A novel approach to security enhancement of chaotic DSSS systems

View/Open
Document typeConference report
Defense date2016
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Rights accessOpen Access
Abstract
In this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol period according to the behavior of the chaotic spreading sequence. As a result, the symbol period and the spreading sequence vary chaotically at the same time. This simultaneous variation aims at protecting DSSS-based communication systems from the blind estimation attacks in the detection of the symbol period. Discrete-time models for spreading and despreading schemes are presented and analyzed. Multiple access performance of the proposed
technique in the presence of additional white Gaussian noise (AWGN) is determined by computer simulations. The increase in security at the physical layer is also evaluated by numerical results. Obtained results show that our proposed technique can protect the system against attacks based on the detection of the symbol period, even if the
intruder has full information on the used chaotic sequence.
CitationNguyen, X., Nguyen, C. T., Barlet, P., Dojen, R. A novel approach to security enhancement of chaotic DSSS systems. A: International Conference on Communications and Electronics. "IEEE ICCE 2016: 2016 IEEE Sixth International Conference on Communications and Electronics: Novotel, Ha Long, Vietnam, July 27-29, 2016". Ha Long Bay: Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 471-476.
ISBN978-1-5090-1931-1
Publisher versionhttp://ieeexplore.ieee.org/abstract/document/7562681/
Files | Description | Size | Format | View |
---|---|---|---|---|
1570253041.pdf | 501,3Kb | View/Open |
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder