A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
Authors
Abstract:
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynamic properties of chaotic nonlinear systems, the performance of most of such designs is not studied and so is not still suitable for wireless channels. To overcome this problem, in this paper a novel wide-band chaos-based communication scheme in multipath fading channels is presented, where the chaotic synchronization is implemented by particle filter observer. To illustrate the effectiveness of the proposed scheme, numerical simulations based on particle filter are presented in different channel conditions and the results are compared with two other EKF and UKF based communication scheme. Simulation results show the Remarkable BER performance of the proposed particle filter-based system in both AWGN and multipath fading channels condition, causes this idea act as a good candidate for asynchronous wide band communication.
similar resources
A residue number system based parallel communication scheme using orthogonal signaling. II. Multipath fading channels
A novel signaling scheme is presented, where a set of orthogonal signals is transmitted in parallel, which are selected according to the so-called residue number system (RNS). Hence the system is essentially a multiple code parallel communication scheme using high modulation alphabets. It is demonstrated that the system performance can be substantially improved by exploiting a number of advanta...
full textA Residue Number System Based Parallel Communication Scheme Using Orthogonal Signaling: Part II—Multipath Fading Channels
A novel signaling scheme is presented, where a set of orthogonal signals is transmitted in parallel. The signals are selected according to the so-called residue number system (RNS). Hence the system is essentially a multiple code parallel communication scheme using high-modulation alphabets. It is demonstrated that the system performance can be substantially improved by exploiting a number of a...
full textA Private Secure Communication Scheme Using UKF-based Chaos Synchronization
This paper presents a novel chaotic communication method using an Unscented Kalman Filter (UKF). Applying UKF, the method proposes the estimation of the state variables of the chaotic dynamical system and synchronization. The proposed method is then applied to new private secure communication. The chaotic synchronization is implemented by the UKF in the presence of processing noise and measurem...
full textJoint Data-Channel Estimation using the Particle Filtering on Multipath Fading Channels
Instead of the per-survivor processing (PSP) detector which is the state-of-the-art solution for the joint data-channel estimation in fast fading channels, we propose a new reducedcomplexity maximum likelihood sequence detector (MLSD) based on the particle filtering technique. We show that the particle detector offers a better trade-off between performance and computational complexity, compared...
full textA Chaos-Based Communication Scheme Using Proportional and Proportional-Integral Observers
In this paper, we propose a new chaos-based communication scheme using the observers. The novelty lies in the masking procedure that is employed to hide the confidential information using the chaotic oscillator. We use a combination of the addition and inclusion methods to mask the information. The performance of two observers, the proportional observer (P-observer) and the proportional integra...
full textBreaking a chaos-noise-based secure communication scheme.
This paper studies the security of a secure communication scheme based on two discrete-time intermittently chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) The key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-...
full textMy Resources
Journal title
volume 8 issue 1
pages 1- 9
publication date 2012-03
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023