AN EFFICIENT AND SECURE TRANSMISSION OF SOLITON FOR WDM SYSTEMS
KrishiKosh
View Archive InfoField | Value | |
Title |
AN EFFICIENT AND SECURE TRANSMISSION OF SOLITON FOR WDM SYSTEMS
|
|
Creator |
ANTWIWAA, ANITA
|
|
Contributor |
KUMAR, Dr. ANIL
|
|
Subject |
null
|
|
Description |
The information hunger of the world is increasing tremendously with time and it is compelling telecommunication companies to mount up strategies to meet the high data demand as well as providing an efficient service to their clients. Amidst the exponential growth of information hungry customers, telecommunication companies dream of providing quality of services at a lower cost to their users in order to survive the competition in the market. Transmitting multiples of signals through a single channel in view of serving millions of customers simultaneously by wavelength division multiplexing (WDM) is the answer. Four-wave mixing (FWM) is the optical signal drift from one channel to the other. This effect has the tendency of imposing a threat on the fiber communication network thereby undermining the security and confidentiality of the information sent by the customers. This work will study the soliton system by analysis of the various impairments in the soliton WDM channel using Matlab software. The results obtained show that when the phase of solitons are varied with equal amplitude and a constant spacing, the solitons interacts and join combines to form one pulse. They walk through each other and separates after travelling for some time. This affirms that soliton pulses are stable even in the mist of interaction when travelling under the right conditions. When the amplitude is varied keeping the phase and separation constant shows an increased in the amplitude due to an increase in the interaction rate thereby reducing the efficiency and QoS of the soliton signals. Moreover, varying the separation of the soliton pulses has effect on the transmission. When soliton pulses are kept so tight in the channel, perturbation will occur therefore the closer the pulse separation the greater the interaction rate and vice versa. Spacing between iii soliton pulses in close proximity should be equal to or more than the width of the pulse so as to overcome interactions. FWM effect and its security issues will be analyzed. The various Matlab simulation results of this FWM will be studied using optisystem software. The obtained results shows that FWM effect can reduce the signal strength by 60% and also broadening the spectrum of the pulse and these are all alarming factors. The evolution of new pulses due to FWM effect also consumes bandwidth which makes data transmission expensive to telecommunication companies. Furthermore, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. These two novel attacks were studied using optisystem software. The outcome of these attacks show that WDM source based attack has a great impact on WDM signals. In the presence of channel impairments, the signals suffers from various non-linearity issues which degenerates into various security issues. The clone source based attack adversely affects the security of a WDM system since the adversary operates with the same wavelength and power of the legitimate user. The DWSBA also causes the signals to be affected by non-linearity effects like pulse broadening and FWM which creates room for security vulnerabilities in WDM. Finally, a proposed Secured WDM system will be designed to mitigate the various security issues using optisystem software. A multiple stage encryption with phase detection and frequency grating network has been proposed to secure the WDM network from intrusion activities. The phase detection method plays a checking role on the transmitted data by comparing the phase of the iv signal received with the phase of the transmitted signal and correcting the resultant phase received. Since the phase of the transmitted signal is known, it is easy to detect whether there has been an intrusion activities on the network. This takes care of the clone source based attack because the phase detection method can determine the exact signal transmitted by the user. The presence of the frequency grating filter plays an august role in the detection and separation of DWSBA by separating the various frequencies received at the output. The output obtained shows that the phase detection method with frequency grating filtering method work together to detect and correct all these channel impairments and attacks makes the proposed WDM phase detection model the most stable and secured WDM system. |
|
Date |
2018-04-04T11:04:51Z
2018-04-04T11:04:51Z 2018 |
|
Type |
Thesis
|
|
Identifier |
http://krishikosh.egranth.ac.in/handle/1/5810042923
|
|
Language |
en
|
|
Format |
application/pdf
|
|
Publisher |
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING SHEPHERD INSTITUTE OF ENGINEERING AND TECHNOLOGY SAM HIGGINBOTTOM UNIVERSITY OF AGRICULTURE TECHNOLOGY AND SCIENCES ALLAHABAD-211007
|
|