Home Security and network performance analysis of coexistence TWDM – NG-PON2, GPON and 10G-EPON systems based on Hill Cipher
Article
Licensed
Unlicensed Requires Authentication

Security and network performance analysis of coexistence TWDM – NG-PON2, GPON and 10G-EPON systems based on Hill Cipher

  • Alaa Hussein Ali , Essam N. Abdulla EMAIL logo and Razi J. Al-Azawi
Published/Copyright: November 17, 2025
Become an author with De Gruyter Brill

Abstract

The challenges of operating legacy, security-related, and future network technologies simultaneously in point-to-point topologies and passive optical networks (PONs) are discussed in this study. We investigate the problems of coexistence for many types of users, such as home, business, industrial, and mobile users. Future access networks will have to support several technologies at once. In order to solve this issue, our paper demonstrates how time and wavelength division multiplexing next-generation PON2 (TWDM-NG-PON2), gigabit passive optical network (GPON), and 10 Gbps Ethernet passive optical networks (10G-EPON) may use triple coexistence multi-PON modules to coexist on the same optical distribution network for deploying of fiber-to-the-X (FTTX) network access. A grayscale image is encrypted at 2*20 Gbps for TWDM-NG-PON2, 2.5 Gbps for GPON and 10 Gbps for 10G-EPON, for a total capacity of symmetric 52.5 Gbps. According to simulation studies, a bidirectional distance fiber with a ratio of splitting 1:112 can be successfully implemented at 40 km. The downstream and upstream receiver sensitivity demonstrated is −24.8, −27.8, −28.6 dB m and −26.8, −23.8, −28.6 dBm for TWDM-NG-PON2, GPON and 10G-EPON, respectively. High security, high capacity, and a sophisticated long-distance networking that delivers efficient usage source and strengthened authenticity network are all provided by the suggested algorithm in coexistence PON.


Corresponding author: Essam N. Abdulla, Optoelectronics Engineering Department, Laser and Optoelectronics College, University of Technology–Iraq, Baghdad, 10021, Iraq, E-mail:

Acknowledgements

This research was supported by Al-bayan University. We thank our colleagues who provided insight and expertise that greatly assisted the research.

  1. Research ethics: The local Institutional Review Board deemed the study exempt from review if the IRB specifically exempted the study from review.

  2. Informed consent: Informed consent was obtained from all individuals included in this study, or their legal guardians or wards.

  3. Author contributions: The authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: The authors state no conflict of interest.

  6. Research funding: None declared.

  7. Data availability: Not applicable.

References

1. Kamil, RA, Alsabti, SMB, Abdulsattar, RK, Mohammed, AH, Elwi, TA. On the enhancement anomaly detection for RF bio-sensors by computing artificial networks using machine learning techniques. Infocommunications J. 2025;17:89–95. https://doi.org/10.36244/icj.2025.2.11.Search in Google Scholar

2. Pagare, RA, Kumar, S, Mishra, A. Design and investigation of N1-class next-generation passive optical network-2 (NG-PON2) coexistence architecture in the presence of Kerr effect and four-wave mixing (FWM) for fiber to the home (FTTX) access networks. J Opt Commun 2021;2:1–20. https://doi.org/10.1515/joc-2020-0299.Search in Google Scholar

3. Lu, HH, Li, CY, Huang, XH, Lin, CJ, De Lin, R, Lin, YS, et al.. A combined fibre/free-space-optical communication system for long-haul wireline/wireless transmission at millimetre-wave/sub-THz frequencies. Commun Eng 2023;2:1–8. https://doi.org/10.1038/s44172-023-00068-1.Search in Google Scholar

4. Bindhaiq, S, Zulkifli, N, Supa’at, AM, Idrus, SM, Salleh, MS. 128 Gb/s TWDM PON system using dispersion-supported transmission method. Opt Fiber Technol 2017;38:87–97. https://doi.org/10.1016/j.yofte.2017.08.006.Search in Google Scholar

5. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/80 Gb/s TWDM PON with supported transmission method utilizing FBG and DML. J Opt Commun 2022;8–12.10.1515/joc-2022-0225Search in Google Scholar

6. Abdulla, EN, Abass, AK, Abdulkafi, AA. Asymmetric 160/80 Gbps TWDM PON utilizing dispersion compensation technique. J Opt 2022. https://doi.org/10.1007/s12596-022-00991-0.Search in Google Scholar

7. Abdulla, EN, Hussien, RA, Rashid, FF, Abdulkafi, AA, Abass, AK, Saleh, MA. Design and performance analysis of symmetrical 160 gbps TWDM-PON utilizing bidirectional configuration. J Opt 2023. https://doi.org/10.1007/s12596-023-01263-1.Search in Google Scholar

8. Al-Saidi, NM, Ali, MH, Al-Azzawi, WKH, Abass, AK. Secure optical communication using a new 5D chaotic stream segmentation. Int. J. Sustain. Dev. Plan. 2022;17:1553–60. https://doi.org/10.18280/ijsdp.170519.Search in Google Scholar

9. Radhi, SS, Hussien, RA, Abdulla, EN, Abass, AK, Rashid, FF. Design a secure TWDM-PON via the Hill Cipher algorithm. Opt. Contin. 2025;4:1051–64. https://doi.org/10.1364/optcon.558674.Search in Google Scholar

10. Mushatet, AF, Fadil, EA, Abdulla, EN. High bit rate secure FSO system utilizing Hill coding. J Opt Commun 2025;0147:1–14. https://doi.org/10.1515/joc-2025-0147.Search in Google Scholar

