Professional Documents
Culture Documents
Base Paper
Base Paper
1. INTRODUCTION
With the exponential increase of optical data traffic driven by the advancement of the broadband services,
passive optical networks (PONs) have emerged as a promising candidate to cope with these requirements. As it
offers a number of advantages, such as high capacity, low cost, and energy efficiently [1]. Besides, adopting
orthogonal frequency division multiplexing (OFDM) as modulation technique in PONs inherits further benefits,
such as tolerance to fiber dispersion, high spectrum efficiency and cost-effectiveness [2]. However, with respect
to the fact that the downstream traffic in PONs has broadcasting nature, the transmitted data becomes more
vulnerable to the eavesdropping by illegal optical network units (ONUs). Therefore, secure OFDM transmission
is extremely necessary in PONs. To deal with this issue, many schemes have been proposed recently [3]. Among
these approaches, chaos-based schemes have acquired much attention due to the unique properties of the chaotic
system, such as the ergodicity, the pseudo randomness and the high sensitivity to the initial values [4]. However,
all of these methods are implemented through the offline digital signal processing (DSP), and the feasibility of
these approaches in the real-time implementation needs to be explored.
FPGA (Field Programmable Gate Array) has been widely applied in modern digital hardware circuit design,
because it offers a hardware platform that can provide high speed, flexibility, performance, efficiency and
reliability. It also can be found widespread in many applications, such as military radios and backbone
infrastructure of cellular networks. For FPGA based OFDM transmission, a number of approaches have been
introduced, however all of these schemes focus on the conventional OFDM transmission rather than secure
OFDM transmission.
In this paper, we propose for the first time a real-time secure OFDM transmission implemented on FPGA.
A multi-fold OFDM data encryption and transmission are performed using a hyper digital chaos [5], where the
chaotic sequences are used to encrypt the real and the imaginary part of the QAM symbols, as well as the input
data itself. A key space of 1022 is provided in the proposed scheme, to guarantee the physical layer
confidentiality. All of the hardware interfaces and modules are designed, implanted and verified through Vivado
using Verilog programming language. As a proof of concept, an encrypted 16-QAM OFDM signal is
successfully demonstrated using Xilinx System Generator (XSG).
DeQAM Mapper
QAM Mapper
I
Remove CP
I
Decryption
Encryption
Add CP
PRBS
PRBS
XOR
XOR
IFFT
FFT
S/P
P/S
S/P
P/S
Q Q
z
y
y
z
Synchronization
X
Keys
Authorized licensed use limited to: GITAM University. Downloaded on February 28,2022 at 11:29:41 UTC from IEEE Xplore. Restrictions apply.
ICTON 2018 Tu.D1.4
2. PRINCIPLE
The schematic setup of the proposed scheme is depicted in Fig. 1, where the chaotic encryption is implemented by
the means of XOR operation on the following parts: pseudo-random binary sequence, real part and imaginary part
of QAM symbol. In order to generate the chaotic sequences, a 3-dimensional (3D) digital chaos is deployed,
x = -a ( x - y )
y = bx - xz - y (1)
z = xy - cz
The system enters in the chaotic regime, when the constants are set: 𝑎𝑎 = 35, 𝑏𝑏 = 8/3, 𝑐𝑐 = 25. According to
the literature [6], selecting 𝑥𝑥 = 0.1, 𝑦𝑦 = 0.1, 𝑧𝑧 = 0.15 as the initial value and setting a sufficient number of
initial iterations. For FPGA implementation of 3D chaotic system, the continuous system should be discretized,
as well as using of fixed-point data format is necessary. In this work, Q25 format with 128-bits fixed-point data
is used, i.e. decimal digits are 25 bits. To obtain the chaotic sequences of {𝑥𝑥}, {𝑦𝑦} and {𝑧𝑧} in FPGA, Eq. (1)
can be discretized and solved using Euler method, which can be expressed as
x(n + 1) = (1 − Ta ) x(n) + Tay (n)
y (n +=1) Tbx(n) − Tx(n) z (n) + (1 − T ) y (n) (2)
z (n + 1) = (1 − Tc) z (n) + Tx(n) y (n)
where the parameter T represents the step size, and the smaller its value is, the more accurate the calculated
result of the discrete system state equation will be. T is set to 0.001 in this paper.
Based on Eq. (2) and with assist of Verilog hardware description language (HDL), the 3D chaotic system can
be directly implemented via Vivado design tool. Figure 2 shows the solution of Eq. (2), where xn, yn, and zn
represent three individual chaotic sequences.
=I En CC
...C D 00...0
⊕ I 31 I 30 ...I18 I17 I16 I15 ...I 0 (4)
14
17
14 17
A=
S y0 ⊕ S z0 , B =
S y1 ⊕ S z1 , C =
S y2 ⊕ S z2 , D =
S y3 ⊕ S z3
where 𝑄𝑄𝐸𝐸𝐸𝐸 and 𝐼𝐼𝐸𝐸𝐸𝐸 represent the encrypted imaginary part and real part respectively, 𝑄𝑄32 , 𝑄𝑄33 , …, 𝑄𝑄63
represent the 1th bit to 32th bit in the binary sequence of the imaginary part, 𝐼𝐼0 , 𝐼𝐼1 , …, 𝐼𝐼31 represent the 1th bit to
32th bit in the binary sequence of the real part. Similar to 𝑠𝑠𝑥𝑥𝑖𝑖 (i = 1, 2, … , 17), 𝑠𝑠𝑦𝑦 and 𝑠𝑠𝑧𝑧𝑖𝑖 are also the binary
𝑖𝑖
bits extracted from the chaotic sequence {𝑦𝑦} and {𝑧𝑧} respectively. For those bits which need to remain their
original value we set 0 in the corresponding positions to operate XOR encryption.
Authorized licensed use limited to: GITAM University. Downloaded on February 28,2022 at 11:29:41 UTC from IEEE Xplore. Restrictions apply.
ICTON 2018 Tu.D1.4
From Eq. (4) it clear that, after the XOR encryption, each symbol will be scrambled into another point on the
constellation diagram. For example, the symbol with 𝑄𝑄 = 1 and 𝐼𝐼 = −1, will be scramble into another symbol
with 𝑄𝑄 = −3 and 𝐼𝐼 = 3 by assuming 𝐴𝐴 = 1, 𝐵𝐵 = 0, 𝐶𝐶 = 1 and 𝐷𝐷 = 0. For decryption, the same chaotic
sequences will be used to perform the XOR operation again.
Figure 4. Simulation results of image encryption, (a). Original image; (b). Encrypted image; (c). Correctly
decrypted image; (d) Decrypted image with a wrong key (a tiny change the initial value).
Authorized licensed use limited to: GITAM University. Downloaded on February 28,2022 at 11:29:41 UTC from IEEE Xplore. Restrictions apply.
ICTON 2018 Tu.D1.4
Moreover, the sensitivity of the initial value of the digital chaos on the data recovery is evaluated during the
data decryption. Specifically, if adding 1 to the last bit of the binary number stored in the synchronization module,
it increases ~3×10-8 in decimal from the original number. By running the simulation in XSG, the decrypted image
in the case of a slightly different chaotic initial value is shown in Fig. 4(d). Obviously, the decryption of the image
is completely incorrect and cannot be recovered whenever the correct initial values are not available. Generally,
the bit error rate (BER) is ~0.5 if any of the initial values is changed ~10-15, which implies the robust security
using digital chaos in OFDM data encryption. For the proposed secure scheme as shown in Fig. 1, the overall
key space after the data encryption is 275 (~3.8 × 1022 ).
5. CONCLUSIONS
We propose a real-time secure data encryption for OFDM signal transmission based on FPGA hardware and XSG.
The hardware implementation includes the multi-fold OFDM data encryption on QAM symbols, as well as XOR
operation on the original data. After transmission, the encrypted OFDM signals are recovered using the correct
chaotic keys. Moreover, the multi-fold data encryption of OFDM signals provides a key space of 1022, which
guarantee the robust security during OFDM data transmission. This implementation is one step ahead towards the
real application for OFDM data encryption using digital chaos.
ACKNOWLEDGEMENTS
This work was supported in part by International S&T Cooperation Program of China, 2016YFE0104500,
Natural Science Foundation of China under Grants 61571291, 61431009 and 61221001.
REFERENCES
[1] A. Sultan, X. Yang, A. Hajomer and W. Hu, “Chaotic constellation mapping for physical-layer data
encryption in OFDM-PON,” IEEE Photonics Technology Letters, vol. 30, no. 4, pp, 339-342, Feb. 2018.
[2] A. Hajomer, X. Yang and W. Hu, “Chaotic Walsh-Hadamard transform for physical layer security in
OFDM-PON,” IEEE Photonics Technology Letters, vol. 29, no. 6, pp. 527-530, Mar. 2017.
[3] X. Hu, X. Yang, Z. Shen, H. He, W. Hu and C. Bai, “Chaos-based partial transmit sequence technique for
physical-layer security in OFDM-PON,” IEEE Photonics Technology Letters, vol. 27, no. 23, pp. 2429-2432,
Dec. 2015.
[4] F. Manavi and Y. Shayan, “Implementation of OFDM modem for the physical layer of IEEE 802.11a
standard based on Xilinx Virtex-II FPGA,” IEEE Vehicular Technology Conference, vol. 3, pp. 1768-1772,
May 2004.
[5] G. Qi, G. Chen, S. Du, et al., “Analysis of a new chaos,” Physical A: Statistical Mechanics & Its
Applications, vol. 352, no. 2–4, pp. 295-308, 2005.
[6] E. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmospheric Sciences, vol. 20, no. 2, pp. 130-141,
2004.
Authorized licensed use limited to: GITAM University. Downloaded on February 28,2022 at 11:29:41 UTC from IEEE Xplore. Restrictions apply.