Design of secure digital communication systems using DCSK chaotic modulation

M. A. Ben Farah, A. Kachouri, M. Samet

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

17 Citations (Scopus)

Abstract

Chaos-based communication can be applied advantageously only if the property of chaotic systems is suitably exploited. Chaos communication has been studied for only a little more than a decade while traditional communication schemes have been developed for nearly a century. The hope was (and still is) that for some application chaotic communication will prove to be better than traditional communication. Yet, after one decade of research, in most cases chaos communication did not take the place of traditional communication schemes. As far as communication efficiency is concerned, chaotic communication schemes are typically less efficient than their traditional counterpart. Still, the main advantage of chaotic communication schemes is for analogy implementation of secure communication. In traditional communication schemes data has to be digitized before encryption takes place. This is due to the fact that traditional encryption is based on discrete number theory. In this paper we study the performance of Differential Chaos Shift Key (DCSK) modulation and we compare it to BPSK modulation, a new application of DCSK modulation is presented (transmission of the image).

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Design and Test of Integrated Systems in Nanoscale Technology, IEEE DTIS 2006
Pages200-204
Number of pages5
DOIs
Publication statusPublished - 6 May 2006

Publication series

NameProceedings - 2006 International Conference on Design and Test of Integrated Systems in Nanoscale Technology, IEEE DTIS 2006

Keywords

  • BPSK
  • chaotic communication
  • DCSK (differential chaos shift key)
  • traditional encryption
  • telecommunication security

Fingerprint

Dive into the research topics of 'Design of secure digital communication systems using DCSK chaotic modulation'. Together they form a unique fingerprint.

Cite this