DeepAI AI Chat
Log In Sign Up

Physical Layer Security in Multimode Fiber Optical Networks

by   Stefan Rothe, et al.

Inverse precoding algorithms in multimode fiber based communication networks are used to exploit mode dependent losses on the physical layer. This provides an asymmetry between legitimate (Bob) and unlegitimate (Eve) receiver of messages resulting in a significant SNR advantage for Bob. In combination with dynamic mode channel changes, Eve has no chance to reconstruct a sent message even in a worst case scenario in which she is almighty. This is the first time, Physical Layer Security in a fiber optical network is investigated on the basis of measured transmission matrices. These results show that messages can be sent securely with conventional communication techniques. Translating the task of securing data from software to hardware represents the potential of a scientific paradigm shift. The introduced technique is a step towards the development of cyber physical systems.


page 7

page 8

page 11

page 13


Programmable Optical Data Transmission Through Multimode Fibres Enabling Confidentiality by Physical Layer Security

Complex light transportation phenomena of multimode fibres can be exploi...

X-Lap: A Systems Approach for Cross-Layer Profiling and Latency Analysis for Cyber-Physical Networks

Networked control applications for cyber-physical networks demand predic...

BLCS: Brain-Like based Distributed Control Security in Cyber Physical Systems

Cyber-physical system (CPS) has operated, controlled and coordinated the...

A Security Cost Modelling Framework for Cyber-Physical Systems

Cyber-Physical Systems (CPS) are formed through interconnected component...

Towards a Networks-of-Networks Framework for Cyber Security

Networks-of-networks (NoN) is a graph-theoretic model of interdependent ...

Online Cycle Detection for Models with Mode-Dependent Input and Output Dependencies

In the fields of co-simulation and component-based modelling, designers ...

Performance of Statistical and Machine Learning Techniques for Physical Layer Authentication

In this paper we consider authentication at the physical layer, in which...