Abstract
This paper considers the DCSK system under jamming environment. We consider both fast and slow switching pulse jamming (PJ). We derive approximations of the system bit error rates (BERs) in analytic expressions containing only well-known special functions, from which we show that for both jamming cases increasing the spreading factor can enhance the BER. In addition, we reveal that under the fast switching PJ, the BER does not depend on the jamming duty cycle ρ when ρ ≤ 0.5, however when ρ > 0.5, increasing its value degrades the BER. Moreover, we find out that under the slow switching PJ, increasing ρ may either enhance or degrade the BER.
Introduction
Chaotic communications (CC) has recently been considered as a promising alternative to the conventional direct sequence spread-spectrum (SS) systems. The basic idea of CC is to replace pseudo-noise sequences by chaotic sequences, which can be directly generated by chaotic maps. Among various chaotic maps, logistic has been extensively exploited due to its simplicity and good performance [1]. Chaotic systems are generally categorized as coherent and non-coherent ones. In the former systems, chaotic synchronization plays a vital role in deciding the systems performance. However, designing an efficient chaotic synchronization scheme still remains as a challenging problem. As a result, research works on the coherent chaotic systems are very limited. On the other hand, in the latter systems, data recovery procedure is much simpler than that of the coherent counterparts since the chaotic synchronization is not required. Consequently, a lot of efforts have been devoted to design effective non-coherent modulation schemes and to find novel applications of non-chaotic coherent systems in reality [2].
The fundamental coherent and non-coherent modulation schemes are chaotic shift keying (CSK) and differential CSK (DCSK), respectively. The performances of chaotic systems with CSK and DCSK modulation schemes, referred as CSK and DCSK systems, over the additive white Gaussian noise (AWGN) channel are extensively investigated in [3]–[6]. It is shown that increasing the length of the spreading sequence improves the performance of the CSK system. On the other hand, enlarging the spreading factor beyond a certain point degrades the performance of the DCSK system. Recently, several advanced derivatives of the DCSK system have been proposed to improve the system performance, i.e. improved-DCSK (I-DCSK) [7], short reference-DCSK (SR-DCSK) [8], and noise reduction-DCKS (NR-DCSK) [9]. In addition, the emerging index modulation is also integrated into the DCSK system to improve the system’s data rate, energy efficiency, and spectral efficiency, i.e. permutation index-DCSK (PI-DCSK) [10] and commutation code index-DCSK (CCI-DCSK) [11]. Moreover, the DCSK system has also found applications in simultaneous wireless information and power transfer system [12].
Although the noise performances of coherent and non-coherent systems have been well studied [3]–[6], very little attention has been paid to tackle the effect of jamming on the performances of these systems. A summary of existing works on this subject is given in the Table 1. In [13], the performances of CSK and DCSK systems under the single-tone jamming (STJ) environment are analyzed. The authors show that the jamming frequency has little effect on the performance of a CSK system, however, the performance of a DCSK system is significantly degraded when the jamming frequency is an integer multiple of the bit frequency. In addition, the authors of [14] consider a CSK system under the pulse jamming (PJ) environment. It is pointed out that when the jamming is slow switching, increasing the jamming duty cycle may increase or decrease the system performance. However, when the jamming is fast switching the system performance is fully independent of the duty cycle. It is first noted that DCSK system is the fundamental and most studied non-coherent chaotic system. In addition, it is widely applied to other practical systems, i.e. multiple input—multiple output, cooperative, channel and network coding systems [15]–[17]. Secondly, the PJ is in fact a typical interference for wireless communication systems [18]. Consequently, the effects of the PJ on the performance of DCSK system is important and worth being investigated. Motivated by this fact, in this work, we will consider a DCSK system under the PJ environments. We shall derive approximations of the system bit-error-rates (BER) in analytic expressions which includes only well-known special functions, from which novel insights about the effect of the slow and fast switching PJ on the system performance will be carried out. In addition and importantly, from our results together with [13] and [14], comparisons of (i) the effects of the PJ on CSK and DCSK systems and (ii) the effects of the STJ and the PJ on a DCSK system will be discussed.
