This paper proposes a chaos-based secure direct-sequence/spread-spectrum (DS/SS) communication system which is based on a novel combination of the conventional DS/SS and chaos techniques. In the proposed system, bit duration is varied according to a chaotic behavior but is always equal to a multiple of the fixed chip duration in the communication process. Data bits with variable duration are spectrum-spread by multiplying directly with a pseudonoise (PN) sequence and then modulated onto a sinusoidal carrier by means of binary phase-shift keying (BPSK). To recover exactly the data bits, the receiver needs an identical regeneration of not only the PN sequence but also the chaotic behavior, and hence data security is improved significantly. Structure and operation of the proposed system are analyzed in detail. Theoretical evaluation of bit-error rate (BER) performance in presence of additive white Gaussian noise (AWGN) is provided. Parameter choice for different cases of simulation is also considered. Simulation and theoretical results are shown to verify the reliability and feasibility of the proposed system. Security of the proposed system is also discussed.
1. Introduction
Studying the possibilities of using chaotic behavior [1, 2] to improve features of communication systems has received significant attention in the last several years [3–5]. Many chaos-based communication systems were proposed [6, 7] and most of them exploited chaotic behavior to convey information. Communication systems based on combination of direct-sequence/spread-spectrum (DS/SS) and chaos techniques were presented in [8–10]. It is well known that DS/SS is considered as a main technique of spread-spectrum digital communications [11, 12]. The main difference between the conventional and chaos-based DS/SS systems is the use of spreading sequence. Instead of using the pseudonoise (PN) sequence [13, 14] as in the conventional system, the spread- and despread-spectrum processes in the chaos-based system are carried out by multiplying directly the binary data with a chaotic sequence generated by a chaotic map [1, 2, 15, 16]. Time domain signals shown in Figures 1(a) and 1(b) illustrate the difference in the conventional and chaos-based DS/SS systems, where Tb and Tc are fixed bit and chip durations, respectively.
Time domain signals of the spread-spectrum process in the conventional and proposed DS/SS systems.
The conventional DS/SS system [11]
The conventional chaos-based DS/SS system [6]
The proposed chaos-based DS/SS system
In this paper, we propose a chaos-based secure DS/SS communication system which is the combination of the DS/SS and chaos techniques. Bit duration is varied according to the behavior of chaotic map but always equal to a multiple of the fixed chip duration. Variation in bit duration makes the difference between our proposed system and the conventional ones. The data bits with variable duration are spread in the frequency domain by multiplying directly with the PN sequence and then modulated onto a sinusoidal carrier by means of the binary phase-shift keying (BPSK) [17, 18]. The spread-spectrum process of our proposed chaos-based DS/SS system is illustrated by time domain signals as in Figure 1(c), where Tbn is the variable duration of the nth bit. Since the proposed system operates based on the DS/SS using PN sequence, it inherits all advantages such as interference rejection, antijamming, fading reduction, multiaccess potential, and low probability of interception from the conventional DS/SS system [11, 12]. In addition, data security is improved significantly since the despread-spectrum and data recovery process needs an identical regeneration of both the PN sequence and chaotic behavior.
In the remainder of the paper, the structure and operation of the proposed communication system is presented in Section 2. Theoretical evaluation of BER performance in presence of additive white Gaussian noise (AWGN) is provided in Section 3. Section 4 presents analysis of parameters choice for the system, based on that specific parameters for different cases of simulation system are chosen with proper values. Simulation results are then shown to verify the theoretical ones. Discussions on security features are presented in Section 5. Finally, the conclusion with some final remarks is given in Section 6.
2. Structure and Operation of Chaos-Based Secure DS/SS Communication System
In this section, we present a detailed analysis of the structure and operation of the chaos-based DS/SS communication system proposed. Basically, the proposed system is built around a variable-position pulse and PN sequence (VPP-PNS) generator. Block diagrams of the proposed system and that of the VPP-PNS generator are illustrated in Figures 2(a) and 2(b), respectively.
Structure of the proposed chaos-based DS/SS communication systems.
