Performance Analysis of Physical Layer Security of Chaos-based Modulation Schemes

被引:0
|
作者
Kong, Long [1 ]
Kaddoum, Georges [1 ]
Taha, Mostafa [2 ]
机构
[1] Univ Quebec, Dept Elect Engn, LaCIME Lab, ETS, Montreal, PQ, Canada
[2] Assiut Univ, Dept Elect Engn, Assiut, Egypt
关键词
CSK; DCSK; Secrecy capacity; Outage probability; Bit energy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Chaos-shift-keying (CSK) and differential CSK (DCSK) are the two popular coherent and non-coherent modulation schemes for ultra wide-band (UWB) communications. However, security of these schemes has never been studied formally from the information-theoretic perspective. In this paper, we investigate the physical layer security of CSK and DCSK modulation schemes over AWGN and Rayleigh fading channels from the information-theoretic manner. For this aim, the average secrecy capacity and outage probability are computed and analyzed by considering the variation of bit energy Eb coming from the use of chaotic signal to convey information. Our results show that CSK has better or close secrecy capacity and outage probability compared with DCSK and the conventional spread-spectrum modulation. Additionally, these metrics favor Rayleigh fading channels over AWGN channels. Finally, we conclude that the non-constant bit energy is useful to enhance the physical layer security.
引用
收藏
页码:283 / 288
页数:6
相关论文
共 50 条
  • [31] Study on target detection technique of chaos-based modulation
    Sun, DN
    Deng, JH
    Huang, ZH
    Wei, SJ
    Pan, SG
    2004 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL ELECTROMAGNETICS AND ITS APPLICATIONS, PROCEEDINGS, 2004, : 364 - 367
  • [32] Correlation detection in chaos-based spread spectrum communication schemes
    Sushchik, MM
    Tsimring, LS
    Volkovskii, AR
    CONTROL OF OSCILLATIONS AND CHAOS, VOLS 1-3, PROCEEDINGS, 2000, : 526 - 529
  • [33] Cryptanalysis of two similar chaos-based image encryption schemes
    Mastan, J. Mohamedmoideen Kader
    Pandian, R.
    CRYPTOLOGIA, 2021, 45 (06) : 541 - 552
  • [34] An uplink non-orthogonal multiple access scheme having physical layer security based on chaos modulation
    Masuda, Yoshihiro
    Okamoto, Eiji
    Ito, Keita
    Yamamoto, Tetsuya
    33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 136 - 140
  • [35] Equalization performance of chaos-based communication systems
    Fen, HC
    Xie, SL
    PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, 2004, : 173 - 176
  • [36] High Security Differential Chaos-Based Modulation With Channel Scrambling for WDM-Aided VLC System
    Chen, Bingjun
    Zhang, Lin
    Lu, Huaiyin
    IEEE PHOTONICS JOURNAL, 2016, 8 (05): : 1 - 13
  • [37] DCSK modulation and performance analysis based on chaos
    Department of Information Engineering, Shaoyang University, Shaoyang
    422000, China
    不详
    210016, China
    Zhongnan Daxue Xuebao (Ziran Kexue Ban), 4 (1268-1273):
  • [38] Chaos-based encryption of multimedia data and design of security analysis interface as an educational tool
    Akgul, Akif
    Kacar, Sezgin
    Pehlivan, Ihsan
    Aricioglu, Burak
    COMPUTER APPLICATIONS IN ENGINEERING EDUCATION, 2018, 26 (05) : 1336 - 1349
  • [39] A novel chaos-based UWB sensor for enhancing homeland security
    Venkatasubramanian, V
    Leung, H
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IV, PTS 1 AND 2, 2005, 5778 : 972 - 980
  • [40] A CHAOS-BASED MULTIPLE SECURITY ENCRYPTION SYSTEM FOR COMPRESSED VIDEO
    Hong, Shun-Cheng
    Kuo, Chi-Huang
    Chen, Hsi-Kuan
    Chen, Chin-Hsing
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4635 - 4652