• Chinese Optics Letters
  • Vol. 21, Issue 6, 060602 (2023)
Zhilan Lu1、2, Chao Shen1、2, Jianyang Shi1、2, and Nan Chi1、2、*
Author Affiliations
  • 1Key Laboratory for Information Science of Electromagnetic Waves (MoE), Department of Communication Science and Engineering, Fudan University, Shanghai 200433, China
  • 2Research Center of Low-Earth-Orbit Satellite Communication and Applications, Shanghai 200433, China
  • show less
    DOI: 10.3788/COL202321.060602 Cite this Article Set citation alerts
    Zhilan Lu, Chao Shen, Jianyang Shi, Nan Chi. Security enhanced underwater visible light communication system based on chaotic phase scrambling and conjugate frequency hopping[J]. Chinese Optics Letters, 2023, 21(6): 060602 Copy Citation Text show less

    Abstract

    We propose an encryption technique for underwater visible light communication (UVLC) based on chaotic phase scrambling (PS) and conjugate frequency hopping (CFH). The technique is experimentally tested using an 8-level pulse amplitude modulation (PAM-8) and a 1.2 m underwater link. The security key of the phase scrambling code is generated according to a logistic map, and the frequency hopping is achieved by adding the same zero frequency points to the signal spectrum. The maximum transmission rate of 2.1 Gbit/s is measured with bit-error-rate (BER) below 7% the hard-decision forward error correction (HD-FEC) threshold of 3.8×10-3.

    1. Introduction

    Underwater visible light communication (UVLC) has a high research value in the development and utilization of new spectrum resources due to such excellent properties as having no available bandwidth limitation, having high speed and high capacity, being far from traditional radio frequency bands, and abundant spectrum resources. In terms of security performance, optical fiber communication is wired communication that is theoretically a secure communication, where the signal is always transmitted in the cable. Wireless communication systems such as VLC have the risk of being eavesdropped because the signal is transmitted without passing through cables. However, compared with traditional radio frequency communication, VLC has a higher transmission frequency, a shorter wavelength, and cannot penetrate the wall. VLC has a high security performance[16], but it still cannot avoid the situation where the signal is stolen by eavesdroppers in the same space[7,8]. Therefore, it is necessary to study the signal encryption technology applicable to UVLC systems to improve the security of transmission.

    In 2018, Fudan University proposed the first spectral scrambling security strategy for UVLC systems in the physical layer[9], but by analyzing the spectral characteristics of the signal, this encryption can potentially be broken at the receiver side. Therefore, it is necessary to use multidimensional encryption techniques to protect the transmission signals. In 2021, Zhejiang University first verified the feasibility of chaotic encryption in high-speed UVLC systems[10], using two-dimensional encryption at the bit and subcarrier levels and verified that chaotic encryption has no negative impact on the performance of the system. In 2022, they also used bitstream diffusion, in-phase and quadrature components scrambling, and time and frequency scrambling for three-dimensional encryption of UVLC systems[11]. However, all these encryption algorithms are complex in implementation and have high requirements for system performance.

    In this paper, we propose a two-dimensional encryption technique based on chaotic phase scrambling and conjugate frequency hopping to encrypt the spectrum of PAM-8 signals and drive a blue LED for transmission in a 1.2 m water tank. At the receiver side, the PAM-8 signal is synchronized by correlating the received signal with the original transmitted signal, and then it is filtered by the least-mean-square (LMS) algorithm and Volterra filter. With the codebook at the transmitter side, we remove the conjugate frequency hopping encryption, the phase scrambling encryption, and finally, the symbol information is mapped back to the bit sequence for BER testing. A maximum transmission rate of 2.1 Gbit/s was experimentally measured with a BER below 7% the hard-decision forward error correction (HD-FEC) threshold. The complexity and security of the system are also analyzed and discussed in this paper, confirming its feasibility and high transmission reliability for physical implementation.

    2. Principle

    The principle of the proposed scheme is described as Fig. 1. The original bit data are first mapped into the PAM-8 signal. Then, two major methods, logistic phase scrambling and conjugate frequency hopping, are implemented to the signal after fast Fourier transform (FFT) to increase its security characteristic. After inverse fast Fourier transform (IFFT) and UVLC transmission, the received signal is de-hopping and de-scrambling for digital signal processing (DSP) and PAM demodulation.

    The principle of the proposed scheme. The original bit sequence is mapped into the PAM-8 signal. After FFT, two major methods, logistic phase scrambling and conjugate frequency hopping, are implemented. After IFFT and UVLC transmission, the received signal is dehopped and descrambled for DSP and demodulation.

    Figure 1.The principle of the proposed scheme. The original bit sequence is mapped into the PAM-8 signal. After FFT, two major methods, logistic phase scrambling and conjugate frequency hopping, are implemented. After IFFT and UVLC transmission, the received signal is dehopped and descrambled for DSP and demodulation.

    PAM-8 modulation uses 7, 5, 3, 1, 1, 3, 5, and 7 to represent 8 symbols. Each symbol carries 3 bits of information. According to Refs. [1215], PAM mapping is a simple but effective coding method, and in the UVLC system with a given signal-to-noise ratio, the PAM-8 signal has a higher spectrum efficiency when compared with a lower level of PAM modulation like PAM-4 modulation. We first generate a 76,800-bit sequence and divide it into 200 groups after PAM-8 modulation. That is, we obtain a signal matrix d200×128. After FFT, we obtain the conjugate symmetrical frequency-domain signal of the real PAM-8 signal, where N is the length of each group, and N=128. D200×128=FFT(d200×128),D(g,n)=k=1Nd(g,k)·exp(j2πnk/N),n=1,2,,N,g=1,2,,200.

    Since the frequency spectrum of the signal has conjugate symmetry and the phase scrambling and conjugate frequency hopping are implemented in the frequency domain, we can simply analyze the positive half-axis of the spectrum D+, D+=[D(0),D(1),,D(N/2)]T,and the negative half-axis can be calculated by D=[D(0),D(1),,D(N/2+1)]T.

    The positive and negative half-axes satisfy the following relationship: D=D+*,Re(D)=Re(D+),Im(D)=Im(D+).

    Then, we implement phase scrambling by using a linear combination of two different logistic-based chaos mappings, which can be illustrated as DPS+=D+·exp(jw(aΘ1+bΘ2)),DPS=D·exp(jw(aΘ1+bΘ2)),where DPS+, Θ1, and Θ2 represent the (N/2+1)-length signal after scrambling and two logistic mappings individually. Parameters a,b are the linear combination coefficients, and w is the phase scrambling coding weight. Logistic mapping is the most commonly used chaos map, which can be described by these three forms[16], θk+1=1μθk2,μ(0,2],θk+1=μθk(1θk),μ(0,4),θk+1=μθk2,μ(0,2].

    Each logistic mapping is uniquely determined by the initial value θ0 and the bifurcation factor μ. The parameter μ determines whether the system is stable or under chaos. The logistic maps generated by Eqs. (8) and (9) with changing μ are shown in Fig. 2. When the system is under chaos, a slight difference in the initial value θ0 can cause large differences over time, which is known as the sensitivity to the initial value, one of the most important characteristics of chaos systems[17]. In this paper, we use Eq. (8) and set Θ0=0.7, μ=2.0 to generate the first chaos mapping Θ1. Similarly, we use Eq. (9) and set Θ0=0.1, μ=3.8 to generate the second mapping Θ2. In order to increase the complexity of the key while taking into account the computational complexity, the post-processing scheme we use is a weighted summation of two different chaotic sequences. That is, the phase scrambling code is calculated by linearly combining Θ1 and Θ2 and multiplying it by a weight w. For application to real systems, we need to increase the complexity of the post-processing algorithm, similar to the sorting operation in Ref. [10] or the XOR operation in Ref. [11].

    Logistic maps generated by (a) Eq. (8) and (b) Eq. (9) when the bifurcation parameter μ changes.

    Figure 2.Logistic maps generated by (a) Eq. (8) and (b) Eq. (9) when the bifurcation parameter μ changes.