The block diagram for the proposed chaos-based DS/SS communication system
The block diagram for the VPP-PNS generator
2.1. VPP-PNS Generator
In the VPP-PNS generator, clock pulses with a fixed frequency, fc=1/Tc, at the output of the clock generator are fed to the counter and the PN generator. At the initial instance t0, the clock generator starts working and the sample-and-hold block (S/H as in Figure 2) is loaded initial value X0. The counter operates in free running mode to produce a discretely increasing signal, C(t)=m·(t-t0)=mNTc, at its output, where m is count-step (i.e., the increasing value in a clock cycle Tc) and N is the count-number (i.e., the number of input clock pulses from the initial instance). When the signal C(t) reaches the value, X1=F(X0), at the output of the nonlinear converter (i.e., the block F(·) using the one-dimension chaotic map, Xn=F(Xn-1)), the comparator generates a pulse with a fixed width Tc at the instance, t1=t0+N0Tc. The position of pulse at the output 2 is determined by the interval, t1-t0=⌊X1/m⌋, with ⌊·⌋ being the floor function. This pulse simultaneously triggers the PN sequence generator to start working and to allow S/H storing the value X1. After that it triggers the counter to reset the count-number to zero. New iteration starts and pulses will be generated as in the above description. In general, the pulse train at the output 1 is expressed as follows:
(1)p(t)=∑n=1∞PTc(t-tn),
where the nth pulse is generated at the instance
(2)tn=tn-1+Nn-1Tc=tn-1+⌊Xnm⌋Tc,
and its position is determined by the interval
(3)tn-t0=∑k=1n⌊Xkm⌋Tc=∑k=1n⌊F(k)(X0)m⌋Tc.PTc(t) is the rectangular pulse shaping function given by
(4)PTc(t)={1,0≤t≤Tc,0,otherwise.
It can be seen that the position of output pulses p(t) varies according to the chaotic signal X(t). With a specific initial instance t0, (3) points out that variation of position depends on the chaotic map F(·), initial value X0, and count-step m.
The PN sequence generated at the output 2 with the fixed chip duration of Tc is expressed by a nonreturn-zero (NRZ) pulse train as follows:
(5)c(t)=∑n=1∞∑k=1NncknPTc(t-tn-(k-1)Tc),
where ckn and Nn are the binary values (i.e., {±1}) of the kth chip and the number of chips in the duration of [tn,tn+1], respectively; the function PTc(t) is as in (4).
2.2. Transmitter
In the transmitter, each pulse of the train p(t) triggers the data source to shift the data bit to the output. It means that the nth bit is shifted at the instance tn and its duration is equal to the interval of [tn,tn+1]. Based on (2), the duration of the nth bit is determined by
(6)Tbn=tn+1-tn=NnTc=⌊Xn+1m⌋Tc=⌊F(n+1)(X0)m⌋Tc.
Equation (6) shows that the bit duration varies according to the chaotic signal X(t) and depends on F(·), X0, and m. With a certain chaotic map F(·), in the iteration process, its output values vary chaotically in the dimensionless range of [Xmin,Xmax]. This leads to the variation in the bit duration within the time range of [Tbmin,Tbmax] in the communication process. Since the chip duration Tc is fixed, the number of chips per bit, Nn=Tbn/Tc, called the spreading factor, also varies in the range of [Nmin,Nmax] what is determined in (6) as
(7)Nmin=TbminTc=⌊Xminm⌋,Nmax=TbmaxTc=⌊Xmaxm⌋.
In the design process, the values of the parameters Tc,Nmin, and Nmax are predetermined to guarantee desired specifications of the system such as the bandwidth, average bit rate, and BER. The chaotic map F(·), the range of [Xmin,Xmax], and the count-step m are then chosen so as to satisfy (7). The analysis of this choice will be presented in Section 4.1.
The binary data with variable bit duration at the output of the data source is formatted in NRZ pulses and expressed by
(8)b(t)=∑n=1∞bnPTbn(t-tn),
where bn is the binary value (i.e., {±1}) of the nth bit, and PTbn(t) is the rectangular pulse shaping function defined by
(9)PTbn(t)={1,0≤t≤Tbn,0,otherwise.
