Artigo Acesso aberto Revisado por pares

Secured relay‐assisted atmospheric optical code‐division multiple‐access systems over turbulence channels

2015; Institution of Engineering and Technology; Volume: 9; Issue: 5 Linguagem: Inglês

10.1049/iet-opt.2014.0148

ISSN

1751-8776

Autores

Hien T. T. Pham, Phuc V. Trinh, Ngoc T. Dang, Anh T. Pham,

Tópico(s)

graph theory and CDMA systems

Resumo

IET OptoelectronicsVolume 9, Issue 5 p. 241-248 Special Issue on Optical-Wireless CommunicationsFree Access Secured relay-assisted atmospheric optical code-division multiple-access systems over turbulence channels Hien T.T. Pham, Corresponding Author Hien T.T. Pham [email protected] Department of Optical Communications, Posts and Telecommunications Institute of Technology, Km 10, Nguyen Trai Road, Ha Don District, Hanoi, 100000 VietnamSearch for more papers by this authorPhuc V. Trinh, Phuc V. Trinh orcid.org/0000-0001-8087-6739 Computer and Information Systems, University of Aizu, B 11-4, Tsuruga, Ikkimachi, Aizu-Wakamatsu, Fukushima, 965-8580 JapanSearch for more papers by this authorNgoc T. Dang, Ngoc T. Dang Department of Optical Communications, Posts and Telecommunications Institute of Technology, Km 10, Nguyen Trai Road, Ha Dong District, Hanoi, Hanoi, 150000 VietnamSearch for more papers by this authorAnh T. Pham, Anh T. Pham Computer Engineering, The University of Aizu, Tsuruga, Ikkimachi, Aizu-Wakamatsu, Fukushima, 965-8580 JapanSearch for more papers by this author Hien T.T. Pham, Corresponding Author Hien T.T. Pham [email protected] Department of Optical Communications, Posts and Telecommunications Institute of Technology, Km 10, Nguyen Trai Road, Ha Don District, Hanoi, 100000 VietnamSearch for more papers by this authorPhuc V. Trinh, Phuc V. Trinh orcid.org/0000-0001-8087-6739 Computer and Information Systems, University of Aizu, B 11-4, Tsuruga, Ikkimachi, Aizu-Wakamatsu, Fukushima, 965-8580 JapanSearch for more papers by this authorNgoc T. Dang, Ngoc T. Dang Department of Optical Communications, Posts and Telecommunications Institute of Technology, Km 10, Nguyen Trai Road, Ha Dong District, Hanoi, Hanoi, 150000 VietnamSearch for more papers by this authorAnh T. Pham, Anh T. Pham Computer Engineering, The University of Aizu, Tsuruga, Ikkimachi, Aizu-Wakamatsu, Fukushima, 965-8580 JapanSearch for more papers by this author First published: 01 October 2015 https://doi.org/10.1049/iet-opt.2014.0148Citations: 3AboutSectionsPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Abstract The authors propose a relay-assisted atmospheric optical code-division multiple-access (AO/CDMA) system for secured, multiuser optical communications. Chip detect-and-forward (CDF) scheme is used at relay nodes so that the complex multiuser decoding process can be avoided. The proposed system performance, in terms of bit-error rate (BER) and transmission confidentiality, is analysed over atmospheric turbulence channel taking into account channel loss due to atmospheric attenuation and beam divergence. Multiple-access interference and background noise are also included in the analysis. In addition, a quantitative analysis of data confidentiality is further examined in the study. The numerical results show that the relay transmission is an efficient solution to improve the system performance. Thanks to this solution, AO/CDMA systems can achieve low BER, long distance, and a large number of users. Moreover, high confidentiality can be attained by properly configuring system parameters, such as limiting the transmitted power and/or reducing the signal beam width. 1 Introduction Atmospheric optical (AO) or free-space optical (FSO) communication, a data transmission technology based on the propagation of light over atmospheric channel, has recently received much attention thanks to its advantages of high data rates, unregulated spectrum, and flexible deployment [1]. Since AO communication is capable of providing Gigabits per second (Gbps) data rates, it is a promising candidate for broadband access environments [2]. To allow multiple users to simultaneously share the same resource of atmospheric channels, AO/code-division multiple-access (AO/CDMA) systems have been proposed and attracted much interest thanks to additional benefits including asynchronous access, scalability, and inherent security [3–8]. It has been shown in the literature that the performance of AO/CDMA systems is severely limited by the effect of atmospheric turbulence, which is caused by the variations in the refractive index due to inhomogeneities in temperature and pressure changes [9]. Atmospheric turbulence, together with background noise and multiple-access interference (MAI), causes the increase of bit-error rate (BER) and