|
1.IntroductionOptical code division multiple access (OCDMA) system is a future technology to eliminate the problem of traffic growth and multiple user access on the internet in optical networks.1 Enhanced information security is often said to be inherent in OCDMA technology due to its coded nature. If multiple codes with long code length function all together, it is nearly impossible for an eavesdropper to get any significant information because of multiple access interference (MAI) caused by all the transmitting users, and also it is difficult to jam the noise like OCDMA-encoded signal that the literature survey revealed otherwise.2,3 In the last few years, studies discovered that OCDMA systems are vulnerable to eavesdropping and jamming attacks. The physical layer of the OCDMA network can be attacked by an eavesdropper to intercept the data by launching an interferer signal, which will jam the system. The interferer signal can be selected by an eavesdropper through cross correlation between code words of authentic users.4,5 A jamming attack can easily manipulate information being transmitted if the signals have the same frequency band as of the data signal. In addition, the increase in the number of attacks as well as in diverse methods of the attacks is becoming more difficult to tackle, and it further makes information security a crucial issue in OCDMA networks. The explosive increase in information exchange on the Internet ameliorates the transmission of sensitive and private data through networks reliant on optical fibers. In high-speed optical networks, the most vital multiple access technique practiced is spectral amplitude coding (SAC) because the absence of any frequency synchronizations and dedicated time, which makes it a flexible coding scheme. Also the performance of the system depends on the number of coded users, which successively rely on the cardinality of the OCDMA code taken into consideration. The number of users can be increased in OCDMA systems by employing the codes with large cardinality. But increase in the code cardinality with enhanced properties is a problematic task in OCDMA systems. Also extensive information exchange on the optical networks leads to network security breaching of confidential information, which, in addition, increase by easily tapping the signal with low-priced equipments. Network security in physical layer, therefore, emerges as compelling request in future generation optical fiber-based networks. OCDMA is a potential technology to remove the troubles of ever-increasing data traffic as well as multiple end users in the networks. Because of the coded nature of the OCDMA systems that are perceived as the secured systems and if more than one user operates at the same time, it increases the security of the system against the eavesdropper and jammer. In recent times, numerous research studies revealed that code division systems are susceptible to attacks such as noise interference from an unauthorized user and eavesdropper. Network security can be breached by an eavesdropper with the number of combinations of the chips based on metadata, and a jammer signal can alter the authorized user information by interfering it with false data at the same frequency band as the authentic user. Therefore, problem of network security breaching is a prominent shortcoming in the OCDMA systems. The performance of the OCDMA system is limited by shot noise, beat noise, thermal noise, MAI, and cross correlation existing among multiple users, out of which the dominating source of noise is MAI.6,7 Numerous one-dimensional code schemes have been designed and implemented in the literature review to eliminate the MAI among multiple users but comes with various shortcomings. Various one-dimensional code schemes such as Walsh–Hadamard code, multidiagonal (MD) code, diagonal double weight (DDW) code, modified double weight (MDW) code, and enhanced DDW code have been implemented in the literature survey. Walsh–Hadamard code employs the balanced detection scheme. The code construction cannot be implemented according to the precise number of users and as the code length increases, the cross correlation also increases.8–12 In DDW code, the code length does not enhance abruptly with boost in number of users but the cross correlation will always occur between the two users.13–16 MDW code is basically a customized adaptation of the double weight code, where the weight of the code is any even number larger than 2. Better code weight increases the signal-to-noise ratio of the received signal.17–19 MD codes employ data and code segment to produce the code; along with it there exists a trade-off between the cross correlation and the length of the code.20–24 Enhanced double weight (EDW) code had a limitation of the code weight of any odd number , which was further eliminated with the usage of the algorithms. Thus now there is a flexibility to choose any code weight to construct a basic matrix. EDW code is able to deliver better security with short code length, but there exists a cross correlation of 1.25–30 Extensive literature survey makes us familiar with the challenges in the SAC-OCDMA systems, and it is perceived that there is peer pressure on the aforementioned system to deliver and cater high data rate services along with large cardinality due to a large number of users. Generally, the performance of the systems depends on the nature of OCDMA code and number of users. MAI problems can be coped up by designing optimal codes and deploying state–of-the-art architectures to support large end users. Different codes have been demonstrated to eliminate the MAI in OCDMA systems but they suffered from the limitations by various ways. Some of the limitations are large code lengths, variable cross correlation, and restriction of the code to design it for any number of users. Major problems in the SAC-OCDMA codes are: (i) bandwidth inefficiency, (ii) differential/subtraction detection, (iii) code generation complexity, and (iv) cross correlation. Therefore, in order to enhance the potential of the current optical systems, further work requires to be accomplished with the architectures reliant on enormous available network topologies by incorporating enhanced codes. So far, the performance of OCDMA systems by employing effective coding is validated at low bit rates and wide frequency spacing. Hence, it is required to address the wavelength division multiplexing (WDM) systems with compatible OCDMA systems that can serve high data rate services and facilitate a large number of users with acceptable BER. Practical scenarios and implementations have been reported in the literature, and we have listed some of the practical works for different SAC-OCDMA codes. Walsh–Hadamard codes were implemented on hardware as well as on simulation in IIT Delhi, India.31 The author presented that orthogonal Walsh–Hadamard codes are error correcting codes and generally incorporated in the error free systems. This paper explores modeling of Walsh codes and Hadamard matrices as a finite orthogonal vector space. Theoretical studies on WH codes are carried out in France for wireless body area network (WBAN) that caters health care services.32 Basic work was here to suppress the interference using WH codes in WBANs. The Walsh–Hadamard code design using optical nonlinear material was presented in India using nonlinear optics. Nonlinear optics has augmented attention for all-optical signal processing in high-speed photonic networks due to its inherent attributes of polarization. The performance of helicopter satellite communication using Walsh–Hadamard code under the periodic blockage environment was investigated in Vietnam.33 WH codes are mainly preferred for parameter evaluation and harmonization in a multibeam state for video broadcasting via satellites due to their orthogonality property, Czech Republic.11 In Taiwan,12 a hardware implementation and simulation of unipolar and bipolar WH codes was done and results revealed that the BER in case of bipolar coding of WH exhibited better results than unipolar coding. Performance analysis of band-limited baseband synchronous code division with the orthogonal-independent component analysis spreading sequences was compared with Walsh–Hadamard sequences, and practical was also accomplished in the Next Generation Mobile Communications Laboratory, RIKEN, Japan.34 An appropriate decoding technique for SAC-OCDMA-based secured distributed vibration sensor was investigated and practically implemented in Ref. 35. Walsh–Hadamard codes have some limitations, and therefore, other SAC-OCDMA codes are also demonstrated over the globe. The performance of DDW codes was studied analytically to raise the presentation and cardinality of SAC-OCDMA systems in Malaysia.36 BER results revealed that single photodetector in DDW provides good performance. MDW codes were introduced by the enhancement of DDW codes as presented in Ref. 13 and analyzed the SAC-OCDMA system performance using MDW code with NAND detection technique with theoretical study and simulation experiments. Hybrid subcarrier multiplexing incorporating multidiagonal codes OCDMA technology was explored mutually, i.e., mathematically and by simulation in Ref. 37. In Refs. 23 and 38, the work was done on the theoretical evaluation of MD codes and results revealed that these codes provide better results than existing SAC-OCDMA codes of that time. Section 1 elaborates the introduction of optical code division multiplexing, SAC. The remainder of this paper is structured as follows. Section 2 explains various coding techniques. Section 3 describes the basic code construction of the WH code, MD code, MDW code, and EDW code. Section 3 explains the basic generalized simulation setup involved in the construction code in the simulatory environment. Section 4 discusses working model of OCDMA codes and the results received by comparing aforementioned codes in terms of BER, SNR, quality of the received signal, applying different algorithms, variation of the distance, and data rates in the similar simulatory environment. A zero cross-correlation code is described and its code construction is given in Sec. 5. Recent trends and technologies used in OCDMA are mentioned in Sec. 6. Section 7 explains future scope and Sec. 8 concludes this paper. 