Table 1. A summary of existing works studying the anti-jamming performance of the CSK and the DCSK systems.
1 System and Jamming Models
1.1 System Model
The considered system consists of a pair of source-destination and a jammer. The DCSK scheme is employed for modulating and demodulating legitimate signals. In addition, the logistic map is exploited for generating chaotic sequences. A mathematical representation of the map is given by [1]
| (1) |
where E [xk] = 0, , and . For the modulation process, each bit duration is divided into two equal time slots. The first time slot is allocated for transmitting a reference chaotic sequence length β, called spreading factor. In the second time slot, either the reference sequence or its inverted version is transmitted depending upon the information bit. As a result the transmitted signal of the lth bit, bl, can be expressed as
| (2) |
While going through a channel to the destination, the transmitted signal sk is affected by pulse jamming and additive white Gaussian noise (AWGN). The channel with jamming and AWGN is considered here so that we can solely focus on the effect of jamming on the system performance. This assumption has also been adopted in several related works, i.e. [13]–[14]. The joint effects of jamming and fading on the performance of the DCSK system are also interesting and will be considered in our future works. Finally, at the receiver side, the received signal is first correlated with its delayed version (delayed β samples), accumulated over a half bit duration, and passed through a threshold detector for deciding the transmitted bit.
1.2 Jamming Model
We consider the both fast switching PJ (FSPJ) and slow switching PJ (SSPJ). In addition, the jammer is assumed to turn on and off periodically. During the on time, the jamming signal can be considered as a zero-mean Gaussian variable with variance Pj/ρ in the equivalent baseband discrete-time model, where Pj is the average power of the jammer [14].
The PJ is fast switching when its switching frequency is close to the bit frequency. Hence, it can be assumed that a fraction of ρ of every symbol is jammed. Let’s define λ = ρ2β as the period of time during which the jammer is on. In addition, for simplicity, we assume that λ is an integer and the jammer is turned on at the beginning of every symbol. Then, we can express the jamming signal during the lth bit (symbol) period as follows
| (3) |
where wk is a zero-mean Gaussian variable with variance .
On the other hand, the PJ is slow switching when its switching frequency is much lower than the bit frequency. In other words, the period during which the jammer is on or off is much longer than the bit duration. Consequently, the probability of a symbol being jammed is commonly approximated as ρ [14].
1.3 System Transmission
An equivalent baseband discrete-time model of the received signal at the receiver can be expressed as follows
| (4) |
where nk is the zero-mean AWGN with variance N0/2 and jk denotes the jamming signal. Considering the lth transmitted bit, the output of the correlator is given by
| (5) |
where
| (6) |
| (7) |
| (8) |
2 System Performance Analysis
Although the F-distribution based approach for deriving an exact BER of a DCSK system is presented in [6], its result is in a double-integral expression, from which it is challenging to reveal possible novel insights without doing numerical integration. On the other hand, the Gaussian approximation approach (GAA) can provide a simple closed-form approximation of the BER of a DCSK system. In addition, the approximation follows an exact one tightly with reasonable large values of the spreading factor. Hence, we will exploit the GAA to derive the BER of our considered system. According to the GAA, the output of the correlator (at the receiver) is assumed to follow the Gaussian distribution, and thus, the error probability of transmitting the lth bit can be approximated as [13]
| (9) |
where Pr[⋅], E[⋅], and var[⋅] denote the probability, expectation, and the variance, respectively. Let’s first consider the FSPJ case, in which the mean and variance of the output of the correlator yl can be derived by considering the following two cases: λ ≤ β and λ > β.