significantly limits the transmission distance of AO/CDMA systems. Several techniques have been proposed to deal with this problem, including pulse-position modulation (PPM), spectral phase encoding, and forward error correction (FEC). PPM offers a number of advantages, including power-efficient and non-threshold detection [3–7]. PPM-based AO/CDMA system, which requires the transmission of short pulse, is however significantly affected by pulse broadening effect in the case of transmitting high data-rate and long distance [8]. Spectral phase-encoded optical CDMA also offers better spectral efficiency and performance [6]. It is, nevertheless, relatively complicated since the use of coherent sources is required. The study in [7] shows that FEC can effectively combat with physical layer impairments. The use of FEC is still limited as it imposes high delay and reduces the transmission efficiency. In this paper, we propose to use relay-assisted transmission to deal with atmospheric turbulence issue in AO/CDMA systems. Relay transmission is an effective technique to improve the coverage and reliability of radio frequency links, and it has been recently proposed in FSO communications [10–15]. By employing relay transmission, the performance and coverage distance of AO/CDMA systems can be improved. It also helps to deploy the system when users and the receiver do not have a line-of-sight connection. Conventional relay schemes often use bit detect-and-forward (BDF) at relay nodes [10, 11]. Nevertheless, BDF is complex in relay-assisted AO/CDMA systems since multiuser detection at each relay node is required. We therefore propose to use chip detect-and-forward (CDF) instead. In relay-assisted AO/CDMA systems using CDF scheme, relay nodes will detect CDMA chip, either '1' or '0', using a threshold detection, and then forward that chip to the following node. Furthermore, CDF can be well matched to AND detection scheme, which is used at the receiver to mitigate the effect of MAI [16]. In addition, although enhanced security has been often cited as an advantage of both AO communication and optical CDMA, the quality and degree of security enhancements have not been examined for AO/CDMA systems. As a matter of fact, it is possible for someone to intercept a signal by placing a detector within the footprint of the optical beam, especially when the beam width is wider due to the long transmission distance. In this paper, we also consider the code interception performance of the proposed AO/CDMA systems, which is calculated based on the probability that the eavesdropper can detect the user's entire code word with no errors. In our analysis, the performance of relay-assisted AO/CDMA systems over atmospheric turbulence modelled as log-normal fading channel will be carried out taking into account major physical layer impairments including MAI and background noise. Other effects of atmospheric channel such as atmospheric attenuation and power loss due to beam spreading are also considered. The expression for BER and transmission confidentiality of the proposed AO/CDMA systems will be analytically derived. Numerical results will be discussed considering various system's parameters, including the transmitted power, the number of relays, the number of users, and the transmission distance. The rest of the paper is organised as follows. The model of relay-assisted AO/CDMA systems is introduced in Section 2. Section 3 presents the mathematical model of atmospheric channel. In Section 4, we formulate the BER of relay-assisted AO/CDMA systems. Section 5 devotes to analyse the security performance of the proposed system. The numerical results and discussion are shown in Section 6. Finally, Section 7 concludes the paper. 2 Relay-assisted AO/CDMA System 2.1 System model A model of a relay-assisted AO/CDMA system with K users and N relays is shown in Fig. 1. Data signals from all K users are transmitted over atmospheric channels and collected by the first relay (R1), where they are detected and then forwarded to the receiver via other relays (i.e. R2, R3, …, RN). Each user in the AO/CDMA system is assigned a unique signature code, which can be either one-dimensional or two-dimensional (2D) one, for encoding its data. With the properties of high cardinality and low peak cross-correlation, 2D wavelength hopping/time spreading (WH/TS) codes have been proposed and adopted in optical CDMA systems [17]. To reduce MAI and enhance security, 2D WH/TS codes are also used in our proposed AO/CDMA system, whose block diagram, including a transmitter, a relay, and a receiver, is depicted in Fig. 2. Fig. 1Open in figure viewerPowerPoint Relay-assisted AO/CDMA system model Fig. 2Open in figure viewerPowerPoint Block diagram