Optical fiber channel safe transmission system based on neural network
Technical Field
The invention relates to an information security technology, in particular to a scheme for preventing an illegal eavesdropper from eavesdropping on transmission information under optical fiber channel transmission.
Background
Optical transmission is widely used in personal, commercial, and military communications because of its advantages such as high speed, large bandwidth, and long reach. However, with the 5G era and the advent of various intelligent devices, the data requirement in the optical link has increased explosively, so that the data security transmission of the optical link becomes more and more important. In point-to-point transmission systems, optical fiber is often used as the system communication link, but optical fiber is very vulnerable to many eavesdropping, so how to guarantee the secure transmission of optical communication systems attracts more and more attention.
The traditional security technology mainly guarantees the security of the system by means of the complexity of a physical layer and a high-level algorithm, but along with the development of a quantum computer, the traditional security technology is no longer secure. The theoretically completely safe quantum key technology also has the disadvantages of short transmission distance, low key generation rate, expensive device and the like. Although the chaotic security system can improve the security of data transmission, the key space of the system is relatively small, i.e. the security is not high, because the security is established in the randomness and unpredictability of the initial value, so that the secure transmission scheme based on the physical layer becomes a hot field of research in recent years.
In recent years, many physical layer-based security schemes have been proposed, such as random phase fluctuation based on polarization-maintaining fibers, polarization film dispersion based on random spliceable maintaining fibers, characteristics of ultra-long fiber lasers, random film-mixing extraction keys in multimode fibers. Although these schemes can improve the confidentiality and privacy of data transmission from the perspective of the physical layer, these schemes do not consider that the received data of the legitimate party is not completely consistent due to the non-ideal environment, a post-processing algorithm is required to perform the consistency of the received data of the legitimate party and the differential amplification of the received data of the illegitimate party, the common transmission of information and a secret key cannot be realized, and the secure communication cannot be performed even when the length of a legitimate channel optical fiber is matched by the eavesdropping party.
Neural networks have been proven to fit many data curves well even with only one hidden layer, so that neural networks are increasingly studied in channel modeling, and we need to study a secure transmission system that is safely established in channel characteristic estimation neural networks, considering that the polarization film dispersion of fiber channels is a variable and the time for matching the legal fiber length by eavesdropping method cannot be made zero.
Disclosure of Invention
In order to solve the technical problem, the invention provides a fiber channel secure transmission system based on a neural network, and a legal party can locally obtain a neural network model which cannot be obtained by an illegal eavesdropping party through a method for locally estimating the characteristics of a transmission channel through the neural network, so that the eavesdropping party cannot obtain a secret key used for plaintext encryption.
The invention provides a fiber channel safe transmission system based on a neural network, which is characterized in that,
firstly, a legal method trains a neural network model locally, then a sending end generates a section of pseudo key locally, a real key is generated by using the pseudo key and the neural network model, a plaintext is encrypted by using the key, a ciphertext and the pseudo key are transmitted to a receiving end after encryption, and the receiving end receives and decrypts data.
The training neural network model refers to that detection data and data of received data which are sent by a sending end and are subjected to post-processing are used as training data of a neural network, wherein the sent data are used as input data, and the received data which are subjected to post-processing are used as tag data. The post-processing is used for received data consistency of a legal party and received data differential amplification of an illegal eavesdropper, because a fiber channel is not ideal, the received data after the same transmitted data of the legal party is transmitted are not necessarily identical, so that the received data of the legal party is required to be consistent by adopting information negotiation, and in order to further expand the data difference of the legal party and the illegal party, the received data differential amplification of the legal party and the illegal eavesdropper is carried out by adopting privacy amplification after the information negotiation.
The generation of a pseudo key is to locally generate a pseudo random number as a pseudo key before the encryption is performed at the receiving end.
The generation of the real key means that the pseudo key is input into a local trained neural network, and data output by the neural network is the real key at the moment.
The encryption of the plaintext refers to the encryption of the plaintext needing to be transmitted in a secret manner according to a secret key.
The communication means that the sending end combines the ciphertext and the pseudo key into a group of new data, and then transmits the new data to the receiving end in a standard single mode optical fiber.
The receiving and decrypting of the data means that a receiving end receives lossless signals through a channel compensation algorithm, then ciphertext and a pseudo key are respectively obtained through a predetermined combination mode, the pseudo key is input into a locally trained neural network to generate a key, and a process opposite to encryption is carried out on the ciphertext according to the key to obtain a plaintext.
