CN103905358A - Improved type differential chaos shift keying DCSK confidentiality communication method - Google Patents
Improved type differential chaos shift keying DCSK confidentiality communication method Download PDFInfo
- Publication number
- CN103905358A CN103905358A CN201410085985.2A CN201410085985A CN103905358A CN 103905358 A CN103905358 A CN 103905358A CN 201410085985 A CN201410085985 A CN 201410085985A CN 103905358 A CN103905358 A CN 103905358A
- Authority
- CN
- China
- Prior art keywords
- mrow
- signal
- msub
- chaotic
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 40
- 238000000034 method Methods 0.000 title claims abstract description 17
- 230000005540 biological transmission Effects 0.000 claims abstract description 41
- 230000000739 chaotic effect Effects 0.000 claims description 73
- 230000003111 delayed effect Effects 0.000 claims description 9
- 238000001228 spectrum Methods 0.000 claims description 9
- 108010003272 Hyaluronate lyase Proteins 0.000 claims description 7
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 5
- 230000000737 periodic effect Effects 0.000 claims description 4
- 238000004088 simulation Methods 0.000 abstract description 4
- 230000006872 improvement Effects 0.000 abstract description 3
- 230000008054 signal transmission Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 6
- 238000011160 research Methods 0.000 description 4
- 230000001427 coherent effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 230000007480 spreading Effects 0.000 description 2
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005291 chaos (dynamical) Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 238000005312 nonlinear dynamic Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Images
Landscapes
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
Abstract
The invention discloses a confidentiality communication method based on an improved type DCSK, and belongs to the technical field of signal transmission. In response to the confidentiality problem of the DCSK, after the improvement, information is scattered to two communication channels to be transmitted, a reference signal of the information in each channel is transmitted in the other channel, so that even the information in one channel is intercepted and captured in the transmission process, the original signal cannot be decoded, and the problem of low channel utilization rate is solved. Through the comparison of the original system bit error rate with the improved system bit error rate, the bit error rate of the improved type DCSK system is lower than the bit error rate of the traditional system in the data transmission process, and the channel utilization rate is much higher and confidentiality is much stronger. Through simulation it can be seen that the simulation result is consistent with the theoretical analysis, and confidentiality is greatly enhanced. Meanwhile, the improved type differential chaos shift keying DCSK confidentiality communication method is relatively low in complexity, easy for the project to be realized, and will has wide application prospect in the fields of images, military confidential information and the like.
Description
Technical Field
The present invention relates to data communication systems, and more particularly, to a chaotic secure communication method for transmitting and receiving data using improved differential chaotic keying.
Background
Since 1990, chaotic communication and chaotic synchronization technology have become a research hotspot for international and domestic communication. The development of the chaos synchronization control theory lays a theoretical foundation for the application of chaos in the communication field. The utilization of synchronous chaos for secret communication is a major international research hotspot. The synchronous chaotic communication that has been proposed and developed so far is mainly classified into: chaos masking, chaos parameter modulation, chaos keying and chaos spreading. Chaos covering belongs to chaos analog communication, and the other three types belong to chaos digital communication. Chaos covering is a chaos secret communication mode which is proposed earlier, a transmission signal covered under a chaos signal is extracted by utilizing a nonlinear dynamics prediction technology, the realization of the chaos signal depends on the synchronous realization degree of a system, therefore, high-quality communication service cannot be provided, the chaos signal covering method is only suitable for a slow-varying signal, and the chaos signal and a time-varying signal cannot be well processed. The chaos parameter modulation is to hide the transmitted information in the system parameter, the key of the scheme lies in the recovery degree of the chaos system parameter, and the demodulation of the system parameter is sensitive to the external interference, thereby reducing the communication efficiency. The chaotic spread spectrum communication is to replace a pseudo-random sequence of a traditional communication system by a chaotic sequence, thereby meeting the higher requirements of people on future communication. Due to some characteristics of the chaotic signal, the chaotic spread spectrum sequence has good random performance, high confidentiality, good correlation characteristics and a large number of usable signals. The key of chaotic spread spectrum communication lies in the selection of chaotic spread spectrum sequences, and the research