Please use this identifier to cite or link to this item:
http://idr.nitk.ac.in/jspui/handle/123456789/7968
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abdulameer, L.F. | - |
dc.contributor.author | Jignesh, D.J. | - |
dc.contributor.author | Shripathi, Acharya U. | - |
dc.contributor.author | Kulkarni, M. | - |
dc.date.accessioned | 2020-03-30T10:03:13Z | - |
dc.date.available | 2020-03-30T10:03:13Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | 2012 International Conference on Radar, Communication and Computing, ICRCC 2012, 2012, Vol., , pp.1-5 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/7968 | - |
dc.description.abstract | There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. We have studied the performance of Chaos Shift Keying (CSK) with 2�1 Alamouti scheme for different chaotic maps over Additive White Gaussian Noise (AWGN) and Rayleigh fading channels. Our simulations indicate that the use of the Alamouti schemes can allow service providers to enhance security without degrading the BER performance while communicating over these channels. � 2012 IEEE. | en_US |
dc.title | BER performance improvement for secure wireless communication systems based on CSK-STBC techniques | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.