The spectrum spreading process is carried out by multiplying the data b(t) with the PN sequence c(t). The spreading signal d(t) is then modulated onto a sinusoidal carrier by means of BPSK, producing the DS/SS-BPSK signal given by
(10)e(t)=Ab(t)c(t)cos(2πf0t),
with A and f0 being the amplitude and frequency of the carrier, respectively. The resulting signal e(t) is transmitted at the output of the transmitter.
2.3. Receiver
The VPP-PNS generators in the transmitter and receiver are designed to work as digital modules which can be implemented on the programmable devices such as the field programmable gate array (FPGA), digital signal processing (DSP), and microprocessor (MP). In practice, this design can be guaranteed such that there is nearly no parameters mismatch between the VPP-PNS generators. It means that the variable-position pulse train and PN sequence regenerated in the receiver are identical to those in the transmitter. Therefore, we can apply the available synchronization methods of the conventional DS/SS system [11, 12, 18] for the proposed system. Here, for simplicity, the operation of the receiver assumes that the synchronization in the sinusoidal carrier, variable-position pulse train, and PN sequence is established and maintained.
The received signal r(t) at the input is the sum of the transmitted signal e(t) and channel noise n(t). Firstly, the received signal is multiplied with the PN sequence as follows:
(11)g(t)=r(t)c(t)=(e(t)+n(t))c(t)=Ab(t)c2(t)cos(2πf0t)+n(t)c(t)=Ab(t)cos(2πf0t)+n(t)c(t),
and then the resulting signal g(t) is mixed with the sinusoidal carrier by
(12)s(t)=Ag(t)cos(2πf0t)=Ab(t)cos2(2πf0t)+An(t)c(t)cos(2πf0t)=A22b(t)+A22b(t)cos(4πf0t)+An(t)c(t)cos(2πf0t).
The signal s(t) is fed to the integrator whose output is reset to zero by the trigger of each pulse of the train p(t). It means that the integration period of each bit is equal to the corresponding interpulse interval which is also the corresponding bit duration. Before each reset instance, the output signal of the integrator, i(t), is sampled. The output value of the sampler at the instance tn+1 is determined by
(13)i(tn+1)=∫tntn+1s(t)dt=∫0TbnA22b(t)dt+∫0TbnA22b(t)cos(4πf0t)dt+∫0TbnAn(t)c(t)cos(2πf0t)dt=A22bnTbn+0+∫0TbnAn(t)c(t)cos(2πf0t)dt,
where (A2/2bn)Tbn is the energy of the desired signal; ∫0Tbn(A2/2b)(t)cos(4πf0t)dt equal to zero because the period Tbn is a multiple of the carrier cycle (i.e., T0=1/f0); ∫0TbnAn(t)c(t)cos(2πf0t)dt is the energy produced by the channel noise. It is noted that the correlation between c(t) and An(t)cos(2πf0t) is very low and hence the noise energy is much less than the signal energy. Finally, the resulting sample is fed to the decision device to recover the binary value of the nth bit as follows:
(14)bn={1,i(tn+1)≥0,0,i(tn+1)<0.
3. Theoretical Evaluation of BER Performance
In this section, BER performance of the proposed communication system with the channel noise being AWGN is evaluated theoretically. In the receiver, at each sampling instance, an error decision leading to an error bit occurs when the noise energy exceeds the signal energy in the opposite direction. Therefore, signal-to-noise ratio (SNR) of each output sample is a key parameter for estimating the BER of the system. Let us consider the value of the (n+1)th sample with two energy component as given in (13). The first component is the signal energy whose absolute magnitude is determined by
(15)Sn=|A22bnTbn|=A22Tbn.
The second one is the noise energy which is a random variable depending on the zero-mean Gaussian noise n(t) and thus its mean is also zero, while its variance can be calculated as follows:
(16)σn2=E[(∫0TbnAn(t)c(t)cos(2πf0t))2]=A2N02∫0Tbnc2(t)cos2(2πf0t)dt=A2TbnN04,
where E[·] is the statistical expectation and N0 is the noise power spectral density. The SNR of the (n+1)th sample, SNRn, is determined as the absolute magnitude of the signal energy, Sn, divided by the root-mean-square noise σn2 [19], so we have
(17)SNRn=Snσn2=A2TbnN0=A2NnTcN0=2Nn(EcN0),
where Ec=A2Tc/2 is fixed, and called the energy per chip; the ratio Ec/N0 is known as the SNR per chip. It can be seen from (17) that the SNR of each output sample depends on the ratio Ec/N0 and the corresponding spreading factor Nn. Therefore, the SNR for general case of the spreading factor being equal to N is given by
(18)SNRN,Ec/N0=2N(EcN0).
