180 research outputs found

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research

    Security Improvements for the S-MIM Asynchronous Return Link

    Get PDF
    S-MIM is a hybrid terrestrial and satellite system that enables efficient and high-performance communication in the return link. For communication to be possible between a device and the satellite, a preamble has to be established. Some parameters to generate the preamble are broadcasted by the satellite without protection. It is very important to protect the preamble, because if an attacker knows the preamble he could avoid the communication. This project presents a method without the necessity of establishing the preamble in a way that ensures the communication. However, to achieve this security the trade-off is degradation of throughput and a delay in communication

    A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism

    Get PDF
    Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) techniques are widely used to implement code-division multiple access (CDMA) in wireless communication systems.  Both DSSS and FHSS systems help reducing the effects of interference on the transmitted information making it robust against channel impairments.  DSSS uses a signal bandwidth that is much broader than the information signal bandwidth.  Traditionally, the wide band signal is generated by multiplying the narrowband information signal with a binary code, often designated as a spreading code, to generate the wideband signal that is transmitted. The original information signal can be recreated at the receiver by multiplying the received wideband signal by the same binary code (now designated as a de-spreading code) used to generate the wideband transmitted signal.  To extract the original information signal, the spreading and de-spreading codes must be in synchronism at the receiver and amplitude match with each other.  A new modification for the direct sequence spread spectrum is proposed in this paper. The mechanism introduced in this approach implicates generating the wideband signal by circularly shifting the spreading code (PN) by n places, where n represents the value of the current byte of information signal. The yielded signal is modulated using BPSK modulator before transmitting it.  The original information signal is extracted at the receiver by correlating the received signal (which is actually the original spread sequence circularly shifted by n places) with a locally generated replica of the spreading code.  The position of the maximum value of the cross-correlation vector represents the value of the information signal byte.  The proposed configuration has been implemented using Simulink simulator and the obtained results show that its performance is identical with the conventional DSSS

    Mobile and Wireless Communications

    Get PDF
    Mobile and Wireless Communications have been one of the major revolutions of the late twentieth century. We are witnessing a very fast growth in these technologies where mobile and wireless communications have become so ubiquitous in our society and indispensable for our daily lives. The relentless demand for higher data rates with better quality of services to comply with state-of-the art applications has revolutionized the wireless communication field and led to the emergence of new technologies such as Bluetooth, WiFi, Wimax, Ultra wideband, OFDMA. Moreover, the market tendency confirms that this revolution is not ready to stop in the foreseen future. Mobile and wireless communications applications cover diverse areas including entertainment, industrialist, biomedical, medicine, safety and security, and others, which definitely are improving our daily life. Wireless communication network is a multidisciplinary field addressing different aspects raging from theoretical analysis, system architecture design, and hardware and software implementations. While different new applications are requiring higher data rates and better quality of service and prolonging the mobile battery life, new development and advanced research studies and systems and circuits designs are necessary to keep pace with the market requirements. This book covers the most advanced research and development topics in mobile and wireless communication networks. It is divided into two parts with a total of thirty-four stand-alone chapters covering various areas of wireless communications of special topics including: physical layer and network layer, access methods and scheduling, techniques and technologies, antenna and amplifier design, integrated circuit design, applications and systems. These chapters present advanced novel and cutting-edge results and development related to wireless communication offering the readers the opportunity to enrich their knowledge in specific topics as well as to explore the whole field of rapidly emerging mobile and wireless networks. We hope that this book will be useful for students, researchers and practitioners in their research studies

    Use of RNS Based Pseudo Noise Sequence in DS-CDMA and 3G WCDMA

    Get PDF
    Code Division Multiple Access (CDMA) based on Spread Signal (SS) has emerged as one of the most important multiple access technologies for Second Generation (2G) and Third Generation (3G) wireless communication systems by its wide applications in many important mobile cellular standards. CDMA technique relies on spreading codes to separate dierent users or channels and its properties will govern the performance of the system. So many of the problems of communication systems based on CDMA technology stem from the spreading codes/sequences, which includes two sub-categories, one being the orthogonal codes, such as Walsh Hadamard (WH) codes and Orthogonal Variable Spreading Factor (OVSF) codes, and the other being pseudo-noise or Pseudo Random (PN) sequences, such as Gold sequences, Kasami sequences, m-sequences, etc. In this thesis a PN sequence generation based on Residue Arithmetic is investigated with an eort to improve the performance of existing interference-limited CDMA technology for mobile cellular systems. This interference-limited performance is due to the fact that all the existing CDMA codes used in mobile cellular standards does not consider external interferences, multipath propagation, Doppler eect etc. So the non-ideal correlation properties of the pseudo-random CDMA codes results in MAI when used in a multi-user system. The PN codes appear random yet they are completely deterministic in nature with a small set of initial conditions. Consequently this work focuses on CDMA code design approach based on Residue Number System (RNS) which should take into account as many real operational conditions as possible and to maintain a suciently large code set size.First, the thesis reviews RNS, DS-CDMA and CDMA codes that are already implemented in various mobile cellular standards. Then the new PN Sequencegenerator design based on RNS is discussed. Comparison of the generated PN sequence with respect to other standard sequence is done in terms of number of codes and correlation properties. Monte-Carlo simulations with the generated sequence are carried out for performance analysis under multi-path environment. The system has been evaluated in AWGN, Rayleigh Fading channel and dierent Stationary Multipath Channels for dierent cross-correlation threshold. It is known that orthogonal Codes are used to multiplex more than one signal for downlink transmission over cellular networks. This downlink transmission is prone to self interference caused by the loss of orthogonality between spreading codes due to multipath propagation. This issue is investigated in detail with respect to WCDMA standards, which is very good representative for CDMA based 3G mobile cellular systems where the channelization code is OVSF code. The code assignment blocking (CAB) (If a particular code in the tree is used in a cell, then all its parent codes and child codes should not be used in the same cell to maintain orthogonality among the users) problem of OVSF codes restricts the number of available codes for a given cell. Since the 3rd generation WCDMA mobile communication systems apply the same multiple access technique, the generated sequence can also be the channelization code for downlink WCDMA system to mitigate the the same. The performance of the system is compared with Walsh Hadamard code over multipath AWGN and dierent Fading channels. This thesis work shows that RNS based PN sequence has enhanced performance to that of other CDMA codes by comparing the bit error probability in multi- user and multipath environment thus contributing a little towards the evolution of next generation CDMA technology

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    Interference Mitigation in Frequency Hopping Ad Hoc Networks

    Get PDF
    Radio systems today exhibit a degree of flexibility that was unheard of only a few years ago. Software-defined radio architectures have emerged that are able to service large swathes of spectrum, covering up to several GHz in the UHF bands. This dissertation investigates interference mitigation techniques in frequency hopping ad hoc networks that are capable of exploiting the frequency agility of software-defined radio platforms
    corecore