When λ ≤ β (and thus ρ ≤ 0.5), we have B1l = B3l = C4l = 0. In addition, B2l and C3l can be rewritten as
| (10) |
On the other hand, when λ > β (and thus ρ > 0.5), B1l, B2l, B3l, C3l, and C4l can be rewritten as
| (11) |
| (12) |
| (13) |
From (6)–(8) and (10)–(13), we can show that for a general value of λ, , E [Bil] = 0, E [Cjl] = 0, and
| (14) |
| (15) |
| (16) |
| (17) |
| (18) |
| (19) |
| (20) |
| (21) |
where i = {1, 2, 3}, j = {1, ⋯, 5}, and
| (22) |
In addition, by exploiting the fact that the means of xk, jk, and the AWGN are all zero, we can readily prove that the covariance between any pairs of {Al, B1l, B2l, B3l, C1l, C2l, C3l, C4l, C5l} is zero. Consequently, we obtain
| (23) |
| (24) |
| (25) |
| (26) |
Finally, replacing the results given in (23)–(26) into (9) gives the error probability of transmitting the lth bit BERl. In addition, from the fact that BERl does not depend on l, the whole system error probability BER will be the same as BERl and is given as follows
| (27) |
from which we observe that
When ρ ≤ 0.5, the system BER is independent of ρ.
When ρ > 0.5, increasing its value degrades the system BER. The reason is that monotonically increases as ρ enlarges in (0.5, 1].
Increasing the length of the chaotic sequence β can enhance the system BER.
From the above observation and [14], we see that the FSPJ has different effects on DCSK and CSK systems. Particularly, the BER of a CSK system is independent of the jamming duty cycle [14]. However, this only holds true for the DCSK system when the duty cycle is less than or equal to 0.5. On the other hand, when the duty cycle is larger than 0.5, increasing its value degrades the BER of the DCSK system.
By following the afore-presented procedure we can also derive the BER of the DCSK system under the SSPJ. After a similar manipulation like that for the case of FSPJ with GAA, one may obtain the system BER under the SSPJ as follows
| (28) |
which, together with [14], points out that the SSPJ has the same effects on DCSK and CSK systems. That is, increasing β can enhance the systems performance. In addition, increasing ρ may increase or decrease the systems performances. The reason is that although increasing ρ decreases the values of the erfc[⋅] functions, the factor ρ/2 being multiplied to the second erfc[⋅] function makes the BER’s trend uncertain.
3 Simulation Results
In this section, simulated and analytic results are presented to verify our analyses. The BER versus the jamming duty cycle of the FSPJ is given in Fig 1. It is first shown that when ρ ≤ 0.5, the system BER is independent of ρ. In addition, when ρ > 5, increasing its value enlarges the BER. It is also noted that when ρ approaches 1, the increase of the BER is negligible. The reason is that the term given in (27) slowly converges to 1 as ρ tends to 1.
Fig 1. System BER versus ρ under the fast switching pulse jamming for several value of Pj/Ps.
In Fig 2, we present the system BER versus Eb/N0 for the case that the FSPJ randomly turns on within a symbol duration. Let Tstart be the starting instant of the jammer which is a random integer between 2(l − 1)β and 2lβ − χ. χ is used here to make sure that every symbol is jammed. Depending upon the value of Tstart we can have the following cases: only chaotic sequences are jammed, only information bearing sequences are jammed, two sequences of every symbol are jammed, and chaotic and information bearing sequences belonging to any two consecutive symbols are jammed. In the figure, S and T denote simulation and theory, respectively. It is shown that regardless of the value of Tstart, our findings about the effect of the FSPJ on the system performance still hold and our analytic results still follow the simulated ones tightly. In addition, we observe that increasing Pj/Ps degrades the system performance, as expected.
Fig 2. System BER versus Eb/N0 for the case that the fast switching pulse jammer randomly turns on within a symbol duration with β = 100.
We illustrate the system BER versus Pj/Ps under the STJ, FSPJ, and the SSPJ environments in Fig 3. The curve representing the system BER under the STJ is obtained by using the equation (73) given in [13]. The figure first shows that the STJ is the worst jamming type. Secondly, for the two PJs, the corresponding BERs stay more or less the same in the low region of Pj/Ps. However, when Pj/Ps goes large, the FSPJ causes a much larger BER than that provided by the slow switching counterpart. The reason is that in the low region of Pj/Ps, the effect of jamming is dominated by that of the AWGN. On the contrary, in the high region of Pj/Ps, the effect of jamming becomes superior, and since under the FSPJ scenario it is most likely that every symbol is jammed, the corresponding error probability is larger than that caused by the SSPJ. Finally, the figure shows that as ρ tends to 1, the two BERs under the two PJs converge to each other and they approach the BER under the STJ in the high region of Pj/Ps.