of a Transmitter b Relay node c Receiver in relay-assisted AO/CDMA system At the transmitter side shown in Fig. 2 a, binary data of each user is first modulated with broadband optical signal, which is generated from the laser source, at a modulator. Modulated optical signal is then encoded in both wavelength and time domains at a WH/TS encoder, where bit '1' is converted to a chip sequence including chips '1' and '0' while bit '0' is kept unchanged. An optical pulse at a specific wavelength, whose power is Pc, will be transmitted in the case of chip '1' while optical pulse is absent in the case of chip '0'. At the first relay, as shown in Fig. 2 b, optical pulses from K users are collected and separated into individual wavelengths at a demultiplexer (λ -DEMUX). The optical signal at each wavelength is then converted to an electrical signal by a photodetector (PD). The electrical signal is then followed a process of CDF by a threshold detector and a laser source. Optical signals from laser sources are combined at a wavelength multiplexer (λ -MUX) before transmitting to the next node. It is worth noting that the transmitted power per chip '1' at the output of R1 is also kept at the level of Pc. The similar process is performed at other relays (i.e. R2, R3, …, RN) of the system. The CDF process in these relays is not affected by additional MAI as they are only connected to the previous node. At the receiver (Fig. 2 c), the binary data from the desired transmitter is decoded at a WH/TS decoder. After passing through the decoder, optical pulses (i.e. chip '1'), whose wavelengths are matched to receiver's signature codes, are collected and separated. In addition, the relative time delays among them are cancelled so that they are aligned in time. Next, these optical pulses are converted to electrical ones at the PDs and then detected at chip detectors. Based on logical levels at the output of the chip detectors, logical AND operation is carried out to detect a bit '1' or a bit '0'. 2.2 Prime code In this paper, we use 2D prime code to provide accessibility for multiple users simultaneously. In detail, each user is assigned a unique code whose length is , where ps is a prime number. A TS pattern can be generated using the linear congruent placement operator to place a pulse within a block as follows (1)where [.] denotes modulo ps operation, x represents the sequence number within the family of sequences, and y represents the block number for that particular sequence. The algorithm determines the place of a pulse within a block of length ps. Hence, the prime algorithm produces ps sequences (i = 0, 1, …, ps − 1) of length . Similarly, a WH pattern is generated from a prime number ph(ps ≤ ph). In that case, there are ph wavelengths available for colouring the TS pattern, exactly as there are ps pulses in the code sequence. The WH pattern H0 comprises pulses at one wavelength only and is therefore discarded. Consequently, the number of WH patterns is ph − 1 and a 2D WH/TS code set includes ps × (ph − 1) distinctive 2D prime codes of length . The process of generating the TS and the WH patterns with ps = ph = 5 is illustrated in Table 1. An example of 2D WH/TS code sequence created by WH pattern H1 and TS pattern S2 is λ0 000 000λ1 000 000λ2 0λ3 000 000λ4 0. Table 1. WH and TS patterns for ps = ph = 5 WH pattern TS pattern H0 λ0 λ0 λ0 λ0 λ0 S0 10000 10000 10000 10000 10000 H1 λ0 λ1 λ2 λ3 λ4 S1 10000 01000 00100 00010 00001 H2 λ0 λ2 λ4 λ1 λ3 S2 10000 00100 00001 01000 00010 H3 λ0 λ3 λ1 λ4 λ2 S3 10000 00010 01000 00001 00100 H4 λ0 λ4 λ3 λ2 λ1 S4 10000 00001 00010 00100 01000 3 Atmospheric channel Considering the effects of path loss and atmospheric turbulence, the state of atmospheric channel between node (m − 1) and node m can be described as (2)where is the path loss coefficient, which is considered as a fixed scaling factor during a long period of time, is the fraction of power collected by a PD, which depends on the relative distance (r) between the PD and the centre of the received optical beam, is a random variable representing the intensity fluctuation due to atmospheric turbulence. 3.1 Channel loss Channel loss is the reduction of the optical signal power as a result of absorption and scattering processes due to the presence of molecules along the transmission path. The concentrations of matter in the atmosphere, which depend on the weather conditions, result in the signal attenuation varying spatially and temporally. The attenuation of optical power through the atmospheric is described by the exponential Beers–Lambert Law and can be described as (3)where β is the attenuation coefficient and z is the transmission distance between node (m − 1) and node m, respectively. 