2.Different Encoding TechniquesWith the rapid increase in the bandwidth hungry internet services, there is augmentation of high data rate demands. Optical code division came out to be a premier and attractive solution for high data rate supported optical communication systems. Numerous research articles were reported to enhance the bit rate of the OCDMA systems. However, due to optical to electrical and electrical to optical conversion, a bottleneck is introduced in the systems that limit the high data rate supportability. In order to increase the potential of the OCDMA systems, all-optical systems are the prominent and ultimate solution to cater the ever-increasing demands. An all-optical system with conversion of nonreturn to zero into incoherent OCDMA system is proposed in Ref. 39 using optical nonlinear effects such as cross gain modulation in semiconductor optical amplifier. All-optical processing was a key factor to enhance the optical signal-to-noise ratio of the system, and there was an increment of 20 in optical signal to noise ratio. In Ref. 40, the work was accomplished on an all-optical system with the incorporation of time-wavelength OCDMA chips in ring networks. The system rate was ultrafast and was based on asymmetrical demultiplexer. Demonstrated results revealed that the system had the capability to support 2.5 Gb/s data rate and facilitated the growth of all-optical OCDMA add drop multiplexers. With the developments of OCDMA systems, there exists other limitations of system security and is an important issue to be addressed. Physical layer security has attracted much attention because of the increase in network security breaching issues. Physical security prospective was outlined in Ref. 41 and described the various encoding schemes in OCDMA. All-optical data encryption is a potential and necessity for providing an unprecedented degree of security. This encryption in all-optical domain was done with different methods such as using all-optical logic gate, data hiding, cryptography, and multicode keying (MCK). The advanced coding schemes are explained in Sec. 5. 2.1.Spectral Amplitude CodingSAC is a prominent OCDMA technology that rapidly grows in all-optical processing. It provides an ultimate solution to cope with MAI by incorporating in-phase cross-correlation codes. Basically, in order to eliminate MAI as well as to keep signal at their fixed chip slots, all the codes need high autocorrelation and low cross correlation. In SAC-OCDMA systems, wavelengths are encrypted based on the blocking and allowing process as permitted by code matrix. In other words, wavelengths are encrypted according to code signature. SAC reliant on code sequences with particular properties to uphold a suitable degree of orthogonality between coded signals of different users. Basically, transmitter unit of the SAC-based systems has binary data generator, optical source, pulse generator, modulators, power splitters, and multiplexers. In order to slice different frequencies from wideband spectrum (given by light source typically light emitting diode), fiber Bragg gratings (FBGs) are employed in the transmitter for wavelength selection according code matrix. Similarly, selecting particular user’s code chips, again FBGs are incorporated followed by basic receiver unit, which consists of photodetector, electrical filters, and error detectors. All the users share same bandwidth of fiber optic. Detection of SAC codes mainly accomplish through balanced detection scheme, in which more than one photodetector is employed and it has advantage to quell MAI by selecting only authentic user chips of respective code. It takes the advantage that it is appropriate for point to multipoint communication by spending low cost and provides cost efficient solution to the network. 3.Code ConstructionVarious code schemes are used such as Walsh–Hadamard code, MD code, MDW code, and EDW code, to encrypt and decrypt the data in the SAC-OCDMA system. These codes are constructed using certain logical patterns, which are known to the authorized users only. 3.1.Walsh–Hadamard CodeCDMA communication system can make use of Hadamard codes in a number of ways. The Hadamard code can be defined as a row of element of the Hadamard matrix , which is madeup of 0,1 binary values, where is engendered by the foundation matrix, which is as follows: For , the Hadamard matrix is formed as shown beneath: Unipolar Hadamard matrix has the following properties:
In Hadamard matrix, every row is different from other row by just positions. So all the rows apart from the first row contains (0)’s and (1)’s. This code is able to support amount of users. Therefore, it is concluded that it is bandwidth inefficient code and has inflexible code construction, as the number of users augments, cross correlation also increases and thus requires more number of filters. For detection, differential/subtraction scheme is used, which leads to MAI, also code construction is complex (Table 1). Table 1State-of-the-art comparison of Walsh–Hadamard codes.
3.2.Multidiagonal CodeMD code is a matrix, which depends upon the number of users () and code weight (). There is flexibility to choose the code weight, but it has to be greater than (). The MD code construction is as follows:
MD code has few pros and cons, which are: MD codes perform better when large code lengths and number of users are required. Orthogonality is achieved because cross correlation is always zero, therefore, it is suitable for metropolitan area network. Direction direct detection scheme is used, code construction is simple, and there is flexibility in maintaining the code weight, which is . These codes are bandwidth inefficient code (Table 2). 3.3.Modified Double Weight CodeMDW code is a matrix having two vital components in the fundamental matrix of MDW codes and they are where denotes the basic code’s column size and is the basic code’s row size.Table 2State-of-the-art comparison of MD codes.
In this code, there is a cross correlation of 1 but in some combinations of codes there is a possibility of zero cross correlation as well. From the basic code construction, it is evident that maximum cross correlation is equal to 1. The weight of this code is an even number and should always be more than 2. The chips combination is maintained as “1 2 1” for every three columns for every successive pairs of codes (Table 3). Table 3State-of-the-art comparison of MDW codes.
3.4.Enhanced Double Weight CodeIn double weight spectral amplitude codes, the first and foremost step is to construct a base matrix, which entirely reliant on the number of users.51,52 Base matrix is repeated diagonally and this repetition for the construction of the code is termed as mapping technique. The size of the base matrix as well as users decide the length of the code. Increment of the code length due to mapping is not constant. Double weight, MDW, and EDW codes have a property that they have maintained cross correlation of almost one among different users. Aforementioned codes have the same mapping technique despite the different code construction algorithms. Here a discussion on the general algorithm code construction for EDW codes has been done without mapping for . This code construction is free from the mapping and maintains the cross correlation of 1. The length of the code remains constant for each additional user. Let us discuss a example that if length of code is 9 for 3 users, then for 4 users length of the code comes out to be 12 and so on (increment of 3 for each user). A generalized code construction without mapping is given below. In EDW code construction, first of all, choose the value of weight () and also decide the desired no. of users (). Code length is given as Basic matrix () of size () is constructed as shown as follows: The complete code set is represented by matrix of size for users. The construction involves three steps, in which a liaison matrix is first formed. is repeated times in as shown as follows:30 To completely fill all columns, basic matrix rows and are added to last row and first row of the last column of matrix , respectively, as shown as follows: The complete code set is obtained by filling up empty places in with zeros: Algorithm is stated as:
Table 4State-of-the-art comparison of EDW codes.
