PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRANSMISSION

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 06 | Jun 2022

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRANSMISSION Narmatha J1, I. Muthumani2 1Student,

Dept. of ECE, GCE, Tirunelveli, Tamil Nadu, India Dept. of ECE, GCE, Tirunelveli, Tamil Nadu, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Symmetric key cryptography Abstract - Cross layer security network is used to improve 2Professor,

the security of image transmission over optical fiber and Image confidentiality is increased by means of this method. To evaluate the Security performance of cross layer security network, encoding schemes is performed at the different network layers. It is difficult for the eavesdropper to intercept the code as it provide cross layer security for both physical and datalink layer. The original image is recovered if user use correct decoder and encryption algorithm. Hence it achieves higher confidentiality than other network.

Asymmetric key cryptography

The technique used here is symmetric key encryption. AES encryption technique is employed to enhance the security at data layer.

2. PROPOSED METHODOLOGY The block diagram for cross layer security network is depicted in Fig.1. cross layer security system is designed with the help of optisystem. optical encoder and optical decoder is constructed by means of optical delay lines with the optical orthogonal code. At the transmitter, user data is encrypted by means of AES encryption, and then modulated by means of M-Z modulator. The transmission power is 0 dBm and the central wavelength is 1550 nm. The transmission rate is 10 Gbit/s. The modulated signal is encoded by the optical encoder using optical orthogonal code . Then, the signal is amplified by an erbium doped fiber amplifier (EDFA) and transmits through a single mode fiber link. The dispersion compensation fiber (DCF) is used to compensate for the fiber dispersion.

Key Words: Image transmission, Security, Encryption, Confidentiality

1. INTRODUCTION Fiber optic network is used in many applications for image transmission. As user information is more sensitive, it is important to maintain security in image transmission. Eavesdropper use some of the techniques like differential detection, Energy detection and Code interception to eavesdrop the signal. Two level of security is implemented by means of cross layer security network. Cross layer security is the combination of both physical layer security and data layer security. To improve the security, transmitted data is encrypted at both physical layer and data layer. To evaluate the Security performance of cross layer security network AES encryption is used in data layer and CDMA technique is used in physical layer. 1.1 Physical layer security

Fig-1: Block diagram of Cross layer security network

To enhance the security of communication channel physical layer security is important. OCDMA is employed to enhance physical layer security. Optical code-division multiple access (O-CDMA) technique has a advantage of providing large bandwidth of the fiber medium and flexibility. Hence it achieve high-speed connectivity, fairness, flexibility, simplified network control and management, service differentiation, and increased security.

At the receiver, optical signal is decoded by a matched decoder for the user. Cross layer security network for secure optical transmission is designed with the help of Optisystem simulation software 2.1 Transmitter The transmitter block designed in Optisystem is shown in Fig-2. The AES encrypted image is fed as input to User defined bit sequence generator by enabling load from file option. The AES encrypted data is then modulated by means of MZ modulator. The modulated signal is encoded by optical encoder using optical orthogonal code {1,13,25,40,53}. The delays introduced to encode the signal are 3 ps, 18 ps, 33 ps, 51.7 ps, 68 ps,

1.2 Data layer security Algorithmic cryptography is employed to enhance data layer security. Algorithmic cryptography is classified as two types

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 2146


Turn static files into dynamic content formats.

Create a flipbook