Abstract
Optical access network security concerns are increasingly urgent as the demands of important network functions have been significantly increased. This study evaluates gigabit passive optical networks (GPON) security and provides an innovative, resilient solution. In accordance with the International Telecommunication Union-Telecommunication (ITU-T) G.984.6 standard series, the approach allows for safe mutual authentication and establishment of keys between optical line termination (OLT) units and optical network units (ONUs) in an optical distribution network (ODN). The Blowfish cipher algorithm has been used in combination with the Opti-System software. Fiber to the home (FTTH), based on GPON technology, offers cost-effective triple-play services. Aside from the customer premises and central office, it operates entirely on passive equipment. Telecom operators support FTTH systems based on GPON because they are flexible in reacting to future technologies as well as services. A network with a maximum reach of 65 km can accommodate up to 64 users using secure GPON technology at a minimum acceptable quality factor of 6, a maximum BER level of about 10−9 and optimum reach between optical consecutive network terminals of 20 km in accordance with G.984.6 ITU-T requirements. GPON transmits 2.5 Gbps downstream (D/S) and 1.25 Gbps upstream (U/S) data transmission with a minimum allowable receiving sensitivity of −35.8 dBm for uplink and −34.3 dBm for downlink has been achieved.
-
Research ethics: “The local Institutional Review Board deemed the study exempt from review” if the IRB specifically exempted the study from review.
-
Informed consent: Not applicable.
-
Author contributions: The authors have accepted responsibility for the entire content of this manuscript and approved its submission.
-
Use of Large Language Models, AI and Machine Learning Tools: None declared.
-
Conflict of interest: The authors state no conflict of interest.
-
Research funding: None declared.
-
Data availability: Not applicable.
References
1. Tang, R, Liu, B, Mao, Y, Ullah, R, Ren, J, Xu, X, et al.. High security OFDM-PON based on an iterative cascading chaotic model and 4-D joint encryption. Opt Commun 2021;495. https://doi.org/10.1016/j.optcom.2021.127055.Search in Google Scholar
2. Bindhaiq, S, Zulkifli, N, Supa’at, AM, Idrus, SM, Salleh, MS. 128 Gb/s TWDM PON system using dispersion-supported transmission method. Opt Fiber Technol 2017;38:87–97. https://doi.org/10.1016/j.yofte.2017.08.006.Search in Google Scholar
3. ITU-T G.984.6. Gigabit-capable passive optical networks (GPON): reach extension. ITU-T G-Series Recomm 2008;3:1–32.Search in Google Scholar
4. Abdellaoui, Z, Dieudonne, Y, Aleya, A. Design, implementation and evaluation of a fiber to the home (FTTH) access network based on a giga passive optical network GPON. Array 2021;10:100058. https://doi.org/10.1016/j.array.2021.100058.Search in Google Scholar
5. Abdulla, EN, Hussien, RA, Rashid, FF, Abdulkafi, AA, Abass, AK, Saleh, MA. Design and performance analysis of symmetrical 160 Gbps TWDM-PON utilizing bidirectional configuration. J Opt 2023. https://doi.org/10.1007/s12596-023-01263-1.Search in Google Scholar
6. Al-Saidi, NM, Ali, MH, Al-Azzawi, WKH, Abass, AK. Secure optical communication using a new 5D chaotic stream segmentation. Int J Sustain Dev Plann 2022;17:1553–60. https://doi.org/10.18280/ijsdp.170519.Search in Google Scholar
7. Mohammed, SH, Abass, AK, Ali, MH, Rashid, FF. Design and simulation of secure fiber optic communication system utilizing hill cipher algorithm. J Opt 2023. https://doi.org/10.1007/s12596-023-01313-8.Search in Google Scholar
8. Fadil, EA, Abass, AK, Tahhan, SR. Secure WDM-free space optical communication system based optical chaotic. Opt Quant Electron 2022;54:477. https://doi.org/10.1007/s11082-022-03870-x.Search in Google Scholar
9. Fadil, EA, Abass, AK, Tahhan, SR. Design and simulation of optical chaotic-based secure hybrid optical communication system. J Opt 2023;52:1887–96. https://doi.org/10.1007/s12596-023-01143-8.Search in Google Scholar
10. Mohammed, SH, Ali, MH, Abass, AK, Al-Azzawi, WK. Design and implementation of cipher algorithm based secure optical communication system. Opt Quant Electron 2023;55. https://doi.org/10.1007/s11082-022-04354-8.Search in Google Scholar
11. Zhang, L, Xin, X, Liu, B, Yin, X. Physical secure enhancement in optical OFDMA-PON based on two-dimensional scrambling. Eur Conf Opt Commun ECOC 2012;20:32–7. https://doi.org/10.1364/oe.20.000b32.Search in Google Scholar
12. Kumari, M, Arya, V, Al-Khafaji, HMR. Wheel-based MDM-PON system incorporating OCDMA for secure network resiliency. Photonics 2023;10. https://doi.org/10.3390/photonics10030329.Search in Google Scholar
13. Hussien, RA, Radhi, SS, Rashid, FF, Abdulla, EN, Abass, AK. Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm. Results Opt 2024;16:100708. https://doi.org/10.1016/j.rio.2024.100708.Search in Google Scholar
14. Chowdary, CL, Nallamothu, P, Reddy, MC, Vijay, B. Comparative study on blowfish and twofish algorithms for image encryption and decryption. Int Res J Eng Technol 2020:941–5.Search in Google Scholar
15. Abdulla, EN, Radhi, SS, Rashid, FF, Hussien, RA, Salih, MM, Abass, AK, et al.. Security improvement for TWDM-PON utilizing blowfish cryptography. Appl Opt 2024;63. https://doi.org/10.1364/ao.537254.Search in Google Scholar
