首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 656 毫秒
1.
Vishav Jyoti 《Optik》2011,122(9):787-791
In this paper, the security enhanced OCDMA system based on spectral encoding using code-switching scheme is analyzed. The security issues are investigated by measuring eye diagrams and received signals for various cases. It has been observed; an eavesdropper based on a simple energy detector can easily read the information being transmitted by a single user using on-off keying. In order to increase the security a code-switching scheme is implemented on OCDMA. It is shown that the eye diagram at the eavesdropper becomes true noise waveform due to code-switching scheme and at the receiver end a clear eye diagram is observed. Hence, it is concluded that the code-switching scheme shows an immunity of the OCDMA system against eavesdropping and like conventional OCDMA schemes an authorized user clearly decodes an original data when a single user is active in the network.  相似文献   

2.
Massive multiple input multiple output (MIMO), also known as a very large-scale MIMO, is an emerging technology in wireless communications that increases capacity compared to MIMO systems. The massive MIMO communication technique is currently forming a major part of ongoing research. The main issue for massive MIMO improvements depends on the number of transmitting antennas to increase the data rate and minimize bit error rate (BER). To enhance the data rate and BER, new coding and modulation techniques are required. In this paper, a generalized spatial modulation (GSM) with antenna grouping space time coding technique (STC) is proposed. The proposed GSM-STC technique is based on space time coding of two successive GSM-modulated data symbols on two subgroups of antennas to improve data rate and to minimize BER. Moreover, the proposed GSM-STC system can offer spatial diversity gains and can also increase the reliability of the wireless channel by providing replicas of the received signal. The simulation results show that GSM-STC achieves better performance compared to conventional GSM techniques in terms of data rate and BER, leading to good potential for massive MIMO by using subgroups of antennas.  相似文献   

3.
Direct-sequence spread-spectrum signals collected from the TREX04 experiment are analyzed to determine the bit-error-rate (BER) as a function of the input signal-to-noise ratio (SNR) for a single receiver. A total of 1160 packets of data are generated by adding ambient noise data collected at sea to the signal data (in postprocessing) to create signals with different input-SNR, some as low as -15 dB. Two methods are analyzed in detail, both using a time-updated channel impulse-response estimate as a (matched) filter to mitigate the multipath-induced interferences. The first method requires an independent estimate of the time-varying channel impulse-response function; the second method uses the channel impulse-response estimated from the previous symbol as the matched filter. The first method yields an average BER <10(-2) for input-SNR as low as -12 dB and the second method yields a similar performance for input-SNR as low as -8 dB. The measured BERs are modeled using the measured signal amplitude fluctuation statistics and processing gain obtained by de-spreading the received signal with the transmitted code sequence. Performance losses caused by imprecise symbol synchronization at low input-SNR, uncertainty in channel estimation, and signal fading are quantitatively modeled and compared with data.  相似文献   

4.
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.  相似文献   

5.
Zhang X  Zhang G  Xie C  Wang L 《Optics letters》2004,29(4):337-339
We report an analysis of the noise statistics for an optically preamplified differential phase-shift keying (DPSK) receiver with balanced and single-port detections. It is found that identical signal-amplified spontaneous emission beating noise exists for bits 1 and 0 in DPSK balanced detection. It is also revealed that the bit error ratio (BER) of a DPSK receiver with balanced detection has no direct relation to the conventional Q factor. Moreover, an analytic BER expression for the DPSK balanced detection receiver is presented.  相似文献   

6.
This paper employs dual-output Mach–Zehnder Modulator (MZM) for optical access networks without optical filters. Light waves generated from multiple laser sources are multiplexed and fed into dual-output MZM. Biasing the dual-output MZM at null point generates central carriers in one output port and first-order sidebands in another output port. Reflective semiconductor optical amplifier modulates both the central carriers and sidebands with wired and wireless data, respectively. The modulated optical signals are combined by polarization beam splitter and transmitted through 25-km single-mode fiber. The performance of the proposed scheme is proved by clear eye-diagrams and great bit error rate (BER) curves. Moreover, the power penalty at the BER of 10-9 is less than 1 dB for both wired and wireless signals. Therefore, the proposed system simultaneously transmits wired and wireless signals.  相似文献   

