0% found this document useful (0 votes)
53 views

Chaos Based Communication System Using Reed Solomon (RS) Coding For AWGN & Rayleigh Fading Channels

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Chaos Based Communication System Using Reed Solomon (RS) Coding For AWGN & Rayleigh Fading Channels

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

© 2015 IJSRSET | Volume 1 | Issue 1 | Print ISSN : 2395-1990 | Online ISSN : 2394-4099

Themed Section: Engineering and Technology

Chaos based Communication System Using Reed Solomon (RS) Coding for
AWGN & Rayleigh Fading Channels
M. Bala Krishna*1, D.Arun Kumar2
*1Department of ECE, GMRIT, RAJAM, AP, INDIA

ABSTRACT
Chaotic signals are non-periodic, random-like and bounded signals that are generated in a deterministic
manner using chaotic mapping techniques and exhibits sensitive dependence on initial conditions. Even
though a small difference is introduced between the initial values, the two chaotic signals separate rapidly
from each other after a short time period. Using these mapping techniques various techniques for
modulation of chaos shift keying signals have been implemented and simulated. And synchronization of
chaos is verified by using same mapping technique at both transmitter and receiver. The data information
symbols are firstly coded by a Reed Solomon (RS) coder. RS are powerful error correcting codes that can
be employed in a wide variety of digital communication systems. Interleaving is a technique commonly
used in communication systems to overcome correlated channel noise such as burst errors or fading using
RS coder the performance of the chaos systems are improved.
Keywords: Choatic Shift Keying, Reed Solomon Code, Interleaving, Mapping

I. INTRODUCTION by Shannon’s 1947 recognition that the channel


capacity of a communications link is optimized
Generally, a chaotic process results from the action when the waveform is a noise-like maximal entropy
of a non-linear dynamical system. In a chaotic signal [1] and further solidified by Chua’s 1980
process, the state of the system depends on initial implementation of a practical chaotic electrical
conditions. The chaos process loses its deterministic circuit [2]. Chaotic communication systems
nature over certain time and becomes resemble direct sequence spread spectrum
undeterministic in nature. A chaotic process looks communication systems in that the data is spread
similar to a random process, but a stationary across a relatively wide transmission bandwidth and
random process is independent of initial conditions then dispread by the intended receiver with a time-
while a chaos process is not. Looking at the process, synchronized spreading sequence. The chaotic
one cannot determine whether it is a random sequence based communication systems exhibit
process, or a chaotic process. Some examples where analytically better performance than direct sequence
we can observe chaos processes are nature, based communication systems and may in general
chemical reactions, oscillation of pendulum, and be viewed as a generalization of direct sequence
electrical circuits. The chaotic process has the approaches.
ability to produce highly diversified waveforms and Chaotic systems have properties such as periodicity,
is undeterministic in nature. sensitivity to initial conditions/parameter
The field of chaotic communications has gone mismatches, mixing property, deterministic
through various periods of intense interest, initiated dynamics, structure complexity, to mention a few,

IJSRSET141119 | Received: 15 Dec 2014 | Accepted: 20 Dec 2014 | January-February 2015 [(1)1: 52-56] 52
that map nicely with cryptographic requirements dynamical key. The receiver must be able to
such as confusion, diffusion, deterministic pseudo- synchronize to the transmitter’s dynamical
randomness, algorithm complexity. Furthermore, parameters. A direct application of chaos theory to
the possibility of chaotic synchronization, where the telecommunication systems appears in a
master system (transmitter) is driving the slave conventional digital spread spectrum, where the
system (receiver) by its output signal, made it information is spread over a wider band by using a
probable for the possible utilization of chaotic chaotic signal instead of the usual periodic
systems to implement security in the sequence, called Pseudo-noise (PN) sequence, the
communication systems. Many methods like latter is generated, for instance, by linear shift
chaotic masking, chaotic modulation, inclusion, registers. The problem with a linear shift register
chaotic shift keying (CSK) had been proposed. generator is that the price paid for making the
period of the PN long increases sharply because a
large amount of storage capacity and a large
WORKING PRINCIPLE number of logic circuits are required. This imposes
The principle of chaotic masking hints at the larger a practical limit on how large the period of the PN
issue of communication secrecy. Certainly, can actually be made. This can be overcome by the
fundamental properties of chaotic systems seem to use of digital chaotic sequence generators. A
make them ideal for this purpose. Chaotic systems classic, efficient, and well-studied method of
are inherently unpredictable. Their dynamics are a generating a sequence of pseudo random bits is the
periodic and irregular. A small message added to or linear feedback shift register.
modulated onto unpredictable a periodic and
irregular wave forms could be difficult to decipher A shift register is a very simple electronic device,
without a second chaotic system, identical to the which produces a very fast pseudo random
first, which can synchronize to the transmitter. sequence. Basically, this device is formed by a
Concealment, privacy, and encryption these aspects sequence of adjacent bits in a register and at each
can be interpreted in the context of chaotic clock signal the sequence is shifted a position to the
communication. Concealment of a message using right. The right-most bit is the output. To the left,
chaotic carrier signals is possible because the one additional bit is introduced which is computed
carrier is irregular and a periodic. The presence of a by a function, named feedback function, of the
message in the chaotic fluctuations may not be previous contents of the registers. The binary
obvious. According to Shannon, the second aspect, storage elements are called the stages of the shift
communication privacy, occurs for systems in register, and their contents are called the state of the
which special equipment is required to recover the shift register. After starting the shift register in any
message. This situation is present with chaotic initial state, it progresses through some sequence of
communication systems because an eavesdropper states; hence a periodic succession ultimately
must have the proper receiver system, with results. This succession is used in the XOR
matched parameter settings, to decode the message. operation to produce the ciphered message. When
Finally, encryption occurs naturally in chaotic the feedback function is linear, the shift register is
communication techniques. In conventional called a linear shift register and using the theory of
encryption techniques, a key is often used to polynomials over finite fields, it is possible to
encrypt the message. If the transmitter and receiver discover how to design a device that produces a
share the same encoding key, the scrambled sequence whose period is very long and has good
message can be recovered by the receiver. In randomness properties. But, it is important to stress
chaotic systems, the transmitter itself acts as a that the linear feedback shift register is insecure for
cryptographic purposes.

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


53
II. METHODS AND MATERIAL Transmitter Structure

A. How to achieve chaotic behaviour? 1. Error coding block

Chaotic behaviour can be obtained by using The data information symbols are firstly coded by a
different mapping techniques [4].In this paper we Reed Solomon (RS) coder [6]. RS are powerful
are using tent mapping technique. error correcting codes that can be employed in a
wide variety of digital communication systems. The
TENT MAP: The following is a tent map equation. RS (255, 239, 8) is used in this project. Interleaving
is a technique commonly used in communication
{
( ) systems to overcome correlated channel noise such
Where m=1.9 and x(0)=0.4142. A code illustrating as burst errors or fading. As a result of interleaving,
chaotic behaviour is given below: correlated noise introduced in the transmission
( ) channel appears to be statistically independent at
the receiver and thus allows better error correction.
( ( ) ) Without an interleaver, the RS decoder cannot
() ( ) correct more than 8 errors in code words. At the
output of the interleaver, the symbols are coded
() ( ( )) with a convolution coder (7, 1/2) with code rate
R=1/2.

2. Chaotic modulator

The main goal of using a chaotic modulator is to


have a highly secure transmission with small
complexity and low cost of implementation. By
introducing this simple modulator, the system can
benefit of all the features offered by the chaotic
Figure 1: Tent map signal. After coding the information bits , the
output symbols are transmitted
CHAOS BASED COMMUNICATION SYSTEM
using a chaotic signal. Then
USING REED SOLOMON (RS) ENCODER &
DECODER
( ) ( ) ( )

According to the above equation, the generated


chaotic signals can take place in the two regions
for ( ). The inner region , is used
as a guard region to ensure a minimum distance
between the two waveforms associated to and
. Finally, the transmitted baseband signal is
( ) ( ) ( ) ( )
Figure 2 : Baseband chaotic communication system with error
coding and decoding block

