Physical-Layer Security for Coherent Communications System
20200162172 ยท 2020-05-21
Inventors
- Balakrishnan Sridhar (Ellicott City, MD)
- John P. Mateosky (West River, MD)
- Michael Y. Frankel (Bethesda, MD)
Cpc classification
H04L27/3836
ELECTRICITY
H04B10/6162
ELECTRICITY
H04L27/362
ELECTRICITY
H04B10/85
ELECTRICITY
H04L2209/34
ELECTRICITY
International classification
H04B10/85
ELECTRICITY
H04L1/00
ELECTRICITY
Abstract
Physical-layer security is provided by obfuscating or concealing the structure of the signal being transmitted, such that recovery of the underlying information is prohibitively expensive or even impossible. A digital filter implemented within a digital signal processor at the transmitter device introduces an obfuscation function. A digital filter implemented within a digital signal processor at the receiver device removes the obfuscation function. The obfuscation function conceals information bits to be conveyed by a modulated carrier signal. In some versions, the obfuscation function digitally modifies the phases of individual frequency components of the drive signals used to generate the modulated carrier signal. In other versions, the obfuscation function digitally modifies the phases and amplitudes of individual frequency components of the drive signals used to generate the modulated carrier signal.
Claims
1. A method for concealing information conveyed by a modulated carrier signal from a transmitter device to a coherent receiver device, the method comprising: at the transmitter device using a transmitter digital signal processor (DSP) to generate digital drive signals from information bits, including selecting symbols of a discrete data constellation and using a digital filter implemented in the transmitter DSP to introduce pseudo-random deterministic changes in phase or both phase and amplitude into the digital drive signals such that the discrete data constellation is remapped into a continuous signal without identifiable constellation points; converting the digital drive signals to respective analog drive signals; driving one or more modulators with the analog drive signals to modulate a carrier signal or components of the carrier signal thereby producing the modulated carrier signal; and transmitting the modulated carrier signal; and at the receiver device receiving a distorted version of the modulated carrier signal; determining analog received signals from the distorted version of the modulated carrier signal; converting the analog received signals to respective digital received signals; and using a receiver DSP to process the digital received signals to yield recovered bits, including using a digital filter implemented in the receiver DSP to remove the pseudo-random deterministic changes from the digital received signals.
2. The method as recited in claim 1, wherein the pseudo-random deterministic changes are a function of a key.
3. The method as recited in claim 1, wherein the discrete data constellation is a non-binary constellation.
4. The method as recited in claim 1, wherein the digital filter implemented in the transmitter DSP applies pre-compensation of a physical-layer impairment.
5. The method as recited in claim 1, wherein the digital filter implemented in the receiver DSP applies post-compensation of a physical-layer impairment.
6. The method as recited in claim 1, wherein a deterministic change in amplitude is determined at least in part by available margin.
7. The method as recited in claim 1, wherein functionality of the transmitter DSP includes probabilistic constellation shaping and functionality of the receiver DSP includes inverse probabilistic constellation shaping.
8. The method as recited in claim 1, wherein functionality of the transmitter DSP includes scrambling and functionality of the receiver DSP includes descrambling.
9. A transmitter device comprising: a digital signal processor (DSP) operative to generate digital drive signals from information bits, the DSP operative to select symbols of a discrete data constellation and to use a digital filter implemented in the DSP to introduce pseudo-random deterministic changes in phase or both phase and amplitude into the digital drive signals such that the discrete data constellation is remapped into a continuous signal without identifiable constellation points; digital-to-analog converters operative to convert the digital drive signals to respective analog drive signals; and one or more modulators operative to modulate a carrier signal or components of the carrier signal with the analog drive signals to produce a modulated carrier signal that conveys the information bits.
10. The transmitter device as recited in claim 9, wherein the pseudo-random deterministic changes are a function of a key.
11. The transmitter device as recited in claim 9, wherein the discrete data constellation is a non-binary constellation.
12. The transmitter device as recited in claim 9, wherein the digital filter implemented in the DSP is operative to apply pre-compensation of a physical-layer impairment.
13. The transmitter device as recited in claim 9, wherein functionality of the DSP includes forward error correction (FEC) encoding.