7.
We derive the bit error rate (BER) of inter-satellite laser communication (lasercom) links with on-off-keying systems in the presence of both wave-front aberrations and pointing error, but without considering the noise of the detector. Wave-front aberrations induced by receiver terminal have no influence on the BER, while wave-front aberrations induced by transmitter terminal will increase the BER. The BER depends on the area S which is truncated out by the threshold intensity of the detector (such as APD) on the intensity function in the receiver plane, and changes with root mean square (RMS) of wave-front aberrations. Numerical results show that the BER rises with the increasing of RMS value. The influences of Astigmatism, Coma, Curvature and Spherical aberration on the BER are compared. This work can benefit the design of lasercom system.  相似文献   

8.
It is known that for a slow fading Gaussian wiretap channel without channel state information at the transmitter and with statistically independent fading channels, the outage probability of any given target secrecy rate is non-zero, in general. This implies that the so-called zero-outage secrecy capacity (ZOSC) is zero and we cannot transmit at any positive data rate reliably and confidentially. When the fading legitimate and eavesdropper channels are statistically dependent, this conclusion changes significantly. Our work shows that there exist dependency structures for which positive zero-outage secrecy rates (ZOSR) are achievable. In this paper, we are interested in the characterization of these dependency structures and we study the system parameters in terms of the number of observations at legitimate receiver and eavesdropper as well as average channel gains for which positive ZOSR are achieved. First, we consider the setting that there are two paths from the transmitter to the legitimate receiver and one path to the eavesdropper. We show that by introducing a proper dependence structure among the fading gains of the three paths, we can achieve a zero secrecy outage probability (SOP) for some positive secrecy rate. In this way, we can achieve a non-zero ZOSR. We conjecture that the proposed dependency structure achieves maximum ZOSR. To better understand the underlying dependence structure, we further consider the case where the channel gains are from finite alphabets and systematically and globally solve the ZOSC. In addition, we apply the rearrangement algorithm to solve the ZOSR for continuous channel gains. The results indicate that the legitimate link must have an advantage in terms of the number of antennas and average channel gains to obtain positive ZOSR. The results motivate further studies into the optimal dependency structures.  相似文献   

9.

It shows that there are some serious security issues in the controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations. Some information of the identity strings of the receiver and the controller can be stolen without being detected by the intercept-selectively-measure-resend (ISMR) attack. Furthermore, an eavesdropper (Eve) can eavesdrop on some information of the secret message that the sender transmits. In addition, the receiver can obtain half of information about the secret message without any active attack and the permission of the controller, which is not allowed in a secure CQSDC protocol. The receiver can take the ISMR attack to obtain more information about the secret message without the permission of the controller. If running the protocol many times, the identity strings of the receiver and the controller can be completely acquired by Eve. Finally, the original CQSDC protocol is improved to a secure one.

  相似文献   

10.
计及判决门限与非理想消光比的串扰分析   总被引:2,自引:2,他引:0  
推导出了在多重串扰情况下,串扰光和系统光噪声共同存在时,接收机输入光信号及其基带输出信号的表达式.计算了在最优判决门限和平均判决门限两种情况下,背景误码率在10-9条件时,信号光消光比与串扰光消光比对系统误码率的影响.结果表明,对于不同的接收机判决门限,信号光的消光比在10~12dB的范围内,系统的误码特性接近最优.  相似文献   

11.
林书庆  江宁  王超  胡少华  李桂兰  薛琛鹏  刘雨倩  邱昆 《物理学报》2018,67(2):28401-028401
提出了一种基于混沌映射的三维加密正交频分复用无源光网络保密通信系统.该系统通过相关性检测锁定收发端混沌系统参数,实现收发双方混沌系统同步;并利用同步混沌系统生成密钥,实现符号扰动以及二重子载波加密.该加密方案的密钥空间超过10~(86),能够有效对抗穷举攻击.实验实现了13.3 Gb/s基于64进制正交幅度调制的加密正交频分复用信号在25 km标准单模光纤中的传输,并完成了信息的有效解密.  相似文献   

12.
《Comptes Rendus Physique》2016,17(9):1003-1017
The goal of the experiment proposed in this paper is to give rapidly and with a limited equipment the attenuation level in the L-band for various elevation angles, between 20 and 70 degrees. The original principle is to use the L-band signal transmitted from an airport radar. The signal backscattered by a plane flying over the forest next to the airport is received on many antennas: some are over the canopy; others are on the ground under the foliage. The direct path signal transmitted by the airport radar is received by the antennas located above the forest. This signal is used to synchronize the temporal signals by detecting the waveform of the transmitting pulses. The signal backscattered by the plane is received by two H and V polar antennas located over the forest and by two other antennas placed under the foliage. The signals received by these antennas are digitized and processed to extract the plots of the opportunistic targets that approach the airport. The magnitudes of each plane echo are measured on each channel, and a comparison of the level of signal is made between the antenna above and under the forest. The ratio of magnitude between the two measurements on each polarization component gives the absorption factor of the foliage at the place of experiment. The position of the plane is given by an ADS-B receiver. For each elevation position of the antennas, the pattern of the chosen target will describe all the angles of arrival. This experiment has been deployed on two forested sites near an airport in South-East Asia.  相似文献   

13.
《Physics letters. A》2005,344(6):401-410
A series of short-time stochastic resonance (SR) phenomena, realized in a bistable receiver, can be utilized to detect a train of information represented by signals that adopt frequency-shift keying (FSK). It is demonstrated that the values of noise intensity at resonance regions are close for adjacent periodic signals with an appropriate frequency separation. This establishes the possibility of decoding subthreshold or slightly suprathreshold M-ary FSK signals in bistable receivers. Furthermore, the mechanism of FSK signal detection via short-time SR effects is elucidated in terms of the receiver response speed. This phenomenon provides a possible mechanism for information processing in a bistable device operating in nonstationary noisy environments, where even the inputs appear over a short timescale or have a frequency shift.  相似文献   

14.
In MIMO radar with widely separated antennas, the antennas are spaced far from each other and the target is seen from different angles. In this type of radars, each receiver collects all transmit signals and transmits them to the central processor unit. Power allocation is an important part of military operations. Therefore, it is a primary factor that requires to be taken into account in the designing of target tracking problems in MIMO radar. In fact, the power allocation finds an optimum strategy to allot power to transmit antennas with the goal of minimizing the target tracking errors under specified transmit power constraints. In this paper, the performance of power allocation for target tracking in MIMO radar with widely separated antennas is investigated. For this purpose, first, a MIMO radar with distributed antennas is configured and a target motion model using the constant velocity (CV) method is modeled. Then Joint Cramer Rao bound (CRB) for target parameters (joint target position and velocity) estimation error is computed. This is applied as a power allocation problem objective function. Because a complex Gaussian model is considered for target radar cross-section (RCS), this function becomes complicated. Due to the nonlinearity of this objective function, the proposed power allocation problem is nonconvex. Therefore, a particle swarm optimization (PSO) -based power allocation algorithm is proposed to solve it. In simulation experiments, the performance of the proposed algorithm in different conditions such as a different number of antennas and antenna geometry configurations is evaluated. Results prove the validity of the proposed algorithm.  相似文献   

15.
Vishav Jyoti 《Optik》2011,122(10):851-857
In this paper, two-dimensional (2D) wavelength/time codes are designed and implemented. The 2D codes are constructed by a technique based on folding of Golomb rulers. The performance evaluation of OCDMA system based on wavelength/time code has been analyzed by measuring the values of bit error rates and eye diagrams for different number of active users. It is shown that eye opening decreases and BER increases with increase in number of active users. It is also shown that BER further increases with increase in number of active users when number of decoders increases on receiver side. Hence, it is concluded that multiple access interference (MAI) is the dominant source of BER and there is graceful degradation in system performance when number of simultaneously active users increases. The received optical power is also measured at different transmission distance. It has been observed that received optical power decreases with increase in length of fiber due to attenuation.  相似文献   

16.
In this paper we propose a self-adaptation bacterial foraging optimization (SA-BFO) approach for an adaptive channel equalizer in which the weights of the equalizer are optimized to minimize the mean square error (MSE) and bit error rate (BER). The adaptive channel equalizer at the receiver removes or reduces the effects of inter symbol interference (ISI) and noise. Tests demonstrate that the proposed adaptive channel equalizer provides better convergence speed and minimal MSE and BER compared to a BFO and a normalized least mean square (NLMS) based equalizer.  相似文献   