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


54
Assuming that the transmitted signal is corrupted by
additive noise, the received signal is given by
( ) ( ) ( )
where ( ) denotes the noise signal. At the receiver,
a self-synchronization circuit will be used to
reproduce the chaotic signal. The reproduced signal
then correlates with the received signal r(t).
Figure 3: Chaotic modulator The output of the correlater is given by

Figure 3 shows the chaotic modulator. Note that ( ) ∫ ( ) ( )


this baseband chaotic signal at the output of the ( )( )
modulator can be moved to any desired frequency Where is the acquisition time to achieve
band for a pass band transmission. A square root synchronization.
raised cosine filter is used as pulse shape filters for
the chaotic symbolic samples. The output of the correlator is compared with the
threshold (zero in this case) to determine whether a
Receiver structure “+1” or “−1” has been received. If the correlator
After passing through an AWGN channel, the output is larger than zero, a “+1” is detected.
received signal is Otherwise, a “−1” is decoded.

( ) ( ) ( )
III. RESULTS AND DISCUSSION
Where h[n] is the pulse shaping filter, w[n] is an
additive white Gaussian noise with power spectral
density equal to , T is the period of dynamic
symbols, and denotes the discrete time
convolutional operator. We assume that we have a
perfect clock synchronisation on the receiver side
which means that the sampling at the output of the
matched filter is synchronized with the sampling
period of the received signal. The demodulation of
the received chaotic signal is achieved by the
chaotic demodulator. Finally it is decoded by an RS Figure 5 : Bit Error Rate (BER) calculation over AWGN channel for

decoder to estimate the emitted bits . The RS (7, 3) code.

proposed scheme has been verified in Rayleigh


Fading channel also.

Chaotic Demodulator

Figure 6: Bit Error Rate (BER) calculation over AWGN channel for
Figure 4: Coherent antipodal CSK system demodulator. RS (256,239) code.

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


55
modulator is attenuated and performance becomes
very close to non-secure binary coded BPSK.

V. REFERENCES

[1] C. Shannon, “Communication in the presence of noise,”


Proc. Inst. Radio Eng., vol. 37, pp.10–21, Jan 1947.
[2] L. Chua, “Dynamic nonlinear networks: State-of-the-art,”
IEEE Transactions on Circuits and Systems, vol. 27,
Figure 7: Bit Error Rate (BER) calculation over Rayleigh channel for
pp. 1059–1087, Nov 1980.
RS (7,3) code. [3] S. H. Strogatz, “Non linear dynamics and chaos,” Preseus
Books Publishing, LLC, 1994.
[4] P. Stavroulakis, Chaos applications in
telecommunications. CRC press, 2005.
[5] G. Kolumban, M. Kennedy, G. Kis, and Z. Jako, “Fm-
dcsk: A novel method for chaotic communications,” in
Circuits and Systems, 1998. ISCAS’98. Proceedings of
the 1998 IEEE International Symposium on, vol. 4. IEEE,
1998, pp. 477–480.
[6] G. Kaddoum and F. Gagnon, “Error correction codes for
secure chaos-based communication system,” in
Communications (QBSC), 2010 25th Biennial
Figure 8: Bit Error Rate (BER) calculation over Rayleigh channel for Symposium on. IEEE, 2010, pp. 193- 196.
RS (256,239) code.

IV. CONCLUSION

The objective of this paper was to explore


techniques to exploit the properties of chaotic
signals to implement secure communication. The
facts that chaotic signals were aperiodic, broadband
and sensitive to initial conditions/parameters
mismatches were important for them to be utilized
in security. Therefore the chaotic parameters acted
some sort of hardware key and hence same
dynamical system was necessary for the transmitter
and the receiver with proper chaotic
synchronization techniques. The implementation of
the method was done mostly by using tent map
therefore, the performance of the methods in other
chaotic systems, preferably higher order systems, or
time delay systems, can also be done in order to
improve the security further.

Simulation results confirm the improvement of the


performance of CSK by introducing the channel
coding block, the degradation caused by the chaotic

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


56

You might also like