Encrypted RS and Cyclic Doubles in OFDM - A Channel Variable Approach

被引:0
作者
Praveenkumar, Padmapriya [1 ]
Thenmozhi, K. [1 ]
Parvatha, T. [2 ]
Ganapriya, K. [2 ]
Amirtharajan, Rengarajan [1 ]
机构
[1] SASTRA Univ, Sch EEE, Thirumalaisamudram, Tamil Nadu, India
[2] SASTRA Univ, SEEE, ECE Dept, Thirumalaisamudram, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2014年
关键词
OFDM; Encryption; AWGN; Rayleigh; Rician; IMAGE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern day business world go hand in hand with the technologies. For instance, one can witness the usage of teleconferencing, image scanning; smart cards etc have become more common in established firms and companies. Creating a virtual environment of work place in now the drift as it saves generous sum of money spent on travel and other things. Instead of hand delivery as in olden and medieval period, employees scan and send the documents across the globe within seconds through internet. But is it safe to send the credentials as the way it is? It is definitely a risk. To combat this problem, software's and security algorithms are used in the digital world to avoid eaves dropping. As mentioned earlier, technology and business has now become a great combo to deal with. This paper gives a method to defend the information sent from one end where modulation techniques and encryption are employed as the basis. This paper deals with the comparative performance analysis of different modulation schemes like BPSK (Binary Phase Shift Keying), QPSK (Quadrature Phase Shift Keying), 8QAM (Quadrature Amplitude Modulation), 16QAM, 32QAM and 64 QAM using concatenated error control codes and chaotic encryption in OFDM (Orthogonal Frequency Division Multiplexing). Cyclic codes with RS codes has been used as the concatenated error control code.BER Vs Eb/No graphs are plotted using various modulation schemes using AWGN (Additive White Gaussian Noise), Rayleigh and Rician Fading Channels.
引用
收藏
页数:5
相关论文
共 40 条
  • [1] A chaotic block cipher algorithm for image cryptosystems
    Amin, Mohamed
    Faragallah, Osama S.
    Abd El-Latif, Ahmed A.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) : 3484 - 3497
  • [2] Amirtharajan R., 2012, 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), P388
  • [3] Amirtharajan R., 2012, Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems (RACSS), P71, DOI 10.1109/RACSS.2012.6212700
  • [4] Amirtharajan R., 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET 2012), P1067, DOI 10.1109/ICCEET.2012.6203762
  • [5] Amirtharajan Rengarajan, 2012, Information Technology Journal, V11, P587, DOI 10.3923/itj.2012.587.595
  • [6] Amirtharajan Rengarajan, 2012, Information Technology Journal, V11, P566, DOI 10.3923/itj.2012.566.576
  • [7] Amirtharajan R., 2011, INT MULT SYST ARCH A, P1
  • [8] Amirtharajan R., 2011, 2 INT C WIR COMM VEH, P1
  • [9] An intelligent chaotic embedding approach to enhance stego-image quality
    Amirtharajan, Rengarajan
    Rayappan, John Bosco Balaguru
    [J]. INFORMATION SCIENCES, 2012, 193 : 115 - 124
  • [10] [Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C