11. Fadil, EA, Tahhan, SR, Rashid, FF, Abass, AK, Salman, LA, Abdulla, EN, et al.. Design and performance analysis of optical communication system utilizing optical chaos. J Opt 2024;53:2435–40. https://doi.org/10.1007/s12596-023-01401-9.Search in Google Scholar

12. Mohammed, SH, Ali, MH, Abass, AK, Al-Azzawi, WK. Design and implementation of cipher algorithm based secure optical communication system. Opt. Quantum Electron. 2023;55:86. https://doi.org/10.1007/s11082-022-04354-8.Search in Google Scholar

13. Mousa, E, Abdulla, EN, Adnan, SA. Enhancing network security based on 10G-EPON with the use of the Hill Cipher algorithm. J Opt Commun 2025;1–13.10.1515/joc-2025-0201Search in Google Scholar

14. Baraa, SM, Desa, H, Mohammed, KS, Al-Malaisi, TA, Hussain, AST, Majdi, HS. Selective harmonic elimination in reduced-switch multilevel inverters for PV systems using the sparrow search algorithm. J. Robot. Control 2025;6:385–95.Search in Google Scholar

15. Kumari, M, Arya, V, Al-Khafaji, HMR. Wheel-based MDM-PON system incorporating OCDMA for secure network resiliency. Photonics 2023;10. https://doi.org/10.3390/photonics10030329.Search in Google Scholar

16. Hussien, RA, Radhi, SS, Rashid, FF, Abdulla, EN, Abass, AK. Design and performance analysis of secure optical communication system by implementing blowfish Cipher algorithm. Results Opt 2024;16:100708. https://doi.org/10.1016/j.rio.2024.100708.Search in Google Scholar

17. Musadaq, R, Abdulwahid, SN, Abd Alwahed, NN, Abdulla, EN. Security analysis of an image encryption algorithm based on blowfish in GPON. J Opt Commun 2025;32–34.10.1515/joc-2025-0109Search in Google Scholar

18. Pagare, RA, Kumar, S, Mishra, A. Seven-channel 1 Gbps TWDM coexistence architecture supporting 65 Gbps optical link for next-generation passive optical network 2-based FTTX access networks. J Opt Commun 2020;1–14.10.1515/joc-2020-0078Search in Google Scholar

19. D Systems, “ITU-T,” 2, (2020).Search in Google Scholar

20. ITU-T G.984.6. Gigabit-capable passive optical networks (GPON): reach extension. ITU-T G-Series Recomm 2008;3:1–32.Search in Google Scholar

21. Tanaka, K, Agata, A, Horiuchi, Y. IEEE 802.3av 10G-EPON standardization and its research and development status. J. Light. Technol. 2010;28:651–61. https://doi.org/10.1109/jlt.2009.2038722.Search in Google Scholar

22. Abdulla, EN, Radhi, SS, Rashid, FF, Hussein, RA, Salih, MM, Abbas, AK, et al.. Security improvement for TWDM-PON utilizing blowfish cryptography. Appl Opt 2024;63. https://doi.org/10.1364/ao.537254.Search in Google Scholar

23. Wang, X, Zhu, X, Wu, X, Zhang, Y. Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt. Lasers Eng. 2018;107:370–9. https://doi.org/10.1016/j.optlaseng.2017.06.015.Search in Google Scholar

24. Chen, J, Zhang, Y, Qi, L, Fu, C, Xu, L. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 2018;99:238–48. https://doi.org/10.1016/j.optlastec.2017.09.008.Search in Google Scholar

25. Wu, X, Wang, K, Wang, X, Kan, H, Kurths, J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 2018;148:272–87. https://doi.org/10.1016/j.sigpro.2018.02.028.Search in Google Scholar

26. xin Chen, J, liang Zhu, Z, Fu, C, Yu, H, bo Zhang, L. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 2015;20:846–60. https://doi.org/10.1016/j.cnsns.2014.06.032.Search in Google Scholar

27. Guesmi, R, Farah, MAB, Kachouri, A, Samet, M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 2016;83:1123–36. https://doi.org/10.1007/s11071-015-2392-7.Search in Google Scholar

28. Abdellaoui, Z, Dieudonne, Y, Aleya, A. Design, implementation and evaluation of a fiber to the home (FTTH) access network based on a giga passive optical network GPON. Array 2021;10:100058. https://doi.org/10.1016/j.array.2021.100058.Search in Google Scholar

29. Awalia, W, Pantjawati, AB. Performance simulation of fiber to the home (FTTH) devices based on optisystem. IOP Conf Ser Mater Sci Eng 2018;384. https://doi.org/10.1088/1757-899x/384/1/012051.Search in Google Scholar

30. Kherici, C, Kandouci, M. Performance study of a coexistence system in a PON network taking into account the stimulated scattering of Raman. In: 10th International conference on innovation, modern applied science & environmental studies (ICIES’2022); 2022, vol 351:4–8 pp.10.1051/e3sconf/202235101088Search in Google Scholar

31. Kaur, R, Singh, S. Polarization multiplexing and hybrid modulation based bandwidth efficient NG-PON2 coexisting with GPON and XG-PON. J Opt Technol 2021;88:196. https://doi.org/10.1364/jot.88.000196.Search in Google Scholar

Received: 2025-10-01
Accepted: 2025-10-20
Published Online: 2025-11-17

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 18.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/joc-2025-0435/pdf
Scroll to top button