on the chaotic sequences is also an important aspect of the research on chaotic communication at present. Chaos keying is that there are several chaos systems at the sending end, and different chaos systems are gated according to the code value to be transmitted. Thus, the sending signal is composed of a section of chaotic signal representing different chaotic attractors, and each chaotic system of the sending end is provided with a corresponding synchronous system at the receiving end. The received signal drives each synchronous system, and the code value transmitted in one code element period is judged according to the condition that each synchronous system achieves synchronization in the period. In the chaotic digital communication system, the chaotic keying has strong anti-jamming capability, can effectively inhibit the influence of multipath interference on the system, plays an important role in a communication scheme, and is considered by broad scholars to have better development prospect and application value. The chaos keying modulation technology has strong anti-noise interference and parameter mismatch capability and low power spectral density, so the chaos keying modulation technology is widely applied to a digital secret communication system. The technique of Chaos Shift Keying (CSK), chaos on-off keying (COOK), differential chaos keying (DCSK), frequency modulation differential chaos keying (FM-DCSK) and the like are derived based on the Chaos Shift Keying (CSK), the chaos on-off keying (COOK), the differential chaos keying (DCSK), the frequency modulation differential chaos keying (FM-DCSK) and the like. The CSK and COOK technologies enable the threshold judgment of the system receiving end to be changed according to the change of the signal-to-noise ratio, otherwise the system has higher bit error rate to cause the performance of the system to be reduced. To solve the problem, g.kolomban et al also propose differential chaos keying (DCSK) based on incoherent demodulation, which overcomes the disadvantage that the decision threshold values of CSK and COOK depend on the signal-to-noise ratio, and meanwhile, the receiving end does not need synchronization, and the structure is simple but on the premise. The specific inherent broadband characteristic of FM-DCSK adopts the method of firstly carrying out frequency modulation on chaotic signals so as to keep the signal energy constant, but therefore, an analog phase-locked loop (APLL) and an FM modulator need to be added at the sending end of FM-DCSK, and the circuit is complicated.
The output signal of the differential chaos keying (DCSK) has inherent broadband characteristic and anti-noise characteristic, and because the non-coherent demodulation technology is adopted, synchronization does not need to be established at the transmitting end and the receiving end, so that the DCSK has many advantages compared with the traditional communication system. But its transmission rate is low and its security is poor.
Disclosure of Invention
In view of the above deficiencies in the prior art, the present invention aims to provide an improved DCSK secure communication method with improved transmission rate, improved security, less possibility of being cracked, improved error code performance, and improved utilization rate. The technical scheme of the invention is as follows:
an improved differential chaos keying DCSK secret communication method comprises the following steps:
101. generating two different chaotic signals by adopting Logistic chaotic mapping generator at transmitting end of chaotic systemAnd chaotic signalAnd will chaos signalAnd chaotic signalRespectively obtaining delayed chaotic signals after the phase delay of a spread spectrum coefficient MAnd delaying the chaotic signal
102. Message to be sentAfter serial/parallel conversion, the signals are divided into two paths of sequences a and b with half-reduced speed, and then the two paths of sequences are converted into two paths of bipolar signals through level conversionAndand will bipolar signalAnd the delayed chaotic signal obtained in the step 101Multiplying to obtain a transmission signalPut in channel I for transmission, the bipolar signalAnd the delayed chaotic signal obtained in the step 101Multiplying to obtain a transmission signalPlaced in channel II for transmission, the output signal of channel I beingThe output signal of the channel II isIn which the channel I is in the first half of a symbol period TThe channel transmits a reference signal, andthe second halfThe periodic channel transmitting a transmission signalFirst half period of channel IIThe channel transmits the reference signal, and the second halfThe channel transmitting signals in a cycle
103. When the output signal of channel I in step 102Output signal of channel IIAfter the signals are transmitted to a receiving end of the chaotic system, the receiving end decodes the received signals to recover r1, n and r2, n;
104. decoding the recovered signal r in step 1031,nAnd r2,nBy autocorrelation of a correlator, i.e. by applying a received signal r1,nAnd r2,nThe signal r (n + M) with M bits delayed in the same time is subjected to correlation operation in the interval of the spreading factor M to obtain y1,kAnd y2,k;
105. And (5) changing the signals y1, k and y2, k after the autocorrelation operation in the step 104 into serial transmission from parallel transmission, and completing the data transmission of the secure communication.
Further, the expression of Logistic chaotic mapping generator in step 101 is
Where x (n) is a chaotic signal and μ is a coefficient.
Further, the Logistic chaotic map generator generates chaotic signals when μ =2.9 and μ =3.0And chaotic signal
Further, the expression of the autocorrelation in step 104 is
Where r (n) represents the received signal, r (n) includes r1,nAnd r2,nAnd r (n + M) represents a signal delayed by M bits, M being a spreading factor.
The invention has the following advantages and beneficial effects:
aiming at the defects of the prior art on chaos keying communication, the invention provides an improved DCSK
The system, the output signal of the differential chaos keying (DCSK) has the inherent wide-band characteristic and the anti-noise characteristic
And the method adopts the non-coherent demodulation technology, so that the synchronization does not need to be established at the transmitting end and the receiving end, compared with the traditional communication
The system has many advantages. But its transmission rate is low and its security is poor. Aiming at the problems, the invention provides a
An improved DCSK secret communication system not only ensures the transmission rate but also improves the security
The confidentiality is greatly enhanced, the data is not easy to crack, the error code performance is improved, and the profit is improved
And (7) the rate.
Drawings
FIG. 1 is a modulation schematic diagram of a DCSK system in accordance with a preferred embodiment of the present invention;
FIG. 2 is a demodulation schematic diagram of a DCSK system;
FIG. 3 is a schematic diagram of a modified DCSK modulation;
FIG. 4 is a schematic diagram of an improved DCSK demodulation;
FIG. 5 is a sequence diagram of an improved DCSK accept message exchange;
FIG. 6 is a bit error rate comparison of a conventional DCSK and a modified DCSK;
FIG. 7 is a diagram of the bit error rate of the modified DCSK with different M values;
Detailed Description
The invention will now be further elucidated with reference to the following non-limiting embodiment in which the drawing is combined.
DCSK is the chaos keying secret communication system that studies the most at present, and system simple structure, the bit error rate is lower, and the interference killing feature is stronger, but has a problem in practical application: in a code element period, a reference signal and an information signal sent by a sending end are the same or opposite, so the channel confidentiality is lower, the sent information is intercepted and then is easy to decipher a transmission signal through analysis, and only 1bit of information can be transmitted in one period, so that the channel utilization rate and the transmission speed are lower. Aiming at the confidentiality problem of DCSK, the information is transmitted on two channels in a dispersed way through improvement, and the reference signal of each channel of information is transmitted on the other channel, so that even if a certain channel of information is intercepted in the transmission process, the original signal cannot be decoded, and the problem of low channel utilization rate is solved.
In 1996, g.kolomban proposed a differential chaos keying scheme (DCSK) to solve the problem that the CSK decision threshold value depends on the signal-to-noise ratio. In the DCSK scheme, each bit of information is converted and composed of two sections of chaotic signals, wherein the first section is a reference signal, the second section carries useful information, when the transmission information is 1, two sections of identical in-phase signals are transmitted, and when the transmission information is 0, two sections of signals at a transmitting end are in phase reversal, namely, a section of signals in phase reversal with the reference signal is behind the reference signal, and the two sections of signals are continuously transmitted. After receiving the information signal and the reference signal at the receiving end, sending the information signal and the reference signal to a related receiver, calculating the related characteristics of the two sections of signals, and recovering the information according to the positive and negative of the related characteristics, wherein if the related characteristics are greater than zero, the information signal is '1', and if the related characteristics are less than zero, the information signal is '0'. Modem demodulation principle of DCSK system
The figures are shown in figures 1 and 2.
