期刊文献+

光谱相位编码光码分多址系统信息侦听技术研究 被引量:2

Information eavesdropping techniques of spectral phase-coded OCDMA system
下载PDF
导出
摘要 针对光谱相位编码光码分多址系统(OCDMA)的信息侦听技术进行了研究。利用Optisyslem3.0(光通讯系统仿真软件)和Matlab7.1搭建光谱相位编码OCDMA系统软件分析平台,提出用户地址码字拦截模型。通过仿真分析可以看出该窃听模型在多相编码下能有效地破译用户地址码字,实现对整个系统的信息窃听,可见光谱相位编码相干OCDMA系统的安全性值得进一步探讨。 The information eavesdropping techniques of spectral phase-coded OCDMA system were investigated. The software platform of the spectral phase-coded OCDMA system was built by using the Optisystern3.0 of the Optiwave Corporation and Matlab7.1, the model of user code interception in this system was put forward. The results of simulation based this model indicate that the address code of the user can be deciphered effectively by the eavesdropping scheme, the total system information can be intercepted, the spectral phase-coded OCDMA system isn't secure as generally believed.
出处 《重庆邮电大学学报(自然科学版)》 2008年第2期184-187,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市自然科学基金项目(CSTC 2006BB2362) 重庆市教委科学技术项目(KJ060501)
关键词 光码分多址 光谱相位编码 信息侦听 码字拦截 OCDMA spectral phase-encoding information eavesdropping code interception
  • 相关文献

参考文献9

  • 1[1]REJEB R,PAVLOSOGLON I,LEESON M S,et al.Secu-ring All-Optical Networks[C]//Proceeding of 2003,5th International Conference,on,Transparent Optical Net-works 29 June-3 July 2003,[s.l.]:[s.n.],2003:87-90.
  • 2[2]MURIEL M,DOUGLAS M,STEPHEN R C.Attack detec-tion methods for all-optical networks[EB/OL].[2007-06-25].http://citeseer.ist.psu.edu/501694,html.
  • 3[3]MURIEL M,DOUGLAS M,RICHARD A,et al.Security Issues in All-optical networks[J].IEEE Network Maga-zine,1997,5/6:42-48.
  • 4[4]SHAKE T H.Security Performance of Optical CDMA A-gainst Eavesdropping[J].IEEE Journal of Lightwave Technology,2005,23 (2):655-670.
  • 5[5]SHAKE T H.Confidentiality performance of spectral phase encoded optical CDMA[J].IEEE Lightwave Tech-nology,2005,23(4):1652-1663.
  • 6[6]LONG Bing,PAN Wu.Analysis and Simulation on Spec-tral Phase-Encoded OCDMA system[C]//Proceedings of ICMMT2007,GUI Lin,China,April 19-21,2007.GUI Lin:[s.n.],99-902.
  • 7[7]WANG X,WADA N,MIYAZAKI T,et al.Coherent OCD-MA system using DPSK data format with balanced detec-tion[J].IEEE Photonics Technology Letters,2006,18(7):826-828.
  • 8[8]WANG X,WADA N,CINCOrlTI G,et al.Demonstration of Over 128Gbps-capacity (12-user×10.71Gbps/user),Asynchronous OCDMA Using FEC and AWG-based Multi-pert Optical Encoder/decoders[J].IEEE Photonics Technology Letters,2006,18(15):1603-1605.
  • 9[9]HERNANDEZ V J.Spectral phase-encoded time-spreading (SPECTS) optical code-division multiple access for ter-abit optical access networks[J].IEEE Journal of Light-wave Technology,2004,22(11):2671-2679.

同被引文献17

  • 1张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16
  • 2周秀丽,胡渝.基于MQC的谱幅编码OCDMA系统研究[J].光电子.激光,2005,16(6):702-705. 被引量:10
  • 3NGUYEN L, AAZHANG B, YOUNG J F.All-optical CDMA with bipolar codes[J]. Electron. Lett., 1995 ,(31 ):469-470.
  • 4HASOON F N,ALJUNID S A,SAMAD M D A,et al. Spectral amplitude coding OCDMA using and subtraction technique [J]. Applied Optics, 2008,47(9): 1263-1268.
  • 5ABDULLAH M K, HASOON F N, ALJUNID S A, et al. Performance of OCDMA systems with new spectral direct detection (SDD)technique using enhanced double weight (EDW) code[J].Optics Communications, Issue 18, 2008,28(18): 4658-4662.
  • 6FERAS N. HASOON S A, ALJUNID, M S,et al. Enhanced Double Weight Code Implementation in Multi-Rate Transmission [J].International Journal of Computer Science and Network Security, 2007,7(12): 156-160.
  • 7ALJUNID S A, ISMAIL M, RAMLI A R,et al. A new family of optical code sequences for spectral-amplitude-coding optical CDMA systems [J]. Photonics Technology Letters, 2004,16(10):2383 - 2385.
  • 8李月卉.光码分复用(OCDMA)系统中码间干扰问题研究[C/OL].电子科技大学硕士论文[2004-01-16].http://www.cnki.net.
  • 9van Eck W.Electromagnetic radiation from video display units:an eavesdropping risk?[J] Computers and Security,1985,4(4):269-286.
  • 10Smulders P.The threat of information theft by reception of electromagnetic radiation from RS-232 cables[J].Computers and Security,1990,9(1):53-58.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部