14. The transmitter device as recited in claim 9, wherein functionality of the DSP includes probabilistic constellation shaping.
15. A coherent receiver device comprising: a mixer and down-conversion module operative to mix a received modulated carrier signal with a local version of an unmodulated carrier signal and operative to output analog received signals; analog-to-digital converters operative to convert the analog received signals to respective digital received signals, wherein the digital received signals are indistinguishable from random noise; and a digital signal processor (DSP) operative to process the digital received signals to yield recovered bits, the DSP operative to use a digital filter implemented in the DSP to remove pseudo-random deterministic changes in phase or both phase and amplitude from the digital received signals.
16. The coherent receiver device as recited in claim 15, wherein the pseudo-random deterministic changes are a function of a key.
17. The coherent receiver device as recited in claim 15, wherein the DSP is operative to de-map symbols of a non-binary constellation to forward error correction (FEC) encoded bits.
18. The coherent receiver device as recited in claim 15, wherein the digital filter implemented in the DSP applies post-compensation of a physical-layer impairment.
19. The coherent receiver device as recited in claim 15, wherein functionality of the DSP includes forward error correction (FEC) decoding and error correction.
20. The coherent receiver device as recited in claim 15, wherein functionality of the DSP includes inverse probabilistic constellation shaping.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
DETAILED DESCRIPTION
[0018]
[0019] A transmitter device 14 (transmitter 14) in the example coherent communications system 10 modulates the carrier signal 12 to produce a modulated carrier signal 16. A digital signal processor (DSP) 18 in the transmitter 14 generates in-phase (I) digital drive signals 22 and quadrature (Q) digital drive signals 24 from information bits 26. Digital-to-analog converters 28 convert the I/Q digital drive signals 22, 24 into respective I/Q analog drive signals 32, 34. The I/Q analog drive signals 32, 34 drive one or more I-Q modulators 36 that modulate the carrier signal 12 to produce the modulated carrier signal 16. The modulated carrier signal 16, which conveys the information bits 26, is then transmitted on a link 38. For simplicity, additional components of the transmitter 14 such as amplifiers are not illustrated or discussed in this document.
[0020] The information bits 26 to be conveyed by the modulated carrier signal 16 do not necessarily have any particular underlying spectral structure. The information bits 26 may be completely arbitrary. The information bits 26 may be encrypted data bits resulting from the application of conventional encryption techniques (with or without built-in authentication).
[0021] A rogue coherent receiver (not shown) coupled to the link 38 may obtain a copy of the modulated carrier signal 16 for the purpose of determining the information bits 26. Even in cases where the information bits 26 are encrypted data bits resulting from the application of conventional encryption techniques (with or without built-in authentication), the copy of the modulated carrier signal may be vulnerable to offline brute force methods without further levels of protection as proposed in this document.
[0022] The transmitter DSP 18 is digital hardware 20 supported by software/firmware stored in a memory (not shown). Examples of the functionality implemented by the transmitter DSP 18 are illustrated in
[0023] In the example illustrated in
[0024] In the example illustrated in
[0025] In the example illustrated in
[0026] In the example illustrated in
[0027] Returning now to
[0028] In an ideal coherent communications system 10, the recovered bits 76 are identical to the information bits 26. In practice, however, impairments in the transmitter 14, the link 38, and the receiver 54 cause errors in the recovered bits 76.
[0029] The receiver DSP 78 is digital hardware 80 supported by software/firmware stored in a memory (not shown). Examples of the functionality implemented by the receiver DSP 78 are illustrated in
[0030] In the example illustrated in
[0031] In the example illustrated in
[0032] In the example illustrated in
[0033] In the example illustrated in
[0034] Assuming the bits to be mapped to symbols of a constellation have no particular underlying structure, each one of the M symbols of the constellation has the same visitation probability equal to 1/M. Probabilistic constellation shaping (PCS) is a technique that allows control over the visitation probabilities of different constellation symbols, yielding unequal visitation probabilities. PCS allows the number of bits per symbol (sometimes referred to as the capacity or the spectral efficiency) to be varied in a (nearly) continuous manner without requiring support for multiple discrete constellations to be implemented. When the probability distribution of the visitation probabilities is Gaussian, PCS improves the linear noise tolerance relative to standard modulation. Various PCS implementations are known in the art, including, for example, the implementations described in U.S. Pat. No. 9,698,939. Development of new PCS implementations is ongoing.
