2021
DOI: 10.1016/j.optcom.2021.126911
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic key generation and application in OFDM-PON using QAM constellation points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Compared to upper-layer security protection, physical layer security, which provides transparent encryption for all the data, is considered a promising solution to exploit the inherent randomness of optical access networks. So far, researchers have proposed many physical layer security methods such as quantum noise stream cipher (QNSC) [89][90][91][92][93][94], time domain spectral phase encoding [95][96][97], chaotic encryption [98][99][100][101], and so on. Recently, among those schemes, a number of chaos-based physical layer security schemes have been proposed for the application of joint subcarrier variations in the NG-PON, especially in the OFDM-PON.…”
Section: Beyond-100g Ng-pon Security Protection Technologymentioning
confidence: 99%
“…Compared to upper-layer security protection, physical layer security, which provides transparent encryption for all the data, is considered a promising solution to exploit the inherent randomness of optical access networks. So far, researchers have proposed many physical layer security methods such as quantum noise stream cipher (QNSC) [89][90][91][92][93][94], time domain spectral phase encoding [95][96][97], chaotic encryption [98][99][100][101], and so on. Recently, among those schemes, a number of chaos-based physical layer security schemes have been proposed for the application of joint subcarrier variations in the NG-PON, especially in the OFDM-PON.…”
Section: Beyond-100g Ng-pon Security Protection Technologymentioning
confidence: 99%
“…Among them, the problem of encrypted image transmission is particularly important [ 9 , 10 ]. Optical network technology based on fibre optic communication has developed rapidly in recent years, and due to the advantages of efficient transmission in optical networks, it plays an irreplaceable role in the transceiver side of embedded devices [ 11 , 12 ].…”
Section: Introductionmentioning
confidence: 99%