首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
针对多进制差分混沌移位键控系统传输速率较小且误码率(BER)较差的缺点,该文提出一种扩容型正交抑噪多进差分混沌移位键控(DCSK)通信系统。在该系统的发送端设计了一种改进型混沌基信号发生器,可产生4组正交的混沌基信号,使得通信容量极大提升。定义综合效用函数,并引入粒子群算法对系统各参数优化。对该系统在加性高斯白噪声(AWGN)和Rayleigh衰落信道下理论误码率公式进行推导及系统仿真同时对比不同系统的综合效用函数。结果表明,该系统具有更低的误码率和更优综合效用,具有较好的实际应用价值。  相似文献   

2.

传统多用户差分混沌键控主要缺点是误码率差,该文提出一种多用户降噪差分混沌键控(MU-NRDCSK)通信方案。在发射端,发送M/P长度混沌序列,复制P次后作为参考信号,所有用户共用同一参考信号,信息信号延迟不同的时间来区分用户。在接收端,将接收到的信号通过滑动平均滤波器平均,再与其不同时间延迟后的信号进行相关。该方案通过降低噪声项的方差来提高系统误码性能。文中推导了该方案在加性高斯白噪声(AWGN)信道和Rayleigh信道下的理论误码率公式并进行了蒙特卡洛仿真。理论分析和仿真结果表明,理论公式与仿真结果能较好地吻合,MU-NRDCSK方案能较好地提高系统误码性能,在混沌通信领域具有很好的发展前景与研究价值。

  相似文献   

3.
陈越  陈果 《电讯技术》2021,61(12):1490-1495
在现有的非相干混沌通信系统中,用于传输参考信号的比特能量无法在接收端相关器被恢复出来,因此能量效率不高。针对这一问题,利用混沌序列前、后交换得到的新序列与原序列近似正交的特性,将参考信号与信息调制信号叠加在同一时隙传输,设计了一种置换相关键控混沌通信系统。在加性高斯白噪声信道中,该系统能从接收端相关器恢复全部的发送比特能量,具有比同类方案更高的能量效率。对误码率公式做了理论推导,对噪声性能进行了仿真实验,结果表明,与现有同类非相干混沌通信方案相比该方案具有更低的误码率。  相似文献   

4.
一种保密通信系统的研究   总被引:1,自引:0,他引:1  
贺利芳  张刚  张天骐 《电信科学》2012,28(2):99-103
基于混沌同步的保密通信方式相比传统保密通信方式有很大的优势,发展前景光明。通常混沌同步保密通信方式用混沌掩盖来实现,需要两个信道,其中一个信道传输混沌同步信号使系统保持同步,另一路则传输用混沌信号掩盖后的保密信息。在频谱资源日益紧张的情况下,由于这种通信方式对于信道资源的利用率相对较低,因此经济效益较差。本文提出了一个新的系统,用一个信道轮动传输信息和同步信号,对系统进行了详细分析,重点研究了系统传输的时隙分配并给出了仿真验证,证明了该系统能极大地提高信道利用率,同时对该系统的实际应用作了详细分析。  相似文献   

5.
为有效利用载波索引差分混沌移位键控通信系统中参考信号的发射功率,提出了一种跳时短参考载波索引差分混沌移位键控通信方案.首先,将符号时间分成多个时隙后,根据参考索引比特取其中的一个时隙来发送短参考信号;然后,推导了所提方案在加性白高斯噪声信道和多径Rayleigh衰落信道下的理论误码率计算式.仿真结果表明,所提方案在频带...  相似文献   

6.
针对宽频混沌调制信号在实际信道中传输时易失真的问题,提出一种基于实际信道的超混沌保密通信方案.该方案在接收端对混沌信号进行滤波并分解为两种信号:滤波信号和滤波后的补信号,滤波信号用来遮掩信息信号,滤波后的互补信号和调制信号求和后送入混沌发生器,保证混沌发生器不受滤波器的影响;接收端和发送端采用同样的结构,保证两个混沌发...  相似文献   

7.
针对现有混沌键控、混沌遮掩和混沌参数保密通信系统存在的一些缺点和实际应用的缺陷,提出了一种新型的混沌保密通信系统方案CD-QCSK系统的具体设计.同时对这个系统的实现原理进行了详细的推导,并基于Matlab/Simulink软件仿真实现了这个保密通信方案的信号传输,对其系统性能进行实验仿真分析,列举出了运用混沌加密前后效果图.该混沌键控系统同时兼具CDSK系统保密性高和QCSK误码率低的优点,系统的误码率性能和保密性也都有所提高,并且系统的传输速率是原有键控方式的4倍.  相似文献   

8.
一种超混沌混合保密通信方案   总被引:2,自引:1,他引:1  
本文将超混沌系统单变量单向耦合同步方法与两信道保密通信方案相结合,给出了一种双信道超混沌混合保密通信方案。发送端利用超混沌振荡器的一个或多个状态产生混沌密钥和遮掩信号,对信息信号先加密再遮掩,获得加密信号后使用一个信道传输;利用另一信道传输实现超混沌系统同步的单变量同步信号。接收端基于单变量单向耦合同步方法获得解密同步信号,实现信息信号高信噪比恢复。仿真结果表明了方案的有效性。  相似文献   

9.
应用粒子滤波器实现混沌通信系统的盲信道均衡   总被引:4,自引:0,他引:4  
粒子滤波器(Particle filter,PF)是一种结合重要性权重抽样的序贯蒙特卡罗方法,能够应用到任意状态空间模型,并且能较好地估计经过非线性变化后的随机变量的统计特性.本文应用粒子滤波器和信号建模技术研究混沌通信系统的盲信道均衡问题,发展基于混沌的通信系统的盲均衡技术.仿真结果证实了,当Logistic映射作为混沌发生器和通信场景为固定参数与时变衰落信道时,该盲信道均衡器与基于扩展卡尔曼滤波算法的盲均衡器和基于无先导变换的自适应盲均衡器相比,有较好的均衡实现.此外,利用本文的盲均衡算法,实现了一种混沌调制通信系统的解调.  相似文献   

10.
朱博  孙鸣  朱建良 《信息技术》2011,35(1):97-99
随着计算机技术、信息技术和通讯技术等高科技技术在近年来的迅猛发展,信息加密越来越受到人们的重视。提出了基于五维混沌系统用来实现通信加密的方法,该方法利用五维混沌源信号,对原始方波信号实现掩盖加密,利用迭代次数和混沌信号的加减手段设置密码,为信息加密提供了一种新方法。  相似文献   

11.
Chaotic optical communication at 2.5 Gb/s is experimentally investigated using three major encoding and decoding schemes, namely chaos shift keying (CSK), chaos masking (CMS), and additive chaos modulation (ACM). The effects of message encoding and decoding on the chaotic dynamics, the chaos synchronization, and the chaotic communication performance are compared among the three schemes. In the schemes of CSK and ACM, it is found that a small amount of message injected into the chaotic dynamics can increase the complexity of the chaotic state dramatically. In the CMS scheme, the chaotic dynamics are found not to be influenced by the encoded message. The synchronization quality deteriorates dramatically with an increase in the message strength in CSK and CMS. The ACM scheme is found to have the best synchronization quality among the three schemes when there is an encoded message. Message recovery is demonstrated for each of the three schemes. The ACM scheme is found to have the best communication performance.  相似文献   

12.
一种混沌数字保密通信系统的保密性能分析   总被引:15,自引:1,他引:14  
本文针对传统混沌遮掩保密通信方法易受到基于预测的方法攻击的缺点,在离散耦合混沌同步的基础上构造出一种新的混沌数字保密通信方案,该方案具有较高的保密性能,可有效地低御预测方法的攻击,仿真实验的结果验证了这一点。  相似文献   

13.
In order to break chaotic direct sequence spreading spectrum (CD3S) signals under the multipath fading channel, a particle filter based algorithm combining blind channel equalization with chaos fitting is proposed. To implement this algorithm, the intruder substitutes a different chaotic equation into the state-space equations of the channel and the chaos fitting, and then multiple particle filters are used for blind channel equalization and chaos fitting simultaneously by implementing them in reciprocal interaction. As a result, the impact brought about by the multipath fading channel and additive noises can be overcome. Furthermore, the range-differentiating factor is used to make the inevitable chaos fitting error advantageous based on the chaos fitting method. Thus, the CD3S signals can be broken according to the range of the estimated message. Simulations show that the binary message signal can be extracted from the CD3S signals without any knowledge of the chaotic transmitter’s structure, parameters, initial value, or the channel characteristics.  相似文献   

14.
把混沌理沦应用到电子对抗中,提出混沌信号干扰攻击敌方通信系统以及混沌光攻击光纤通信系统思想方法,提出混沌屏蔽攻击方法和混沌相位攻击方法.混沌屏蔽攻击的物理饥制是;强混沌信号可以直接屏蔽信息信号,小混沌信号可通过态叠加原理扰乱信息信号且能增加误码率;混沌相位攻击物理机制是:主要是通过交差相位调制把混沌信号变化特点叠加在信息信号相位上去干扰信息信号.最后数值模拟了对速率2.5 Gbit/s、5 Gbit/s以及25 Gbit/s的波长1.31光纤通信系统的混沌攻击,其攻击效果确实增加了通信系统的解调难度.  相似文献   

15.
In this paper, we propose a synchronization scheme based on an improved auxiliary particle filter (IAPF) for chaotic Colpitts circuit and conduct an experimental study on the synchronization performance with application to secure communications. Specifically, with the synchronization scheme, when the chaotic signals generated by an analog Colpitts circuit are transmitted through a nonideal channel, the distorted signals are processed digitally by the novelly designed IAPF at the receiver, in order to obtain the synchronized signals of the transmitter circuit. Experimental results indicate that synchronization can be achieved over both the additive white Gaussian noise channel and the multipath fading channel with low signal‐to‐noise ratio, even if there exist severe circuit parameter mismatches between the transmitter and the receiver. Furthermore, a chaos‐masking secure communication system is constructed and verified over both the additive white Gaussian noise channel and the multipath fading channel, and the bit error rate is evaluated versus different signal‐to‐noise ratios and symbol periods. It is shown that the achievable bit error rate can reach the order of magnitude of 10 − 4 without error correction coding techniques. In addition, security analysis demonstrates that the proposed chaotic secure communication system is resistant to the brute‐force attack. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

16.
Wavelength conversion in the transmission of a message masked by optical chaos is experimentally demonstrated. In our setup, chaos is generated by a distributed-feedback laser subject to delayed optical feedback, and hides a message by additive chaos masking. The optical wavelength is converted, along the transmission line, by four-wave mixing in a semiconductor optical amplifier. At the receiver, the message is extracted by master-slave synchronization. Our experiments demonstrate that secure communications based on chaos are compatible with channel switching as required in reconfigurable optical networks.  相似文献   

17.
首先研究了非相干光反馈同步系统内部参数失配对系统同步性能的影响,并与相干光反馈的完全同步系统以及广义同步系统进行了比较,其次研究了非相干光反馈采用三种不同的信号调制解调方式(CSK,CMS,ACM),对三种不同频率(250 MHz,2.5GHz和12.5GHz)的信号进行了调制解调。通过MATLAB仿真实验可知,非相干光反馈混沌同步系统相对于相干光反馈完全同步系统更易于实现,同时保留了一定的对参数失配的敏感特性,从而确保了该系统比相干光反馈广义同步具有更高的安全性;在信号解调时,CSK只能解调出250MHz信号,CMS能解调出2.5GHz信号,ACM能够解调出高达12.5GHz的信号。  相似文献   

18.
An image encryption scheme provides means for securely transmitting images over public channels. In this work, we propose a robust shuffling–masking image encryption scheme based on chaotic maps. The shuffling phase permutes square blocks of bytes using a 3-dimensional chaotic cat map coupled with a zigzag scanning procedure. The masking phase then scrambles b-byte blocks of the shuffled image with combined outputs of three 1-dimensional chaotic skew tent maps, in such a way that the masking of every block is influenced by all previously masked blocks. Empirical results show that while the suggested scheme has good running speed, it generates ciphered images that exhibit (i) random-like behavior, (ii) almost flat histograms, (iii) almost no adjacent pixel correlation, (iv) information entropy close to the ideal theoretical value. Furthermore, this scheme has a large key space, strong sensitivity to the secret key, and is robust against differential attacks. On the basis of these results, this scheme can be regarded as secure and reliable scheme for use in secure communication applications.  相似文献   

19.
Synchronized chaotic optical communications at high bit rates   总被引:7,自引:0,他引:7  
Basic issues regarding synchronized chaotic optical communications at high bit rates using semiconductor lasers are considered. Recent experimental results on broadband, high-frequency, phase-locked chaos synchronization, and message encoding-decoding at 2.5 Gb/s are presented. System performance at a bit rate of 10 Gb/s is numerically studied for the application of three encryption schemes, namely chaos shift keying, chaos masking, and additive chaos modulation, to three chaotic semiconductor laser systems, namely the optical injection system, the optical feedback system, and the optoelectronic feedback system. By causing synchronization error in the forms of synchronization deviation and desynchronization bursts, the channel noise and the laser noise both have significant effects on the system performance at high bit rates. Among the three laser systems, the optoelectronic feedback system has the best performance while the optical feedback system has the worst. Among the three encryption schemes, only the performance of additive chaos modulation with low-noise lasers is acceptable at high bit rates.  相似文献   

20.
A scheme for storing information in a memory system with defective memory ceils using "additive" codes was proposed by Kuznetsov and Tsybakov. When a source message is to be stored in a memory with defective cells, a code vectorxmasking the defect pattern of the memory is formed by adding a vector defined by the message and the defect pattern to the encoded message, and thenxis stored. The decoding process does not require the defect information. Considerably better bounds on the information rate of codes of this type which are capable of masking multiple defects and correcting multiple temporary errors are presented. The difference between the upper and lower bounds approaches the difference between the known best upper and lower bounds for random error correcting linear codes as the word length becomes large. Examples of efficient codes for masking double or fewer defects and correcting multiple temporary errors are presented.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号