[0035] Scrambling 48 and descrambling 94 may employ a linear feedback shift register (LFSR), for example, as described in J. Cho et al., Experimental demonstration of physical-layer security in a fiber-optic link by information scrambling, ECOC 2016. The background of this document explains that one limitation of the approach described in the ECOC 2016 article is that the eavesdropper is required to have marginally worse performance than the intended recipient, which is difficult to assure in a link where there is a large SNR change between the transmitter and the receiver of the channel. In contrast, use of LFSR for scrambling 48 in the transmitter DSP 18 as illustrated in
[0036] In examples where the transmitter DSP 18 implements the functionality illustrated in
[0037] In examples where the transmitter DSP 18 implements the functionality illustrated in
[0038] In examples where the transmitter DSP 18 implements the functionality illustrated in
[0039] In examples where the transmitter DSP 18 implements the functionality illustrated in
[0040] The transmitter DSP 18 includes a digital filter 50 as part of the symbol processing 44, and the receiver DSP 78 includes a digital filter 100 as part of the symbol processing 86. The digital filters 50, 100 may both be implemented as a feed-forward filter, also known as a finite impulse response (FIR) filter. Alternatively, the digital filters 50, 100 may both be implemented as a feedback filter, also known as an infinite impulse response (IIR) filter.
[0041] This document proposes introducing an obfuscation function via the digital filter 50 at the transmitter 14 and removing the obfuscation function via the digital filter 100 at the receiver 54. The obfuscation function conceals the information bits 26 to be conveyed by the modulated carrier signal 16. In some versions, the obfuscation function digitally modifies the phases of individual frequency components of the drive signals used to generate the modulated carrier signal 16. In other versions, the obfuscation function digitally modifies the phases and amplitudes of individual frequency components of the drive signals used to generate the modulate carrier signal 16.
[0042] In the following discussion, the digital filters 50,100 are described in terms of their respective frequency-domain transfer functions. Equivalently, the digital filters 50,100 may be implemented in the time domain instead of in the frequency domain.
[0043] The digital filter 50 is characterized by its frequency-domain transfer function H.sub.TX(), and the digital filter 100 is characterized by its frequency-domain transfer function H.sub.RX(). An algorithm in the software/firmware of the transmitter DSP 18 determines the values of coefficients used by the digital filter 50, where the coefficients are a discrete representation of the frequency-domain transfer function H.sub.TX(). An algorithm in the software/firmware of the receiver DSP 78 determines the values of coefficients used by the digital filter 100, where the coefficients are a discrete representation of the frequency-domain transfer function H.sub.RX().
[0044] The digital filters 50, 100 may be designed for a purpose other than obfuscation and modified as proposed in this document to introduce and remove the obfuscation function, respectively. For example, the digital filter 100 may be designed to apply post-compensation of one or more impairments as expressed by a frequency-domain transfer function H.sub.POST(). For example, the digital filter 50 may be designed to apply pre-compensation of one or more impairments as expressed by a function H.sub.PRE(), or to apply calibration of various analog and/or RF components in the transmitter 14 as expressed by a function R(), or to apply pre-distortion, or any combination thereof. The analog and/or RF components may include, for example, one or more of analog-to-digital converters, digital-to-analog converters, and the like. Calibration settings are typically fixed in the factory and manifest as DC pedestal offsets and bias settings.
[0045] The techniques described in this document are applicable to a wide range of coherent communication systems, including, but not limited to, coherent radio-frequency wireless communication systems, and coherent optical communications systems.
[0046] In the case of a coherent radio-frequency wireless communications system, impairments may include physical-layer impairments such as multi-path fading.
