Wide-Band Optical Frequency Hopping Using Digital Chaos

  • Cong Geng
  • Xuelin YangEmail author
  • Weisheng Hu


A wide-band optical frequency hopping (FH) scheme is proposed and analyzed using hyper digital chaos, where the chaotic sequences are applied to encrypt the original data in physical layer during transmission. The multi-fold data encryption is achieved based on the dynamic generation of the optical carrier frequency, FH rate as well as the available frequency set respectively. A hyper digital chaos is used to generate the multiple, independent chaotic sequences for the proposed data encryption, as a result, a huge key space of 1058 is provided to enhance the security. The performances of data transmission and security enhancement against various attacks are evaluated in details.


Optical communication Signal processing Frequency hopping Data encryption Security Digital chaos 



This work was supported in part by International S&T Cooperation Program of China, 2016YFE0104500, Natural Science Foundation of China under Grants 61571291, 61431009 and 61221001.


  1. 1.
    Wang, S., Chen, W., Zhu, N., Liu, J., Wang, W., & Guo, J. (2015). A novel optical frequency-hopping scheme for secure WDM optical communications. IEEE Photonics Journal, 7(3), 1–8.Google Scholar
  2. 2.
    Cui, Y., Hua, X., Chen, X., Zhang, S., & Li, H. (2014). Performance analysis of variable rate frequency hopping system with signal parameter estimation. The Journal of Computer Information Systems, 10(24), 10379–10388.Google Scholar
  3. 3.
    Ling, C., & Sun, S. (1998). Chaotic frequency hopping sequences. IEEE Transactions on Communications, 46(11), 1433–1437.CrossRefGoogle Scholar
  4. 4.
    Teh, K. C., Kot, A. C., & Li, K. H. (1997). Partial-band jamming rejection of FFH/BFSK with product combining receiver over a Rayleigh-fading channel. IEEE Communications Letters, 1(3), 64–66.CrossRefGoogle Scholar
  5. 5.
    Kaleh, G. K. (Aug. 1997). Performance comparison of frequency-diversity and frequency-hopping spread-spectrum systems. IEEE Transactions on Communications, 45(8), 910–912.CrossRefGoogle Scholar
  6. 6.
    Shen, Z., Yang, X., He, H., & Hu, W. (2016). Secure transmission of optical DFT-S-OFDM data encrypted by digital chaos. IEEE Photonics Journal, 8(3), 1–9.CrossRefGoogle Scholar
  7. 7.
    Torrieri, D. J. (1985). Principles of secure communication systems. Artech House, Inc., 56(4), 136–136.Google Scholar
  8. 8.
    Robertson, R. C., & Lee, K. Y. (2006). Performance of fast frequency-hopped MFSK receivers with linear and self-normalization combining in a Rician fading channel with partial-band interference. IEEE Journal on Selected Areas in Communications, 10(4), 731–741.CrossRefGoogle Scholar
  9. 9.
    Tan, J., & Stuber, G. L. (2003). Anti-jamming performance of multi-carrier spread spectrum with constant envelope”, IEEE International Conference on Communications. ICC '03, Vol. 1, pp. 743–747.Google Scholar
  10. 10.
    Levitt, B. (1985). FH/MFSK performance in multitone jamming. IEEE Journal on Selected Areas in Communications, 3(3), 627–643.CrossRefGoogle Scholar
  11. 11.
    Yan, Y., Quan, H., & Cui, P. (2012). Research on follower jamming of FH communication. 2012 International Conference on Computer Technology and Science, 47, 247–252.Google Scholar
  12. 12.
    Yang, B., Shen, Y., Zhang, H., & Huang, B. (2008). Influence of directed tracking jamming on short-wave frequency hopping system and anti-jamming tactic of the system. Shipboard Electronic Countermeasure, 31(4), 65–69.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Shanghai Institute for Advanced Communication and Data Science, State Key Lab of Advanced Optical Communication Systems and NetworksShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations