Home Technology Hybrid-enhanced secure strategy for encryption image and key management based on WDM/TDM-PON using hill group cipher
Article
Licensed
Unlicensed Requires Authentication

Hybrid-enhanced secure strategy for encryption image and key management based on WDM/TDM-PON using hill group cipher

  • Atheer J. Mansoor ORCID logo , Mohammed Mejbel Salih , Essam N. Abdulla ORCID logo EMAIL logo and Hayder H. Al-khaylani EMAIL logo
Published/Copyright: February 2, 2026
Become an author with De Gruyter Brill

Abstract

Information and communication technology (ICT) has advanced significantly in the modern era, and the majority of smart technology utilized in smart cities are Internet of things (IoT) based. Hybrid passive optical networks (PON) consist of wavelength division multiplexing (WDM) and time division multiplexing (TDM) are of the most encouraging and widely utilized technologies in optical distribution networks (ODN) required for security, encryption data and bandwidth. The security of the mystery/private cryptographic key is crucial to the encryption process’s ability to secure data. Any strong encryption algorithm would be compromised by poor key management. In order to enhance the physical security, so as to protect the secret data during transmission across the channel and to ensure a secure exchange of the encryption key between the transmitter and the recipient, a hybrid system that incorporates cryptography, steganography, and key hiding techniques has been employed. To the best of our knowledge, Opti-System software with python devices combine to create a secure WDM/TDM-PON system depending on the Hill Group cipher and ITU-T G.989.2 standards. Simulation studies indicate that, a bidirectional fiber distance with a splitting ratio 1:64 and a symmetrical 40 Gbps can be accomplished successfully out at 60 km. The least amount of acceptable receiver sensitivity is −28.1 dBm for uplink (U/S) and −23.7 dBm for downlink (D/S).


Corresponding author: Essam N. Abdulla and Hayder H. Al-khaylani, Optoelectronics Engineering Branch, Laser and Optoelectronics Department, University of Technology–Iraq, 10021, Baghdad, Iraq, E-mail: (E. N. Abdulla), (H. Al-khaylani)

  1. Research ethics: “The local Institutional Review Board deemed the study exempt from review” if the IRB specifically exempted the study from review.

  2. Informed consent: Informed consent was obtained from all individuals included in this study, or their legal guardians or wards.

  3. Author contributions: The authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: The authors state no conflict of interest.

  6. Research funding: None declared.

  7. Data availability: Not applicable.

References

1. Zanella, A, Member, S, Bui, N, Castellani, A, Vangelista, L, Member, S, et al.. Internet of things for smart cities. IEEE Internet Things J 2014;1:22–32. https://doi.org/10.1109/jiot.2014.2306328.Search in Google Scholar

2. Kumar, A, Janyani, V, Batagelj, B. Optical fiber technology ring based latency-aware and energy-e ffi cient hybrid WDM TDM-PON with ODN interconnection capability for smart cities. Opt Fiber Technol 2020;58:102242.10.1016/j.yofte.2020.102242Search in Google Scholar

3. Bindhaiq, S, Zulkifli, N, Supa’at, AM, Idrus, SM, Salleh, MS. 128 Gb/s TWDM PON system using dispersion-supported transmission method. Opt Fiber Technol 2017;38:87–97. https://doi.org/10.1016/j.yofte.2017.08.006.Search in Google Scholar

4. Garg, AK, Madavi, AA, Janyani, V. Energy efficient flexible hybrid wavelength division multiplexing-time division multiplexing passive optical network with pay as you grow deployment. Opt Eng 2017;56. https://doi.org/10.1117/1.oe.56.2.026119.Search in Google Scholar

5. Dixit, A, Lannoo, B, Das, G, Colle, D, Pickavet, M, Demeester, P, et al.. Flexible TDMA/WDMA passive optical network : energy efficient next- generation optical access solution. Opt Switch Netw 2013:1–16. https://doi.org/10.1016/j.osn.2013.03.001.Search in Google Scholar

6. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/80 Gbps TWDM PON utilizing dispersion compensation technique. J Opt 2022;52:1683–93.10.1007/s12596-022-00991-0Search in Google Scholar

7. Abdulla, EN, Hussien, RA, Rashid, FF, Abdulkafi, AA, Abass, AK, Saleh, MA, et al.. Design and performance analysis of symmetrical 160 gbps TWDM-PON utilizing bidirectional configuration. J Opt 2023;53:1106–19.10.1007/s12596-023-01263-1Search in Google Scholar