3.2 Fraction of collected power To compute the fraction of collected power by a desired user and an eavesdropper, we consider a circular detection aperture of radius a and a Gaussian beam profile at the receiver as shown in Fig. 3. For a Gaussian beam, the normalised spatial distribution of the transmitted intensity at distance z from the transmitter is given by (4)where ρ is the radial vector from the beam centre, and ωz is the beam waist (radial calculated at e−2) at distance z [18]. The loss due to geometric spreading with pointing error r (i.e. relative distance between the PD and the centre of the received optical beam) is expressed as (5)where A is the detector area. Equation (5) can be approximated by the Gaussian form as [19] (6)where , and [19] (7) Fig. 3Open in figure viewerPowerPoint Location of PDs and beam footprint on the detector plane at the distance of z Here, A0 is the fraction of the collected power at r = 0, and ωz eq is the equivalent beam width. It is worth noting that the fraction of collected power by the desired user can be calculated with r = 0. 3.3 Atmospheric turbulence Transmission over free-space channel, whose refractive index and atmospheric temperature are fluctuated, results in signal fading commonly named as atmospheric turbulence. In AO/CDMA systems, this effect is the main factor that causes the degradation of signal quality and BER. The atmospheric turbulence is also difficult to model because of erratic elements of atmosphere such as temperature, pressure and index. However, thanks to the statistical methods, there are a number of proposed mathematical models which can approximate this effect such as log-normal, gamma, gamma–gamma distributions. Each model corresponds to a specific range of turbulence strength. This paper deals with weak turbulent condition, thus the suitable model is log-normal distribution. The log-normal random variable can be found if we take the exponent of a normally distributed random variable X. Therefore, the relation between the optical signal intensity at the output of transmitter IT and the optical signal intensity at the input of receiver IR through atmospheric turbulent channel can be shown as (8)where X is the normally distributed random variable with mean μx and standard deviation σx. Its probability density function (pdf) can be described as (9)To fairly measure the fading effect caused by atmospheric turbulence, the mean of the log-normal random variable needs to be normalised to guarantee that the average received power is not attenuated or amplified by turbulence. Therefore, and the pdf of the log-normal variable can be expressed as (10)and for weak turbulence, the variance of log-amplitude fluctuation for spherical waves is given by [20] (11)where λ and z are the wavelength and transmission distance in meters; is the refractive index structure coefficient. 4 Performance analysis 4.1 Bit error rate In this subsection, the proposed system BER is analytically derived. Among K users, one user is assumed to be the desired user while K − 1 remaining ones are probable interfering users. The total BER is conditioned on the events: k users among the (K − 1) probable interfering users may transmit a data bit '1', which follows a binomial distribution. Under the assumption that the probabilities of transmitting bit '1' and bit '0' are equally likely for all users, the BER at the receiver can be calculated as (12)where pbe (0|1, k) and pbe (1|0, k) are the conditional bit error probabilities when detecting bit '1' and bit '0' at the receiver, respectively. In the case of AND detection shown in Fig. 2, logical AND operation is carried out on all '1' chip positions of the desired code to detect a bit '1' [16]. Conditional bit error probabilities therefore can be expressed in terms of the conditional chip error probabilities (CEPs) and for AND detection as (13)where pe 2e (0|1, k) and pe 2e (1|0, k) are end-to-end CEPs when the desired user transmits chip '1' but detects chip '0' and transmits chip '0' but detects chip '1'. It is clear that these probabilities depend on the CEPs of all hops from the desired transmitter to the receiver. 