Abstract
In this paper, two vulnerabilities that allow an eavesdropper to extract data from an isolated user in a two-code-keying spectrally phase-coded optical-code-division-multiple-access (O-CDMA) system are experimentally demonstrated. One of these vulnerabilities stems from spectral dips that result from phase-to-amplitude conversion in the encoding process, which allows eavesdropping by using a narrowband tunable optical filter and a simple energy detector. A modified O-CDMA transmitter scheme that masks this vulnerability is demonstrated. A second, especially serious, vulnerability allows eavesdropping by using a differential-phase-shift-keying receiver. Both of these vulnerabilities arise from a structure in the coding and signaling schemes that allow an eavesdropper to recover data, with relatively simple hardware and without attempting to learn the codes.
© 2006 IEEE
PDF Article
More Like This
Cited By
You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.
Contact your librarian or system administrator
or
Login to access Optica Member Subscription