2023
DOI: 10.1515/joc-2022-0085
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the security of free space optical communication system by employing chaos-based modulation scheme

Abstract: Security and privacy are two main dominant features of any communication system. In this paper, physical layer security of free space optical communication system using chaotic modulation scheme i.e., differential chaos shift keying (DCSK) is analyzed, where eavesdropper is actively present near the receiver and interfering between the transmission of secret messages from a transmitter to the receiver. In this manuscript, we have derived analytical expressions for the average secrecy capacity and secrecy outag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 44 publications
0
1
0
Order By: Relevance
“…It can be seen from the figure that the ABER performance improves on decreasing the values of M . For the higher value of M , the transmitted signal will be difficult to intercept [26], [27], [51].…”
Section: Average Secrecy Analysismentioning
confidence: 99%
“…It can be seen from the figure that the ABER performance improves on decreasing the values of M . For the higher value of M , the transmitted signal will be difficult to intercept [26], [27], [51].…”
Section: Average Secrecy Analysismentioning
confidence: 99%
“…The authors in [29] presents wavelength division multiplexing (WDM) based secure FSO via OptiSystem software and which gives very high data rates upto 40 Gb/s. Secrecy analysis of DCSK-FSO communication system in presence of eavesdropper in terms of average secrecy capacity (ASC) and secrecy outage probability (SOP), is presented in [30]. Physical layer security analysis of DCSK based power line communication (PLC) is performed in [31] considering multiple eavesdroppers with Log-normally distributed channels.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in a typical wiretap model, PLS theory states that secure communication is possible if the capacity of the legitimate channel is higher than that of the eavesdropping channel. Motivated by the PLS schemes of RF systems, various PLS techniques have been proposed to secure FSO communications, such as diversity approaches [10], [11], transmit aperture selection (TAS) [12], artificial noise injection [13], and generalized chaotic modulation [14]. However, many characteristics of FSO systems differ from RF systems (e.g., the channel, and the physical characteristics of the transmitting and receiving devices).…”
mentioning
confidence: 99%