8. Huang, X, Bai, Y, Fu, X. Image transmission with binary coding for free space optical communications in the presence of atmospheric turbulence. Appl Opt 2020;59:10283. https://doi.org/10.1364/ao.405152.Search in Google Scholar

9. Al-Saidi, NM, Ali, MH, Al-Azzawi, WKH, Abass, AK. Secure optical communication using a new 5D chaotic stream segmentation. Int J Sustain Dev Plann 2022;17:1553–60. https://doi.org/10.18280/ijsdp.170519.Search in Google Scholar

10. Radhi, SS, Hussien, RA, Abdulla, EN, Abass, AK, Rashid, FF. Design a secure TWDM-PON via the hill cipher algorithm. Opt. Contin. 2025;4:1051–64. https://doi.org/10.1364/optcon.558674.Search in Google Scholar

11. Mushatet, AF, Fadil, EA, Abdulla, EN. High bit rate secure FSO system utilizing hill coding. J. Opt. Commun 2025:1–14. https://doi.org/10.1515/joc-2025-0147.Search in Google Scholar

12. Fadil, EA, Tahhan, SR, Rashid, FF, Abass, AK, Salman, LA, Abdulla, EN, et al.. Design and performance analysis of optical communication system utilizing optical chaos. J Opt 2024;53:2435–40. https://doi.org/10.1007/s12596-023-01401-9.Search in Google Scholar

13. Mohammed, SH, Ali, MH, Abass, AK, Al-Azzawi, WK. Design and implementation of cipher algorithm based secure optical communication system. Opt Quant Electron 2023;55:86. https://doi.org/10.1007/s11082-022-04354-8.Search in Google Scholar

14. Mousa, E, Abdulla, EN, Adnan, SA. Enhancing network security based on 10G-EPON with the use of the hill cipher algorithm. J Opt Commun 2025;1–13.10.1515/joc-2025-0201Search in Google Scholar

15. M Kumari, V Arya, HMR Al-Khafaji. Wheel-Based MDM-PON System Incorporating OCDMA for secure network resiliency. Photonics 2023;10.10.3390/photonics10030329Search in Google Scholar

16. Hussien, RA, Radhi, SS, Rashid, FF, Abdulla, EN, Abass, AK. Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm. Results Opt 2024;16. https://doi.org/10.1016/j.rio.2024.100708.Search in Google Scholar

17. Ridha, FF, Abdulla, EN, Abdulhadi, AH. Machine learning based on raw ensemble predictions scheme for TWDM -PON. J Opt Commun 2025. https://doi.org/10.1515/joc-2025-0373.Search in Google Scholar

18. Gambhir, M, Shenvi, N. Performance analysis of hybrid WDM-TDM passive optical network ( PON ) and TDM NG-PON. Int J Eng Tech.Res 2015;3:287–9.Search in Google Scholar

19. Kaler, R, Teotia, P, Kaler, RS. Simulation of FTTH at 10 Gbit/s for 8 OTU by GE-PON architecture. Opt Int J Light Electron Opt 2011;122:1985–9. https://doi.org/10.1016/j.ijleo.2010.12.015.Search in Google Scholar

20. Musadaq, R, Abdulwahid, SN, Abd Alwahed, NN, Abdulla, EN. Security analysis of an image encryption algorithm based on blowfish in GPON. J Opt Commun 2025;32–34.10.1515/joc-2025-0109Search in Google Scholar

21. Mohammed, SH, Abass, AK, Ali, MH, Rashid, FF. Design and simulation of secure fiber optic communication system utilizing hill cipher algorithm. J Opt 2023;53:1499–507. https://doi.org/10.1007/s12596-023-01313-8.Search in Google Scholar

22. Systems, D. ITU-T; 2020:2 p.Search in Google Scholar

23. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/ Gb/s TWDM PON with supported transmission method utilizing FBG and DML. J Opt Commun 2022;45:s611–18. https://doi.org/10.1515/joc-2022-0225.Search in Google Scholar

24. Abdulla, EN, Safa Salam Radhi, FFR, Hussien, MMSRA, Abass*, AK, Fadil, AEA. Security improvement for TWDM-PON utilizing blowfish cryptography. Appl Opt 2024;63.10.1364/AO.537254Search in Google Scholar

25. Wang, X, Zhu, X, Wu, X, Zhang, Y. Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Laser Eng 2018;107:370–9. https://doi.org/10.1016/j.optlaseng.2017.06.015.Search in Google Scholar

