
- Chinese Optics Letters
- Vol. 21, Issue 6, 060602 (2023)
Abstract
Keywords
1. Introduction
Underwater visible light communication (UVLC) has a high research value in the development and utilization of new spectrum resources due to such excellent properties as having no available bandwidth limitation, having high speed and high capacity, being far from traditional radio frequency bands, and abundant spectrum resources. In terms of security performance, optical fiber communication is wired communication that is theoretically a secure communication, where the signal is always transmitted in the cable. Wireless communication systems such as VLC have the risk of being eavesdropped because the signal is transmitted without passing through cables. However, compared with traditional radio frequency communication, VLC has a higher transmission frequency, a shorter wavelength, and cannot penetrate the wall. VLC has a high security performance[1–6], but it still cannot avoid the situation where the signal is stolen by eavesdroppers in the same space[7,8]. Therefore, it is necessary to study the signal encryption technology applicable to UVLC systems to improve the security of transmission.
In 2018, Fudan University proposed the first spectral scrambling security strategy for UVLC systems in the physical layer[9], but by analyzing the spectral characteristics of the signal, this encryption can potentially be broken at the receiver side. Therefore, it is necessary to use multidimensional encryption techniques to protect the transmission signals. In 2021, Zhejiang University first verified the feasibility of chaotic encryption in high-speed UVLC systems[10], using two-dimensional encryption at the bit and subcarrier levels and verified that chaotic encryption has no negative impact on the performance of the system. In 2022, they also used bitstream diffusion, in-phase and quadrature components scrambling, and time and frequency scrambling for three-dimensional encryption of UVLC systems[11]. However, all these encryption algorithms are complex in implementation and have high requirements for system performance.
In this paper, we propose a two-dimensional encryption technique based on chaotic phase scrambling and conjugate frequency hopping to encrypt the spectrum of PAM-8 signals and drive a blue LED for transmission in a 1.2 m water tank. At the receiver side, the PAM-8 signal is synchronized by correlating the received signal with the original transmitted signal, and then it is filtered by the least-mean-square (LMS) algorithm and Volterra filter. With the codebook at the transmitter side, we remove the conjugate frequency hopping encryption, the phase scrambling encryption, and finally, the symbol information is mapped back to the bit sequence for BER testing. A maximum transmission rate of 2.1 Gbit/s was experimentally measured with a BER below 7% the hard-decision forward error correction (HD-FEC) threshold. The complexity and security of the system are also analyzed and discussed in this paper, confirming its feasibility and high transmission reliability for physical implementation.
Sign up for Chinese Optics Letters TOC. Get the latest issue of Chinese Optics Letters delivered right to you!Sign up now
2. Principle
The principle of the proposed scheme is described as Fig. 1. The original bit data are first mapped into the PAM-8 signal. Then, two major methods, logistic phase scrambling and conjugate frequency hopping, are implemented to the signal after fast Fourier transform (FFT) to increase its security characteristic. After inverse fast Fourier transform (IFFT) and UVLC transmission, the received signal is de-hopping and de-scrambling for digital signal processing (DSP) and PAM demodulation.
Figure 1.The principle of the proposed scheme. The original bit sequence is mapped into the PAM-8 signal. After FFT, two major methods, logistic phase scrambling and conjugate frequency hopping, are implemented. After IFFT and UVLC transmission, the received signal is dehopped and descrambled for DSP and demodulation.
PAM-8 modulation uses
Since the frequency spectrum of the signal has conjugate symmetry and the phase scrambling and conjugate frequency hopping are implemented in the frequency domain, we can simply analyze the positive half-axis of the spectrum
The positive and negative half-axes satisfy the following relationship:
Then, we implement phase scrambling by using a linear combination of two different logistic-based chaos mappings, which can be illustrated as
Each logistic mapping is uniquely determined by the initial value
Figure 2.Logistic maps generated by (a) Eq. (
After phase scrambling, we apply conjugate frequency hopping to the signal, whose detailed scheme is shown in Fig. 1(b). We set the signal
Finally, we apply IFFT and obtain the real time-domain signal of
3. Experimental Setup
The experimental setup of the proposed scheme is shown in Fig. 3. At the transmitter side, the digital signal to be transmitted is obtained after the PAM8 mapping of the bit sequence. After Fourier transform, phase scrambling, conjugate frequency hopping, and inverse Fourier transform, the digital signal is fed into an arbitrary waveform generator (AWG) for conversion into an analog signal. An electric amplifier (EA) is used to amplify the signal, and a bias-Tee is used to couple a direct current (DC) signal. Next, the blue LED with a wavelength of 450 nm is driven, and the beam is transmitted through the lens for collimation into a 1.2 m water tank.
