76 research outputs found

    Multi-User Multi-Carrier Differential Chaos Shift Keying Communication System

    Full text link
    In this paper, a multi user Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple. In this architecture of MC-DCSK system, for each user, chaotic reference sequence is transmitted over a predefined subcarrier frequency. Multiple modulated data streams are transmitted over the remaining subcarriers allocated for each user. This transmitter structure saves energy and increases the spectral efficiency of the conventional DCSK system.Comment: Accepted in the IEEE International Wireless Communications and Mobile Computing Conference (IWCMC 2013

    Physical Layer Security using Time-Reversal Pre-Coding based OFDM-DCSK Communication System with Artificial Noise Injection

    Get PDF
    In this paper, Time-Reversal (TR) pre-coding with Artificial Noise (AN) injection is proposed to enhance the physical layer security (PLS) performance in orthogonal Frequency Division Multiplexing-Differential Chaos Shift Keying (OFDM-DCSK) system, which is named the TRAN-OFDM-DCSK system. This approach is provided to achieve high data rates, high PL data security, and high reliability performance. The AN signal does not spoil the transmitted data to the genuine receiver, but it reduces the ungenuine detection performance. This system ensures the secrecy of communication to the genuine receiver when the sender knows the Channel State Information (CSI) of the genuine communication link. Still, the information about the instantaneous CSI of a possible eavesdropper does not know the transmitter. The performance of the proposed TRAN-OFDM-DCSK system is investigated and tested under a Flat Rayleigh Fading Channel (FRFC). An approach is provided for calculating the performance of Bit Error Rate (BER), and the expression of BER analytical is derived and compared with the simulation version. Furthermore, the ergodic Secrecy Rate (SR) is derived and analyzed at the genuine and ungenuine receivers over the FRFC. Our result shows the best performance for the genuine receiver compared with ungenuine receiver regarding secrecy performance for BER and SR

    Analog Network Coding for Multi-User Spread-Spectrum Communication Systems

    Full text link
    This work presents another look at an analog network coding scheme for multi-user spread-spectrum communication systems. Our proposed system combines coding and cooperation between a relay and users to boost the throughput and to exploit interference. To this end, each pair of users, A\mathcal{A} and B\mathcal{B}, that communicate with each other via a relay R\mathcal{R} shares the same spreading code. The relay has two roles, it synchronizes network transmissions and it broadcasts the combined signals received from users. From user B\mathcal{B}'s point of view, the signal is decoded, and then, the data transmitted by user A\mathcal{A} is recovered by subtracting user B\mathcal{B}'s own data. We derive the analytical performance of this system for an additive white Gaussian noise channel with the presence of multi-user interference, and we confirm its accuracy by simulation.Comment: 6 pages, 2 figures, to appear at IEEE WCNC'1

    A chaotic spread spectrum system for underwater acoustic communication

    Get PDF
    The work is supported in part by NSFC (Grant no. 61172070), IRT of Shaanxi Province (2013KCT-04), EPSRC (Grant no.Ep/1032606/1).Peer reviewedPostprin

    Adaptive detection for a differential chaos-based multiple access system on unknown multipath fading channels

    Get PDF
    This paper addresses the problem of bit detection for a chaos-based multiple-access system. In particular, one considers the Differential Chaos Shift Keying modulation. It is assumed that the transmission channels are frequency-selective. Moreover, the channel coefficients and the channel delays are unknown to the receiver. It is only assumed that vague estimates of the minimum and maximum channel delays are available for the user of interest. In this context, the detection is achieved using a training sequence from which an LMS detector is derived. The theoretical performance results are compared to those of the optimal detector for which all channel characteristics are known. Simulation results are given, which confirm the theoretical study
    • 

    corecore