Each bit of information of a DCSK system sending end consists of two sections of chaotic signals with the same length, wherein the former section transmits a reference signal, and the latter section transmits an information signal. Firstly, converting an original binary signal into a bipolar signal through a converter, then sending out M chaotic signals as reference signals in the former T/2, and sending out the M reference signals after delaying M bits in the latter T/2 and modulating the M reference signals with the bipolar signal. Wherein, if the transmitted signal is "+ 1", the information signal is the same as the reference signal; if the transmitted signal is "-1", the information signal is equal to the inverted reference signal. Therefore, the output signal s (n) of the transmitting end can be expressed as:
where x (n) is a chaotic signal, b (k) is a bipolar signal, and M is a spreading factor. At the receiving end, the correlation operation is performed on the reference signal and the information signal, that is, the correlation operation is performed on the received signal r (n) and the signal r (n + M) with M bit delay in the interval of the spreading factor M. The output formula of the correlator is as follows:
assume that the received signal is r (n) = s (n) + ξ (n), where ξ (n) is the channel noise. If the receiver has acquired synchronization, the correlator output is as shown in equation (3):
in equation (3), the first term is the useful signal and the second term is random noise with a mean value of zero. It can be seen that y (k) is consistent with the polarity of the bipolar signal b (k), so that the original signal can be demodulated, i.e., the original signal
The system changes the traditional single-channel transmission mode into the mode of dispersing information into two channels for transmission. In the DCSK scheme proposed by g.kolomban et al, each bit of information at the system transmitting end consists of two segments of chaotic signals with the same length, the former segment transmits a reference signal, and the latter segment transmits an information signal. After interception, by observing the frequency spectrum of the transmission signal, the rule can be easily found, and the original information is easy to be cracked, so that the method is difficult to have better confidentiality. Moreover, each bit of information can only transmit one binary bit, and the information transmission efficiency is low. In view of the above situation, an improved DCSK system is provided, which has greatly enhanced security, is not easy to be cracked, has improved error code performance, and has improved utilization rate.
By combining the examples, the specific steps for realizing the improved DCSK secure communication system of the invention are as follows:
step 1:
chaos theory begins to be applied to secure communication, wherein most of the theory is to use a Logistic system to generate a pseudo-random number sequence, and the theoretical basis is the sensitivity of a chaotic power system to initial values and parameters. However, Logistic systems are chaotic only when the initial values and parameters take values within certain specified ranges, and are not chaotic for any initial values and parameters. Secondly, even if the Logistic system is in a chaotic state, the randomness of the pseudo-random sequences generated under different initial values and parameters is greatly different. The present invention considers the Logistic system expression to have the following form:
when different initial values are adopted, the generated chaotic signals are different. Input signalModulated and thus the characteristics of the modulation system are altered by the input signal. For example, when the input signal is changed from cosine wave to rectangular wave, the system is not a chaotic system. Therefore, for security purposes, the modulated signal is to be retainedThe chaotic nature of (1). As used hereinTwo values of (a) produce two different chaotic signals.
Step 2:
in the traditional DCSK transmission scheme, a reference signal and a modulation signal are transmitted on the same channel, and transmitted information is intercepted and then is easily decoded through analysis. The improved DCSK introduces a channel based on the original DCSK. As can be seen from the transmitting end of FIG. 3, the informationFirstly, the signals are converted into two paths of bipolar signals through serial-parallel conversionAndthen respectively delaying two different chaotic signals with two paths of signals after M delayAndmultiplying to obtain a signalAnd, separately, put into two channels for transmission, so thatThe respective reference signal and the modulation signal are separated and transmitted in different channels. Due to the special orthogonality of the chaotic signals, the signals in the two transmission channels are orthogonal. The sequence of the demodulation mode information in one symbol period T is simplified as shown in fig. 2. Information is dispersed on two channels in the transmission process, the frequency spectrum is greatly expanded, and the confidentiality is greatly enhanced. Even if the listener interceptsOrThe sequence cannot be deciphered, and thus, complete secure communication can be achieved. Two channel output signalAndrespectively shown in formulas (6) and (7):
wherein,andis a chaotic signal and is a signal that is,andis a bipolar signal, Rn represents a gate function with the length of M, and M is a spreading coefficient, namely each symbol is modulated by an M bit chaotic signal. The relationship between the information rate and the rates of the two signals and the final modulated information rate is shown in (8), where rs, rk and ri respectively represent the channel rate, the transform rate and the information rate.
rs=2Mrk=Mri(8)
In one symbol period T, (6) (7) can be simplified to (9) (10), wherein the first half periodThe channel transmits the reference signal, and the second halfThe periodic channel transmits the other path of modulation signal. The problem that if one channel is intercepted, the information can be cracked is avoided.
And step 3:
as can be seen in figure 4 of the drawings,andafter being transmitted to the receiving end at the same time, beforeGetAndfront M bits and rearGetAndthen M bits and the channel is switched so that the scrambled order is restored again at the transmitting end. The exchange mode is adopted to avoid the weakness that a certain path of information is intercepted in the transmission process and the original signal is decoded, and simultaneously, the problem of low channel utilization rate is solved. The exchanged signals are, as can be seen from fig. 4, respectively, so that the disorderly sequence before transmission is adjusted back at the receiving end, as shown in equations (11) (12):
and 4, step 4:
after the receiving end readjusts the sequence, the two paths of signals respectively perform autocorrelation operation, as shown in fig. 5.
Suppose that two signals received at the receiving end are r1,n=s1,n+ξ1,n,r2,n=s2,n+ξ2,nIn which ξ1,nξ 2, n denotes Additive White Gaussian Noise (AWGN) with a mean value of 0, σ1 2Is xi1,nVariance of (a)2 2Is xi2,nThe variance of (c). And when i ≠ j,and xi2,nAnd (4) performing statistical independence. The sequence after the two paths of merging is as follows:
then, the output of the first path correlator is as shown in equation (15):
first term of formula (15)Is the desired useful signal, the second termIs a random quantity with a mean value of zero, then y1,kAnd b1,kB is consistent, then b can be judged1,kAs shown in equation (16):
the same can derive (17) (18) two formulas:
step 5
The two channels are recoded after autocorrelation and are reordered to restore data after parallel-serial conversion. As shown in fig. 5.
All steps are completed.
The code error performance and the spread spectrum coefficient M of the modulation and demodulation mode andthe relationship is close. Comparing with the traditional modulation mode, analyzing the probability of P (0|1) in the first channel, namely the error probability of judging that the transmission ' 1 ' is ' 0 ', and assuming b '1,K=1, equation (15) becomes (19),for the energy of the signal in T/2 time
Equation (20) can be written as:
the left side of the formula (20) is a random process(i, j) condition, xi,n,ξi,nIndependent of each other and
has a mean value of 0 and is in any caseXi ≠ j conditioni,nAnd xij,nIs statistically independent, σ2 1Is xi1Of
Difference, σ2 2Is xi2Variance of, N1、N2Noise mean power spectral density of the two channels, respectively, and thus
in chaotic systems, the chaotic signal xi,nAnd xi,n+MThe correlation between them decays rapidly as M increases. Assuming that M is greater than the correlation feature decay time, β approaches a gaussian distribution as M increases. Therefore, the formula for improving the bit error rate of the DCSK system can be written as formula (22). Where erfc (x) is a complementary error function, i.e. <math>
<mrow>
<mi>erfc</mi>
<mrow>
<mo>(</mo>
<mi>x</mi>
<mo>)</mo>
</mrow>
<mo>=</mo>
<mfrac>
<mn>2</mn>
<msqrt>
<mi>π</mi>
</msqrt>
</mfrac>
<msubsup>
<mo>∫</mo>
<mi>x</mi>
<mo>∞</mo>
</msubsup>
<mn>2</mn>
<mi>xp</mi>
<mrow>
<mo>(</mo>
<msup>
<mrow>
<mo>-</mo>
<mi>t</mi>
</mrow>
<mn>2</mn>
</msup>
<mo>)</mo>
</mrow>
<mi>dt</mi>
</mrow>
</math>
The initial values used for generating the chaotic signals in each bit period are different, chaotic signal sample values generated by the same initial value have strong correlation, and chaotic signal sample values generated by different initial values are irrelevant. The non-coherent demodulation of the chaotic signal can be realized by utilizing the correlation and the non-correlation at the receiving end.
