Chaos Based Communication System Using Reed Solomon (RS) Coding For AWGN & Rayleigh Fading Channels
Chaos Based Communication System Using Reed Solomon (RS) Coding For AWGN & Rayleigh Fading Channels
Chaos based Communication System Using Reed Solomon (RS) Coding for
AWGN & Rayleigh Fading Channels
M. Bala Krishna*1, D.Arun Kumar2
*1Department of ECE, GMRIT, RAJAM, AP, INDIA
ABSTRACT
Chaotic signals are non-periodic, random-like and bounded signals that are generated in a deterministic
manner using chaotic mapping techniques and exhibits sensitive dependence on initial conditions. Even
though a small difference is introduced between the initial values, the two chaotic signals separate rapidly
from each other after a short time period. Using these mapping techniques various techniques for
modulation of chaos shift keying signals have been implemented and simulated. And synchronization of
chaos is verified by using same mapping technique at both transmitter and receiver. The data information
symbols are firstly coded by a Reed Solomon (RS) coder. RS are powerful error correcting codes that can
be employed in a wide variety of digital communication systems. Interleaving is a technique commonly
used in communication systems to overcome correlated channel noise such as burst errors or fading using
RS coder the performance of the chaos systems are improved.
Keywords: Choatic Shift Keying, Reed Solomon Code, Interleaving, Mapping
IJSRSET141119 | Received: 15 Dec 2014 | Accepted: 20 Dec 2014 | January-February 2015 [(1)1: 52-56] 52
that map nicely with cryptographic requirements dynamical key. The receiver must be able to
such as confusion, diffusion, deterministic pseudo- synchronize to the transmitter’s dynamical
randomness, algorithm complexity. Furthermore, parameters. A direct application of chaos theory to
the possibility of chaotic synchronization, where the telecommunication systems appears in a
master system (transmitter) is driving the slave conventional digital spread spectrum, where the
system (receiver) by its output signal, made it information is spread over a wider band by using a
probable for the possible utilization of chaotic chaotic signal instead of the usual periodic
systems to implement security in the sequence, called Pseudo-noise (PN) sequence, the
communication systems. Many methods like latter is generated, for instance, by linear shift
chaotic masking, chaotic modulation, inclusion, registers. The problem with a linear shift register
chaotic shift keying (CSK) had been proposed. generator is that the price paid for making the
period of the PN long increases sharply because a
large amount of storage capacity and a large
WORKING PRINCIPLE number of logic circuits are required. This imposes
The principle of chaotic masking hints at the larger a practical limit on how large the period of the PN
issue of communication secrecy. Certainly, can actually be made. This can be overcome by the
fundamental properties of chaotic systems seem to use of digital chaotic sequence generators. A
make them ideal for this purpose. Chaotic systems classic, efficient, and well-studied method of
are inherently unpredictable. Their dynamics are a generating a sequence of pseudo random bits is the
periodic and irregular. A small message added to or linear feedback shift register.
modulated onto unpredictable a periodic and
irregular wave forms could be difficult to decipher A shift register is a very simple electronic device,
without a second chaotic system, identical to the which produces a very fast pseudo random
first, which can synchronize to the transmitter. sequence. Basically, this device is formed by a
Concealment, privacy, and encryption these aspects sequence of adjacent bits in a register and at each
can be interpreted in the context of chaotic clock signal the sequence is shifted a position to the
communication. Concealment of a message using right. The right-most bit is the output. To the left,
chaotic carrier signals is possible because the one additional bit is introduced which is computed
carrier is irregular and a periodic. The presence of a by a function, named feedback function, of the
message in the chaotic fluctuations may not be previous contents of the registers. The binary
obvious. According to Shannon, the second aspect, storage elements are called the stages of the shift
communication privacy, occurs for systems in register, and their contents are called the state of the
which special equipment is required to recover the shift register. After starting the shift register in any
message. This situation is present with chaotic initial state, it progresses through some sequence of
communication systems because an eavesdropper states; hence a periodic succession ultimately
must have the proper receiver system, with results. This succession is used in the XOR
matched parameter settings, to decode the message. operation to produce the ciphered message. When
Finally, encryption occurs naturally in chaotic the feedback function is linear, the shift register is
communication techniques. In conventional called a linear shift register and using the theory of
encryption techniques, a key is often used to polynomials over finite fields, it is possible to
encrypt the message. If the transmitter and receiver discover how to design a device that produces a
share the same encoding key, the scrambled sequence whose period is very long and has good
message can be recovered by the receiver. In randomness properties. But, it is important to stress
chaotic systems, the transmitter itself acts as a that the linear feedback shift register is insecure for
cryptographic purposes.
Chaotic behaviour can be obtained by using The data information symbols are firstly coded by a
different mapping techniques [4].In this paper we Reed Solomon (RS) coder [6]. RS are powerful
are using tent mapping technique. error correcting codes that can be employed in a
wide variety of digital communication systems. The
TENT MAP: The following is a tent map equation. RS (255, 239, 8) is used in this project. Interleaving
is a technique commonly used in communication
{
( ) systems to overcome correlated channel noise such
Where m=1.9 and x(0)=0.4142. A code illustrating as burst errors or fading. As a result of interleaving,
chaotic behaviour is given below: correlated noise introduced in the transmission
( ) channel appears to be statistically independent at
the receiver and thus allows better error correction.
( ( ) ) Without an interleaver, the RS decoder cannot
() ( ) correct more than 8 errors in code words. At the
output of the interleaver, the symbols are coded
() ( ( )) with a convolution coder (7, 1/2) with code rate
R=1/2.
2. Chaotic modulator
( ) ( ) ( )
III. RESULTS AND DISCUSSION
Where h[n] is the pulse shaping filter, w[n] is an
additive white Gaussian noise with power spectral
density equal to , T is the period of dynamic
symbols, and denotes the discrete time
convolutional operator. We assume that we have a
perfect clock synchronisation on the receiver side
which means that the sampling at the output of the
matched filter is synchronized with the sampling
period of the received signal. The demodulation of
the received chaotic signal is achieved by the
chaotic demodulator. Finally it is decoded by an RS Figure 5 : Bit Error Rate (BER) calculation over AWGN channel for
Chaotic Demodulator
Figure 6: Bit Error Rate (BER) calculation over AWGN channel for
Figure 4: Coherent antipodal CSK system demodulator. RS (256,239) code.
V. REFERENCES
IV. CONCLUSION