Full Text Available
Note: Clicking the button above will open the full text document at the original institutional repository in a new window.
Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques...
| Format: | Article |
|---|---|
| Published: |
2012
|
| Tags: |
No Tags, Be the first to tag this record!
|
| LEADER | 00000njm a2000000a 4500 | ||
|---|---|---|---|
| 001 | oai:repository.ui.edu.ng:123456789/1718 | ||
| 042 | |a dc | ||
| 720 | |a Kamil, I. A. |e author | ||
| 720 | |a Fakolujo, O. A. |e author | ||
| 260 | |c 2012 | ||
| 520 | |a Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. | ||
| 024 | 8 | |a 1994-4608 | |
| 024 | 8 | |a Ubiquitous Computing and Communication Journal 7(2), pp. 1248-1254 | |
| 024 | 8 | |a ui_art_kamil_lorenz-based_2012 | |
| 024 | 8 | |a http://ir.library.ui.edu.ng/handle/123456789/1718 | |
| 245 | 0 | 0 | |a Lorenz-based chaotic secure communication schemes |