In our proposed system, since the spreading factor varies from Nmin to Nmax in the communication process, the BER is estimated approximately by
(19)BER[Nmin,Nmax],Ec/N0=∑N=NminNmaxpNBERN,Ec/N0,
where pN is the probability to the spreading factor being equal to N, and BERN,Ec/N0 is the BER of the system for case of the spreading factor being equal to N. Assume that the chaotic values distribute uniformly in [Xmin,Xmax]. It means that the probability pN is the same for all values of N∈[Xmin,Xmax], so we have
(20)pN=1(Nmax-Nmin+1).
Based on the evaluation result of the error probability for the conventional DS/SS-BPSK system as mentioned in [20, 21], the BERN,Ec/N0 is determined according to the SNRN,Ec/N0 by
(21)BERN,Ec/N0=Q[SNRN,Ec/N0]withQ[x]=12π∫x∞e-u2/2du.
From the obtained results in (18), (19), (20), and (21), the theoretical evaluation of the BER performance for the proposed communication system is given by the following:
(22)BER[Nmin,Nmax],Ec/N0=1(Nmax-Nmin+1)∑N=NminNmaxQ[2N(EcN0)].
The evaluation BER performances according to (22) for different cases of [Nmin,Nmax] with the same average spreading factor as well as their comparison with the performance of the equivalent conventional system are shown in Figure 3. With the above assumption of the uniformly distributed chaotic values, the average spreading factor and average bit rate are determined by Nav=(Nmin+Nmax)/2 and BRav=2/((Nmin+Nmax)Tc), respectively. In Figure 3(a), the performances of the proposed system for the cases of [Nmin=26,Nmax=36] and [Nmin=21,Nmax=41], are compared to each other and to that of the conventional system [21] which has a fixed spreading factor, N=Nav=31. It can be seen that the proposed system with the case of [Nmin=26,Nmax=36] performs slightly worse than the conventional system with N=31 and better than the [Nmin=21,Nmax=41] case. Similarly, we can observe from Figure 3(b) that the performance of [Nmin=53,Nmax=73] case is between those of the conventional system with N=63 and the case of [Nmin=48,Nmax=78]. It is clear that the performance of the proposed system with [Nmin,Nmax] is poorer than that of conventional system with N=Nav. In addition, the difference between the performance of the proposed system and that of conventional one tends to diminish as the average value (Nmin+Nmax)/2 gets closer to N=Nav.
BER performances obtained from the theoretical evaluation and numerical simulation for different cases of the proposed system in comparison to those of the equivalent conventional system.
The conventional system with N=31, the proposed system for Nmin=26, Nmax=36 and Nmin=21, Nmax=41
The conventional system with N=63, the proposed system for Nmin=53, Nmax=73 and Nmin=48, Nmax=78
4. Parameter Choice and Simulation Results
This section presents the analysis of parameter choice for the proposed system. Based on the analysis, the specific parameters for different cases of the simulation system are chosen with proper values. The simulation results are then shown in order to verify all the theoretical analyses and results obtained.
4.1. Parameter Choice
In order to guarantee the desired specifications of the system such as the bandwidth (i.e., BW=1/Tc), average bit rate (i.e., BRav=2/((Nmin+Nmax)Tc)), and BER (i.e., BER[Nmin,Nmax],Ec/N0 according to (22)), the values of parameters Tc,Nmin, and Nmax are predetermined. The chaotic behavior of the chaotic map F(·) is based on that of a conventional chaotic map, xn=f(xn-1), denoted by f(·), whose output values vary in a known range of [xmin,xmax]. The parameters Tc,Nmin, and Nmax and the map f(·) are considered as the predetermined parameters of the system. Using these predetermined parameters, the count-step m and the chaotic map F(·) are chosen as follows:
(23)m=xmax-xminNmax-Nmin,Xn=xn+d=f(xn-1)+d=f(Xn-1-d)+d=F(Xn-1).