[0047] In the case of a coherent optical communications system, impairments may include physical-layer impairments such as chromatic dispersion (CD) and polarization-mode dispersion (PMD), polarization-dependent loss (PDL), and passband narrowing due to filtering. Linear impairments such as polarization mode dispersion (PMD) and chromatic dispersion can be corrected completely using an adaptive linear equalizer if the magnitude of the impairment is within the compensating range of the coherent optical receiver. Other impairments, such as polarization-dependent loss (PDL), cannot be completely compensated.
[0048] Chromatic dispersion (CD) in an optical fiber impairs the transmitted waveform E.sub.TX() so that the received waveform E.sub.RX() is approximated by E.sub.RX()=E.sub.RX()exp( j .sub.2 D .sup.2), where j is the square root of 1, .sup.2 is the group velocity dispersion (GVD) parameter of the optical fiber, D is the length of the optical fiber, and is the modulation frequency component of the data signal. In the event that CD is handled entirely via an impairment pre-compensation algorithm used by the transmitter DSP 18, the frequency-domain transfer function that applies pre-compensation of CD may be expressed as H.sub.PRE()=exp(+ j .sub.2 D .sup.2), and the frequency-domain transfer function H.sub.POST() may be the unitary operator. In the event that CD is handled partially via an impairment pre-compensation algorithm used by the transmitter DSP 18 and partially via an impairment post-compensation algorithm used by the receiver DSP 78, the combined effect of H.sub.PRE() and H.sub.POST() may be expressed as
H.sub.PRE()*H.sub.POST()=exp(+j.sub.2 D.sup.2).
[0049] Alternatively, the digital filters 50, 100 may be designed specifically for introduction and removal of the obfuscation function, respectively.
[0050] In some versions, the obfuscation function digitally modifies the phases of individual frequency components of the drive signals used to generate the modulated carrier signal 16. For example, the frequency-domain transfer function that characterizes the digital filter 50 may be set to H.sub.TX()=H.sub.PRE()*R()*P() or to H.sub.TX()=H.sub.PRE()*P() or to H.sub.TX()=R()*P() or to H.sub.TX()=P(), where P() is a deterministic phase mapping. A pseudorandom phase mapping P() effectively remaps a discrete data constellation into a continuous signal without identifiable constellation points. Stated differently, the pseudorandom phase mapping P() ensures that the symbols to which the FEC-encoded bits were mapped cannot be identified from the digital drive signals 22, 24 that are output from the digital filter 50 without precise knowledge of the pseudorandom phase mapping.
[0051] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=H.sub.PRE()*R()*P(), applies pre-compensation of the impairment and calibration of analog and/or RF components and introduces deterministic phase mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0052] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=H.sub.PRE()*P(), applies pre-compensation of the impairment and introduces deterministic phase mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0053] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=R()*P(), applies calibration of analog and/or RF components and introduces deterministic phase mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0054] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=P(), introduces deterministic phase mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0055] The deterministic phase mapping P() introduced by the digital filter 50 does not destroy input signal information and is completely invertible. In the event that the frequency-domain transfer function that characterizes the digital filter 100 is set to H.sub.RX()=H.sub.POST()*P().sup.1 or to H.sub.RX()=P().sup.1, where P().sup.1 is the inverse of P(), the signal is hidden at the transmitter and recovered at the receiver without signal loss.
[0056] The digital filter 100, when characterized by the frequency-domain transfer function H.sub.RX()=H.sub.POST()*P().sup.1, applies post-compensation of the impairment and deterministic phase de-mapping to uncover the signal structure.
[0057] The digital filter 100, when characterized by the frequency-domain transfer function H.sub.RX()=P().sup.1, applies deterministic phase de-mapping to uncover the signal structure.
[0058] In other versions, the obfuscation function digitally modifies the phases and amplitudes of individual frequency components of the drive signals used to generate the modulated carrier signal 16. For example, the frequency-domain transfer function that characterizes the digital filter 50 may be set to H.sub.TX()=H.sub.PRE()*R()*P()*A() or to H.sub.TX()=H.sub.PRE()*P()*A() or to H.sub.TX()=R()*P()*A() or to H.sub.TX()=P()*A(), where P() is a deterministic phase mapping and A() is a deterministic amplitude mapping. A pseudorandom phase mapping P() effectively remaps a discrete data constellation into a continuous signal without identifiable constellation points. Stated differently, the pseudorandom phase mapping P() ensures that the symbols to which the FEC-encoded bits were mapped cannot be identified from the digital drive signals 22, 24 that are output from the digital filter 50 without precise knowledge of the pseudorandom phase mapping. The deterministic amplitude mapping may emulate noise, for example, additive Gaussian white noise (AWGN).