Fig 3. A comparison of system BERs under the fast switching pulse jamming, slow switching pulse jamming, and the single-tone jamming environments.
Finally, we present a comparison of the performance of the DCSK system and its derivatives under the FSPJ environment in Fig 4. For the SR-DCSK scheme, for each bit duration, we use a reference sequence containing 50 chaotic samples. In addition, for the NR-DCSK scheme, for each bit duration, 5 chaotic samples are generated, and then, each chaotic sample is replicated 20 times to make a reference sequence of length β = 100. We observe that the DCSK scheme provides the worst performance, the NR-DCSK scheme provides the best performance, and the I-DCSK and the SR-DCSK give similar performance. In addition, it is noticed that the four scheme follow the same trend as the ratio Pj/Ps increases.
Fig 4. A comparison of the performance of the DCSK system and its derivatives under the fast switching pulse jamming environment.
4 Conclusion
In this work, we considered a non-coherent DCSK system under the slow and fast switching pulse jamming environments. We derived approximations of the system BERs in compact analytic expressions, from which we revealed that in general increasing the spreading factor can enhance the system anti-jamming performance. In addition, we showed that under the fast switching pulse jamming environment, the system BER is independent of the jamming duty cycle ρ when ρ ≤ 0.5, however when ρ > 0.5, the system BER is degraded when ρ increases. Moreover, we pointed out that under the slow switching pulse jamming scenario, increasing ρ may either improve or decrease the system BER. Furthermore, our simulation pointed out that the single-tone jamming is a more effective jamming type than the two pulse jamming counterparts. For our future works, we may consider the application of chaotic communications in physical layer security to enhance the secrecy performance of wireless communication systems [19]–[20].
Data Availability
All simulation codes are available from the figshare database: https://figshare.com/articles/BER_versus_Rho_FSPJ_m/6713834.
Funding Statement
The authors received no specific funding for this work.
References
- 1. Yang H., Jiang G.-P., and Duan J., “Phase-Separated DCSK: A Simple Delay-Component-Free Solution for Chaotic Communications,” IEEE Trans. Circuits Syst. II, 2014, vol. 61, no. 12, pp. 967–971. 10.1109/TCSII.2014.2356914 [DOI] [Google Scholar]
- 2. Kaddoum G., “Wireless Chaos-Based Communications Systems: A Comprehensive Survey,” IEEE Access, 2016, vol. 4, pp. 2621–2648. [Google Scholar]
- 3. Hasler M. and Schimming T., “Chaos communication over noisy channels,” Int. J. Bifurc. Chaos, 2000, vol. 10, no. 4 pp. 719–735. 10.1016/S0218-1274(00)00050-5 [DOI] [Google Scholar]
- 4. Kolumbán G. and Kennedy M. P., “The Role of Synchronization in Digital Communications Using Chaos-Part III: Performance Bounds for Correlation Receivers,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 2000, vol. 47, no. 12, pp. 1673–1683. [Google Scholar]
- 5. Sushchik M., Tsimring L. S., and Volkovskii A. R., “Performance Analysis of Correlation-Based Communication Schemes Utilizing Chaos,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 2000, vol. 47, no. 12, pp. 1684–1691. 10.1109/81.899920 [DOI] [Google Scholar]
- 6. Long M., “Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication,” IEEE Commun. Lett., 2011, vol. 15, no. 11, pp. 1175–1177. 10.1109/LCOMM.2011.092011.111088 [DOI] [Google Scholar]