Figure 3.Experimental setup of the proposed scheme for UVLC links. Arbitrary waveform generator, AWG; electric amplifier, EA; positive-intrinsic-negative photoelectric diode; PIN-PD; oscilloscope, OSC.
At the receiver side the light is first focused through the lens to the receiver, where a Si PIN-PD is used for photoelectric conversion. After the electronic amplifier, the received signal is sampled by an OSC and used for off-line processing.
In the offline processing module at the receiver side, the received signal is first synchronized, and then a least-mean-square (LMS) filter and a Volterra filter are used for signal equalization, followed by conjugate frequency hopping and phase scrambling code removal. Next, the decrypted signal is filtered by a second LMS for noise removal, and the obtained signal is then demodulated for BER testing.
4. Results and Discussion
We experimentally test and evaluate the performance of the above system using a BER and a secure key space. We randomly generate 76,800 bits of data and map it into a PAM-8 signal. After quadruple up-sampling and encryption, we transmit the signal through a 1.2 m water tank and obtain the received signal for decryption and decoding.
We first investigate the optimal operating point of the system by varying the bias current
Figure 4.BER performance versus the bias current Ib and the peak-to-peak voltage Vpp of the AWG.
Then, under the optimal working point, we explore the influence of the transmission speed on our system. As shown in Fig. 5, when the conjugate frequency hopping and phase scrambling codes are not removed at the receiver side (red line), the BER is about 0.5, indicating that even if the receiver side eavesdrops the signal, the correct transmission signal cannot be obtained without the correct key for decryption, which confirms the security of the experimental system. When the decryption is performed correctly at the receiver side (blue line), BER also rises gradually as the transmission speed rises. The reason is that when the transmission is accelerated, the intersymbol interference (ISI) at the receiver side is aggravated due to the limited sampling rate and bandwidth of the system. When the BER is below 7% the HD-FEC threshold, the highest transmission speed that can be obtained is 2.1 Gbit/s, and the BER at this speed is
Figure 5.BER versus the transmission speed. Insets are the constellation diagrams.
Accordingly, the constellation diagram that is not correctly decrypted is shown in Fig. 5(a), and the eavesdropper cannot obtain the valid information of the transmitted signal. When the transmission speed is higher than 2.1 Gbit/s, the constellation diagram of the correctly decrypted PAM-8 signal is shown in Fig. 5(b), and the boundaries between the two symbols are not as obvious as in Fig. 5(c), which means the possibility of misclassification will rise.
The effect of the phase scrambling weight
Figure 6.BER versus the phase scrambling coding weight w. Insets are the constellation diagrams.
Finally, we analyze the encryption performance of the system. We begin with the analysis of the chaotic phase scrambling code. Since the parameters to be determined are the initial values
Figure 7.BER versus the different decryption technology.
5. Conclusion
In this paper, we propose a new two-dimensional encryption technology for an underwater visible light communication system based on logistic chaotic phase scrambling and conjugate frequency hopping. We experimentally validate it with PAM-8 modulation and a 1.2 m underwater link and obtain the highest transmission rate of 2.1 Gbit/s. Unlike traditional frequency hopping communication, which changes the carrier frequency of the signal according to a certain rule, the conjugate frequency hopping technique here is realized by symmetrically adding a certain number of zero frequency points to the DC and low frequency components of the spectrum so that the conjugate symmetry of the signal spectrum can be maintained and the signal after conversion to the time domain is still a real signal. In addition, due to advantages such as initial value sensitivity and randomness encryption using logistic chaotic mapping can improve the security of the transmission. After two-dimensional encryption, a key space of
References
[1] H. Kaushal, G. Kaddoum. Underwater optical wireless communication. IEEE Access, 4, 1518(2016).
[9] Y. Zhou, J. Shi, J. Zhang, N. Chi. Spectral scrambling for high-security PAM-8 underwater visible light communication system. Asia Communications and Photonics Conference, Su1G.4(2018).
[16] Z. Hua, Y. Zhou. Dynamic parameter-control chaotic system. IEEE Trans. Cybern., 46, 3330(2016).

Set citation alerts for the article
Please enter your email address