Logistic sequence of when mu1=2.9,μ 22=3.0 can generate chaotic signals. Let the initial value xi,1=0.1, and the chaotic signal generated by 50 iterations is used as a carrier to modulate the original signal, as shown in (23) (24).
Simulation result and performance analysis: the transmission process in a wireless channel is simulated, assuming that the channel noise satisfies the AWGN distribution.
FIG. 6 shows a conventional DAnd comparing the bit error rate between the CSK and the modified DCSK, wherein the solid line represents the conventional DCSK, and the dotted line represents the modified DCSK. It can be seen that the improved DCSK has been greatly improved over the conventional DCSK. Comparing the error code performance of the DCSK system before and after the improvement under the same spreading factor M, it can be known that the error code rate difference of the two systems is not large when the signal to noise ratio is low, and when E isb/N0And when the bit error rate is more than 7.5dB, the difference of the bit error rates begins to increase, and the bit error rate of the improved DCSK is lower than that of the traditional DCSK. At the same Eb/N0The bit error rate of the improved DCSK is 1-2 orders of magnitude lower than that of the traditional DCSK; the signal-to-noise ratio also varies for the same BER, and when BER =10-3 and M =10, the improved DCSK is approximately 6dB higher than the conventional DCSK.
The error performance of the DCSK system has a great relationship with M. Fig. 7 shows the error performance simulation of the improved DCSK system when M is 10, 20, 30, 40 and 50 respectively. When M increases, the system BER also increases, and the error performance is also worse.
Fig. 8 shows the relationship between M and BER for different signal-to-noise ratios. It can be seen from the figure that the larger the signal-to-noise ratio at the same M, the lower the BER.
In general, the performance of the improved DCSK system is obviously better than that of the traditional system, and the error code performance and the confidentiality of data transmission are greatly improved.
The above examples are to be construed as merely illustrative and not limitative of the remainder of the disclosure. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall within the scope of the invention defined by the method claims.
Claims (3)
1. An improved differential chaos keying DCSK secret communication method is characterized by comprising the following steps:
101. generating two different chaotic signals by adopting Logistic chaotic mapping generator at transmitting end of chaotic systemAnd chaotic signalAnd will chaos signalAnd chaotic signalRespectively obtaining delayed chaotic signals after the phase delay of a spread spectrum coefficient MAnd delaying the chaotic signal
102. Message to be sentAfter serial/parallel conversion, the signals are divided into two paths of sequences a and b with half-reduced speed, and then the two paths of sequences are converted into two paths of bipolar signals through level conversionAndand will bipolar signalAnd the delayed chaotic signal obtained in the step 101Multiplying to obtain a transmission signalPut in channel I for transmission, the bipolar signalAnd the one obtained in step 101Delaying chaotic signalsMultiplying to obtain a transmission signalPlaced in channel II for transmission, the output signal of channel I beingThe output signal of the channel II isIn which the channel I is in the first half of a symbol period TThe channel transmits the reference signal, and the second halfThe periodic channel transmitting a transmission signalFirst half period of channel IIThe channel transmits the reference signal, and the second halfThe periodic channel transmitting signals
103. When the output signal of channel I in step 102Output signal of channel IIAfter the signals are transmitted to a receiving end of the chaotic system, the receiving end decodes the received signals to recover r1, n and r2, n;
104. decoding the recovered signal r in step 1031,nAnd r2,nBy autocorrelation of a correlator, i.e. by applying a received signal r1,nAnd r2,nThe signal r (n + M) with M bits delayed in the same time is subjected to correlation operation in the interval of the spreading factor M to obtain y1,kAnd y2,k;
105. And (5) changing the signals y1, k and y2, k after the autocorrelation operation in the step 104 into serial transmission from parallel transmission, and completing the data transmission of the secure communication.