[0059] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=H.sub.PRE()*R()*P()*A(), applies pre-compensation of the impairment and calibration of analog and/or RF components and introduces deterministic phase mapping and deterministic amplitude mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0060] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=H.sub.PRE()*P()*A(), applies pre-compensation of the impairment and introduces deterministic phase mapping and deterministic amplitude mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0061] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=R()*P()*A(), applies calibration of analog and/or RF components and introduces deterministic phase mapping and deterministic amplitude mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0062] The digital filter 50, when characterized by the frequency-domain transfer function H.sub.TX()=P()*A(), introduces deterministic phase mapping and deterministic amplitude mapping to obscure the signal structure such that it is indistinguishable from random noise.
[0063] The deterministic phase mapping P() introduced by the digital filter 50 does not destroy input signal information and is completely invertible. However, the deterministic amplitude mapping A() introduced by the digital filter 50 leads to information loss of a magnitude that is related to A(). The deterministic amplitude mapping A() is only partially invertible by the intended recipient. It is not completely invertible, as it results in noise amplification at the receiver. In the event that the frequency-domain transfer function that characterizes the digital filter 100 is set to H.sub.RX()=H.sub.POST()*P().sup.1*A().sup.1 or to H.sub.RX()=P().sup.1*A().sup.1, where P().sup.1 is the inverse of P() and A().sup.1 is the partial inverse of A(), the signal structure is hidden at the transmitter and recovered at the receiver with some signal loss.
[0064] The digital filter 100, when characterized by the frequency-domain transfer function H.sub.RX()=H.sub.POST()*P().sup.1*A().sup.1 applies post-compensation of the impairment and deterministic phase de-mapping and deterministic amplitude de-mapping to uncover the signal structure.
[0065] The digital filter 100, when characterized by the frequency-domain transfer function H.sub.RX()=P().sup.1*A().sup.1, applies deterministic phase de-mapping and deterministic amplitude de-mapping to uncover the signal structure.
[0066] Deterministic phase mapping does not inherently spread the spectrum. Deterministic phase mapping with deterministic amplitude mapping does not inherently spread the spectrum, as both are applied in the frequency domain to individual spectral components and no new spectral components are generated.
[0067] Consider a scenario where the digital filter 50 uses 1152 coefficients to represent the frequency-domain transfer function H.sub.TX(), and the digital filter 100 uses 1152 coefficients to represent the frequency-domain transfer function H.sub.RX().
[0068] In one example, repeated calculations of pseudorandom phase offsets and, in the second implementation, pseudorandom amplitude factors, could be made. The deterministic phase mapping for a discrete frequency [i] (i is an index) could be expressed as P([i])=exp(j .sub.[i]), and the deterministic phase de-mapping for the discrete frequency [i] could be expressed as P(.sub.i).sup.1=exp(j .sub.i), where a phase offset .sub.[i] for the discrete frequency [i] is given by .sub.[i]=rand[0, 2), and this calculation is repeated for all 1152 discrete frequencies. For the second implementation described above, the deterministic amplitude mapping for the discrete frequency [i] could be expressed as A([i])=A[i] and the deterministic amplitude de-mapping for the discrete frequency [i] could be expressed as A(.sub.i).sup.1=1/A[i], where an amplitude factor A[i] for the discrete frequency [i] is given by A[i]=rand[0.35, 1], and this calculation is repeated for all 1152 discrete frequencies. A new seed for the random function rand could be set after a predetermined number of calculations, such as after 1152 calculations. In this example, the deterministic phase mapping can be considered spectral phase encoding and the deterministic phase de-mapping can be considered spectral phase decoding, where the seed of the random function rand is a symmetric key used for spectral phase encoding/decoding. In this example, the deterministic amplitude mapping can be considered encoding noise and the deterministic amplitude de-mapping can be considered decoding noise, where the seed of the random function rand is a symmetric key used for encoding/decoding noise.
