"CSK和DCSK与MC-DCSK的原理与实现代码"

需积分: 49 18 下载量 102 浏览量 更新于2024-01-20 4 收藏 1.8MB DOCX 举报
混沌移位键控CSK(Chaotic Shift Keying)和DCSK(Differential Chaotic Shift Keying)是一种基于混沌映射的调制解调技术,与MC-DCSK(Multi-Carrier Differential Chaotic Shift Keying)相比,具有更高的抗噪声性能和更低的误码率。 CSK是一种非相干调制方式,其调制原理是将二进制信息序列映射到混沌信号的极性反转时刻,即在每个信号周期的极性变换时刻改变混沌信号的系数。通过使用不同的阈值来解调信号,并将其映射回二进制序列,实现数据的传输。 DCSK是一种差分调制方式,其调制原理是通过混沌信号的极性差异来表示二进制信息。在调制过程中,通过比较相邻两个信号周期的极性差异,将其映射为二进制序列。 MC-DCSK是一种多载波混沌调制方式,通过将混沌信号应用于多个载波频率上,来实现更好的抗噪声性能。在解调过程中,通过计算多个载波频率上的混沌信号与已调信号之间的差异,将其映射回二进制序列。 在实际实验中,首先完成了CSK的调制和解调功能。通过输入二进制序列,可以观察到调制后的波形,并通过相干解调输出二进制序列。随后,引入高斯白噪声的干扰,进行了相同的解调过程,并计算出误码率。实验结果表明,在不同信噪比环境下,CSK具有良好的抗噪声性能和较低的误码率。 实验中采用了Matlab和Matlab App designer作为实验工具,并根据实验要求进行了相应的步骤和结果记录。在实验原理部分,介绍了CSK调制解调的基本原理,并说明了混沌映射的原理和应用。在实验步骤及结果部分,详细描述了实验过程和实验结果,并给出了在不同信噪比环境下的误码率分析图。 总结而言,混沌移位键控CSK和DCSK与MC-DCSK是基于混沌映射的调制解调技术,在实验中展示了它们的原理和实现代码。通过实验结果可以看出,这些技术具有较好的抗噪声性能和较低的误码率,适用于数据通信安全技术领域。

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.

2023-06-13 上传