Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Similar documents
BEING wideband, chaotic signals are well suited for

Implementation of DSSS System using Chaotic Sequence using MATLAB and VHDL

LORENZ-BASED CHAOTIC SECURE COMMUNICATION SCHEMES

Improving security of communication systems using CHAOS

Lecture 9: Spread Spectrum Modulation Techniques

PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS

Chaotic Communications With Correlator Receivers: Theory and Performance Limits

A NOVEL FREQUENCY-MODULATED DIFFERENTIAL CHAOS SHIFT KEYING MODULATION SCHEME BASED ON PHASE SEPARATION

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS

A Novel Spread Spectrum System using MC-DCSK

Improved concatenated (RS-CC) for OFDM systems

IDMA Technology and Comparison survey of Interleavers

Performance of Reed-Solomon Codes in AWGN Channel

Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Study of Turbo Coded OFDM over Fading Channel

Spread Spectrum Techniques

A MODIFIED DIRECT-SEQUENCE SPREAD SPECTRUM MODULATION SCHEME FOR BURST TRANSMISSIONS. Bart Scheers and Vincent Le Nir

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 51, NO. 2, FEBRUARY

CONVOLUTIONAL CODED GENERALIZED DIRECT SEQUENCE SPREAD SPECTRUM

Project: IEEE P Working Group for Wireless Personal Area Networks N

PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Revision of Previous Six Lectures

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems

UNIT-1. Basic signal processing operations in digital communication

Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Improvements encoding energy benefit in protected telecommunication data transmission channels

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

ECE 6640 Digital Communications

Chapter-1: Introduction

Revision of Previous Six Lectures

Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel

Performance Evaluation of BPSK modulation Based Spectrum Sensing over Wireless Fading Channels in Cognitive Radio

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff

Performance Analysis of OFDM System with QPSK for Wireless Communication

Prof. P. Subbarao 1, Veeravalli Balaji 2

Multiplexing Module W.tra.2

Pilot-Assisted DFT Window Timing/ Frequency Offset Synchronization and Subcarrier Recovery 5.1 Introduction

Fundamentals of Digital Communication

Chapter 2 Channel Equalization

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Comparative Analysis of the BER Performance of WCDMA Using Different Spreading Code Generator

Frequency-Hopped Spread-Spectrum

Journal of American Science 2015;11(7)

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Performance analysis of OFDM with QPSK using AWGN and Rayleigh Fading Channel

Performance Analysis of Concatenated RS-CC Codes for WiMax System using QPSK

Lab/Project Error Control Coding using LDPC Codes and HARQ

Chapter 2 Direct-Sequence Systems

Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique

CDMA Mobile Radio Networks

Multirate schemes for multimedia applications in DS/CDMA Systems

Performance Analysis Of Multi Carrier CDMA System

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

Channel Estimation in Multipath fading Environment using Combined Equalizer and Diversity Techniques

Comparative Study of OFDM & MC-CDMA in WiMAX System

COMMUNICATION SYSTEMS

MC CDMA PAPR Reduction Using Discrete Logarithmic Method

Comparative Analysis of Inter Satellite Links using Free Space Optical Communication with OOK and QPSK Modulation Techniques in Turbo Codes

Performance Evaluation of different α value for OFDM System

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

Study on the UWB Rader Synchronization Technology

Performance Evaluation of ½ Rate Convolution Coding with Different Modulation Techniques for DS-CDMA System over Rician Channel

Performance comparison of convolutional and block turbo codes

Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators

Comparison Between Serial and Parallel Concatenated Channel Coding Schemes Using Continuous Phase Modulation over AWGN and Fading Channels

Performance Evaluation of OFDM System with Rayleigh, Rician and AWGN Channels

Table of Contents. Acknowledgments... XVII Prologue... 1

CDMA Principle and Measurement

Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1, 2X2&2X4 Multiplexing

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting

B SCITEQ. Transceiver and System Design for Digital Communications. Scott R. Bullock, P.E. Third Edition. SciTech Publishing, Inc.