2. The improved DCSK (differential chaos keying) secret communication method as claimed in claim 1, wherein the Logistic chaos mapping generator in step 101 has the expression of
generating chaotic signal by Logistic chaotic mapping generator when mu =3.0And chaotic signal
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410085985.2A CN103905358A (en) | 2014-03-10 | 2014-03-10 | Improved type differential chaos shift keying DCSK confidentiality communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410085985.2A CN103905358A (en) | 2014-03-10 | 2014-03-10 | Improved type differential chaos shift keying DCSK confidentiality communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103905358A true CN103905358A (en) | 2014-07-02 |
Family
ID=50996514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410085985.2A Pending CN103905358A (en) | 2014-03-10 | 2014-03-10 | Improved type differential chaos shift keying DCSK confidentiality communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103905358A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410487A (en) * | 2014-12-04 | 2015-03-11 | 重庆邮电大学 | Communication method combining chaos and MIMO |
CN104869566A (en) * | 2015-06-15 | 2015-08-26 | 湖北师范学院 | Communication system for encrypting information through chaotic signal |
CN105916138A (en) * | 2016-06-08 | 2016-08-31 | 西安交通大学 | Secure transmission method based on Key assistance |
CN106357383A (en) * | 2016-11-14 | 2017-01-25 | 兰州大学 | DC-DCSK secret communication system and analysis processing method |
CN106385392A (en) * | 2016-09-07 | 2017-02-08 | 厦门大学 | Low-intercept probability communication waveform design method based on chaotic keying |
CN106452720A (en) * | 2016-08-31 | 2017-02-22 | 王波 | Digital chaotic secure communication system |
CN109088717A (en) * | 2018-10-24 | 2018-12-25 | 重庆邮电大学 | Multi-user's chaos communications based on time reversal of multiple input single output |
CN109347619A (en) * | 2018-10-25 | 2019-02-15 | 重庆邮电大学 | A kind of CD-DCSK chaos communications interfered between no signal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399795A (en) * | 2008-11-04 | 2009-04-01 | 南京师范大学 | Modulating and demodulating method for orthogonal differential chaos phase shift-keying of digital signal |
CN101476932A (en) * | 2008-12-19 | 2009-07-08 | 哈尔滨工程大学 | Same-frequency Duffing transducer without sensitivity to checking signal phase and its construction method |
CN101980492A (en) * | 2010-11-01 | 2011-02-23 | 重庆盖尔乐普科技发展有限公司 | Orthogonal code multiplexing-based differential chaos shift keying modulation and demodulation method |
CN101986632A (en) * | 2010-10-26 | 2011-03-16 | 黑龙江大学 | Correlation delay-differential chaos shift keying-based modulation communication method |
CN102170346A (en) * | 2011-05-18 | 2011-08-31 | 华北电力大学 | A secure communication method of utilizing an amplitude to realize chaos synchronization |
-
2014
- 2014-03-10 CN CN201410085985.2A patent/CN103905358A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399795A (en) * | 2008-11-04 | 2009-04-01 | 南京师范大学 | Modulating and demodulating method for orthogonal differential chaos phase shift-keying of digital signal |
CN101476932A (en) * | 2008-12-19 | 2009-07-08 | 哈尔滨工程大学 | Same-frequency Duffing transducer without sensitivity to checking signal phase and its construction method |
CN101986632A (en) * | 2010-10-26 | 2011-03-16 | 黑龙江大学 | Correlation delay-differential chaos shift keying-based modulation communication method |
CN101980492A (en) * | 2010-11-01 | 2011-02-23 | 重庆盖尔乐普科技发展有限公司 | Orthogonal code multiplexing-based differential chaos shift keying modulation and demodulation method |
CN102170346A (en) * | 2011-05-18 | 2011-08-31 | 华北电力大学 | A secure communication method of utilizing an amplitude to realize chaos synchronization |
Non-Patent Citations (1)
Title |
---|
张刚等: "一种改进型DCSK 保密通信系统性能分析", 《电视技术》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410487A (en) * | 2014-12-04 | 2015-03-11 | 重庆邮电大学 | Communication method combining chaos and MIMO |
