I. Introduction
As data traffic grows dramatically and the accessibility of transparent optical networks increases, optical network security is increasingly important [1]. Many countermeasures against eavesdropping attacks have been proposed using chaotic encryption [2]. Although the data confidentiality is effectively enhanced, they are still susceptible to active attacks. For example, a malicious attacker can access the network and masquerade as a legal user or perform a man-in-the-middle attack [3]. Thus, authentication methods must be employed to ensure the legitimacy of the access devices.