CHAPTER 3 ADAPTIVE MODULATION TECHNIQUE WITH CFO CORRECTION FOR OFDM SYSTEMS

THE EFFECT of multipath fading in wireless systems can

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Adoption of this document as basis for broadband wireless access PHY

TRANSMITING JPEG IMAGE OVER USING UPA AND CHOTIC COMMUNICATION

CDMA Technology. Pr. S.Flament Pr. Dr. W.Skupin On line Course on CDMA Technology

Digital Communication System

UNIVERSITY OF CALIFORNIA College of Engineering Department of Electrical Engineering and Computer Sciences EECS 121 FINAL EXAM

Pseudo Noise Sequence Generation using Elliptic Curve for CDMA and Security Application

Multi-User Multi-Carrier Differential Chaos Shift Keying Communication System

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

2. TELECOMMUNICATIONS BASICS

MULTILEVEL RS/CONVOLUTIONAL CONCATENATED CODED QAM FOR HYBRID IBOC-AM BROADCASTING

PRINCIPLES OF SPREAD-SPECTRUM COMMUNICATION SYSTEMS

two computers. 2- Providing a channel between them for transmitting and receiving the signals through it.

MITIGATING INTERFERENCE TO GPS OPERATION USING VARIABLE FORGETTING FACTOR BASED RECURSIVE LEAST SQUARES ESTIMATION

Transcription:

2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels M. Bala Krishna *1, D.Arun Kumar 2 * 1 Department of ECE, GMRIT, RAJAM, AP, INDIA ABSTRACT Chaotic signals are non-periodic, random-like and bounded signals that are generated in a deterministic manner using chaotic mapping techniques and exhibits sensitive dependence on initial conditions. Even though a small difference is introduced between the initial values, the two chaotic signals separate rapidly from each other after a short time period. Using these mapping techniques various techniques for modulation of chaos shift keying signals have been implemented and simulated. And synchronization of chaos is verified by using same mapping technique at both transmitter and receiver. The data information symbols are firstly coded by a Reed Solomon (RS) coder. RS are powerful error correcting codes that can be employed in a wide variety of digital communication systems. Interleaving is a technique commonly used in communication systems to overcome correlated channel noise such as burst errors or fading using RS coder the performance of the chaos systems are improved. Keywords: Choatic Shift Keying, Reed Solomon Code, Interleaving, Mapping I. INTRODUCTION Generally, a chaotic process results from the action of a non-linear dynamical system. In a chaotic process, the state of the system depends on initial conditions. The chaos process loses its deterministic nature over certain time and becomes undeterministic in nature. A chaotic process looks similar to a random process, but a stationary random process is independent of initial conditions while a chaos process is not. Looking at the process, one cannot determine whether it is a random process, or a chaotic process. Some examples where we can observe chaos processes are nature, chemical reactions, oscillation of pendulum, and electrical circuits. The chaotic process has the ability to produce highly diversified waveforms and is undeterministic in nature. The field of chaotic communications has gone through various periods of intense interest, initiated by Shannon s 1947 recognition that the channel capacity of a communications link is optimized when the waveform is a noise-like maximal entropy signal [1] and further solidified by Chua s 1980 implementation of a practical chaotic electrical circuit [2]. Chaotic communication systems resemble direct sequence spread spectrum communication systems in that the data is spread across a relatively wide transmission bandwidth and then dispread by the intended receiver with a timesynchronized spreading sequence. The chaotic sequence based communication systems exhibit analytically better performance than direct sequence based communication systems and may in general be viewed as a generalization of direct sequence approaches. Chaotic systems have properties such as periodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, IJSRSET141119 Received: 15 Dec 2014 Accepted: 20 Dec 2014 January-February 2015 [(1)1: 52-56] 52