4.Working Model of OCDMA CodesThe block diagram of SAC-OCDMA is revealed in Fig. 1. It comprises a light source, an encoder, modulator, and user data at the transmitter section of each user. The wavelengths considered here are taken from C band (1531 to 1565 nm). The output of each user is pooled and commenced onto the optical fiber. At the receiving side, first the inward signal is divided and propelled to the decoding section of each user. The code is engendered by opting for the wavelengths from the optical signal of the broadband source (laser array). Wavelengths are chosen in accordance of the code matrix. Codes from diverse users are merged before they are instigated into the optical fiber. At the receiver, the received signal is divided using demux and the authorized user extracts the original data using optical filters of specific wavelengths, which are entirely reliant on the spectral code chips of a particular user and is a direct detection method. Comparison between different coding schemes is carried out under the similar environment, i.e., by considering the same input parameters. In Fig. 2, BER is worse in the case of Walsh–Hadamard code due to cross correlation of 2, which means that the data of two users interfere at two wavelengths due to which there are more errors in desired data reception. The performance of Walsh–Hadamard code is followed by double diagonal weight codes due to the cross correlation of 1. MD codes exhibit better performance as compared to DDW codes because of the presence of multiwavelengths (). Thus SNR increases due to the presence of multiples 1’s consequently log BER decreases. EDW has the best performance among aforementioned codes due to better chip combination. From Fig. 3, which represents quality variation with distance increase, we can conclude that the EDW has the best quality factor with increasing distance as compared to other code schemes, but after 30 km it is surpassed by Walsh–Hadamard code due to the nonlinear effects in the optical fiber, but again after 40 km attenuation increases again and it decreases the overall power level inside the optical fiber. DDW has the worst performance due to low SNR. In Fig. 4, evaluation of compressed spectrum return to zero and duo-binary return to zero advanced modulation formats is accomplished in different SAC-OCDMA codes in terms of BER at varied data speeds. It is perceived from the investigation that there is performance betterment in the codes, which incorporate Duo-binary return to zero (DRZ) format as compared to carrier suppressed return to zero (CSRZ). Increase in data rate causes decrease in the time of bit slots that are reserved for the each pulse and ultimately effect of pulse broadening (dispersion) becomes more aggravated. This phenomenon exhibits more errors in the received chip code-based pulses. Results revealed that maximum correct code detection is in EDW codes with DRZ codes followed by CSRZ. Worst BER is observed in WH codes with CSRZ. Performance betterment is more in DRZ due to transmission of bits/s using of bandwidth. Most noteworthy benefit of this format is tolerance of pulse width broadening (PWB) and narrowband optical filtering. In Fig. 5, as the photonic efficiency of photodetector PIN is increasing, the detected bit error rate decreases of all the SAC-OCDMA codes. At the fixed carrier power of 0 dBm, from 10% to 90%, the BER is tremendously depressed about 500% in case of EDW and in WH. So WH shows the worst performance and EDW provides the best performance at varied photonic efficiency of photodetector PIN. Therefore, from this figure, it was evident that the optimal region of PIN efficiency is between 60% and 90%, where the reduction in errors is fluctuated not to greater extent. Signal-to-noise ratio is an important parameter to evaluate the performance of the system and another significant parameter is frequency band of operation. The use of conventional band is reported widely, however, due to the high-capacity demands: we need to pack the more number of channels to optical fiber. High capacity, inturns, puts the pressure on the researchers to demonstrate the systems in other frequency bands also. So the performance of different frequency bands such as O-band, S-band, C-band, and L-band is compared in Fig. 6 for different SAC-OCDMA codes in terms of SNR. This work is accomplished with forward error correction (FEC) and without FEC. It is perceived that EDW codes with FEC provide the highest SNR and WH codes without FEC give minimum SNR. FEC basically improves the performance due to the redundant codes or error corrective codes. SNR trends in different frequency bands in the system are as follows: EDW (FEC) > EDW (W/o FEC) > MD (FEC) > MD (W/o FEC) > MDW (FEC) > MDW (W/o FEC) > WH (FEC) > WH (W/o FEC). Codes provide optimal SNR in C-band due to less attenuation, dispersion, and scattering as compared to other bands. From the observations, it is evident that S-band is not recommended to use for getting good performance. Moreover, PWB is a major cause of the error in the system and becomes very severe at high data rates. Here in Fig. 7, we have varied the pulse width of the signals according to the values within the range as given by the International Telecommunication Union. With the increase in the time of the pulse, SNR of system decreases. Effects of shot noise only and shot + thermal noise are studied and compared in the system for all aforementioned codes. WH codes are least performed codes followed by modified diagonal codes. Out of all the four codes, EDW again gives the maximum SNR. It is also important to note that combined effects of shot and thermal lowers the SNR significantly. Figure 8 shows the eye height of the received signal with respect to different algorithms used for their calculation is taken for different OCDMA codes at varied extinction ratios. Eye height is calculated as is the standard value of sample 0, is the standard value of sample 1, is the average value of sample 0, and is the average value of sample 1.Gaussian for the standard deviation and is, BER and are the probability of symbols. and are the samples for 0, 1, respectively, is the average value of sample 0, is the average value of sample 1, and is the threshold value, and are the sample value standard deviation.Chi-squared algorithm for sampled value for logic 0 and for logic BER is If there is noise mixed, then it is modified as is the no. of 1 occurs, is the total patterns, is the average value of sample, is the standard value of sample, and is the threshold 1 value.Probability of error is The algorithms used were Gaussian and chi-squared, and it is seen that there is slight improvement in the performance of the codes with the use of chi-squared algorithms. Also the effect of ER is that its low value cause troubles to the receiver for the calculations of 1’s and 0’s. ER is basically a ratio in two optical powers. Eye height is highest in EDW (chi-squared) and least in WH (Gaussian) after 20 dB of ER. Therefore, it is recommended to use high ER to achieve more eye height.In Fig. 9, we have tried to investigate different SAC-OCDMA codes in our proposed work at different time instances of the bit period. Its depicts the comparative analysis of maximum -factor received with respect to time of any transmitted bit for EDW code with conventional codes such