[0069] The lower end of the range of random numbers for the amplitude factor could be a programmable value that is adjusted for optical network system and span design (for example, number of fiber spans, the span loss, FEC gain, modulation format, etc.). The longer the worse-case routethat is, the greater the number of lossy spans (based on a given sensitivity of the receiver 54), the higher the programmable value due to less margin SNR in the specific system.
[0070] In another example, a long pseudo-random bit stream could be generated with a single valuesuch as one bytefor each of the discrete frequencies. This would produce 1152 pseudo-random bytes (8-bit unsigned values). A phase offset .sub.[i] for a discrete frequency [i] and, in the second implementation, an attenuation factor A[i] for the discrete frequency [i] could be calculated in a similar manner as described above for the phase offset key (for example, one unsigned byte per discrete frequency) from the pseudo-random byte corresponding to the index i. The deterministic phase mapping for the discrete frequency [i] could be expressed as P([i])=exp(j .sub.i), and the deterministic phase de-mapping for the discrete frequency [i] could be expressed as P(.sub.i).sup.1=exp(j .sub.i). For the second implementation described above, the deterministic amplitude mapping for the discrete frequency [i] could be expressed as A([i])=A[i] and the deterministic amplitude de-mapping for the discrete frequency [i] could be expressed as A().sup.1=1/A[i]. In this example, the deterministic phase mapping can be considered spectral phase encoding and the deterministic phase de-mapping can be considered spectral phase decoding, where the long pseudo-random bit stream is a symmetric key used for spectral phase encoding/decoding. In this example, the deterministic amplitude mapping can be considered encoding noise and the deterministic amplitude de-mapping can be considered decoding noise, where the long pseudo-random bit stream is a symmetric key used for encoding/decoding noise.
[0071] Any suitable key generation and/or key distribution scheme may be employed to ensure that the key used for encoding at the transmitter 14 is identical to the key used for decoding at the receiver 54.
[0072] The deterministic phase mapping and, in some versions, the deterministic amplitude mapping, use real number multiplication and division, implemented using fixed-point mathematics, or integer multiplication with word growth, clipping/scaling. If the coefficients of H.sub.PRE() and R() are denoted H.sub.PRE([i]) and R([i]), respectively, the encoding can be effected by multiplying one or both sets of those coefficients by P([i]) and, in some versions, also by A[i].
[0073] The deterministic phase de-mapping and, in some versions, the deterministic amplitude de-mapping, use real number multiplication and division, implemented using fixed-point mathematics, or integer multiplication with word growth, clipping/scaling. If the coefficients of H.sub.POST() are denoted H.sub.POST([i]), the decoding can be effected by multiplying those coefficients by P([i]).sup.1 and, in some versions, also by A([i]).sup.1.
[0074] This multiplication and division can be contrasted with the exclusive OR (XOR) mod 2 addition of data bits with a key employed in some conventional cryptographic algorithms.
[0075] For cases where the digital filter 50 was designed for a purpose other than obfuscation and is modified as proposed in this document to introduce the obfuscation function, the digital filter 50 combines the function of encoding with other functions, for example, one or more of impairment pre-compensation, calibration of analog and/or RF components, and pre-distortion. For cases where the digital filter 100 was designed for a purpose other than obfuscation and is modified as proposed in this document to remove the obfuscation function, the digital filter 100 combines the function of decoding with other functions, for example, impairment post-compensation.
[0076] The coherent receiver has feedback control loops to track the changes in state of polarization, polarization mode dispersion and polarization dependent loss in the fiber and amplifiers and compensate for it. Adding pseudo random phase and amplitude noise will disrupt the functioning of the feedback loops and make it impossible for the eavesdropping receiver to track the channels in real time.
[0077]
[0078] In the case of a coherent optical communications system, the deterministic amplitude mapping although applied through multiplication may appear to the receiver as additive Gaussian white noise (AGWN) or Amplified Spontaneous Emission (ASE) noise.
