Optical identification using physical unclonable functions

Pantea Nadimi Goki,Stella Civelli,Emanuele Parente,Roberto Caldelli,Thomas Teferi Mulugeta,Nicola Sambo,Marco Secondini,Luca PotÌ
DOI: https://doi.org/10.1364/JOCN.489889
2023-07-27
Abstract:In this work, the concept of optical identification (OI) based on physical unclonable functions is introduced for the first time, to our knowledge, in optical communication systems and networks. The OI assigns an optical fingerprint and the corresponding digital representation to each sub-system of the network and estimates its reliability in different measures. We highlight the large potential applications of OI as a physical layer approach for security, identification, authentication, and monitoring purposes. To identify most of the sub-systems of a network, we propose to use the Rayleigh backscattering pattern, which is an optical physical unclonable function and allows to achieve OI with a simple procedure and without additional devices. The applications of OI to fiber and path identification in a network and to the authentication of users in a quantum key distribution system are described.
Signal Processing
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to achieve optical identification (OI) based on physical unclonable functions (PUFs) in optical communication systems and networks. Specifically, the paper proposes a method of using Rayleigh backscattering patterns (RBPs) as optical physical unclonable functions (OPUFs) to provide the optical fingerprints of each subsystem and their corresponding digital representations. This method can be used to evaluate the reliability of subsystems in different measurements and has broad application potential in security, identification, authentication, and monitoring. ### Specific Problems and Solutions 1. **Physical Layer Security (PLS)** - **Problem**: The security of current communication networks mainly depends on the upper - layer protocols of the OSI model, while physical - layer security measures are relatively lacking. The physical layer is faced with various attacks, such as tampering, interference, side - channel attacks, physical infrastructure attacks, and eavesdropping. - **Solution**: The paper proposes a new method based on optical fingerprints - optical identification (OI), using Rayleigh backscattering patterns (RBPs) as physical unclonable functions (PUFs) to generate unique optical fingerprints for each subsystem. This method can significantly enhance the physical - layer security of the network. 2. **Subsystem Identification and Authentication** - **Problem**: In the network, how to ensure the authenticity of each subsystem's identity and the security of the communication path? - **Solution**: By extracting the RBP of each subsystem, its unique optical fingerprint can be generated. These fingerprints can be stored in a database for subsequent identification and authentication. Any physical attack on the optical fiber or connection will change the system's RBP, thus changing the system's signature and revealing potential attackers. 3. **Network Monitoring** - **Problem**: How to monitor abnormal activities in the network in real - time? - **Solution**: Using RBPs for regular inspections can detect unauthorized access or tampering behavior. For example, it is possible to identify whether there is an intrusion by comparing the current RBP with the RBP stored in the database. 4. **User Authentication in Quantum Key Distribution Systems** - **Problem**: How to achieve user authentication in quantum key distribution (QKD) systems? - **Solution**: The paper proposes to apply OPUF to QKD systems, improving the security and reliability of the system by generating and verifying users' optical fingerprints. ### Mathematical Formulas - **Probability Model** - Suppose there are two users U and V, and each user's digital signature consists of N bits. The Hamming distance (HD) is used to compare the similarity between two signatures. - When two signatures are independently generated, the mean value of the Hamming distance is \( \frac{N}{2} \). - Decision rule: If HD is less than a certain threshold \( t \), then the two signatures are considered to belong to the same user; otherwise, they are considered to belong to different users. - The calculation formula for the threshold \( t \): \[ t=\gamma M_V+(1 - \gamma)M_U \] where \( M_U \) and \( M_V \) are the mean Hamming distances of users U and V respectively, and \( \gamma \) is a parameter between 0 and 1. - **Probability Distribution of Hamming Distance** - The distribution of Hamming distance can be approximated as a binomial distribution: \[ P(\text{HD} = k)=\binom{N}{k}\left(\frac{M_U}{N}\right)^k\left(1-\frac{M_U}{N}\right)^{N - k} \] - Calculate the false positive rate (FPR):