as WH code, MD code, and MDW codes. Maximum -factor of 17.47, 15.23, 14.67, and 9.93 are observed in case of EDW, MD, MDW, and WH codes, respectively. The highest quality of signal is achievable in the case of EDW as it is a bandwidth efficient code due to shoeter code length, whereas a longer code length of WH codes makes it a bandwidth inefficient code and higher value of cross-correlation deteriorates the quality of the received signal. By implementing and analyzing performance of diverse SAC codes, it is evident that cross correlation is a major performance degradation factor among multiple users. Multidiagonal codes have zero cross correlation but code construction of MD codes is complex, and moreover it has greater code lengths, which waste the bandwidth. On the contrary, EDW, MDW, and WH codes have cross correlation, which is the major cause of MAI. Comparison between different coding schemes is carried out under a similar environment, i.e., by considering the same input parameters. From Figs. 2 and 3, it is perceived that due to better chip combination, less cross correlation than Hadamard codes, less code length (greater bandwidth efficiency) than MD codes, and greater SNR due to the presence of more no. of 1’s than DDW codes, EDW codes are found out to be optimal and best performing in the demonstrated system investigation. Figure 4 shows the performance betterment of the system using EDW codes and DRZ advanced modulation format. DRZ is superior to CSRZ due to transmission of bits/s using of bandwidth. The most noteworthy benefit of this DRZ format is tolerance of PWB and narrowband optical filtering. In Fig. 5, as the photonic efficiency of photodetector PIN is increasing, the detected bit error rate decreases of all the SAC-OCDMA codes. At the fixed carrier power of 0 dBm, from 10% to 90%, the BER is tremendously depressed about 500% in case of EDW and in WH. So WH shows the worst performance and EDW provides the best performance at varied photonic efficiency of photodetector PIN. Therefore, from Fig. 5, it was evident that the optimal region of PIN efficiency is between 60% and 90%, where the reduction in errors is fluctuated not to greater extent. The performance of different frequency bands such as O-band, S-band, C-band, and L-band is compared in Fig. 6 for different SAC-OCDMA codes in terms of SNR. This work is accomplished with FEC and without FEC. It is perceived that EDW codes with FEC provide the highest SNR at C-band and WH codes without FEC give minimum SNR. From observations, it is evident that S-band is not recommended to use for getting good performance. Figure 7 shows that with the increase in the time of the pulse, SNR of the system decreases. WH codes are the least performed codes followed by modified diagonal codes. Out of all the four codes, EDW again gives the maximum SNR. It is also important to note that combined effects of shot and thermal lowers the SNR significantly. Figure 8 shows the eye height of the received signal with respect to Gaussian and chi-squared algorithm. Eye height is highest in EDW (chi-squared) and least in WH (Gaussian) after 20 dB of ER. Therefore, it is recommended to use high ER to achieve more eye height. In Fig. 9, we have tried to investigate different SAC-OCDMA codes in our proposed work at different time instances of the bit period. Maximum -factor of 17.47, 15.23, 14.67, and 9.93 are observed in case of EDW, MD, MDW, and WH codes, respectively. To remove the existing limitations and for making code bandwidth efficient and making code construction simpler, an SAC-OCDMA code, i.e., diagonal identity matrix (DIM) code has been designed with zero cross correlation and with the flexibility to choose code weight. 5.Diagonal Identity Matrix CodesThe generalized code construction algorithm is explained below. The code construction steps and algorithm is described as:
Repeat the process for times as shown in matrix Fill zeros in the empty spaces of matrix to make final matrix as given as follows: 5.1.Flow Diagram of the Implementation of the Proposed Code SchemeTo define the security of the system, two parameters are taken into consideration, i.e., autocorrelation and cross correlation. Autocorrelation in a code defines the number of 1’s existing within a code. Higher autocorrelation leads to better signal-to-noise ratio at the receiver side and better signal quality but on the other side it can lead to interference between the bandwidths of number of bits due to which the desired quality of the signal deteriorates: Cross correlation occurs between the code words of two different users. It is basically an issue in existing coding schemes as it leads to MAI between the number of users and makes it possible for the eavesdropper to detect the wavelengths of the code of the authorized data. DIM codes have autocorrelation of 2 and cross correlation of 0. Figure 10 shows how the DIM code is constructed and implemented.Figure 11 shows the variation of quality factor due to laser linewidth. The spectrum of the carrier signal includes sidebands or divergence of spectrum around desired carrier signal is termed as laser linewidth. As the laserwidth increases, the divergence of spectrum multiplies with that of the carrier signal and the dispersion factor also gets involved. So the quality of the signal deteriorates as the laser linewidth increases. Signal quality deteriorates more in case of EDW than DIM because cross correlation exists in EDW, which causes MAI between simultaneous users, and this unwanted factor is absent in DIM code. Figure 12 shows the effect of signal-to-noise ratio on the extinction ratio. Extinction ratio at receiver is the difference of received amplitude of digital logic level “1” and “0.” It is evident that the greater the difference in two levels, the better the performance is of the system in terms of signal-to-noise ratio. In other words, if we increase SNR in both the proposed codes, extinction ratio increases. DIM code provides enhanced results as compared to EDW codes due to zero cross correlation and longer code length. 6.Advanced Encrypting Techniques6.1.All-Optical OCDMA Encryption Using Logic GatesConfidentiality and data security are required for the high-speed optical communication systems for reliable operations, and this can be achieved using all-optical encryption/decryption as depicted in Figs. 13 and 14. All-optical logic gates are right candidate to fulfill the aforementioned requirements. An OCDMA system with all-optical XOR gate-based encryption was demonstrated in Ref. 51, which did the task of code swapping and enhanced the system security. Two designs of OR and AND gates were introduced in Ref. 52 based on photonic crystal. Their simplicity and reliability as well flexible operation makes then suitable for future generation optical communication systems. An all-optical interference suppressed OCDMA system with advanced binary optical logic gates were presented in Ref. 56. Since the performance restriction of optical fiber reliant systems is the conversion from O/E domains for optical receivers, the interference abolition was performed in the optical domain. In Ref. 57, a flexible incoherent OCDMA system was demonstrated with one-time pad with XOR gating, which provides access to multiple users to establish communication among them at OC-24 data rate and the system offered