Security enhancement in passive optical networks through wavelength hopping and sequences cycling technique

dc.contributor.advisor Doug W. Jacobson
dc.contributor.advisor Ahmed E. Kamal
dc.contributor.author Shawbaki, Walid
dc.contributor.department Electrical and Computer Engineering
dc.date 2018-08-25T02:32:43.000
dc.date.accessioned 2020-06-30T07:25:50Z
dc.date.available 2020-06-30T07:25:50Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2006
dc.date.issued 2006-01-01
dc.description.abstract <p>Growth in the telecommunication industry continues to expand with requirements evolving around increased bandwidth and security. Advances in networking technologies have introduced low cost optical components that has made passive optical networks (PON) the choice for providing huge bandwidth to end users. PON are covered by established standards such as IEEE 802.3ah and ITU-T G.983.1/984.1, with star topology of broadcast and select (B&S) on shared fiber links that poses security vulnerability in terms of confidentiality and privacy;Research and reports in the literature focus around increasing cardinality via coding schemes that lack in addressing security, which was left for implementation in application layers via cryptography. This dissertation presents an approach on security in PON at the network level using slow wavelength hopping techniques and diffusion of data packets among dense wave division multiplex (DWDM). Orthogonal wavelength sequences are generated by mapping an ITU-T G694.1 based wavelength grid matrix and code matrices. The arrangement of wavelengths in the wavelength grid matrix, which can be changed frequently (i.e, hourly) serves as the first key of secure operation. Allocation of generated wavelength sequences distributed in multiple quantities to nodes based on their security level serve as second individual keys for the nodes. In addition, an improved level of security provided via the cycling order of those allocated wavelength sequences to nodes is the third key between the central office (CO) and a node. The proposed approach to PON security provides three new keys available outside the world of cryptography;Various coding techniques are used, and results show that even time spreading/wavelength hopping based on symmetric prime numbers provided the least wavelength sequences; however, it provided excellent correlation properties and level of security. A PON simulation model was implemented to investigate channel impairments in DWDM with 64 channels spaced at 25GHz carried over a 25 km ITU-T G.655 compliant shared fiber cable. Security performance evaluation included analytical studies in classical probabilities to capture the correct order of wavelength hopping sequence using exhaustive searching and reverse construction of matrices from monitored channels. Encouraging results obtained support the feasibility of this proposed technical approach for security.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/1305/
dc.identifier.articleid 2304
dc.identifier.contextkey 6093765
dc.identifier.doi https://doi.org/10.31274/rtd-180813-12051
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/1305
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/66486
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/1305/r_3217319.pdf|||Fri Jan 14 19:43:05 UTC 2022
dc.subject.disciplines Electrical and Electronics
dc.subject.disciplines Systems Engineering
dc.subject.keywords Electrical and computer engineering
dc.subject.keywords Computer engineering
dc.title Security enhancement in passive optical networks through wavelength hopping and sequences cycling technique
dc.type article
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
Name:
r_3217319.pdf
Size:
4.72 MB
Format:
Adobe Portable Document Format
Description: