| With the development of modern information technology,network security issues are frequent,which affects the harmony and stability of society.As an important part of the communication network,the optical network plays an indispensable role in infor-mation communication in government,finance,energy,electric power,communication,transportation,and other fields.Optical network is divided into two categories:Active Optical Network(AON)and Passive Optical Network(PON)in terms of system alloca-tion.The common optical network topological architecture includes ring structure,star structure,Mesh structure,Torus structure and Fattree structure.At present,the security encryption scheme of the optical network mainly focuses on the network Mac layer and its upper layer data encryption,while the encryption of the physical layer mainly applies a digital chaos scheme.Therefore,it is important to study the security of the physical layer of optical networks to ensure the data security of communication networks.The current physical layer security technology of optical networks is mainly based on a digital chaotic security encryption scheme,which is relatively simple and insufficient to meet the higher security requirements.Therefore,this paper takes Mesh-basd optical network as the re-search object and combines the scheme of Double chaotic masking(DCM)to research the security of the physical layer of Mesh-basd optical network.1.In order to tackle the security and privacy problems in optical networks,a novel mesh-based optical security network exploiting DCM scheme for multipoint confiden-tial communication is proposed.For each node in the optical network,two sets of mu-tually asynchronous Vertical-cavity Surface-Emitting Lasers(VCSELs)are required as transceivers for encrypted communication.In this network,the encryption of the mes-sage is implemented on the transmitter of the source node by using the DCM scheme,and the encrypted message is transmitted to the receiver of the destination node through the optical network for decryption.The network nodes are marked and differentiated using the delayed marking method.Delay Fiber(DF)is used in opticalnetworks to set different time delays as special markers for network nodes,and network nodes with different time delays output different chaotic signals.Network nodes with the same time delay can es-tablish a legitimate communication relationship and complete the communication process.Network nodes with different time delays cannot output high-quality synchronized chaotic signals and cannot communicate normally,which effectively avoids the communication chaos among network nodes.The optical network transceiver is modeled using Spin Flip Model(SFM),and the rate equation of the transceiver is simulated based on the numerical simulation software Matlab and using the fourth-order Runge-Kutta method.The chaotic output characteristics of the network node transceiver are studied and analyzed by numer-ical simulation with appropriate parameters.In addition,by regulating different internal parameter mismatches,the synchronization characteristics of transceivers in a security network are numerically analyzed by using the cross correlation coefficient.2.The proposed Mesh-basd optical network exploiting the DCM scheme is evaluated specifically from three perspectives:network performance,communication performance,and security performance.(1)Based on the OPNET simulation platform,the network per-formance of the proposed network is simulated at different network scales.By comparing the two important metrics of end-to-end(ETE)delay and network throughput,the results show that the network exhibits excellent network performance.(2)Based on the high quality synchronization with a correlation coefficient of 0.983,a joint simulation with numerical simulation software Matlab and Optisystem is used to verify the communica-tion performances of the longest path channel are investigated for a given metropolitan area network scale.(3)The ability of the Mesh-basd optical network to effectively resist illegal brute force attacks is investigated.The results show that the network has a high key sensitivity and a key space of up to 10180,and the chaotic eye diagram indicates that the illegal brute force cracking does not obtain any useful information,so the network is con-sidered to have a reliable ability to resist illegal attacks.The network takes into account both communication performance and network performance with security performance in mind. |