26. Chen, J, Zhang, Y, Qi, L, Fu, C, Xu, L. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 2018;99:238–48. https://doi.org/10.1016/j.optlastec.2017.09.008.Search in Google Scholar

27. Wu, X, Wang, K, Wang, X, Kan, H, Kurths, J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 2018;148:272–87. https://doi.org/10.1016/j.sigpro.2018.02.028.Search in Google Scholar

28. xin Chen, J, liang Zhu, Z, Fu, C, Yu, H, bo Zhang, L. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul2015;20:846–60. https://doi.org/10.1016/j.cnsns.2014.06.032.Search in Google Scholar

29. Guesmi, R, Farah, MAB, Kachouri, A, Samet, M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 2016;83:1123–36. https://doi.org/10.1007/s11071-015-2392-7.Search in Google Scholar

30. Isaac, E, Chikweru, E. Test for significance of pearson ’ s correlation coefficient (r). Int. J. Innov. Math. Stat. Energy Policies 2018;6:11–23.Search in Google Scholar

31. Wang, X, Su, Y, Zhang, H, Zou, C. A new hybrid image encryption algorithm based on gray code transformation and snake-like diffusion. Vis Comput 2022;38:3831–52. https://doi.org/10.1007/s00371-021-02224-0.Search in Google Scholar

32. Hu, G, Xiao, D, Wang, Y, Xiang, T. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image Represent 2017;44:116–27. https://doi.org/10.1016/j.jvcir.2017.01.022.Search in Google Scholar

33. Luo, Y, Lin, J, Liu, J, Wei, D, Cao, L, Zhou, R, et al.. A robust image encryption algorithm based on Chua’s circuit and compressive sensing. Signal Process 2019;161:227–47. https://doi.org/10.1016/j.sigpro.2019.03.022.Search in Google Scholar

34. Ponuma, R, Amutha, R. Compressive sensing based image compression-encryption using novel 1D-Chaotic map. Multimed Tool Appl 2018;77:19209–34. https://doi.org/10.1007/s11042-017-5378-2.Search in Google Scholar

35. Abdellaoui, Z, Dieudonne, Y, Aleya, A. Design, implementation and evaluation of a fiber to the home (FTTH) access network based on a giga passive optical network GPON. Array 2021;10. https://doi.org/10.1016/j.array.2021.100058.Search in Google Scholar

36. Awalia, W, Pantjawati, AB. Performance simulation of fiber to the home (FTTH) devices based on optisystem. IOP Conf Ser Mater Sci Eng 2018;384. https://doi.org/10.1088/1757-899x/384/1/012051.Search in Google Scholar

37. Zhang, W, Zhang, C, Jin, W, Chen, C, Jiang, N, Qiu, K, et al.. Chaos coding-based QAM IQ-encryption for improved security in OFDMA-PON. IEEE Photonics Technol Lett 2014;26:1964–7. https://doi.org/10.1109/lpt.2014.2343616.Search in Google Scholar

38. Kherici, C, Kandouci, M. Performance study of a coexistence system in a PON network taking into account the stimulated scattering of raman. In: 10th International Conference on Innovation, Modern Applied Science & Environmental Studies (ICIES’2022). Tangier, Morocco: EDP Sciences; 2022, vol 351:4–8 pp.10.1051/e3sconf/202235101088Search in Google Scholar

39. Kaur, R, Singh, S. Polarization multiplexing and hybrid modulation based bandwidth efficient NG-PON2 coexisting with GPON and XG-PON. J Opt Technol 2021;88:196. https://doi.org/10.1364/jot.88.000196.Search in Google Scholar

40. Tang, R, Liu, B, Mao, Y, Ullah, R, Ren, J, Xu, X, et al.. High security OFDM-PON based on an iterative cascading chaotic model and 4-D joint encryption. Opt Commun 2021;495. https://doi.org/10.1016/j.optcom.2021.127055.Search in Google Scholar

41. Chen, Y, Zhang, C, Cui, M, Luo, Y, Wu, T, Liang, X, et al.. Joint compressed sensing and JPEG coding based secure compression scheme in OFDM-PON. Opt Commun 2022;510. https://doi.org/10.1016/j.optcom.2022.127901.Search in Google Scholar

Received: 2025-12-02
Accepted: 2026-01-10
Published Online: 2026-02-02

© 2026 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 30.1.2026 from https://www.degruyterbrill.com/document/doi/10.1515/joc-2025-0507/html
Scroll to top button