    After phase scrambling, we apply conjugate frequency hopping to the signal, whose detailed scheme is shown in Fig. 1(b). We set the signal DUP whose length is 4 times the original spectral signal and whose dimension is 200×(4N). As the whole system has bandpass characteristics, the direct current (DC) component and the low frequency parts of the signal will all be attenuated. To deal with this problem, we first apply zpad points of zeros at the zero and low frequencies, called zero padding, with zpad=5. Then, we randomly generate 200 conjugate hopping factors (zhop) ranging from 1 to 5. For each group, we add an additional number of zeros to the low frequencies according to the corresponding hopping factor. Accordingly, we add the same number of zeros to the negative half-axis of the spectrum. To maintain the conjugate symmetry of the frequency spectrum, we add an extra zero directly at the DC component. The time-domain and frequency-domain signals after conjugate hopping are shown in Fig. 1(e). The principle of conjugate frequency hopping can be illustrated as [DUP((zpad+zhop)),,DUP(zpad+zhop)]T=[0,,0]T,[DUP(zpad+zhop+1),,DUP(zpad+zhop+1+N/2)]=DPS+T,[DUP(zpadzhopN/2),,DUP(zpadzhop1)]=DPST.

    Finally, we apply IFFT and obtain the real time-domain signal of dUP200×512=IFFT(DUP200×512)for UVLC transmission. At the receiving terminal, these two encryption methods are removed by the code book used for encryption. In this way, we correctly obtain the decrypted signal for demodulation and BER testing.

    3. Experimental Setup

    The experimental setup of the proposed scheme is shown in Fig. 3. At the transmitter side, the digital signal to be transmitted is obtained after the PAM8 mapping of the bit sequence. After Fourier transform, phase scrambling, conjugate frequency hopping, and inverse Fourier transform, the digital signal is fed into an arbitrary waveform generator (AWG) for conversion into an analog signal. An electric amplifier (EA) is used to amplify the signal, and a bias-Tee is used to couple a direct current (DC) signal. Next, the blue LED with a wavelength of 450 nm is driven, and the beam is transmitted through the lens for collimation into a 1.2 m water tank.

    Experimental setup of the proposed scheme for UVLC links. Arbitrary waveform generator, AWG; electric amplifier, EA; positive-intrinsic-negative photoelectric diode; PIN-PD; oscilloscope, OSC.

    Figure 3.Experimental setup of the proposed scheme for UVLC links. Arbitrary waveform generator, AWG; electric amplifier, EA; positive-intrinsic-negative photoelectric diode; PIN-PD; oscilloscope, OSC.

    At the receiver side the light is first focused through the lens to the receiver, where a Si PIN-PD is used for photoelectric conversion. After the electronic amplifier, the received signal is sampled by an OSC and used for off-line processing.

    In the offline processing module at the receiver side, the received signal is first synchronized, and then a least-mean-square (LMS) filter and a Volterra filter are used for signal equalization, followed by conjugate frequency hopping and phase scrambling code removal. Next, the decrypted signal is filtered by a second LMS for noise removal, and the obtained signal is then demodulated for BER testing.

    4. Results and Discussion

    We experimentally test and evaluate the performance of the above system using a BER and a secure key space. We randomly generate 76,800 bits of data and map it into a PAM-8 signal. After quadruple up-sampling and encryption, we transmit the signal through a 1.2 m water tank and obtain the received signal for decryption and decoding.

    We first investigate the optimal operating point of the system by varying the bias current Ib and the peak-to-peak voltage Vpp of the AWG separately. Figure 4 is a two-dimensional thermodynamic diagram of the BER performance, which changes with the Ib and the Vpp. When the Vpp is fixed, with the increase of bias current Ib, the BER decreases to a minimum value and then increases. The same situation happens when we increase the Vpp and the Ib is fixed. When the Ib and the Vpp are set too high, the BER will increase due to a nonlinear effect. When the power of the signal is too high, it may cause the power amplifier to enter the nonlinear region. In addition, the system uses intensity modulation and direct detection, both of which can also introduce nonlinearity during the conversion of the optical and electrical signals. An increase in DC bias also raises the peak in the signal, making it more likely to enter the nonlinear region. The nonlinearity increases the intensity noise of the PAM-8 signal and causes deterioration of the system performance. On the contrary, if the Ib and the Vpp are low, the SNR of the received signal will diminish, as a result of which the BER will rise. Therefore, according to the experimental results, there is a global optimal working point for our system, which is obtained when the Ib=140mA and the Vpp=0.5V, and the BER is under the 7% HD-FEC limit of 3.8×103.

    BER performance versus the bias current Ib and the peak-to-peak voltage Vpp of the AWG.

    Figure 4.BER performance versus the bias current Ib and the peak-to-peak voltage Vpp of the AWG.