that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed. WORKING PRINCIPLE The principle of chaotic masking hints at the larger issue of communication secrecy. Certainly, fundamental properties of chaotic systems seem to make them ideal for this purpose. Chaotic systems are inherently unpredictable. Their dynamics are a periodic and irregular. A small message added to or modulated onto unpredictable a periodic and irregular wave forms could be difficult to decipher without a second chaotic system, identical to the first, which can synchronize to the transmitter. Concealment, privacy, and encryption these aspects can be interpreted in the context of chaotic communication. Concealment of a message using chaotic carrier signals is possible because the carrier is irregular and a periodic. The presence of a message in the chaotic fluctuations may not be obvious. According to Shannon, the second aspect, communication privacy, occurs for systems in which special equipment is required to recover the message. This situation is present with chaotic communication systems because an eavesdropper must have the proper receiver system, with matched parameter settings, to decode the message. Finally, encryption occurs naturally in chaotic communication techniques. In conventional encryption techniques, a key is often used to encrypt the message. If the transmitter and receiver share the same encoding key, the scrambled message can be recovered by the receiver. In chaotic systems, the transmitter itself acts as a dynamical key. The receiver must be able to synchronize to the transmitter s dynamical parameters. A direct application of chaos theory to telecommunication systems appears in a conventional digital spread spectrum, where the information is spread over a wider band by using a chaotic signal instead of the usual periodic sequence, called Pseudo-noise (PN) sequence, the latter is generated, for instance, by linear shift registers. The problem with a linear shift register generator is that the price paid for making the period of the PN long increases sharply because a large amount of storage capacity and a large number of logic circuits are required. This imposes a practical limit on how large the period of the PN can actually be made. This can be overcome by the use of digital chaotic sequence generators. A classic, efficient, and well-studied method of generating a sequence of pseudo random bits is the linear feedback shift register. A shift register is a very simple electronic device, which produces a very fast pseudo random sequence. Basically, this device is formed by a sequence of adjacent bits in a register and at each clock signal the sequence is shifted a position to the right. The right-most bit is the output. To the left, one additional bit is introduced which is computed by a function, named feedback function, of the previous contents of the registers. The binary storage elements are called the stages of the shift register, and their contents are called the state of the shift register. After starting the shift register in any initial state, it progresses through some sequence of states; hence a periodic succession ultimately results. This succession is used in the XOR operation to produce the ciphered message. When the feedback function is linear, the shift register is called a linear shift register and using the theory of polynomials over finite fields, it is possible to discover how to design a device that produces a sequence whose period is very long and has good randomness properties. But, it is important to stress that the linear feedback shift register is insecure for cryptographic purposes. 53

II. METHODS AND MATERIAL A. How to achieve chaotic behaviour? Chaotic behaviour can be obtained by using different mapping techniques [4].In this paper we are using tent mapping technique. TENT MAP: The following is a tent map equation. { ( ) Where m=1.9 and x(0)=0.4142. A code illustrating chaotic behaviour is given below: ( ) ( ( ) ) ( ) ( ) ( ) ( ( )) Transmitter Structure 1. Error coding block The data information symbols are firstly coded by a Reed Solomon (RS) coder [6]. RS are powerful error correcting codes that can be employed in a wide variety of digital communication systems. The RS (255, 239, 8) is used in this project. Interleaving is a technique commonly used in communication systems to overcome correlated channel noise such as burst errors or fading. As a result of interleaving, correlated noise introduced in the transmission channel appears to be statistically independent at the receiver and thus allows better error correction. Without an interleaver, the RS decoder cannot correct more than 8 errors in code words. At the output of the interleaver, the symbols are coded with a convolution coder (7, 1/2) with code rate R=1/2. 2. Chaotic modulator Figure 1: Tent map CHAOS BASED COMMUNICATION SYSTEM USING REED SOLOMON (RS) ENCODER & DECODER The main goal of using a chaotic modulator is to have a highly secure transmission with small complexity and low cost of implementation. By introducing this simple modulator, the system can benefit of all the features offered by the chaotic signal. After coding the information bits, the output symbols are transmitted using a chaotic signal. Then According to the above equation, the generated chaotic signals can take place in the two regions for ( ). The inner region, is used as a guard region to ensure a minimum distance between the two waveforms associated to and. Finally, the transmitted baseband signal is ( ) Figure 2 : Baseband chaotic communication system with error coding and decoding block 54