- 7. Kaddoum G., Soujeri E., Arcila C., and Eshteiwi K., “I-DCSK: An Improved Noncoherent Communication System Architecture,” IEEE Trans. Circuits Syst. II, 2015, vol. 62, no. 9, pp. 901–905. 10.1109/TCSII.2015.2435831 [DOI] [Google Scholar]
- 8. Kaddoum G., Soujeri E., and Nijsure Y., “Design of a Short Reference Noncoherent Chaos-based Communication Systems,” IEEE Trans. Commun., 2016, vol. 64, no. 2, pp. 680–689. 10.1109/TCOMM.2015.2514089 [DOI] [Google Scholar]
- 9. Kaddoum G. and Soujeri E., “NR-DCSK: A Noise Reduction Differential Chaos Shift Keying System,” IEEE Trans. Circuits Syst. II, 2016, vol. 63, no. 7, pp. 648–652. 10.1109/TCSII.2016.2532041 [DOI] [Google Scholar]
- 10. Herceg M., Kaddoum G., Vranješ D., and Soujeri E., “Permutation Index DCSK Modulation Technique for Secure Multiuser High-Data-Rate Communication Systems,” IEEE Trans. Veh. Technol., 2018, vol. 67, no. 4, pp. 2997–3011. 10.1109/TVT.2017.2774108 [DOI] [Google Scholar]
- 11. Herceg M., Vranješ D., Kaddoum G., and Soujeri E., “Commutation Code Index DCSK Modulation Technique for High-Data-Rate Communication Systems,” IEEE Trans. Circuits Syst. II, 2018, Accepted for publicaation. 10.1109/TCSII.2018.2817930 [DOI] [Google Scholar]
- 12. Kaddoum G., Tran H., Kong L., and Atallah M., “Design of Simultaneous Wireless Information and Power Transfer Scheme for Short Reference DCSK Communication Systems,” IEEE Trans. Commun., 2017, vol. 65, no. 1, pp. 431–443. [Google Scholar]
- 13. Lau F. C. M., Ye M., Tse C. K., and Hau S. F., “Anti-Jamming Performance of Chaotic Digital Communication Systems,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 2002, vol. 49, no. 10, pp. 1486–1494. 10.1109/TCSI.2002.803362 [DOI] [Google Scholar]
- 14. Lau F. C. M. and Tse C. K., “Performance of Chaos-Based Digital Communication Systems in the Presence of a Pulse-Noise Jammer,” Circuits Syst. Signal Process., 2004, vol. 23, no. 3, pp. 169–194. 10.1007/s00034-004-7015-3 [DOI] [Google Scholar]
- 15. Wang S., Lu S., and Zhang E., “MIMO-DCSK Communication Scheme and its Performance Analysis over Multipath Fading Channels,” J. Syst. Eng. Electron., 2013, vol. 24, no. 5 pp. 729–733. 10.1109/JSEE.2013.00085 [DOI] [Google Scholar]
- 16. Kaddoum G., Parzysz F., and Shokraneh F., “Low-complextiy Amplify-and-Forward Relaying Protocol for Non-coherent chaos-based communication system,” IET Commun., 2014, vol. 8, no. 13 pp. 2281–2289. 10.1049/iet-com.2014.0232 [DOI] [Google Scholar]
- 17. Lyu Y., Wang L., Cai G., and Chen G., “Iterative Receiver for M-ary DCSK Systems,” IEEE Trans. Commun., 2015, vol. 63, no. 11 pp. 3929–3936. 10.1109/TCOMM.2015.2425877 [DOI] [Google Scholar]
- 18. Xu C., Liang Y., Guan Y. L., and Leon W. S., “Turbo Product Codes for Mobile Multimedia Broadcasting with Partial-Time Jamming,” IEEE Trans. Broadcast., 2007, vol. 53, no. 1 pp. 256–262. 10.1109/TBC.2006.889681 [DOI] [Google Scholar]
- 19. Nguyen B. V. and Kim K., “Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks,” IEEE Commun. Lett.s, 2015, vol. 19, no. 12 pp. 2086–2089. 10.1109/LCOMM.2015.2486768 [DOI] [Google Scholar]
- 20. Nguyen B. V., Jung H., and Kim K., “Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond,” IEEE Commun. Mag., 2018, vol. PP, no. 99 pp. 2–8. 10.1109/MCOM.2017.1700588 [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
All simulation codes are available from the figshare database: https://figshare.com/articles/BER_versus_Rho_FSPJ_m/6713834.




