TENCON 2005 - 2005 IEEE Region 10 Conference 2005
DOI: 10.1109/tencon.2005.300876
|View full text |Cite
|
Sign up to set email alerts
|

Blind Adaptive Multiuser Detection for Chaos CDMA Communication

Abstract: Abstract-Chaos-based CDMA communication has opened up a new category for spread spectrum communication, where the spreading code that is used to scramble data in the CDMA systems can be generated using a single mathematical relationship of a chaotic generator instead of using the pseudo-noise (PN) generator. Recent studies showed that this sequence can enhance the security and increase the capacity of the system at the physical link due to its bifurcation behavior. In this paper, we investigate the performance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…In the literature, numerous CBSC schemes have been investigated for the CD/PD-NOMA by exploiting the aforementioned characteristics of chaotic signals [5], [24]- [26], [33]- [39]. In [38] and [39], non-orthogonal CDMA schemes with PLS have been designed based on chaotic spreading codes rather than the conventional pseudo-noise sequences.…”
Section: A Related Workmentioning
confidence: 99%
“…In the literature, numerous CBSC schemes have been investigated for the CD/PD-NOMA by exploiting the aforementioned characteristics of chaotic signals [5], [24]- [26], [33]- [39]. In [38] and [39], non-orthogonal CDMA schemes with PLS have been designed based on chaotic spreading codes rather than the conventional pseudo-noise sequences.…”
Section: A Related Workmentioning
confidence: 99%
“…Moreover, the parameters of the chaotic system can provide an enormous key-space that remarkably enhances the system security against eavesdroppers bruteforce attacks [14]. For example, various CBSC systems based on NOMA approaches have been studied such as [9], [16] over Gaussian channels and [6], [12], [17] over fading channels with multiple-input multiple-output (MIMO) technique integrated with orthogonal frequency division multiplexing (OFDM) method [11].…”
Section: Introductionmentioning
confidence: 99%
“…The realized security gap based on the performance of bit-error-rate (BER) emerges as an efficient and practical PLS measure to evaluate the achieved PLS instead of the information theoretic-based measures such as the secrecy throughput, secrecy outage probability, and secrecy rate [3], [9]- [14], [18]. Secure communications may be achieved by expanding the realized gap between the BER performance of legal and illegitimate receivers [17]- [20]. Other important metrics are considered also like the key-space which is employed to assess the computational efforts required by an external eavesdropper to guess the secret keys correctly.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations