124 research outputs found

    Introduction to Random Signals and Noise

    Get PDF
    Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal. With a strong mathematical grounding, this text provides a clear introduction to the fundamentals of stochastic processes and their practical applications to random signals and noise. With worked examples, problems, and detailed appendices, Introduction to Random Signals and Noise gives the reader the knowledge to design optimum systems for effectively coping with unwanted signals.\ud \ud Key features:\ud • Considers a wide range of signals and noise, including analogue, discrete-time and bandpass signals in both time and frequency domains.\ud • Analyses the basics of digital signal detection using matched filtering, signal space representation and correlation receiver.\ud • Examines optimal filtering methods and their consequences.\ud • Presents a detailed discussion of the topic of Poisson processed and shot noise.\u

    Physical Layer Security using Time-Reversal Pre-Coding based OFDM-DCSK Communication System with Artificial Noise Injection

    Get PDF
    In this paper, Time-Reversal (TR) pre-coding with Artificial Noise (AN) injection is proposed to enhance the physical layer security (PLS) performance in orthogonal Frequency Division Multiplexing-Differential Chaos Shift Keying (OFDM-DCSK) system, which is named the TRAN-OFDM-DCSK system. This approach is provided to achieve high data rates, high PL data security, and high reliability performance. The AN signal does not spoil the transmitted data to the genuine receiver, but it reduces the ungenuine detection performance. This system ensures the secrecy of communication to the genuine receiver when the sender knows the Channel State Information (CSI) of the genuine communication link. Still, the information about the instantaneous CSI of a possible eavesdropper does not know the transmitter. The performance of the proposed TRAN-OFDM-DCSK system is investigated and tested under a Flat Rayleigh Fading Channel (FRFC). An approach is provided for calculating the performance of Bit Error Rate (BER), and the expression of BER analytical is derived and compared with the simulation version. Furthermore, the ergodic Secrecy Rate (SR) is derived and analyzed at the genuine and ungenuine receivers over the FRFC. Our result shows the best performance for the genuine receiver compared with ungenuine receiver regarding secrecy performance for BER and SR

    Binary time series generated by chaotic logistic maps

    Get PDF
    This paper examines stochastic pairwise dependence structures in binary time series obtained from discretised versions of standard chaotic logistic maps. It is motivated by applications in communications modelling which make use of so-called chaotic binary sequences. The strength of non-linear stochastic dependence of the binary sequences is explored. In contrast to the original chaotic sequence, the binary version is non-chaotic with non-Markovian non-linear dependence, except in a special case. Marginal and joint probability distributions, and autocorrelation functions are elicited. Multivariate binary and more discretised time series from a single realisation of the logistic map are developed from the binary paradigm. Proposals for extension of the methodology to other cases of the general logistic map are developed. Finally, a brief illustration of the place of chaos-based binary processes in chaos communications is given.Binary sequence; chaos; chaos communications; dependence; discretisation; invariant distribution; logistic map; randomness

    Performance of differential chaos-shift-keying digital communication systems over a multipath fading channel with delay spread

    Get PDF
    Author name used in this publication: Chi K. TseAuthor name used in this publication: Francis C. M. Lau2004-2005 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Cryptographic requirements for chaotic secure communications

    Get PDF
    In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security. In this work we provide a set of guidelines that every new cryptosystems would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are offered regarding some practical aspects of communications, such as channel noise, limited bandwith, and attenuation.Comment: 13 pages, 3 figure

    Chaos-Based Spectral Keying Technique for Secure Communication and Covert Data Transmission between Radar Receivers over an Open Network Channel

    Get PDF
    Application of chaotic signals in modern telecommunication facilities and radars is an actual task that can significantly extend functionality of these systems and improve their performance. In this chapter, we propose a concept of chaos-based technique for secure communication and hidden data transmission over an open network channel which is based on a novel method for spectral keying of chaotic signal generated by nonlinear dynamical system with delayed feedback. In the technique developed, the modulating information sequence controls the parameter of nonlinear element, so that it switches the chaotic modes and changes the spectral structure of the signal, transmitted to the communication channel. A noncoherent reception is used for demodulation the information message from received waveform. We start from theoretical justification of the proposed scheme, and show then the numerical simulations and imitation modeling results, as well as demonstrate experimental validation of suggested technique. Also, the communication system reliability and its covert operation efficiency under impact of AWGN in the environment with high-level interferences have been shown by means of evaluation the system anti-jamming capabilities and unauthorized access immunity

    The importance of choosing attractors for optimizing chaotic communications

    Get PDF

    A high security and noise immunity of speech based on double chaotic masking

    Get PDF
    It is known that increasing the security of the information and reducing the noise effect through public channels are two of the main priorities in developing any communication system. In this article, an efficient, secure communication system with two levels of encryption has been applied to the speech signal. The suggested security approach was implemented by using two different stages of chaotic masking on the signal; one masking was conducted by using Lorenz system and the other masking was built by using RÓ§ssler chaotic flow system. The main goal of developing this two-chaotic masking approach is to increase the key space and the security of the information. Also, an immunity technique has been implemented in the suggested approach to reduce the noise effect. For practical application purposes, this system was tested with additive white gaussian noise (AWGN) channel. The simulation results show that the quality of reconstructed speech signal is changeable according to the used signal to noise ratio (SNR); therefore, a proposed technique based on digital processing method (DPM) was applied to the first masked signal by converting the sampled data from the analog to the binary format. The simulation results show that an 22 dB (SNR) is sufficient to recover the speech signal with minimum noise by using the suggested approach
    • …
    corecore