    Then, under the optimal working point, we explore the influence of the transmission speed on our system. As shown in Fig. 5, when the conjugate frequency hopping and phase scrambling codes are not removed at the receiver side (red line), the BER is about 0.5, indicating that even if the receiver side eavesdrops the signal, the correct transmission signal cannot be obtained without the correct key for decryption, which confirms the security of the experimental system. When the decryption is performed correctly at the receiver side (blue line), BER also rises gradually as the transmission speed rises. The reason is that when the transmission is accelerated, the intersymbol interference (ISI) at the receiver side is aggravated due to the limited sampling rate and bandwidth of the system. When the BER is below 7% the HD-FEC threshold, the highest transmission speed that can be obtained is 2.1 Gbit/s, and the BER at this speed is 2.62×103. The constellation diagram of the PAM-8 signal obtained by correct decryption at the receiver side is shown in Fig. 5(c).

    BER versus the transmission speed. Insets are the constellation diagrams.

    Figure 5.BER versus the transmission speed. Insets are the constellation diagrams.

    Accordingly, the constellation diagram that is not correctly decrypted is shown in Fig. 5(a), and the eavesdropper cannot obtain the valid information of the transmitted signal. When the transmission speed is higher than 2.1 Gbit/s, the constellation diagram of the correctly decrypted PAM-8 signal is shown in Fig. 5(b), and the boundaries between the two symbols are not as obvious as in Fig. 5(c), which means the possibility of misclassification will rise.

    The effect of the phase scrambling weight w on the system performance at the optimal operating point and the highest transmission speed is shown in Fig. 6. When the conjugate frequency hopping and phase scrambling are not properly removed (blue line), and when only the phase scrambling is removed (orange line), we cannot decode the signal correctly to obtain useful information, and the BER is about 0.5. When only the conjugate frequency hopping is removed at the receiver side (green line), the transmission BER also rises gradually as the scrambling weight w rises, implying that scrambling codes with high weights require higher accuracy of encryption at the receiver. The scrambling code with low weight has less influence on the signal and can be removed as system noise by the receiver, and the encryption effect is poor. When the weight is 50%, the constellation diagram at the receiver side is shown in Fig. 6(b), where there are almost no boundaries between the adjacent symbols, and it is extremely difficult to classify them correctly. When the conjugate frequency hopping and phase scrambling codes are correctly removed (red line), the highest weight we can obtain is 50%, and the BER is 2.84×103.

    BER versus the phase scrambling coding weight w. Insets are the constellation diagrams.

    Figure 6.BER versus the phase scrambling coding weight w. Insets are the constellation diagrams.

    Finally, we analyze the encryption performance of the system. We begin with the analysis of the chaotic phase scrambling code. Since the parameters to be determined are the initial values θ0 and the bifurcation factors μ of the two chaotic maps Θ1 and Θ2, as well as the coefficients a and b of the linear combination of the two maps, there are six unknown parameters. As the accuracy of the AWG we use is 8 bits, the phase scrambling code provides a key space of 28×6=2.81×1014. Then, the conjugate frequency hopping provides a key space of 5200=6.22×10139 since the number of hopping codes is 200 (the number of groups of PAM-8 signals), and their values are integers varying from 1 to 5. Therefore, the key space of the system is up to 2.81×1014×6.22×10139=1.75×10154. We can see that the system has high security, which mainly comes from the conjugate frequency hopping. Figure 7 shows the decryption results obtained at the receiver side with fixed hopping codes varying from 1 to 5 (the box plot). No matter what the hopping code is, the BER cannot be reduced to the threshold and is close to that without processing the phase scrambling and conjugate hopping (red line). Although a large part of the key space is provided by conjugate frequency hopping, the role of chaotic phase scrambling cannot be denied. If only conjugate frequency hopping is used, then the eavesdropper may observe the encryption of conjugate frequency hopping by analyzing the spectrum of the signal. Therefore, the conjugate frequency hopping and phase scrambling codes proposed in this paper are both complementary and indispensable.

    BER versus the different decryption technology.

    Figure 7.BER versus the different decryption technology.

    5. Conclusion

    In this paper, we propose a new two-dimensional encryption technology for an underwater visible light communication system based on logistic chaotic phase scrambling and conjugate frequency hopping. We experimentally validate it with PAM-8 modulation and a 1.2 m underwater link and obtain the highest transmission rate of 2.1 Gbit/s. Unlike traditional frequency hopping communication, which changes the carrier frequency of the signal according to a certain rule, the conjugate frequency hopping technique here is realized by symmetrically adding a certain number of zero frequency points to the DC and low frequency components of the spectrum so that the conjugate symmetry of the signal spectrum can be maintained and the signal after conversion to the time domain is still a real signal. In addition, due to advantages such as initial value sensitivity and randomness encryption using logistic chaotic mapping can improve the security of the transmission. After two-dimensional encryption, a key space of 1.75×10154 can be obtained. The feasibility of the proposed scheme is verified, with high security robustness and low complexity at the same time, which has the potential to be used in practical applications.

    References

    [1] H. Kaushal, G. Kaddoum. Underwater optical wireless communication. IEEE Access, 4, 1518(2016).

    [2] Z. Zeng, S. Fu, H. Zhang, Y. Dong, J. Cheng. A survey of underwater optical wireless communications. IEEE Commun. Surv. Tutor., 19, 204(2017).

    [3] H. M. Oubei, C. Shen, A. Kammoun, E. Zedini, K.-H. Park, X. Sun, G. Liu, C. H. Kang, T. K. Ng, M.-S. Alouini, B. S. Ooi. Light based underwater wireless communications. Jpn. J. Appl. Phys., 57, 08PA06(2018).

    [4] N. Chi, M. Shi. Advanced modulation formats for underwater visible light communications [Invited]. Chin. Opt. Lett., 16, 120603(2018).

    [5] M. Chen, P. Zou, L. Zhang, N. Chi. Demonstration of a 2.34 Gbit/s real-time single silicon-substrate blue LED-based underwater VLC system. IEEE Photon. J., 12, 7900211(2020).

    [6] N. Chi, Y. Zhou, Y. Wei, F. Hu. Visible light communication in 6G: advances, challenges, and prospects. IEEE Veh. Technol. Mag., 15, 93(2020).

    [7] H. Li, Y. He, X. Cheng, H. Zhu, L. Sun. Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag., 53, 56(2015).

    [8] D. Shaboy, D. Rockban, A. Handelman. Tapping underwater wireless optical communication in pure water and natural dead-sea ultra-high-salinity water by diffraction grating. Opt. Express, 26, 29700(2018).

    [9] Y. Zhou, J. Shi, J. Zhang, N. Chi. Spectral scrambling for high-security PAM-8 underwater visible light communication system. Asia Communications and Photonics Conference, Su1G.4(2018).

    [10] J. Du, Y. Wang, C. Fei, R. Chen, G. Zhang, X. Hong, S. He. Experimental demonstration of 50-m/5-Gbps underwater optical wireless communication with low-complexity chaotic encryption. Opt. Express, 29, 783(2021).

    [11] H. Deng, Z. Du, J. Xiong, X. Yang, Y. Hua, J. Xu. Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding. Chin. Opt. Lett., 20, 110601(2022).

    [12] G. Stepniak, L. Maksymiuk, J. Siuzdak. Experimental comparison of PAM, CAP, and DMT modulations in phosphorescent white LED transmission link. IEEE Photon. J., 7, 7901708(2015).

    [13] N. Chi, M. Zhang, J. Shi, Y. Zhao. Spectrally efficient multi-band visible light communication system based on Nyquist PAM-8 modulation. Photon. Res., 5, 588(2017).

    [14] N. Chi, Y. Zhao, M. Shi, P. Zou, X. Lu. Gaussian kernel-aided deep neural network equalizer utilized in underwater PAM8 visible light communication system. Opt. Express, 26, 26700(2018).

    [15] M. Shi, M. Zhang, F. Wang, M. Zhao, N. Chi. Equiprobable pre-coding PAM7 modulation for nonlinearity mitigation in underwater 2 × 1 MISO visible light communications. J. Light. Technol., 36, 5188(2018).

    [16] Z. Hua, Y. Zhou. Dynamic parameter-control chaotic system. IEEE Trans. Cybern., 46, 3330(2016).

    [17] S. Boccaletti, J. Kurths, G. Osipov, D. L. Valladares, C. S. Zhou. The synchronization of chaotic systems. Phys. Rep., 366, 1(2002).

    Zhilan Lu, Chao Shen, Jianyang Shi, Nan Chi. Security enhanced underwater visible light communication system based on chaotic phase scrambling and conjugate frequency hopping[J]. Chinese Optics Letters, 2023, 21(6): 060602
    Download Citation