Sei sulla pagina 1di 6

International Journal of Wireless Communication and Simulation Volume 3 Number 1 (2011), pp. 1-6 Research India Publications http://www.ripublication.com/ijwcs.

htm

Simulation and Analysis of Chaotic Sequence based Encryption Method for Different Wireless Communication Systems
1

Swapnil Shrivastava and 2Sumit Sharma


1

M.Tech., SRIT, Jabalpur, M.P., India E-mail: swapnilmtech@yahoo.in 2 H.O.D., EC Deptt., SRIT Jabalpur, M.P., India

Abstract Security is an important issue in all communications systems for the users and providers of such systems. Although mobile application have special requirements because it is accessible for every one within the range of transmitter and are therefore of special concern. Encryption of the data by some way is one of the simplest solutions for stated problem but for the proper operation of the system the method must be fast enough and should be simple so that it can implemented on the low resources mobile devices, also it should not increase the power requirements of the systems. In this paper we proposed and analyzed the chaotic sequence based encryption technique for different types of communication systems like OFDM, CDMA, QPSK and GMSK, and we also simulated the BER of each system with respect to SNR. The simulation of all techniques is done on MATLAB. Keywords: Wireless Communication, Encryption, Chaotic Sequence.

Introduction
Mobile devices are designed to be portable, i.e., light and small. Until a more suitable alternative is found, mobile devices will more than likely be battery powered within the foreseeable future. In order to conserve energy, processing speeds need to be slower and processor cycles reduced. Data transmissions also consume energy therefore it must be reduced. The former imposes limits on the computational complexity of encryption algorithms and the number of messages involved in security protocols. Even though using special purpose circuitry or encryption chips can

Swapnil Shrivastava and Sumit Sharma

alleviate this problem. Faxed business letters can be intercepted at will through tapped phone lines or intercepted microwave transmissions without the knowledge of the sender or receiver. To increase the security of this and other data communications, including digitized telephone conversations, the binary codes representing data may be scrambled in such a way that unauthorized interception will produce an indecipherable sequence of characters. Authorized receive stations will be equipped with a decoder that enables the message to be restored. The process of scrambling, transmitting, and descrambling is known as encryption. This paper presents the chaotic sequence based encryption technique which can be easily programmed in main processor or can be implemented on integrated circuits at low cost. In some cases, it can be incorporated into the main circuitry of a data communications device and function without operator knowledge. In other cases, an external circuit can also be used so that the device, and its encrypting/decrypting technique, may be transported easily.

Chaotic Sequences
Chaos is a deterministic, random-like process found in non-linear, dynamical system, which is non-period, non-converging and bounded. Moreover, it has a very sensitive dependence upon its initial condition and parameter. Chaotic signals can be used in communication. A chaotic map is a discrete-time dynamical system
x k +1 = f ( x k ), 0 < x k < 1, k = 0, 1, 2,

running in chaotic state. The chaotic sequence

{x k :

k = 0, 1, 2,

can be used as spread-spectrum sequence in place of PN sequence in conventional CDMA DS/SS communication systems or as encrypting sequence in any digital communication system. Chaotic sequences are uncorrelated when their initial values are different, so in chaotic spread-spectrum systems, a user corresponds to an initial value. In addition, it is possible to synchronize two copies of a discrete-time chaotic system, in the sense that their state trajectories tend asymptotically to be identical when one system is suitably driven by the other. If the driving signal is selected appropriately, the discrete-time synchronization will be immediate.

OFDM
Orthogonal frequency division multiplexing, (OFDM), essentially identical to coded OFDM (COFDM) and discrete multi-tone modulation (DMT), is a frequency-division

Simulation and Analysis of Chaotic Sequence

multiplexing (FDM) scheme used as a digital multi-carrier modulation method. A large number of closely-spaced orthogonal sub-carriers are used to carry data. The data is divided into several parallel data streams or channels, one for each sub-carrier. Each sub-carrier is modulated with a conventional modulation scheme (such as quadrature amplitude modulation or phase-shift keying) at a low symbol rate, maintaining total data rates similar to conventional single carrier modulation schemes in the same bandwidth. OFDM has developed into a popular scheme for wideband digital communication, whether wireless or over copper wires, used in applications such as digital television and audio broadcasting, wireless networking and broad band internet access. The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions (for example attenuation of high frequencies in a long copper wire, narrowband interference and frequency-selective fading due to multipath) without complex equalization filters. Channel equalization is simplified because OFDM may be viewed as using many slowly-modulated narrowband signals rather than one rapidly-modulated wideband signal. The low symbol rate makes the use of a guard interval between symbols affordable, making it possible to eliminate intersymbol interference (ISI) and utilize echoes and time-spreading (that shows up as ghosting on analogue TV) to achieve a diversity gain, i.e. a signal-to-noise ratio improvement. This mechanism also facilitates the design of single frequency networks (SFNs), where several adjacent transmitters send the same signal simultaneously at the same frequency, as the signals from multiple distant transmitters may be combined constructively, rather than interfering as would typically occur in a traditional single-carrier system.