4.2 CEP for the first hop CEP for the first hop is determined at the first relay (R1). At the first hop, CEP is affected by not only background noise but also MAI from interfering users. We assume that the transmitted power per pulse (Pc) and the distance to R1 are identical for both the desired user and (K − 1) remaining users. In addition, among the k users transmitting bit '1', n interfering users may have a pulse overlapping the chip of interest, where n = binom(k, pcov) and pcov is the probability that desired user's chip is overlapped by an interfering user's chip. For the case of 2D WH/TS prime code, [16], where μλ is the average number of wavelengths common to a pair of two codes and, under the condition that ph > ps, can be estimated as [17] (14)In the special case that ph = ps, μλ equals to ps, therefore . Given k users transmitting bit '1', n can vary from 1 to k, therefore CEPs for the first hop can be computed as (15) (16)where pce (1|0, n) and pce (0|1, n) are the conditional CEPs when detecting chip '1' and chip '0', respectively. The conditional CEPs are governed by the received power per chip at the input of the relay R1, which can be expressed as (17) (18)where P1(0) and P1(1) are the received optical powers when desired user transmits chip '0' and chip '1', respectively. Pb is the average background power. h1,i denotes the atmospheric channel coefficient of the i th interfering user and we assume that it has the same pdf with the desired one's (i.e. h1,d). Here, the sums of n or (n + 1) log-normal random variables can be approximated into a single log-normal random variable denoted as h1(0) or h1(1) (the detail about this approximation is given by (36) in Appendix 1). When received optical signals pass through the PD, they are converted to the electrical currents which can be expressed as (19) (20)where I1(0) and I1(1) are electrical signals respectively converted from P1(0) and P1(1) thanks to the PD. Besides, background power causes the background noise, whose variance can be written as (21)where Be corresponds to the effective electrical bandwidth. Based on (19)–(21), the CEPs under the effects of MAI and background noise can be calculated as (22) (23)where ID is the chip detection threshold, which is assumed to be fixed. , correspond to the joint pdf of log-normal vector of length n and n + 1, respectively. It is worth noting that and , where and are the channel loss coefficient and the fraction of the collected power of the first hop, respectively. Performing and transformations, we have (24) (25)where . Furthermore, (24) and (25) can be approximated by Gauss-Hermite quadrature formula (shown in (38) in Appendix 2) (26) (27)where mt and gt are the zero of the t th-order Hermite polynomial value and the weight factor for the t th-order approximation, respectively. 4.3 CEP for the m th hop (m = 2, 3, …, N + 1) For the m -hop with m = 2, 3, …, N + 1, there is no additional MAI but still having the presence of atmospheric channel effects and background noise. Therefore, the received current at relay (Ri) can be expressed as (28)By following the mathematical transformations as presented in the previous subsection, we can derive the CEP for the m th hop as (29) (30) 4.4 End-to-end CEP In relay-assisted AO/CDMA systems, there is a possibility that the receiver may still detect correctly a chip although that chip is detected incorrectly in an even number of times in the previous relays. For the worst-case performance, we consider that the end-to-end CEP is the probability that chips are transmitted without error between any pair of two consecutive relays, and it can be expressed as (31) (32) 5 Security analysis To demodulate user's data, an eavesdropper has to detect exactly the code word of the user. By locating a receiver in the coverage of the optical beam, the eavesdropper is able to detect the coded transmissions of users to perform the necessary calculations and derive the code from this information. The resulting code will have some probability of error, which depends strongly on the signal-to-noise ratio at the eavesdropper's receiver. Similar to [21], in our analysis, we consider the worst case assumption from a security perspective (i.e. the best possible performance for the eavesdropper) that the eavesdropper is able to synchronise the user's signal, locate the beginning and ending of a data bit, and then can sample the detector output precisely at the end of each code chip time. Code interception performance is calculated based on the average probability that the eavesdropper can detect the user's entire code word with no errors, denoted by Pcorrect. This probability, therefore, can be computed from the probability of missing a transmitted pulse in a given chip time (PM) and the probability of falsely detecting a pulse in a chip time where none was transmitted (PF) as (33)where the first term represents the probability of not missing any of the pulses that are transmitted during a data bit; the second term is the probability of not falsely detecting pulses in any of the chip time where pulses are not transmitted during a data bit. Assuming that the eavesdropper places its receiver next to the node m (a relay or destination) to detect the coded transmissions. The distance between the eavesdropper's receiver and that of relays (or