16. Chuan, NB, Premadi, A, Ab-rahman, MS, Jumari, K. Optical power budget and cost estimation for intelligent fiber-to-the-home (i-FTTH). IEEE 2010;978:4–10.Search in Google Scholar
17. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/80 Gb/s TWDM PON with supported transmission method utilizing FBG and DML. J Opt Commun 2022:8–12.10.1515/joc-2022-0225Search in Google Scholar
18. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/80 Gbps TWDM PON utilizing dispersion compensation technique. J Opt 2022. https://doi.org/10.1007/s12596-022-00991-0.Search in Google Scholar
19. Wang, X, Zhu, X, Wu, X, Zhang, Y. Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Laser Eng 2018;107:370–9. https://doi.org/10.1016/j.optlaseng.2017.06.015.Search in Google Scholar
20. Chen, J, Zhang, Y, Qi, L, Fu, C, Xu, L. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 2018;99:238–48. https://doi.org/10.1016/j.optlastec.2017.09.008.Search in Google Scholar
21. Wu, X, Wang, K, Wang, X, Kan, H, Kurths, J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 2018;148:272–87. https://doi.org/10.1016/j.sigpro.2018.02.028.Search in Google Scholar
22. xin Chen, J, liang Zhu, Z, Fu, C, Yu, H, bo Zhang, L. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 2015;20:846–60. https://doi.org/10.1016/j.cnsns.2014.06.032.Search in Google Scholar
23. Guesmi, R, Farah, MAB, Kachouri, A, Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 2016;83:1123–36. https://doi.org/10.1007/s11071-015-2392-7.Search in Google Scholar
24. Souyah, A, Faraoun, KM. An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 2016;86:639–53. https://doi.org/10.1007/s11071-016-2912-0.Search in Google Scholar
25. Singh, P, Yadav, AK, Singh, K. Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Laser Eng 2017;91:187–95. https://doi.org/10.1016/j.optlaseng.2016.11.022.Search in Google Scholar
26. Faragallah, OS, Alzain, MA, El-Sayed, HS, Al-Amri, JF, El-Shafai, W, Afifi, A, et al.. Block-based optical color image encryption based on double random phase encoding. IEEE Access 2019;7:4184–94. https://doi.org/10.1109/access.2018.2879857.Search in Google Scholar
27. Jain, R, Sharma, JB. Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map. In: 2016 IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol. RTEICT 2016 - Proc. India: IEEE International Conference On Recent Trends In Electronics Information Communication Technology; 2017:1835–40 pp.10.1109/RTEICT.2016.7808152Search in Google Scholar
28. Zhou, N, Zhang, A, Zheng, F, Gong, L. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 2014;62:152–60. https://doi.org/10.1016/j.optlastec.2014.02.015.Search in Google Scholar
29. Luo, Y, Lin, J, Liu, J, Wei, D, Cao, L, Zhou, R, et al.. A robust image encryption algorithm based on Chua’s circuit and compressive sensing. Signal Process 2019;161:227–47. https://doi.org/10.1016/j.sigpro.2019.03.022.Search in Google Scholar
30. Zhou, N, Li, H, Wang, D, Pan, S, Zhou, Z. Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 2015;343:10–21. https://doi.org/10.1016/j.optcom.2014.12.084.Search in Google Scholar
31. Liu, Y, Wang, J, Fan, J, Gong, L. Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimed Tool Appl 2016;75:4363–82. https://doi.org/10.1007/s11042-015-2479-7.Search in Google Scholar
32. Ponuma, R, Amutha, R. Compressive sensing based image compression-encryption using Novel 1D-Chaotic map. Multimed Tool Appl 2018;77:19209–34. https://doi.org/10.1007/s11042-017-5378-2.Search in Google Scholar
33. Li, A, Belazi, A, Kharbech, S, Talha, M, Xiang, W. Fourth order MCA and chaos-based image encryption scheme. IEEE Access 2019;7:66395–409. https://doi.org/10.1109/access.2019.2911559.Search in Google Scholar
34. Wang, X, Su, Y, Zhang, H, Zou, C. A new hybrid image encryption algorithm based on Gray code transformation and snake-like diffusion. Vis Comput 2022;38:3831–52. https://doi.org/10.1007/s00371-021-02224-0.Search in Google Scholar
35. Hu, G, Xiao, D, Wang, Y, Xiang, T. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image Represent 2017;44:116–27. https://doi.org/10.1016/j.jvcir.2017.01.022.Search in Google Scholar
36. ur Rehman, A, Liao, X, Kulsoom, A, Abbas, SA. Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tool Appl 2015;74:4655–77. https://doi.org/10.1007/s11042-013-1828-7.Search in Google Scholar
37. Awalia, W, Pantjawati, AB. Performance simulation of fiber to the home (FTTH) devices based on optisystem. IOP Conf Ser Mater Sci Eng 2018;384. https://doi.org/10.1088/1757-899x/384/1/012051.Search in Google Scholar
38. Kherici, C, Kandouci, M. Performance study of a coexistence system in a PON network taking into account the stimulated scattering of Raman. In: 10th International Conference on Innovation, Modern Applied Science & Environmental Studies (ICIES’2022). Turkey: International Conference on Innovation, Modern Applied Science & Environmental Studies; 2022, 351:4–8 pp.10.1051/e3sconf/202235101088Search in Google Scholar
39. Kaur, R, Singh, S. Polarization multiplexing and hybrid modulation based bandwidth efficient NG-PON2 coexisting with GPON and XG-PON. J Opt Technol 2021;88:196. https://doi.org/10.1364/jot.88.000196.Search in Google Scholar
© 2025 Walter de Gruyter GmbH, Berlin/Boston