CDMA
In telecommunications, direct-sequence spread spectrum (DSSS) is a modulation technique. As with other spread spectrum technologies, the transmitted signal takes up more bandwidth than the information signal that is being modulated. The name 'spread spectrum' comes from the fact that the carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency. 802.11b use DSSS signaling. DSSS phase-modulates a sine wave pseudo randomly with a continuous string of pseudo noise (PN) code symbols called "chips", each of which has a much shorter duration than an information bit. That is, each information bit is modulated by a sequence of much faster chips. Therefore, the chip rate is much higher than the information signal bit rate. DSSS uses a signal structure in which the sequence of chips produced by the transmitter is known a priori by the receiver. The receiver can then use the same PN sequence to counteract the effect of the PN sequence on the received signal in order to reconstruct the information signal.

Swapnil Shrivastava and Sumit Sharma

GMSK
In digital modulation, minimum-shift keying (MSK) is a type of continuousphase frequency-shift keying that was developed in the late 1950s and 1960s.Similar to OQPSK, MSK is encoded with bits alternating between quadature components, with the Q component delayed by half the symbol period. However, instead of square pulses as OQPSK uses, MSK encodes each bit as a half sinusoid. This results in a constant-modulus signal, which reduces problems caused by non-linear distortion. In addition to being viewed as related to OQPSK, MSK can also be viewed as a continuous phase frequency shift keyed (CPFSK) signal with a frequency separation of one-half the bit rate.

QPSK
Sometimes this is known as quaternary PSK, quadriphase PSK, 4-PSK, or 4-QAM. (Although the root concepts of QPSK and 4-QAM are different, the resulting modulated radio waves are exactly the same.) QPSK uses four points on the constellation diagram, equispaced around a circle. With four phases, QPSK can encode two bits per symbol, shown in the diagram with gray coding to minimize the bit error rate (BER) sometimes misperceived as twice the BER of BPSK. The mathematical analysis shows that QPSK can be used either to double the data rate compared with a BPSK system while maintaining the same bandwidth of the signal, or to maintain the data-rate of BPSK but halving the bandwidth needed. In this latter case, the BER of QPSK is exactly the same as the BER of BPSK - and deciding differently is a common confusion when considering or describing QPSK. Given that radio communication channels are allocated by agencies such as the Federal Communication Commission giving a prescribed (maximum) bandwidth, the advantage of QPSK over BPSK becomes evident: QPSK transmits twice the data rate in a given bandwidth compared to BPSK - at the same BER. The engineering penalty that is paid is that QPSK transmitters and receivers are more complicated than the ones for BPSK. However, with modern electronics technology, the penalty in cost is very moderate. As with BPSK, there are phase ambiguity problems at the receiving end, and differentially encoded QPSK is often used in practice.

Simulation Results
Each of the above mentioned method are implemented and simulated on matlab the simulation are performed for 104 bits, and for different AWGN values, in all simulation the main data stream is firstly encrypted by using chaotic encryption technique and then at receiver side decrypted using same technique.

Simulation and Analysis of Chaotic Sequence

Figure 1: Performance of OFDM System with Chaotic sequence based encryption technique.

Figure 2: Performance of CDMA System with Chaotic sequence based encryption technique.

Figure 3: Performance of QPSK System with Chaotic sequence based encryption technique.

Swapnil Shrivastava and Sumit Sharma

Figure 4: Performance of GMSK System with Chaotic sequence based encryption technique.

Conclusion
The results shows that the encryption scheme does not affects the basic characteristics of the modulation techniques and hence it can be adopted as a fast and efficient encryption method in either in built system or with external devices.

References
[1] O. Edfors, M. Sandell, J.-J. de Beek, D. Landstrom, F.Sjoberg, \An introduction to orthogonal frequency-divisionmultiplexing," [2] E. Lawrey, \The suitability of ofdm as a modulation tech-nique for wireless telecommunications, with a cdma com-parison," MSc. thesis, James Cook University, Australia,October 1997. [3] A. Engelhart, H. Gryska, C. Sgraja, W.G. Teich, J. Lind-ner, \The discrete-time channel matrix model for general bfdm packet transmission schemes," Proceedings of 1 st In- ternational POFDM-Workshop Hamburg, 21-22 September 1999. [4] J. Proakis, Digital Communications. New York: McGraw-Hill, 3 ed., 1995. [5] N. Yee, J.P.M.G. Linnartz, \Multi-carrier CDMA in an in-door wirless radio channel," UCB/ERL, 1994. U.C. Berke-ley, UCB/ERL M94/6, Electronics Research Lab. [6] R. van Nee, R. Pasad, OFDM for Wireless Multimedia Communication. Boston London: Artech House Publishers,2000. [7] T. Keller, L. Hanzo, \Adaptive multicarrier modulation:A convencient framework for time-frequency processing in wireless communications," Procideengs of the IEEE, vol. 88,May 2000.

Potrebbero piacerti anche