[0079] The deterministic amplitude mapping that is applied will enhance or attenuate the drive signals that are used to generate the modulated carrier signal 16. The maximum enhancement or attenuation value is limited by the available system margin. The amount of excess margin is reflected by the signal-to-noise ratio (SNR) of the receiver. This may be communication to the transmitter device from the receiver device. Alternatively, if the link is symmetric, the transmitter device may be able to estimate the SNR from its local receiver.
[0080] For further levels of concealment, FEC encoding can suppress the required SNR with a tradeoff of reduced payload spectral efficiency, and artificial noise can be added for operation over links with sufficient residual margin at the receiver.
[0081] Employing probabilistic constellation shaping (PCS) to achieve a Gaussian or super-Gaussian probability distribution of visitation probabilities for symbols in a non-binary constellation (that is, a constellation that maps more than 1 bit to a symbol) together with a digital FIR filter or a digital IIR filter to perform deterministic phase mapping may provide a significant level of security in coherent communication systems. The reason is that, under these conditions, a FIR/IIR digital decoder does not have any metric or any parameter to monitor for convergence, and well-known algorithms such as constant modulus algorithm (CMA) are unable to determine the precise filter used to introduce the deterministic phase mapping at the transmitter DSP. The underlying modulation structure and the information bits are concealed or obfuscated to the point that only detailed, a priori knowledge of the digital FIR or IIR filter's coefficients will enable proper convergence and determination of the underlying, non-binary stream of symbols.
[0082] Accordingly, deterministic phase mapping and de-mapping as described above may provide a significant level of security where the functionality of the transmitter DSP 18 includes probabilistic constellation shaping (PCS) 46 and bit-to-symbol mapping 42 according to a non-binary constellation (that is a constellation that maps more than 1 bit to a symbol, such as QPSK, 16-QAM, etc.), and the functionality of the receiver DSP 78 includes symbol-to-bit de-mapping 88 according to the non-binary constellation and inverse PCS 92. Such functionality is illustrated in
[0083]
[0084] In this example, the transmitter device 14 comprises a laser 11 to produce the optical carrier signal 12, a polarization beam splitter 13 to split the optical carrier signal 12 into two orthogonally-polarized components, and a polarization beam combiner 15. The I/Q modulator and up-converter 36 is implemented as two electrical-to-optical modulators 36 (for example, Mach-Zehnder modulators). One of the electrical-to-optical modulators 36 is driven by a pair of the in-phase (I) and quadrature (Q) analog drive signals 22, 24 to modulate one of the orthogonally-polarized components of the optical carrier signal 12, thereby generating a modulated polarized optical signal. The other of the electrical-to-optical modulators 36 is driven by another pair of the I and Q analog drive signals 22, 24 to modulate the other of the orthogonally-polarized components of the carrier signal, thereby generating another modulated polarized optical signal. The polarization beam combiner 15 combines the two modulated polarized optical signals, thereby yielding the modulated optical carrier signal 16 for transmission on the link 38. The transmitter DSP 18 generates the pairs of the I and Q digital drive signals 22, 24 from the information bits 26.
[0085] In this example, the receiver device 54 comprises a laser 51 to produce the local version 58 of the optical carrier signal 12, and a polarization beam splitter 53 to split the received modulated carrier signal 56 into two orthogonally-polarized components. The mixer and down-conversion module 60 are implemented by an optical hybrid 59 and photodetectors 61.
[0086] In this example, the link 38 is an optical link 38 that may comprise one or more of optical fibers, optical amplifiers, repeaters, WSS nodes, OADMs, ROADMs, etc.
[0087] In the case of a coherent optical communications system, the underlying baseband signals may have bit rates of 40 Gbps, 100 Gbps, 200 Gbps, 400 Gpbs, or higher. The symbol rates with two polarizations may range between 30 Gbaud and 80 Gbaud, or higher. (In contrast, full-rate voice channels are in the kilohertz range, such as approximately 13 kbps, 56 kbps in V.90 modems.) Thus if the digital filter 50 and the digital filter 100 are implemented as FIR filters, the FIR filters are applied to much higher bandwidth signals than in the case of using FIR filters for concealing voice signals.
[0088] The scope of the claims should not be limited by the details set forth in the examples, but should be given the broadest interpretation consistent with the description as a whole.