a bit error rate of . Semiconductor optical amplifier-based XOR gate was employed in the multidiagonal coding reliant OCDMA system for data security.47 SOAs were placed in MZI configuration to realize all-optical XOR gate. The proposed system architecture was acknowledged as good for military communication services. Subcarrier multiplexed and NAND gate subtraction incorporated spectral amplitude coded OCDMA was demonstrated in Ref. 58. Double weight codes were studied and NAND gate was used for the security enhancement and to suppress interferences. The performance of SAC-OCDMA was investigated by taking NAND subtractions into account, and the code used was EDW code. It was perceived that NAND gate detection was enhanced than complementary detection.54 6.2.Cryptography in OCDMAAs the development of OCDMA systems takes place rapidly, at the same time strategies of an eavesdropper are also increasing day by day such as interception of code, energy detection, and differential detection. OCDMA systems are inherently coded in nature, but these strategies of the eavesdropper threaten the optical communication systems. In Ref. 59, a cryptography algorithm with OCDMA systems was combined and it made sure that the eavesdropper does not detect the coded information. Therefore, the security of the physical layer enhanced successfully. Data security is offered by the source cryptography and security of time-wavelength codes was discussed in Ref. 60. They explained that the degree of security in OCDMA systems is dependent on different parameters such as high input power and less number of users. High power makes the system more prone to an eavesdropper. The probability of correct code word detection for an eavesdropper increases if single or fewer numbers of users are carrying information. Sometimes, due to the metadata and code detection, an eavesdropper can decode the information and, that time, even multiple users cannot increase the system security. On the contrary, cryptography has no impact of these factors and it enhances the system security to maximum extent. The physical layer security of passive optical networks (PON) is examined inside a meticulous crypto analysis outline.61 In Ref. 62, a simulation of an all-optical cryptography system, which is independent of bit rate and has transparency to modulation patterns, was considered. Encryption includes signal spectral segmentation pursued by two encoding stages that entail various attenuations and delays to each of the spectral segments. 6.3.Multicode KeyingMCK encryption is used to cope with issues like eavesdropping of the information in OCDMA systems. Large cardinality of the chips in the codes and tree structure of code word are examined nowadays due to requirement of greater number of users. Large cardinality and tree structured code word have the ability to boost system security by employing MCK. In Ref. 63, multicode key-based all-optical encryption was proposed and demonstrated in simulator as well as results were verified by designing hardware of the system in China. Moreover, theoretical analysis was also performed to show code switching and working of encryption.64,65 Figure 15 shows the block diagram of MCK in the OCDMA system. A physical layering of OCDMA was performed in Ref. 66 with XOR gating and a data randomizer with cipher text key (MCK). Data scrambler (randomizer) was incorporated to create chaos after cipher text and eliminate the large strings of 1’s and 0’s so that the eavesdropper does not get the right sequence. Benefit of scrambler is that it can be employed to digital and continuous signals but encryption can only be accomplished for digital domain. It makes the system less vulnerable to network security breaching issues. MCK scheme was also demonstrated for SAC-OCDMA network in Ref. 67. Users were given the several signature sequences for physical layer confidentiality enhancement of the system. MCK is also termed as multiple bits per symbol and can support high data rates.68,69 Brute force technique for calculation of searching time was taken in this work against the eavesdropper and bit correct interception were calculated for multiple as well as single user. It was perceived that security performance of coded chips can be enhanced by employing MCK. 6.4.Steganography in OCDMAOptical steganography is a supplementary coating of security that can enhance data encryption by trouncing the information transmission beneath the public channel. Optical steganography for data-hiding was proposed and studied with hardware by means of group velocity dispersion in an optical network. The authorized channel was covered under the public channel, and this was tested for OCDMA systems and WDM systems. At the receiver side, covered channels were realized through dispersion management. Results were shown in the form of BER and eye diagrams. Polarization modulator-based code-shift-keying (CSK) data modulation and OCDMA encryption/decryption was demonstrated in Ref. 70, where an incoherent light source was required as shown in Fig. 16. Due to dispersion elements, time of the each pulse increases and as a result it decreases the amplitude of the pulse, which can be used for the data hiding. Binary phase shift was considered in Refs. 42 and 71, and the dispersed signal was retrieved by a balance detector. 6.5.Virtual User Scheme in OCDMA SystemsIn OCDMA systems, a huge number of users increase the confidentiality of the system due to the problem in the correct code word detection at eavesdropper. However, probability of correct code word detection is more when low numbers of users were carrying information of the system. A method to solve the issues of network breaching, when a single user is in operation, was proposed in OCDMA systems.72 By forcing the eavesdropper to detect multiple signals simultaneously, the eavesdropping attack on the targeted signal can be avoided. This can be done by incorporating a virtual user in the system as shown in Fig. 17. A virtual user environment is created in the network by incorporating a virtual user with every authorized user. A virtual user will enhance the confidentiality of an OCDMA system by always transmitting in parallel to the authorized user. The pseudorandom noise is used as the data input to the virtual user. Both users are encoded using different codes and then multiplexed before transmitting the signal over the optical fiber. This virtual user acts as an interferer and appears as an authorized user to the eavesdropper; this would prevent eavesdropping. Hence, the presence of multiple users makes it more difficult to sift the data. In the VUS, twice as many codes are needed as compared to conventional OOK-OCDMA because each authorized user has its own virtual user, which requires a unique code. This results in wasting half of the code words on the virtual users. In order to minimize the wastage of network resources, the virtual user scheme is slightly modified by introducing a common virtual user for all the users. This means each user has its dummy user but the same code word is shared among all the dummy users, which will become active only whenever the authorized user is isolated in the network, this will increase only the hardware cost but does not degrade the system performance by decreasing the number of simultaneously active users from the given code set. Demonstrated work used the virtual user to create chaos along with the authentic user as depicted in Fig. 17. Likelihood of code detection of a single user reduces due to the virtual user and accompaniment of distinct progression of virtual user eliminates the incidence of single user’s code in the channel. 