CN104410487B (en) * | 2014-12-04 | 2018-02-06 | 重庆邮电大学 | A kind of communication means being combined using chaos and MIMO |
CN104869566A (en) * | 2015-06-15 | 2015-08-26 | 湖北师范学院 | Communication system for encrypting information through chaotic signal |
CN104869566B (en) * | 2015-06-15 | 2018-05-22 | 湖北师范学院 | A kind of communication system that information is encrypted by chaotic signal |
CN105916138A (en) * | 2016-06-08 | 2016-08-31 | 西安交通大学 | Secure transmission method based on Key assistance |
CN105916138B (en) * | 2016-06-08 | 2019-07-23 | 西安交通大学 | The safe transmission method assisted based on Key |
CN106452720A (en) * | 2016-08-31 | 2017-02-22 | 王波 | Digital chaotic secure communication system |
CN106385392A (en) * | 2016-09-07 | 2017-02-08 | 厦门大学 | Low-intercept probability communication waveform design method based on chaotic keying |
CN106357383A (en) * | 2016-11-14 | 2017-01-25 | 兰州大学 | DC-DCSK secret communication system and analysis processing method |
CN106357383B (en) * | 2016-11-14 | 2023-11-07 | 兰州大学 | DC-DCSK secret communication system and analysis processing method |
CN109088717A (en) * | 2018-10-24 | 2018-12-25 | 重庆邮电大学 | Multi-user's chaos communications based on time reversal of multiple input single output |
CN109347619A (en) * | 2018-10-25 | 2019-02-15 | 重庆邮电大学 | A kind of CD-DCSK chaos communications interfered between no signal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103905358A (en) | Improved type differential chaos shift keying DCSK confidentiality communication method | |
CN108365945B (en) | Differential chaotic shift keying modem and method based on two-way index modulation | |
CN101986632B (en) | Correlation delay-differential chaos shift keying-based modulation communication method | |
CN103944606B (en) | A kind of production method of AFH pattern | |
Liu et al. | Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching | |
CA2995500C (en) | A differential chaos shift keying (dcsk) based on hybrid chaotic system | |
CN105577359A (en) | OOFDM (Optical Orthogonal Frequency Division Multiplexing) encryption system based on chaos sequence pilot frequency mapping | |
CN111614590B (en) | Anti-detection transmission method based on extended weighted fractional Fourier transform | |
CN106161310A (en) | A kind of multicarrier difference chaotic shift keying modulation demodulation method and modem | |
Shu et al. | Chaotic direct sequence spread spectrum for secure underwater acoustic communication | |
Zhang et al. | Efficient and secure non-coherent OFDM-based overlapped chaotic chip position shift keying system: Design and performance analysis | |
WO2020113462A1 (en) | Chaotic sequence-based 5g multi-carrier spread spectrum underwater acoustic communication method | |
CN113890805B (en) | Multi-user multi-carrier CDSK chaotic communication method and system with high transmission rate | |
CN104410487B (en) | A kind of communication means being combined using chaos and MIMO | |
CN113114600A (en) | Difference chaos shift keying modulator and method for re-difference arrangement index | |
CN111770040A (en) | Improved multi-user DCSK chaotic communication system | |
Fu et al. | The modulation technology of chaotic multi-tone and its application in covert communication system | |
CN104320243A (en) | Analysis processing method of CD-FM-CDSK secret communication system | |
CN108574574A (en) | Physical layer encryption method based on multi-dimensional constellation rotation | |
CN104202148A (en) | Secret communication method based on FM-DCSK | |
Sobers et al. | Covert communications on continuous-time channels in the presence of jamming | |
CN113055154B (en) | Repeatable chaos spread spectrum DCSK modulation and demodulation method and modem | |
CN106357383B (en) | DC-DCSK secret communication system and analysis processing method | |
Kim et al. | Correlation-based optimal chirp rate allocation for chirp spread spectrum using multiple linear chirps | |
Hasan et al. | Design and analysis of an OFDM-based orthogonal multilevel code shifted differential chaos shift keying |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140702 |