Figure 3: Chaotic modulator Figure 3 shows the chaotic modulator. Note that this baseband chaotic signal at the output of the modulator can be moved to any desired frequency band for a pass band transmission. A square root raised cosine filter is used as pulse shape filters for the chaotic symbolic samples. Receiver structure After passing through an AWGN channel, the received signal is Where h[n] is the pulse shaping filter, w[n] is an additive white Gaussian noise with power spectral density equal to, T is the period of dynamic symbols, and denotes the discrete time convolutional operator. We assume that we have a perfect clock synchronisation on the receiver side which means that the sampling at the output of the matched filter is synchronized with the sampling period of the received signal. The demodulation of the received chaotic signal is achieved by the chaotic demodulator. Finally it is decoded by an RS decoder to estimate the emitted bits. The proposed scheme has been verified in Rayleigh Fading channel also. Assuming that the transmitted signal is corrupted by additive noise, the received signal is given by where ( ) denotes the noise signal. At the receiver, a self-synchronization circuit will be used to reproduce the chaotic signal. The reproduced signal then correlates with the received signal r(t). The output of the correlater is given by ( ) ( ) ( ) ( )( ) Where is the acquisition time to achieve synchronization. The output of the correlator is compared with the threshold (zero in this case) to determine whether a +1 or 1 has been received. If the correlator output is larger than zero, a +1 is detected. Otherwise, a 1 is decoded. III. RESULTS AND DISCUSSION Figure 5 : Bit Error Rate (BER) calculation over AWGN channel for RS (7, 3) code. Chaotic Demodulator Figure 4: Coherent antipodal CSK system demodulator. Figure 6: Bit Error Rate (BER) calculation over AWGN channel for RS (256,239) code. 55

modulator is attenuated and performance becomes very close to non-secure binary coded BPSK. V. REFERENCES Figure 7: Bit Error Rate (BER) calculation over Rayleigh channel for RS (7,3) code. Figure 8: Bit Error Rate (BER) calculation over Rayleigh channel for RS (256,239) code. [1] C. Shannon, Communication in the presence of noise, Proc. Inst. Radio Eng., vol. 37, pp.10 21, Jan 1947. [2] L. Chua, Dynamic nonlinear networks: State-of-the-art, IEEE Transactions on Circuits and Systems, vol. 27, pp. 1059 1087, Nov 1980. [3] S. H. Strogatz, Non linear dynamics and chaos, Preseus Books Publishing, LLC, 1994. [4] P. Stavroulakis, Chaos applications in telecommunications. CRC press, 2005. [5] G. Kolumban, M. Kennedy, G. Kis, and Z. Jako, Fmdcsk: A novel method for chaotic communications, in Circuits and Systems, 1998. ISCAS 98. Proceedings of the 1998 IEEE International Symposium on, vol. 4. IEEE, 1998, pp. 477 480. [6] G. Kaddoum and F. Gagnon, Error correction codes for secure chaos-based communication system, in Communications (QBSC), 2010 25th Biennial Symposium on. IEEE, 2010, pp. 193-196. IV. CONCLUSION The objective of this paper was to explore techniques to exploit the properties of chaotic signals to implement secure communication. The facts that chaotic signals were aperiodic, broadband and sensitive to initial conditions/parameters mismatches were important for them to be utilized in security. Therefore the chaotic parameters acted some sort of hardware key and hence same dynamical system was necessary for the transmitter and the receiver with proper chaotic synchronization techniques. The implementation of the method was done mostly by using tent map therefore, the performance of the methods in other chaotic systems, preferably higher order systems, or time delay systems, can also be done in order to improve the security further. Simulation results confirm the improvement of the performance of CSK by introducing the channel coding block, the degradation caused by the chaotic 56