KEYWORDS: Free space optics, Receivers, Network security, Signal generators, Transmitters, Computer security, Information security, Complex systems, Free space optical communications, Digital signal processing
Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This
technology can provide fiber-like data rate over short distances. In order to improve security associated with data
transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross-correlation that determine the ease with which synchronization between transmitter and receiver can be achieved. It is demonstrated that cross correlation is very close to zero and auto-correlation is -like. The overall system is implemented in the MATLAB Simulink DSP Builder.
KEYWORDS: Telecommunications, Wireless communications, Chaos, Information security, Modulation, Antennas, Network security, Receivers, Transmitters, Signal to noise ratio
The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been
motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) with 2×1 and 2×2 Alamouti schemes for different chaotic maps over wireless channels has been studied. It has been shown that the use of these schemes can provide security enhancement without the penalty of degradation of BER performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.