It is easy to find that the output value of the chaotic map F(·) varies chaotically in the range of [Xmin=xmin+d,Xmax=xmax+d] and thus the initial value X0 will be chosen in this range. Here, d is a shift value chosen to satisfy (7) as follows:
(24)Nminm-xmin≤d<(Nmin+1)m-xmin.
The count-step m and the parameters d,X0 of the map F(·) are called the chosen parameters of the system.
4.2. Simulation Results
Numerical simulations for different cases of the proposed system with the specific parameters are carried out in Simulink. The values of the predetermined parameters of the simulation system are given as follows: Tc=1μs; four cases of [Nmin,Nmax]=[26,36], [21,41], [53,73], and [48,78]; three conventional chaotic maps simulated in turn are Tent map, Logistic map, and Bernoulli map [1, 2, 15, 16], whose output values vary chaotically in [xmin=0,xmax=1]. Based on the choice analysis above, the values of the specifications and chosen parameters of the simulation system corresponding to the different cases of [Nmin,Nmax] are determined and shown as in Table 1.
Specific parameters of the simulation system for cases of [Nmin,Nmax] = [26,36], [21,41], [53,73], [48,78].
Predetermined parameters
Specifications of system
Chosen parameters
Chaotic map
Tc
[Nmin,Nmax]
f(·):xn=f(xn-1)[xmin=0,xmax=1]
BW
BR_{av}
BER
m
F(·):Xn=F(Xn-1)[Xmin=d,Xmax=d+1]
d
X0
[26,36]
Tent map: xn=2|0.5-|0.5-xn-1||
32.25 Kbps
Blue lines in Figure 2(a)
0.1/μs
Xn=2|0.5-|0.5-(Xn-1-d)|+d|
2.65
2.7
1 μs
[21,41]
Logistic map: xn=4xn-1(1-xn-1)
1 MHz
0.05/μs
Xn=4(Xn-1-d)(1-(Xn-1-d))+d
1.075
1.1
[53,73][48,78]
Bernoulli map:xn=(2xn-1) mod 1
15.87 Kbps
Blue lines in Figure 2(b)
0.05/μs0.033/μs
Xn=((2(Xn-1-d))mod1)+d
2.6751.616
2.71.7
Time domain signals obtained from the simulation system using Tent map for the case of [Nmin=21,Nmax=41] within duration from the starting time 0 to 1000μs are presented in Figure 4. When the synchronization state of system is established and maintained, the signals of the VPP-PNS generators in the transmitter and receiver are identical and shown as in Figures 4(a)–4(d). The baseband signals in the transmitter and receiver are given in Figures 4(e)-4(f) and Figures 4(g)–4(i), respectively. The chaotic behavior the nonlinear converter F(·) is seen by the attractor diagram in Figure 5(a). It is clear that this is the attractor of Tent map after being shifted with a positive value, d=1.075. The variation in bit duration according to the chaotic behavior is given in the diagram as in Figure 5(b), where each point expresses the relation between the duration of previous bit and that of the present one. It can be seen that the bit duration varies in the range of [Tbmin=21μs,Tbmax=41μs].
Time domain signals of the simulation system using Tent map for case of [Nmin=21,Nmax=41].
The discretely increasing signal at output of the counter
The chaotic signal at output of the nonlinear converter
The variable-position pulse train at the output 1
The PN sequence at the output 2
The binary data with variation of bit duration
The signal after spreading
The output signal of the integrator
The output signal of the sampler
The recovered data bits at output of the decision device
The variation of bit duration according to the chaotic behavior.
The attractor diagram of the chaotic map F (·)
The variation diagram of bit duration
BER performance of the simulation system using Tent map for the cases of [Nmin=26,Nmax=36], [Nmin=21,Nmax=41], [Nmin=53,Nmax=73], [Nmin=48,Nmax=78] is presented in Figure 3 to compare with the corresponding theoretical performance. In order to investigate the performance of the proposed system with different chaotic maps, the simulation systems using Tent, Logistic, and Bernoulli maps for the cases of [Nmin=21,Nmax=41] and [Nmin=26,Nmax=36] are carried out and the result is as shown in Figure 6. Here, the simulation BERs are calculated as the number of error bits divided by the total number of 108 bits transmitted and the channel noise is AWGN. It can be seen from Figure 3, for each case, that the simulation and corresponding evaluation curves are nearly the same. Also, Figure 6 shows that there is a slight difference in the simulation curves of the different chaotic maps. These prove that the theoretical analysis and the result are reasonable and the proposed communication system is totally feasible.
Simulation BER performances with different chaotic maps.
For the case of Nmin=21 and Nmax=41
For the case of Nmin=26 and Nmax=36
5. Discussion on Security
It is clear that the conventional DS/SS-BPSK system, an intruder can break the security and recover successfully the original data if he detects correctly the PN sequence and the integration period which is equal to bit rate. Since the bit duration is the same and fixed in the observation process, it is not difficult for the intruder to detect exactly bit rate. Several detection methods of bit rate have been presented in [22, 23]. It means that the security of the conventional system mainly depends on the complication of PN sequence.
Since our proposed system is combined by the DS/SS technique using PN sequence and chaotic modulation, the data transmitted by using the proposed system must be more secure from eavesdroppers than that in case of using individual methods. In other words, the security has been compromised by burying chaotic modulation in the conventional DS/SS technique. With the presence of the conventional DS/SS technique in the proposed system, the transmitted signal has properties like random noise and occupies a wide bandwidth with a very low power spectral density on the transmission channel. It means that the proposed system inherits the security advantages from the conventional method such as the anti jamming capability and low probability of detection and interception [24, 25]. In addition, with the variation of bit duration according to the chaotic behavior, the capability to protect data against unauthorized accesses is improved significantly.
More specifically, the data security of the proposed system is dependent on not only on the complication of PN sequence but also on the variation of the integration period (i.e., the bit duration) according to the chaotic behavior. It is seen that the generation of the chaotic behavior is quite simple for the transmitter and the authorized receiver which has full information on the structure, the value of parameters and functions. In fact, the exact regeneration of chaotic behavior in the proposed system is very difficult for intruders trying to detect them in the context that the chaotic system is covered by the PN sequence generator. Due to the sensitive dependence of the chaotic behavior on the initial value, a very slight error in its detection leads to exponentially increasing errors in the regeneration. In such case, the detection of the variation of bit duration is completely incorrect and the receiver operates in the desynchronization state. As a result, BER will be very high and thus the unauthorized access is failed. These are proved by simulation results in Figures 7 and 8, where the time domain signals and BER performances of the receiver in the case of initial value mismatch (with a very small difference, ΔX0=0.0001) are shown and compared with those in the case of no mismatch. We can observe that after about 0.2ms from the starting time, the mismatch signals become totally different from the corresponding no-mismatch signals. The BER performance with the mismatch is much worse than that of the cases with no-mismatch. Particularly, although the ratio Ec/N0 increases gradually, the mismatches in BER are nearly unvaried and approximately equal to 1.610-1. It is noticed that the set of values of m,X0, and F(·) is considered as a secret key. It is hard for the intruder to recover correctly the data without having full information on the structure of the system, the PN sequence, and this secret key. Furthermore, the generation of the chaotic values can easily be made as complicated as is desired. For example, instead of the one-dimension maps, we can use multidimension chaotic ones. Also, several chaotic maps may be combined to increase the number of parameters involved. The initial value can be changed for different communication sessions. All these will improve significantly the security of the proposed method.
Time domain signals in the receiver of the simulation system using Tent map for case of [Nmin=21,Nmax=41] with no mismatch and with initial value mismatch (ΔX0=0.0001).
The discretely increasing signal at output of the counter
The chaotic signal at output of the nonlinear converter
The variable-position pulse train at the output 1
The recovered data bits at output of the decision device
BER performances of the simulation system using Tent map for cases of [Nmin=26,Nmax=36] and [Nmin=21,Nmax=41] with no mismatch and with initial value mismatch (ΔX0=0.0001).
Most of the attack methods are proposed in order to break the chaotic communication systems [26–29] operated based on exploiting properties such as waveform, spectrum, and attractor of the chaotic signal which masks the information and is transmitted directly on the channel. In the proposed system, the signal transmitted on the channel is totally the same as that of the conventional system and without any trace of the chaotic behavior; thus, the existing attack methods are inapplicable to the proposed system. It means that no chance for the intruder to be able to detect the variation of bit duration from the physical signal on the channel. It is also clear that the conventional detection methods of bit rate mentioned above cannot detect in detail this variation. They may detect the variation range and average value of bit duration, but this is not sufficient for a successful access.
6. Conclusion
This study has presented a chaos-based secure DS/SS communication system which is based on a novel combination of the conventional DS/SS and chaos techniques. The structure, operation, and BER performance of the proposed system are described and investigated by means of the theoretical analysis and numerical simulation. The simulation result agrees with the theoretical analysis. The discussion shows the potential of security improvement. It can be seen from the obtained results, that is, (1) the proposed system inherits all the advantages from the conventional system such as the interference rejection, antijamming, fading reduction, multiaccess capability, and low probability of interception due to its operation also based on the DS/SS using PN sequence and BPSK technique; (2) with the variation of bit duration according to the chaotic behavior in the communication process, the proposed system not only still maintains an approximately good performance but also achieves significant improvement on the data security in comparison with the equivalent conventional system. All these features make the proposed system feasible and robust for the security required and DS/SS-based digital communication system.
Acknowledgment
This work is supported by the Vietnam’s National Foundation for Science and Technology Development (NAFOSTED) under Grant no. 102.02-2012.34.
StrogatzS. H.HilbornR. C.KennedyM. P.RovattiR.SettiG.KennedyM. P.KolumbánG.Special issue on noncoherent chaotic communicationsAbelA.SchwarzW.Chaos communications—Principles, schemes, and system analysisLauF. C. M.TseC. K.StavroulakisP.Heidari-bateniG.McGillemC. D.Chaotic direct-sequence spread-spectrum communication systemHeidari-BateniG.McGillemC. D.Chaotic sequences for spread spectrum: an alternative to PN-sequencesProceedings of the IEEE International Conference on Selected Topics in Wireless CommunicationsJune 1992Vancouver, Canada437440KurianA. P.PuthusserypadyS.HtutS. M.Performance enhancement of DS/CDMA system using chaotic complex spreading sequencePetersonR. L.ZeimerR. E.BorthD. E.SimonM. K.OmuraJ. K.ScholtzR. A.LevittB. K.DinanE. H.JabbariB.Spreading codes for direct sequence CDMA and wideband CDMA cellular networksSarwateD. V.PursleyM. B.Crosscorrelation properties of pseudorandom and related sequencesDevaneyR. L.SchusterH. G.FrankR. L.ZadoffS. A.Phase shift pulse codes with good periodic correlation propertiesProakisJ.PursleyM. B.Performance evaluation for phase-coded spread-spectrum multiple-access communication—part I: system AnalysisMorrowR. K.LehnertJ. S.Bit-to-bit error dependence in slotted DS/SSMA packet systems with random signature sequencesHoltzmanJ. M.A simple, accurate method to calculate spread-spectrum multiple-access error probabilitiesReedD. E.Comparison of symbol-rate detector and radiometer intercept receiver performances in a nonstationary environment1Proceedings of the IEEE Military Communications ConferenceOctober 1989Boston, Mass, USA195119552-s2.0-0024936550BurelG.BouderC.BerderO.Detection of direct sequence spread spectrum transmissions without prior knowledgeProceedings of the IEEE Global Telecommunicatins ConferenceNovember 20012362392-s2.0-0035685002DillardR. A.Detectability of spread-spectrum signalsSchoolcraftR.Low probability of detection communications–LPD waveform design and detection techniques2Proceedings of the Military Communications ConferenceNovember 1991McLean, Va, USA353135392-s2.0-0026380035ShortK. M.Steps toward unmasking secure communicationShortK. M.Unmasking a modulated chaotic communications schemeSobhyM. I.ShehataA. R.Methods of attacking chaotic encryption and countermeasures2Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal ProcessingMay 2001100110042-s2.0-0034856253ÁlvarezG.MontoyaF.RomeraM.PastorG.Breaking parameter modulated chaotic secure communication system