Compared with the existing safe transmission system, the system not only realizes the simultaneous transmission of the open cipher, one-time cipher and real-time key adjustment, but also can ensure the safety of most conditions of the system under the condition that the eavesdropping party perfectly matches the length of the legal channel optical fiber, and because of the time-varying property and the randomness of the polarization membrane coefficient in the channel and the diversity of the neural network structure, the key space of the scheme is very large and is difficult to crack.
In the embodiment of the method, an implementation case of a fiber channel secure transmission system based on a neural network is given.
Drawings
The above and other features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 is a diagram of a secure fiber channel transmission system based on a neural network according to an embodiment of the present invention.
Fig. 2 is a flow chart of the secure transmission of the fiber channel based on the neural network according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of channel characteristic detection according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of the training of the neural network for channel characteristic estimation according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a pseudo key generation key according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of communication according to an embodiment of the present invention.
Detailed description of the invention
The present solution is described in further detail below with reference to the accompanying drawings
Fig. 1 and fig. 2 are a diagram and a flowchart of a secure fiber channel transmission system based on a neural network according to an embodiment of the present invention, in the secure fiber channel transmission system, the total steps are five:
the first step is that the legitimate users Alice and Bob in step S201 simultaneously send a predetermined probing signal data to each other, where the probing signal is a 40Gbps NRZ electrical signal, and in order to amplify the loss of the channel, we set an EDFA of 20db and load the electrical signal onto the optical signal using MZM. The detection signal is transmitted through the local optical fiber and the exposed optical fiber and then received by the receiver, the received signal is subjected to photoelectric conversion through the photoelectric detector, and then digital signal processing is performed to obtain received data, as shown in fig. 3.
In the second step, the received signal of the legal party in step S202 needs to be post-processed, in this case, the information negotiation technique of Cascade is adopted, and in the information negotiation process, the legal party only transmits the parity value of the received signal on the common channel and corrects the local data. And after the information negotiation, the difference amplification of the eavesdropper and the legal party is carried out by adopting a hash function. In step S203, the local neural network is trained according to the probe signal sent in S201 and the post-processed received data obtained in S202, where the input data is the sent data and the tag data is the post-processed received data. As shown in fig. 4, a four-layer fully-connected layer neural network is used in this case, in which the number of neurons in the input layer is 51, which represents that a single symbol in the channel will receive interference from the surrounding 50 symbols, the numbers of neurons in the second, third and fourth hidden layers are 128 × 8, 128 × 4 and 128 × 2, respectively, and the number of neurons in the output layer is 2, which represents the probability of two symbols in NRZ. The activation functions of the hidden layer and the output layer of the neural network are Relu and Softmax, batchsize and epoch are all 100, the learning rate is 0.0001, the training set and the testing set are all 4096 bits, Adam is used as a training optimizer, a dropout function is not adopted, the error function is a cross dead error function for characterizing two probability similarities in an information theory, and a flow chart of the hidden layer is also shown in figure 4.
The third step first needs to generate a pseudo random number, i.e. a pseudo key, locally at the sending end in step S204, and step S205 is to generate a real key by using the pseudo key through the neural network model trained in step S203, as shown in fig. 5.
In the fourth step, step S206 is first performed, that is, the sending end encrypts plaintext information to be sent by using the locally generated key, in this case, a standard AES encryption algorithm is used. After encryption, the ciphertext and the pseudo key need to be sent to the receiving end together, in the scheme, a combination mode that the first half is the ciphertext and the second half is the pseudo key is adopted, and the combined data is transmitted to the receiving end through a standard single-mode optical fiber. In step S207, the receiving end may obtain a lossless transmission signal after compensating the transmission channel, and may obtain a lossless ciphertext and a pseudo key by using a predetermined method, as shown in fig. 6.
Step S208 is firstly needed to be carried out in the fifth step, after the receiving end receives the ciphertext and the pseudo key, the receiving end needs to input the pseudo key into a neural network model which is trained locally by the receiving end, and the output is the real key. Step S209 needs to decrypt the plaintext information sent from the sender by combining the key generated in step S208 with the ciphertext obtained in step S207.
The above description is only an example of the present disclosure, and is not intended to limit the present disclosure, and any modifications, equivalent replacements, improvements, etc. within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.