Show simple item record

dc.contributor.authorNguyen, Xuan Quyen
dc.contributor.authorNguyen, Chuyen T.
dc.contributor.authorBarlet Ros, Pere
dc.contributor.authorDojen, Reiner
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2017-01-24T09:37:40Z
dc.date.available2017-01-24T09:37:40Z
dc.date.issued2016
dc.identifier.citationNguyen, X., Nguyen, C. T., Barlet, P., Dojen, R. A novel approach to security enhancement of chaotic DSSS systems. A: International Conference on Communications and Electronics. "IEEE ICCE 2016: 2016 IEEE Sixth International Conference on Communications and Electronics: Novotel, Ha Long, Vietnam, July 27-29, 2016". Ha Long Bay: Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 471-476.
dc.identifier.isbn978-1-5090-1931-1
dc.identifier.urihttp://hdl.handle.net/2117/99925
dc.description.abstractIn this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol period according to the behavior of the chaotic spreading sequence. As a result, the symbol period and the spreading sequence vary chaotically at the same time. This simultaneous variation aims at protecting DSSS-based communication systems from the blind estimation attacks in the detection of the symbol period. Discrete-time models for spreading and despreading schemes are presented and analyzed. Multiple access performance of the proposed technique in the presence of additional white Gaussian noise (AWGN) is determined by computer simulations. The increase in security at the physical layer is also evaluated by numerical results. Obtained results show that our proposed technique can protect the system against attacks based on the detection of the symbol period, even if the intruder has full information on the used chaotic sequence.
dc.format.extent6 p.
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica
dc.subject.lcshTelecommunication -- Security measures
dc.subject.otherAWGN
dc.subject.otherChaotic communication
dc.subject.otherCode division multiple access
dc.subject.otherSpread spectrum Communication
dc.subject.otherPhysical layer security enhancement
dc.subject.otherChaotic DSSS systems
dc.subject.otherChaotic direct-sequence spread-spectrum communication systems
dc.subject.otherChaotic spreading sequence
dc.subject.otherSymbol period
dc.subject.otherBlind estimation attacks
dc.subject.otherDiscrete-time models
dc.subject.otherMultiple access performance
dc.subject.otherAdditional white Gaussian noise
dc.subject.otherAWGN
dc.subject.otherComputer simulations
dc.subject.otherDespreading scheme
dc.titleA novel approach to security enhancement of chaotic DSSS systems
dc.typeConference report
dc.subject.lemacTelecomunicació -- Mesures de seguretat
dc.contributor.groupUniversitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla
dc.identifier.doi10.1109/CCE.2016.7562681
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://ieeexplore.ieee.org/abstract/document/7562681/
dc.rights.accessOpen Access
local.identifier.drac19073708
dc.description.versionPostprint (author's final draft)
local.citation.authorNguyen, X.; Nguyen, C. T.; Barlet, P.; Dojen, R.
local.citation.contributorInternational Conference on Communications and Electronics
local.citation.pubplaceHa Long Bay
local.citation.publicationNameIEEE ICCE 2016: 2016 IEEE Sixth International Conference on Communications and Electronics: Novotel, Ha Long, Vietnam, July 27-29, 2016
local.citation.startingPage471
local.citation.endingPage476


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder