distributed EDs. The generalized error in signal-to-noise ratio that occurs when reflections are ignored is defined as a function of the distance between the receiver and the wall. We use this error for quantifying the domain of interest that needs to be considered from the secrecy viewpoint. Furthermore, we investigate how the reflection affects the secrecy outage probability (SOP). It is shown that the effect of the reflection on the SOP can be removed by adjusting the light emitting diode configuration. Monte Carlo simulations and numerical results are given to verify our analysis.
Shahjalal, M., Chowdhury, M. Z., Hasan, M. K., Hossan, M. T., Jang, Y. Min.  2018.  A Generalized SDN Framework for Optical Wireless Communication Networks. 2018 International Conference on Information and Communication Technology Convergence (ICTC). :848–851.
Wireless communication based on optical spectrum has been a promising technology to support increasing bandwidth demand in the recent years. Light fidelity, optical camera communication, visible light communication, underwater optical wireless communication, free space optical communication are such technologies those have been already deployed to support the challenges in wireless communications. Those technologies create massive data traffic as lots of infrastructures and servers are connected with the internet. Software defined optical wireless networks have been introduced in this paper as a solution to this phenomenon. An architecture has been designed where we provide the general software defined networking (SDN) structure and describe the possible tasks which can be performed by the SDN for optical wireless communication.
Wang, J., Lin, S., Liu, C., Wang, J., Zhu, B., Jiang, Y..  2018.  Secrecy Capacity of Indoor Visible Light Communication Channels. 2018 IEEE International Conference on Communications Workshops (ICC Workshops). :1–6.
In the indoor scenario, visible light communications (VLC) is regarded as one of the most promising candidates for future wireless communications. Recently, the physical layer security for indoor VLC has drawn considerable attention. In this paper, the secrecy capacity of indoor VLC is analyzed. Initially, an VLC system with a transmitter, a legitimate receiver, and an eavesdropper is established. In the system, the nonnegativity, the peak optical intensity constraint and the dimmable average optical intensity constraint are considered. Based on the principle of information theory, the closed-form expressions of the upper and the lower bounds on the secrecy capacity are derived, respectively. Numerical results show that the upper and the lower bounds on secrecy capacity are very tight, which verify the accuracy of the derived closed-form expressions.
Schrenk, B., Pacher, C..  2018.  1 Gb/s All-LED Visible Light Communication System. 2018 Optical Fiber Communications Conference and Exposition (OFC). :1–3.
We evaluate the use of LEDs intended for illumination as low-cost filtered optical detectors. An optical wireless system that is exclusively based on commercial off-the-shelf 5-mm R/G/B LEDs is experimentally demonstrated for Gb/s close-proximity transmission.
Chen, Z., Wang, X..  2018.  A Method for Improving Physical Layer Security in Visible Light Communication Networks. 2018 IEEE Conference on Standards for Communications and Networking (CSCN). :1–5.
In this paper, a method is proposed for improving the physical layer security for indoor visible light communication (VLC) networks with angle diversity transmitters. An angle diversity transmitter usually consists of multiple narrow-beam light-emitting diode (LED) elements with different orientations. Angle diversity transmitters are suitable for confidential data transmission, since data transmission via narrow light beams can effectively avoid the leakage of messages. In order to improve security performance, protection zones are introduced to the systems with angle diversity transmitters. Simulation results show that over 50% performance improvement can be obtained by adding protection zones.
Yang, M., Wang, A., Sun, G., Liang, S., Zhang, J., Wang, F..  2017.  Signal Distribution Optimization for Cabin Visible Light Communications by Using Weighted Search Bat Algorithm. 2017 3rd IEEE International Conference on Computer and Communications (ICCC). :1025–1030.
With increasing demand for travelling, high-quality network service is important to people in vehicle cabins. Visible light communication (VLC) system is more appropriate than wireless local area network considering the security, communication speed, and narrow shape of the cabin. However, VLC exhibits technical limitations, such as uneven distribution of optical signals. In this regard, we propose a novel weight search bat algorithm (WSBA) to calculate a set of optimal power adjustment factors to reduce fluctuation in signal distributions. Simulation results show that the fairness of signal distribution in the cabin optimized by WSBA is better than that of the non-optimized signal distribution. Moreover, the coverage rate of WSBA is higher than that of genetic algorithm and particle swarm optimization.
Li, W., Ji, J., Zhang, G., Zhang, W..  2016.  Cross-layer security based on optical CDMA and algorithmic cryptography. 2016 IEEE Optoelectronics Global Conference (OGC). :1–2.

In this paper, we introduce an optical network with cross-layer security, which can enhance security performance. In the transmitter, the user's data is encrypted at first. After that, based on optical encoding, physical layer encryption is implemented. In the receiver, after the corresponding optical decoding process, decryption algorithm is used to restore user's data. In this paper, the security performance has been evaluated quantitatively.

Xiang Zhou.  2014.  Efficient Clock and Carrier Recovery Algorithms for Single-Carrier Coherent Optical Systems: A systematic review on challenges and recent progress. Signal Processing Magazine, IEEE. 31:35-45.

This article presents a systematic review on the challenges and recent progress of timing and carrier synchronization techniques for high-speed optical transmission systems using single-carrier-based coherent optical modulation formats.

Chitnis, P.V., Lloyd, H., Silverman, R.H..  2014.  An adaptive interferometric sensor for all-optical photoacoustic microscopy. Ultrasonics Symposium (IUS), 2014 IEEE International. :353-356.

Conventional photoacoustic microscopy (PAM) involves detection of optically induced thermo-elastic waves using ultrasound transducers. This approach requires acoustic coupling and the spatial resolution is limited by the focusing properties of the transducer. We present an all-optical PAM approach that involved detection of the photoacoustically induced surface displacements using an adaptive, two-wave mixing interferometer. The interferometer consisted of a 532-nm, CW laser and a Bismuth Silicon Oxide photorefractive crystal (PRC) that was 5×5×5 mm3. The laser beam was expanded to 3 mm and split into two paths, a reference beam that passed directly through the PRC and a signal beam that was focused at the surface through a 100-X, infinity-corrected objective and returned to the PRC. The PRC matched the wave front of the reference beam to that of the signal beam for optimal interference. The interference of the two beams produced optical-intensity modulations that were correlated with surface displacements. A GHz-bandwidth photoreceiver, a low-noise 20-dB amplifier, and a 12-bit digitizer were employed for time-resolved detection of the surface-displacement signals. In combination with a 5-ns, 532-nm pump laser, the interferometric probe was employed for imaging ink patterns, such as a fingerprint, on a glass slide. The signal beam was focused at a reflective cover slip that was separated from the fingerprint by 5 mm of acoustic-coupling gel. A 3×5 mm2 area of the coverslip was raster scanned with 100-μm steps and surface-displacement signals at each location were averaged 20 times. Image reconstruction based on time reversal of the PA-induced displacement signals produced the photoacoustic image of the ink patterns. The reconstructed image of the fingerprint was consistent with its photograph, which demonstrated the ability of our system to resolve micron-scaled features at a depth of 5 mm.