7.Future ScopeOCDMA is based on the principle that chips are mapped according to the user code relation. Therefore, it is operational in the high-speed asynchronous broadcast local area network (LAN). Optical code division provides larger multiple channels as compared to spectral division of wavelength division multiple access. System architectures are also less complex due to asynchronous transmission in comparison to time division. Multiclass data or different services traffic can be operational by incorporating diverse lengths of codes at the same time. The inspiration for LAN network of OCDMA is fortified by the anticipation that LAN traffic patterns are active at the same time based on the characterization of burstiness. A PON with employment of OCDMA codes can be realized in the tree topology. Unique code lengths and decodes are placed at optical network units (ONUs) with correspondence to optical line terminal encoder. OCDMA PON is superior to LAN due to the fact that the signal transmitted by one ONU never reaches to other ONU. More determined offerings can be set up by mapping universal IP addresses to codes of optical code division. A wavelength routing MAN may be offered for virtual private network (VPN) connections. The most important aim of a VPN is to offer secure data connections over network security threatened platforms. The optical code chips’ signals provide improved security as well as can be decoded only with authorized wavelength selection. Optical processing, which comprises of splitting and accumulation, makes VPN system less complex by elimination of the multiplexing, which is in electronic domain. Potential of light-tree ability at the MAN networks level can be practiced to facilitate the establishment of multipoint VPN. Time division-based image transmission needs the pixel streams of different users by performing their serial to parallel (s/p) conversions. At the end node, prior to the images retrieving from pixel, each user stream of pixels must be differentiated by using s/p conversion. For the elimination of these conversions and bottleneck in the communication, optical CDMA is demonstrated. Also the use of OCDMA in ROF systems offers the larger channel count and supports good data rates. From the reported works in SAC-OCDMA, precise topics have been acknowledged, which have a scope for future research. Existing SAC-OCDMA codes suffered from various performance limitations and code generation issues such as cross correlations, MAI, long code lengths, bandwidth inefficiency, cost, complexity, and failure in desired user code generation. To cope with these issues, this work can be done for the code generation that provides zero cross correlation, less MAI, bandwidth efficiency, etc. However, zero cross-correlation DIM codes are constructed in this work but further enhancements and comparisons are required using DIM code. Moreover, security breaching in OCDMA systems is an important issue to be addressed, and a highly confidential system is required. These systems are vulnerable to eavesdropping and jamming, which are external intruders in the authorized users communications. Different approaches such as wavelength conversion for antijamming, cryptography, code word swapping, data hiding under public channels, and encryption through logic gates against eavesdropping are prominently used in OCDMA security enhanced systems. However, cost and complexity are key issues in aforementioned techniques. Therefore, in near future, confidentiality enhancement of OCDMA system is a good area for research. All-optical encryption is also a promising field for high-speed OCDMA systems to combat with security issues. 8.ConclusionSAC based on code chips was performed by simulations/experiment test bed trials over fiber-optic cables. We effectively explored numerous architectures from extremely synchronized point-2-point (p2p) systems to minimum spectral matched OCDMA. From the results, it is perceived that cross correlation among users is a prominent limitation that deteriorates the performance and needs to be addressed. Demonstrations of SAC-OCDMA with coherent optical sources using optical filters have persuasively confirmed that the use of zero cross-correlation codes (multidiagonal codes) or minimizing the spectral interferences from Walsh–Hadamard to EDW codes improves the system performance. For the fulfillment of the ever-increasing demands of applications such as online games and VoIP, various OCDMA codes are demonstrated in the literature and we made a comparison of Walsh–Hadamard, DDW, MDW, and EDW, and multidiagonal codes with similar input parameters in this work. Results revealed that EDW codes performed the best in terms of BER, SNR, eye height, and WH codes due to less spectral interference from desired chip combinations. It is noteworthy that several parameters such as duo-binary pulse shape, C-band wavelength window, FEC, chi-squared algorithm, and photonic efficiencies of photodetectors between 60% and 90% are optimal in proposed comparison of SAC codes at varied data rates. A cost effective, simple code construction, and zero cross correlation-based DIM code is demonstrated in this work. Also recent trends and the future of the OCDMA technology are also elaborated. ReferencesR. S. Kaler, T. S. Kamal and A. K. Sharma,
“Simulation results for DWDM systems with ultra-high capacity,”
Int. J. Fiber Integr. Opt., 21
(5), 361
–369
(2002). https://doi.org/10.1080/01468030290087697 Google Scholar
S. Singh and R. S. Kaler,
“Investigation of hybrid optical amplifiers for dense wavelength division multiplexed system with reduced spacings at higher bit rates,”
Int. J. Fiber Integr. Opt., 31
(3), 208
–220
(2012). https://doi.org/10.1080/01468030.2012.666818 Google Scholar
S. Singh and R. S. Kaler,
“Performance evaluation of 64 × 10 Gbps and 96 × 10 Gbps DWDM system with hybrid optical amplifier for different modulation formats,”
Optik, 123
(24), 2199
–2203
(2012). https://doi.org/10.1016/j.ijleo.2011.11.015 OTIKAJ 0030-4026 Google Scholar
S. Singh and R. S. Kaler,
“Investigation of hybrid optical amplifiers with different modulation formats for DWDM optical communication system,”
Optik, 124
(15), 2131
–2134
(2013). https://doi.org/10.1016/j.ijleo.2012.06.060 OTIKAJ 0030-4026 Google Scholar
S. Singh and R. S. Kaler,
“Novel optical flat gain hybrid amplifier for dense wavelength division multiplexed system,”
Photonics Technol. Lett., 26
(2), 173
–176
(2014). https://doi.org/10.1109/LPT.2013.2291035 Google Scholar
R. Kaur, R. Randhawa and R. S. Kaler,
“Performance evaluation of optical amplifier for 16 × 10, 32 × 10 and 64 × 10 Gbps WDM system,”
Optik, 124
(8), 693
–700
(2013). https://doi.org/10.1016/j.ijleo.2012.01.008 OTIKAJ 0030-4026 Google Scholar
R. Singh,
“Performance comparison of dispersion compensation techniques on 40 Gbps OTDM system at S-band and C-band over different fibre standards,”
Optik, 126
(4), 391
–393
(2014). https://doi.org/10.1016/j.ijleo.2014.10.003 OTIKAJ 0030-4026 Google Scholar
Z. Wei, H. M. H. Shalaby and H. Ghafouri-Shiraz,
