Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance

Summary Two new methods, the nested direct sequence spread spectrum and interleaved direct sequence spread spectrum, are introduced in view of the previously investigated spread spectrum methods. In the nested direct sequence method, the security is maintained, and the cross-correlation between different codes resulting in multi-user interference that corresponds to BER performance is improved, while in the interleaved direct sequence spread spectrum, the security is improved and BER performance is maintained. Both methods are analysed by mathematical relations as well as computer simulations and are compared with the existing methods. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Abolfazl Falahati,et al.  Improving code division multiple access security by applying encryption methods over the spreading codes , 2007, IET Commun..

[2]  Torben Larsen,et al.  Compressive Sensing for Spread Spectrum Receivers , 2013, IEEE Transactions on Wireless Communications.

[3]  MinWoo Lee,et al.  Spreading technique of satellite beacon to avoid jamming attacks , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[4]  Xu Zhu,et al.  Support vector machine-based equalisation for direct-sequence ultra wideband systems , 2013, Wirel. Commun. Mob. Comput..

[5]  Shuangqing Wei,et al.  Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise , 2012, IEEE Transactions on Information Forensics and Security.

[6]  H. Vincent Poor,et al.  Blind adaptive multiuser detection in multipath CDMA channels based on subspace tracking , 1998, IEEE Trans. Signal Process..

[7]  Jitendra K. Tugnait,et al.  Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criteria , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[8]  Hugo Krawczyk,et al.  On Compression of Data Encrypted With Block Ciphers , 2012, IEEE Transactions on Information Theory.

[9]  Yang Xiao,et al.  A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID , 2011, Wirel. Commun. Mob. Comput..

[10]  Mohammad Soleimani,et al.  Pulse compression security enhancement as an electronic protection technique by exploiting a block cipher output as phase-code , 2015 .

[11]  Harish K. Pillai,et al.  On the Number of Linear Feedback Shift Registers With a Special Structure , 2012, IEEE Transactions on Information Theory.

[12]  Melanie Hartmann Principles Of Communications Systems Modulation And Noise , 2016 .

[13]  Ric A. Romero,et al.  Friendly Spectrally Shaped Radar Waveform With Legacy Communication Systems for Shared Access and Spectrum Management , 2015, IEEE Access.

[14]  Roger L. Peterson,et al.  Introduction to Spread Spectrum Communications , 1995 .

[15]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[16]  Ahmed K. Elhakeem,et al.  Cross-layer optimization for CDMA/TDD wireless mesh networks , 2011, Wirel. Commun. Mob. Comput..