destination) is denoted as r (see Fig. 3), thus the fraction of power collected by the eavesdropper is hp (r;z) where r is larger than zero. PM and PF, are the accumulated CEPs that the user transmits chip '1' but the eavesdropper detects chip '0' and the user transmits chip '0' but the eavesdropper detects chip '1', respectively. PM and PF, therefore, can be expressed as (34) (35) 6 Numerical results This section presents numerical results of the proposed system BER and security analysis. We assume the distance of L km from the source to the destination and the consecutive nodes are equidistant along the path. The numerical results are considered under a constraint on the fixed energy per bit Eb. Because there are ps pulses in one bit duration, which are assumed to have equal power, the relation between the energy per bit and the power per chip is given by Pc = (Eb /ps)/Tc, where (Eb /ps) and Tc are the chip energy and chip duration, respectively. In addition, the threshold detection level ID can be calculated as , where D is the normalised threshold and set at the same level for all hops along the transmission path. The effective electrical bandwidth, Be, is fixed at 70% of the chip rate [16]. The relation between the chip rate Rc and the bit rate per user (Rb) can be expressed as , where is the code length. Other system parameters and constants used in the analysis are shown in Table 2. Table 2. System parameters and constants Name Symbol Value electron charge e 1.602 × 10−19 C PD responsivity 0.6 A/W attenuation coefficient β 1 km−1 receiver diameter 2a 20 cm beam radius at 1 km ωz 2.5 m background power Pb −30 dBm wavelength λ 1550 nm refractive index structure coeff. 10−15 m−2/3 6.1 BER performance The BER of 10−9 is the error probability at which the communication systems can be considered as error-free. In our analysis, BER of 10−6 is targeted so that, under the assumption that FEC is used used, the error-free communications can be guaranteed. First, Fig. 4 investigates the system BER against the normalised threshold with the number of relays varies from 1 to 3. To achieve low BER, the normalised threshold should be chosen properly. If D is too small, system's performance is degraded due to detecting chip '1' when none was transmitted. In the case when D is too large, error detection is induced by falsely detecting chip '0' when chip '1' was transmitted. The optimum threshold selection depends on parameter settings, especially the number of relays. When the number of relays is large enough, BER reaches the floor and the selection of threshold can be chosen from a wide range of values. Fig. 4Open in figure viewerPowerPoint BER against the normalised threshold (D) with Eb = −130 dBJ, Rb = 5 Gbps, L = 3 km, K = 4 users, and {ps; ph } = {7;7} In Fig. 5, the relation between the BER and the number of active users K is investigated with different code sets, that is, different values of ps and ph. This figure is obtained based on the optimum threshold selection shown in Fig. 4. It is clearly seen that BER is reduced by increasing either ps or ph. When ps is increased, BER is improved more significantly. Moreover, the number of supportable users at a specific value of BER can be determined from this result. As shown in the figure, the system using ps = 7 and ph = 7 (i.e. 7 wavelengths) can support 15 users with the BER of 10−6, which is above twice times the required number of wavelengths. This is an advantage of AO systems using CDMA compared with the ones using wavelength-division multiple-access. Fig. 5Open in figure viewerPowerPoint BER against the number of active users (K) with Eb = −130 dBJ, Rb = 5 Gbps, L = 3 km, and N = 2 The benefits of using relay transmission are quantified in Fig. 6, which also shows BER versus the number of active users K. Under the impacts of physical layer impairments, including atmospheric turbulence, MAI, and background noise, BER of AO/CDMA systems without relaying is very high even when the number of users is small. On the other hand, the use of relay transmission can help to reduce BER significantly. As a result, the relay-assisted AO/CDMA systems with one relays can support more than 10 users with BER of 10−6 when L = 3 km and Rb = 1 Gbps. Fig. 6Open in figure viewerPowerPoint BER against the number of active users (K) with Eb = −130 dBJ, Rb = 5 Gbps, L = 3 km, and {ps; ph } = {7;7} To further examine the gain of using relay transmission in terms of transmission distance, Fig. 7 demonstrates the BER as a function of L with Eb = − 130 dBJ. In this case, BER floor is governed by the number of active users that is related to the strength of MAI. It is seen that the transmission distance that AO/CDMA systems can support (at a specific