17.
This work considers a two-user multiple access channel in which both users have Age of Information (AoI)-oriented traffic with different characteristics. More specifically, the first user has external traffic and cannot control the generation of status updates, and the second user monitors a sensor and transmits status updates to the receiver according to a generate-at-will policy. The receiver is equipped with multiple antennas and the transmitters have single antennas; the channels are subject to Rayleigh fading and path loss. We analyze the average AoI of the first user for a discrete-time first-come-first-served (FCFS) queue, last-come-first-served (LCFS) queue, and queue with packet replacement. We derive the AoI distribution and the average AoI of the second user for a threshold policy. Then, we formulate an optimization problem to minimize the average AoI of the first user for the FCFS and LCFS with preemption queue discipline to maintain the average AoI of the second user below a given level. The constraints of the optimization problem are shown to be convex. It is also shown that the objective function of the problem for the first-come-first-served queue policy is non-convex, and a suboptimal technique is introduced to effectively solve the problem using the algorithms developed for solving a convex optimization problem. Numerical results illustrate the performance of the considered optimization algorithm versus the different parameters of the system. Finally, we discuss how the analytical results of this work can be extended to capture larger setups with more than two users.  相似文献   

18.
《Physical Communication》2009,2(3):194-203
In a Dynamic Spectrum Access Network (DySPAN), nodes opportunistically make use of white spaces for transmission. The frequencies and bandwidth of available white spaces will of course vary in these networks. Hence a DySPAN transmitter will need to be capable of frequency agile and bandwidth-adaptive transmissions and a DySPAN receiver will need to accordingly respond to any changes made by a transmitter. This paper introduces a novel space–time (ST) scheme that facilitates the detection of bandwidth-adaptive transmissions without the need for a control channel. The scheme is based on orthogonal frequency-division multiplexing (OFDM) and ensures a high diversity gain. By using multiple transmit antennas, the proposed scheme also allows the application of ST block-coded OFDM (STBC-OFDM) which not only increases the robustness against bit errors but also preserves the spectral efficiency of the system. For frequency acquisition and bandwidth estimation, the receiving nodes in the DySPAN exploit the cyclostationary signatures intentionally embedded in the OFDM signals using a small set of subcarriers. In this way, communication links are established autonomously without any need for control channels.The ST scheme in this paper carries out appropriate multi-antenna transmissions of the signature information on the aforementioned subcarriers, which result in highly robust cyclostationary feature detection over the frequency selective multipath fading channels. Moreover, lower bit-error rates (BERs) are attained by applying STBC-OFDM to the data symbols on the rest of the subcarriers. Both feature detection and the BER performance are improved further by deploying multiple receive antennas. Detailed performance comparisons are presented by using simulation results.  相似文献   

19.
A novel technique for 2R-regeneration (re-shaping and re-amplification) of received RZ or NRZ 80 Gbit/s DPSK data is demonstrated using numerical simulations. The technique is based on using a single SOA balanced-receiver for balanced gain-compression and balanced amplification of demodulated DPSK (OOK) data. The utilized SOA is polarization-insensitive with 100 ps recovery time, and the tested data is 223-1 PRBS long. The balanced configuration of co-propagating orthogonally-polarized and complementary OOK streams inside SOA introduce a negligible pattern-dependence at system output. The receiver has been tested by wide-range of input random phase and amplitude-noise showing a remarkable improvement in data quality-factor. The BER demonstrates a receiver-sensitivity improvement by more than 4 dB in both cases of single-ended and balanced-detected signals.  相似文献   

20.
Massive multiple-input-multiple-output (Massive MIMO) significantly improves the capacity of wireless communication systems. However, large-scale antennas bring high hardware costs, and security is a vital issue in Massive MIMO networks. To deal with the above problems, antenna selection (AS) and artificial noise (AN) are introduced to reduce energy consumption and improve system security performance, respectively. In this paper, we optimize secrecy energy efficiency (SEE) in a downlink multi-user multi-antenna scenario, where a multi-antenna eavesdropper attempts to eavesdrop the information from the base station (BS) to the multi-antenna legitimate receivers. An optimization problem is formulated to maximize the SEE by jointly optimizing the transmit beamforming vectors, the artificial noise vector and the antenna selection matrix at the BS. The formulated problem is a nonconvex mixed integer fractional programming problem. To solve the problem, a successive convex approximation (SCA)-based joint antenna selection and artificial noise (JASAN) algorithm is proposed. After a series of relaxation and equivalent transformations, the nonconvex problem is approximated to a convex problem, and the solution is obtained after several iterations. Simulation results show that the proposed algorithm has good convergence behavior, and the joint optimization of antenna selection and artificial noise can effectively improve the SEE while ensuring the achievable secrecy rate.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号