“Modified quadratic congruence codes for fiber Bragg-grating-based spectral-amplitude-coding optical CDMA systems,”
J. Lightwave Technol., 19
(9), 1274
–1281
(2001). https://doi.org/10.1109/50.948274 JLTEDG 0733-8724 Google Scholar
N. Hathi et al.,
“Analysis of the influence of Walsh–Hadamard code allocation strategies on the performance of multi-carrier CDMA systems in the presence of HPA nonlinearities,”
in 13th IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communications,
1305
–1309
(2002). https://doi.org/10.1109/PIMRC.2002.1045240 Google Scholar
S. Jos, P. Kumar and S. Chakrabarti,
“Performance comparison of orthogonal Gold and Walsh–Hadamard codes for quasi-synchronous CDMA communication,”
Lect. Notes Comput. Sci., 5408 395
–399
(2009). https://doi.org/10.1007/978-3-540-92295-7 LNCSD9 0302-9743 Google Scholar
T. Kojima and S. Fujiwara,
“Performance of Walsh–Hadamard code division multiplexing in helicopter satellite communications,”
in IEEE Int. Conf. on Advanced Technologies for Communications (ATC),
622
–665
(2015). https://doi.org/10.1109/ATC.2015.7388414 Google Scholar
B. Suesser-Rechberger, W. Gappmair and A. Ginesi,
“Performance of Walsh–Hadamard codes used for timing recovery in a DVB-S2x multibeam scenario,”
in IEEE 10th Int. Symp. on Communication Systems, Networks and Digital Signal Processing (CSNDSP),
(2016). https://doi.org/10.1109/CSNDSP.2016.7573918 Google Scholar
W. A. Imtiaz and N. Ahmad,
“Cardinality enhancement of SACOCDMA systems using new diagonal double weight code,”
Int. J. Commun. Networks Inf. Secur., 6
(3), 106
–112
(2014). Google Scholar
N. D. Keraf et al.,
“The evolution of double weight codes in spectral amplitude coding OCDMA,”
Lect. Notes Electr. Eng., 315 129
–140
(2015). https://doi.org/10.1007/978-3-319-07674-4 Google Scholar
G. Kaur and G. S. Bal,
“Performance analysis of SAC-OCDMA in free space optical medium using DDW code,”
Optik, 133 36
–42
(2017). https://doi.org/10.1016/j.ijleo.2016.12.057 OTIKAJ 0030-4026 Google Scholar
G. Kaur,
“Performance analysis of SAC-OCDMA in free space optical medium using MD and DDW code,”
in 2nd Int. Conf. on Recent Advances in Engineering and Computational Sciences (RAECS),
(2015). https://doi.org/10.1109/RAECS.2015.7453295 Google Scholar
N. Ahmed, S. A. Aljunid and R. D. Ahmad,
“Novel OCDMA detection technique based on modified double weight code for optical access network,”
Elektron. Elektrotech., 18
(8), 117
–121
(2012). https://doi.org/10.5755/j01.eee.18.8.2638 Google Scholar
S. Gupta and A. Goel,
“Advance method for security enhancement in optical code division multiple access system,”
IETE J. Res., 64 17
–26
(2017). https://doi.org/10.1080/03772063.2017.1351314 Google Scholar
A. Kaur and G. Singh,
“Performance comparison of various detection techniques for SAC–OCDMA system using DW and MDW code,”
in Int. Conf. and Workshop on Computing and Communication (IEMCON),
1
–6
(2015). https://doi.org/10.1109/IEMCON.2015.7344476 Google Scholar
A. Salehi,
“Code division multiple access technique in optical fiber networks—Part I: fundamentals principles,”
IEEE Trans. Commun., 37 824
–833
(1989). https://doi.org/10.1109/26.31181 IECMBT 0090-6778 Google Scholar
I. B. Djordjevic, B. Vasic and J. Rorison,
“Multi-weight unipolar codes for spectral-amplitude-coding optical CDMA systems,”
IEEE Commun. Lett., 8 259
–261
(2004). https://doi.org/10.1109/LCOMM.2004.825709 ICLEF6 1089-7798 Google Scholar
T. H. Abda et al.,
“Modeling and simulation of multi diagonal code with zero cross correlation for SAC-OCDMA networks,”
in 2nd Int. Conf. on Photonics,
(2011). https://doi.org/10.1109/ICP.2011.6106829 Google Scholar
H. Abda et al.,
“Impact of multi-diagonal code on high-speed spectral amplitude coding optical code division multiple-access networks,”
Arabian J. Sci. Eng., 38 2389
–2397
(2013). https://doi.org/10.1007/s13369-012-0517-6 Google Scholar
N. Jellali, F. Moez and M. Najjar,
“Performance enhancement of OCDMA system based on 3D-multi-diagonal codes,”
in IEEE 13th Int. Wireless Communications and Mobile Computing Conf. (IWCMC),
2105
–2108
(2017). Google Scholar
M. K. Abdullah et al.,
“Performance of OCDMA systems with new spectral direct detection (SDD) technique using enhanced double weight (EDW) code,”
Opt. Commun., 281
(18), 4658
–4662
(2008). https://doi.org/10.1016/j.optcom.2008.06.029 OPCOB8 0030-4018 Google Scholar
F. N. Hasoon et al.,
“Spectral amplitude coding OCDMA systems using enhanced double weight code,”
J. Eng. Sci. Technol., 1
(2), 192
–202
(2006). Google Scholar
M. Noshad and K. Jamshidi,
“Code family for modified spectral-amplitude-coding ocdma systems and performance analysis,”
IEEE/OSA J. Opt. Commun. Networking, 2
(6), 344
–354
(2010). https://doi.org/10.1364/JOCN.2.000344 Google Scholar
A. Zahid, F. Hasoon and S. Shaari,
“New code structure for enhanced double weight (EDW) code for spectral amplitude coding OCDMA system,”
in Int. Conf. on Future Computer and Communication, ICFCC,
658
–661
(2009). https://doi.org/10.1109/ICFCC.2009.26 Google Scholar
A. Arief et al.,
“Cardinality enhancement of spectral/spatial modified double weight code optical code division multi-access system by PIIN suppression,”
Optik, 124
(19), 3786
–3793
(2013). https://doi.org/10.1016/j.ijleo.2012.11.061 OTIKAJ 0030-4026 Google Scholar
S. Kumawat and M. R. Kumar,
“Generalized optical code construction for enhanced and modified double weight like codes without mapping for SAC-OCDMA systems,”
Opt. Fiber Technol., 30 72
–80
(2016). https://doi.org/10.1016/j.yofte.2016.03.004 1068-5200 Google Scholar
K. Singhal,
“Walsh codes, PN sequences and their role in CDMA technology,”
1
–4
(2012) https://pdfs.semanticscholar.org/5963/793d3cc95aea091f9cf89ff340f48d19348c.pdf Google Scholar
M. Ali et al.,
“Inter-WBANs interference mitigation using orthogonal Walsh–Hadamard codes,”
in 27th Annual IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communications (PIMRC),
(2016). https://doi.org/10.1109/PIMRC.2016.7794928 Google Scholar
S. Mandal et al.,
“Walsh–Hadamard code design using optical nonlinear material,”
in Devices for Integrated Circuit,
(2017). https://doi.org/10.1109/DEVIC.2017.8074014 Google Scholar
C. T. Yen et al.,
“Performance analysis of dual unipolar/bipolar spectral code in optical CDMA systems,”
J. Appl. Res. Technol., 11
(2), 235
–241
(2013). https://doi.org/10.1016/S1665-6423(13)71533-5 Google Scholar
R. Takahashi and K. Umeno,
“Performance comparison of band-limited baseband synchronous CDMA using between Walsh–Hadamard sequence and ICA sequence,”
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.332.1196&rep=rep1&type=pdf Google Scholar
A. Taiwo et al.,
“Practical investigation of suitable decoding technique for SAC-OCDMA based vibration sensing,”
IET Optielectron., 10
(6), 227
–232
(2016). https://doi.org/10.1049/iet-opt.2015.0125 Google Scholar
N. Ahmed et al.,
“Performance improvement of SAC-OCDMA system using modified double weight (MDW) code for optical access network,”
Sci. Res. Essays, 7
(7), 796
–804
(2012). https://doi.org/10.5897/SRE Google Scholar
T. H. Abd et al.,
“Performance improvement of hybrid SCM SAC-OCDMA networks using multi-diagonal code,”
Sci. Res. Essays, 7
(11), 1262
–1272
(2012). Google Scholar
M. L. F. Abbade et al.,
“An all-optical OCDMA encoder with simultaneous signal regeneration based on cross-gain modulation in semiconductor optical amplifiers,”
in Int. Conf. on Transparent Optical Networks (ICTON),
(2012). https://doi.org/10.1109/ICTON.2012.6253808 Google Scholar
C.-S. Bres et al.,
“All-optical OCDMA code-drop unit for transparent ring networks,”
IEEE Photonics Technol. Lett., 17
(5), 1088
–1090
(2005). https://doi.org/10.1109/LPT.2005.845710 IPTLEL 1041-1135 Google Scholar
Z. Wang, M. P. Fok and P. R. Prucnal,
“Physical encoding in optical layer security,”
http://ee.princeton.edu/research/prucnal/sites/default/files/RP_Journal_22451439%20_116.pdf Google Scholar
C.-T. Yen and G.-J. Huang,
“Optical steganography transmission of optical CDMA signals over a public BPSK channel,”
Eng. Comput., 33
(6), 1810
–1824
(2016). https://doi.org/10.1108/EC-08-2015-0253 ENGCE7 0177-0667 Google Scholar
M. Bharti, A. K. Sharma and M. Kumar,
“Simulative analysis of 2-code keying approach using Walsh–Hadamard codes to enhance security and reduce dispersion in OCDMA system,”
in Int. Conf. on Data Mining and Intelligent Computing (ICDMIC),
(2014). https://doi.org/10.1109/ICDMIC.2014.6954260 Google Scholar
B. Hamzeh and M. Kavehrad,
“OCDMA-coded free-space optical links for wireless optical-mesh networks,”
IEEE Trans. Commun., 52
(12), 2165
–2174
(2004). https://doi.org/10.1109/TCOMM.2004.838735 IECMBT 0090-6778 Google Scholar
M. Jazayerifar and J. A. Salehi,
“Atmospheric optical CDMA communication systems via optical orthogonal codes,”
IEEE Trans. Commun., 54
(9), 1614
–1623
(2006). https://doi.org/10.1109/TCOMM.2006.881245 IECMBT 0090-6778 Google Scholar
T. H. Abda et al.,
“Modelling and simulation of a 1.6 Tb/s optical system based on multi-diagonal code and optical code-division multiple-access,”
Ukr. J. Phys. Opt., 13
(2), 54
–66
(2012). https://doi.org/10.3116/16091833/13/2/54/2012 Google Scholar
S. Rana and A. Gupta,
“A novel security enhanced decoder based on XOR detection for optical code division multiple access system using multi-diagonal code,”
Indian J. Sci. Technol., 9
(36), 1
–9
(2016). https://doi.org/10.17485/ijst/2016/v9i36/101480 Google Scholar
M. Z. Norazimah et al.,
“Analytical comparison of various SAC-OCDMA detection techniques,”
in 2nd Int. Conf. on Photonics,
(2011). https://doi.org/10.1109/ICP.2011.6106864 Google Scholar
S. A. Aljunid et al.,
“Development of modified double-weight code and its implementation in multi-rate transmissions,”
in 13th IEEE Int. Conf. on Networks Jointly held with the 2005 IEEE 7th Malaysia Int. Conf. on Communication,
(2005). https://doi.org/10.1109/ICON.2005.1635487 Google Scholar
A. R. Arief et al.,
“Enhanced performance of new family modified double weight codes spectral amplitude coding optical CDMA system network,”
in IEEE Int. Conf. on Control System, Computing and Engineering,
(2011). https://doi.org/10.1109/ICCSCE.2011.6190575 Google Scholar
Z. Wang et al.,
“Optical encryption with OCDMA code swapping using all-optical xor logic gate,”
IEEE Photonics Technol. Lett., 21
(7), 411
–413
(2009). https://doi.org/10.1109/LPT.2008.2012131 IPTLEL 1041-1135 Google Scholar
R. M. Younis et al.,
“Fully integrated AND and OR optical logic gates,”
IEEE Photonics Technol. Lett., 26
(19), 1900
–1903
(2014). https://doi.org/10.1109/LPT.2014.2340435 IPTLEL 1041-1135 Google Scholar
S. Singh et al.,
“Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme,”
Opt. Fiber Technol., 22 84
–89
(2015). https://doi.org/10.1016/j.yofte.2015.01.013 1068-5200 Google Scholar
N. Ahmed et al.,
“Performance improvement of spectral amplitude coding-optical code division multiple access systems using NAND detection with enhanced double weight code,”
Opt. Rev., 19
(1), 1
–6
(2012). https://doi.org/10.1007/s10043-012-0001-2 1340-6000 Google Scholar
S. Kumawat and M. R. Kumar,
“Design and analysis of different decoders for SAC-OCDMA systems,”
in Proc. of the Int. Conf. on Recent Cognizance in Wireless Communication and Image Processing,
(2016). Google Scholar
S. A. Nezamalhosseini et al.,
“Interference cancellation in optical CDMA systems via advanced binary optical logic gate elements,”
IEEE Commun. Mag., 50
(8), 96
–101
(2012). https://doi.org/10.1109/MCOM.2012.6257533 ICOMD9 0163-6804 Google Scholar
I. Glesk et al.,
“Increasing optical security with OCDMA using optical XOR,”
in Photonics in Switching,
(2007). https://doi.org/10.1109/PS.2007.4300766 Google Scholar
A. J. Jaye and G. B. Lakshmy,
“A NAND subtraction detection technique for hybrid SCM SAC-OCDMA system,”
Int. J. Innovative Res. Comput. Commun. Eng., 4
(2), 1101
–1106
(2016). Google Scholar
W. Li et al.,
“Cross-layer security based on optical CDMA and algorithmic cryptography,”
in IEEE Optoelectronics Global Conf. (OGC),
(2016). https://doi.org/10.1109/OGC.2016.7590484 Google Scholar
T. H. Shake,
“Security performance of optical CDMA against eavesdropping,”
J. Lightwave Technol., 23
(2), 655
–670
(2005). https://doi.org/10.1109/JLT.2004.838844 JLTEDG 0733-8724 Google Scholar
G. Cincotti et al.,
“Physical layer security: all-optical cryptography in access networks,”
in 10th Anniversary Int. Conf. on Transparent Optical Networks,
(2008). https://doi.org/10.1109/ICTON.2008.4598751 Google Scholar
M. L. F. Abbade et al.,
“All-optical cryptography through spectral amplitude and delay encoding,”
J. Microwave Optoelectron. Electromagn. Appl., 12
(2), 376
–397
(2013). Google Scholar
W.-H. Chang et al.,
“Enhancing optical-CDMA confidentiality with multicode-keying encryption,”
J. Lightwave Technol., 33 1708
–1718
(2015). https://doi.org/10.1109/JLT.2015.2394792 JLTEDG 0733-8724 Google Scholar
U. Kaur and H. Singh,
“Security enhancement in OCDMA system using multicode keying and data randomisers,”
in 2nd Int. Conf. on Next Generation Computing Technologies,
(2016). https://doi.org/10.1109/NGCT.2016.7877533 Google Scholar
C.-C. Yang,
“Performance analysis of multi-code keying scheme for spectral-amplitude-coding optical CDMA network,”
Int. J. Inf. Commun. Sci., 2
(6), 100
–103
(2017). https://doi.org/10.11648/j.ijics.20170206.12 Google Scholar
A. T. Reshma and V. R. Vipin,
“Security enhancement of optical code division multiple access system using multicode-keying encryption,”
Int. J. Innovative Res. Comput. Commun. Eng., 4
(2), 1608
–1613
(2016). Google Scholar
Y.-T. Chang,
“Confidential enhancement with multi-code keying reconfiguration over TS/WH OCDMA networks,”
Appl. Mech. Mater., 284-287 2899
–2903
(2013). Google Scholar
L. Qin et al.,
“Security performance analysis of an M-code keying OCDMA system,”
Photonic Network Commun., 15 19
–24
(2008). https://doi.org/10.1007/s11107-007-0081-2 Google Scholar
P. R. Prucnal et al.,
“Optical steganography for data hiding in optical networks,”
in 16th Int. Conf. on Digital Signal Processing,
(2009). https://doi.org/10.1109/ICDSP.2009.5201086 Google Scholar
H. Zhu et al.,
“Optical steganography of code-shift-keying OCDMA signal based on incoherent light source,”
IEEE Photonics J., 7
(3), 6801607
(2015). https://doi.org/10.1109/JPHOT.2015.2432072 Google Scholar
P. Laka and L. Maksymiuk,
“Steganographic transmission in optical networks with the use of direct spread spectrum technique,”
Security Commun. Networks, 9 771
–780
(2016). https://doi.org/10.1002/sec.v9.8 Google Scholar
S. Gupta and A. Goel,
“New approach for performance and security enhancement in OCDMA networks,”
in Proc. of Int. Conf. on Communication and Networks, Advances in Intelligent Systems and Computing,
(2017). Google Scholar
Biography |