BER) increases with the number of relays. For example, at K = 4 users and BER of 10−6, the transmission distance increases from 3.5 to 5.2 km when the number of relays increases from 1 to 2. Obviously, longer transmission distance can be achieved by deploying more relays. Fig. 7Open in figure viewerPowerPoint BER against the transmission distance with Eb = − 130 dBJ, Rb = 5 Gbps, and {ps; ph } = {7;7} System BER is investigated versus the bit rate per user in Fig. 8 under a constraint of fixed power per bit, that is, Eb Rb is a constant and set to be − 5 dBm. The transmission distance L = 3 km and the number of users K = 4. Similar to the previous results, BER floor is governed by the number of active users. In the case of no relay, the supportable bit rate per user with BER of 10−9 is below 200 Mbps. By increasing the number of relays, the supportable bit rate per user can be increased. In particular, the bit rate per user of 4 Gbps (also at BER of 10−9) can be supported with one relay. In the case of using two relays, BER reaches the floor for any bit rate from 100 Mbps to 10 Gbps. Fig. 8Open in figure viewerPowerPoint BER against the bit rate per user with average bit power of −5 dBm, L = 4 km, K = 4 users and {ps; ph } = {7;7} 6.2 Security performance Fig. 9 depicts the average probability that the eavesdropper can detect the user's entire code word with no errors Pcorrect against the transmitted power per bit Ps. Several values of r, the distance between the targeted receiver and the eavesdropper's receiver, are investigated in the figure. The increase of transmitted power helps to reduce BER, however it causes the decrease of confidentiality, that is, Pcorrect increases. Confidentiality is also decreased when the eavesdropper's receiver is located near the targeted receiver. This is because the fraction of optical power that reaches unauthorised receiver increases with r as shown in (6). Fig. 9Open in figure viewerPowerPoint Pcorrect against total transmitted power per bit Eb = −130 dBJ with K = 4 users, Rb = 5 Gbps, L = 5 km, N = 3, and {ps; ph } = {7;7} Finally, we investigate Pcorrect as a function of the number of active users K in Fig. 10. Thanks to the effect of MAI from interfering users, Pcorrect is reduced when K increases. In addition, confidentiality can be increased by reducing the width of the optical beam. Although a FSO system with narrow beam is considerably affected by pointing error, an auto-tracking scheme may overcome this problem. Fig. 10Open in figure viewerPowerPoint Pcorrect against the number of active user K with Eb = −130 dBJ, Rb = 5 Gbps, L = 5 km, N = 3, r = 3 m, and {ps; ph } = {7;7} 7 Conclusion We have presented the method to formulate the mathematical expression for BER of relay-assisted AO/CDMA systems over log-normal turbulence channel. Other physical layer impairments were also taken into consideration including atmospheric attenuation, beam spreading, MAI, and background noise. The numerical results showed that relay transmission helps to significantly reduce the effect of atmospheric turbulence, hence AO/CDMA system could achieve a large number of users and long transmission distance. The security performance of the proposed system was also investigated with several values of system parameters including the location of eavesdropper and the beam width. High confidentiality could be achieved by properly selecting the system parameters. Thanks to the above-mentioned advantages, serial relaying of the AO/CDMA systems could be a promising candidate for the next generation broadband access networks. 8 Acknowledgment This research was funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant no. 102.02-2013.02. 10 Appendix 1: approximation for a sum of correlated log-normal random variables This appendix shows an approach of approximation for the summation of correlated log-normal random variables. Particularly, we can approximate , where pdf of all xk are , to single log-normal variable Z = exp (z) with pdf of z is . We can have the closed-form of mean and variance of random variable z as given by [20] (36)where are cross-correlation values between xk and xl, k ≠ l. 11 Appendix 2: Gauss–Hermite quadrature Gauss–Hermite quadrature is a form of Gaussian quadrature used for approximating the value of an integral. If we have a Gaussian integral as (37)then it can be approximated as [22] (38)where n is the required approximation order. xi, i = 1, 2, …, n are zeros of the Hermite polynomial Hn(x) and wi, i = 1, 2, …, n are the associated weight factors which is given by [22] (39) 9 References 1Heatley D.J. Wisely D.R. Neild I., and Cochrane P.: 'Optical wireless: the story so far', IEEE Commun. Mag., 1998, 36, (12), pp. 72– 82 (doi: https://doi.org/10.1109/35.735881) 2Liu Q. Qiao C. Mitchell G., and Stanton S.: 'Optical wireless communication networks for first- and last-mile broadband access [Invited]', J. Opt. Netw., 2005, 4, (12), pp. 807– 828 (doi: https://doi.org/10.1364/JON.4.000807) 3Ohtsuki T.: 'Performance analysis of atmospheric optical PPM CDMA systems', J. Lightwave Technol., 2005, 21, (2), pp. 406– 411 (doi: https://doi.org/10.1109/JLT.2003.808791) 4Ohba K. Hirano T. Miyazawa T., and Sasase I.: ' A symbol detection scheme to mitigate effects of scintilations and MAIs in optical atmospheric PPM-CDMA systems'. Proc. IEEE Globecom, St. Louis, MO, November/December 2005, pp. 1999– 2003 5Jazayerifar M., and Salehi J.A.: 'Atmospheric optical CDMA communications via optical orthogonal codes', IEEE Trans. Commun., 2006, 54, (9), pp. 1614– 1623 (doi: https://doi.org/10.1109/TCOMM.2006.881245) 6Miyazawa T., and Sasase I.: 'BER performance analysis of spectral phase-encoded optical atmospheric PPM-CDMA communication systems', J. Lightwave Technol., 2007, 25, (10), pp. 2992– 3000 (doi: https://doi.org/10.1109/JLT.2007.905219) 7Pham A.T. Luu T.A., and Dang N.T.: 'Performance bound for turbo-coded 2-D FSO/CDMA systems over atmospheric turbulence channel', IEICE Trans. Fundam., 2010, 93-A, (12), pp. 2696– 2699 (doi: https://doi.org/10.1587/transfun.E93.A.2696) 8Dang N.T., and Pham A.T.: 'Performance improvement of FSO/CDMA systems over dispersive turbulence channel using multi-wavelength PPM signaling', OSA Opt. Exp., 2012, 20, (24), pp. 26786– 26797 (doi: https://doi.org/10.1364/OE.20.026786) 9Zhu X., and Khan J.M.: 'Free-space optical communication through atmospheric turbulence channels', IEEE Trans. Commun., 2002, 50, (8), pp. 1293– 1300 (doi: https://doi.org/10.1109/TCOMM.2002.800829) 10Akella J. Yuksel M., and Kalyanaraman S.: 'Error analysis of multi-hop free-space optical communication'. Proc. of IEEE Int. Conf. on Communication, 2005, pp. 1777– 1781 11Safari M., and Uysal M.: 'Relay-assisted free-space optical communication', IEEE Trans. Wirel. Commun., 2008, 7, (12), pp. 5441– 5449 (doi: https://doi.org/10.1109/T-WC.2008.071352) 12Datsikas C.K. Peppas K.P. Sagias N.C., and Tombras G.S.: 'Serial free-space optical relaying communications over Gamma-Gamma atmospheric turbulence channels', J. Opt. Commun. Netw., 2010, 2, (8), pp. 576– 586 (doi: https://doi.org/10.1364/JOCN.2.000576) 13Feng M. Wang J.B. Sheng M. Cao L.L. Xie X.X., and Chen M.: 'Outage performance for parallel relay-assisted free-space optical communications in strong turbulence with pointing errors'. Proc. of International Conf. on Wireless Commun. and Signal Processing (WCSP), 2011, pp. 1– 5 14Chatzidiamantis N.D. Michalopoulos D.S. Kriezis E.E. Karagiannidis G.K., and Schober R.: 'Relay selection protocols for relay-assisted free-space optical systems', IEEE/OSA J. Opt Commun. Netw., 2013, 5, (1), pp. 92– 103 (doi: https://doi.org/10.1364/JOCN.5.000092) 15Kashani M. Safari M., and Uysal M.: 'Optimal relay placement in cooperative free-space optical communication systems', IEEE J. Opt. Commun. Netw., 2013, 5, (1), pp. 37– 47 (doi: https://doi.org/10.1364/JOCN.5.000037) 16Meenakshi M., and Andonovic I.: 'Effect of physical layer impairments on SUM and AND detection strategies for 2-D optical CDMA', IEEE Photon. Technol. Lett., 2005, 17, (5), pp. 1112– 1114 (doi: https://doi.org/10.1109/LPT.2005.843935) 17Tancevski L., and Andonovic I.: 'Hybrid wavelength hopping/time spreading schemes for use in massive optical networks with increased security', J. Lightw. Technol., 1996, 14, (12), pp. 2636– 2647 (doi: https://doi.org/10.1109/50.545782) 18Ricklin J.C., and Davidson F.M.: 'Atmospheric turbulence effects on a partially coherent Gaussian beam: implications for free space laser communication', J. Opt. Soc. Amer. A, Opt. Image Sci., 2002, 19, (9), pp. 1794– 1802 (doi: https://doi.org/10.1364/JOSAA.19.001794) 19Farid A.A., and Hranilovic S.: 'Outage capacity optimization for free-space optical links with pointing errors', IEEE J. Lightw. Technol., 2007, 25, (7), pp. 1702– 1710 (doi: https://doi.org/10.1109/JLT.2007.899174) 20Navidpour S.M. Uysal M., and Kavehrad M.: 'BER performance of free-space optical transmission with spatial diversity', IEEE Trans. Wirel. Comm., 2007, 6, (8), pp. 2813– 2819 (doi: https://doi.org/10.1109/TWC.2007.06109) 21Shake T.H.: 'Security performance of optical CDMA against eavesdropping', IEEE J. Lightw. Technol., 2005, 23, (2), pp. 655– 670 (doi: https://doi.org/10.1109/JLT.2004.838844) 22Simon M.K., and Alouini M.S.: ' Digital communication over fading channels' (John Wiley and Sons, New York, 2000) Citing Literature Volume9, Issue5October 2015Pages 241-248 FiguresReferencesRelatedInformation

Referência(s)
Altmetric
PlumX