82
Views
0
CrossRef citations to date
0
Altmetric
Articles

Lattice-Based Coding to Enhance Error Performance of the Hidden Direct Sequence Spread Spectrum

ORCID Icon &

REFERENCES

  • R. Peterson, R. Ziemer, and D. Borth, Introduction to Spread Spectrum Communications. Prentice-Hall Publications, 1995, ch. 7.
  • G. Kaddoum, “Wireless Chaos-based communication systems: A comprehensive survey,” IEEE Access, Vol. 4, pp. 2621–2648, May 2016. doi: https://doi.org/10.1109/ACCESS.2016.2572730
  • T. Song, K. Zhou, and T. Li, “CDMA system design and capacity analysis under disguised jamming,” IEEE Trans. Inf. Forensics Secur., Vol. 11, pp. 2487–2498, June 2016. doi: https://doi.org/10.1109/TIFS.2016.2585089
  • A. Falahati and N. Sanandaji, “Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance,” Int. J. Commun Syst., Vol. 29, pp. 1907–1915, May 2016. doi: https://doi.org/10.1002/dac.3151
  • M. Tafaroji and M. A. Falahati, “Improving code division multiple access security by applying encryption methods over the spreading codes,” IET Commun. J., Vol. 1, pp. 398–404, June 2007. doi: https://doi.org/10.1049/iet-com:20060295
  • B. Chen, S. Tang, X. Du, and X. Wu, “Study on an anti-jamming method of spread spectrum communication based on LT codes,” in 11th IET International Conference on Wireless Communication, Networking and Mobile Computing, Sept. 2015.
  • M. B. Pursley and T. C. Royster, “High-rate direct-sequence spread spectrum with error-control coding,” IEEE Trans. Commun., Vol. 54, pp. 1693–1702, Aug. 2006. doi: https://doi.org/10.1109/TCOMM.2006.881256
  • K. A. Shridhara, “A study of the bit error rate performance of convolutional coded spread spectrum communication systems,” IETE. J. Res., Vol. 35, pp. 160–169, 1989. doi: https://doi.org/10.1080/03772063.1989.11436808
  • P. Benprom, C. Pinthong, and S. Kanprachar, “Analysis of convolutional coded direct sequence spread spectrum CDMA system with a BPSK jamming signal,” in 8th IEEE Conference on Electrical Engineering/ Electronics, Telecommunication and Information Technology, May 2011.
  • C. Rachinger, J. B. Huber, and R. R. Muller, “Comparison of convolutional and block codes for Low structural delay,” IEEE Trans. Commun., Vol. 63, pp. 4629–4638, Dec. 2015. doi: https://doi.org/10.1109/TCOMM.2015.2488661
  • R. Zamir, Lattice Coding for Signals and Networks. Cambridge, UK: Cambridge University Press, 2014.
  • H.-A. Loeliger, “Averaging bounds for lattices and linear codes,” IEEE Trans. Inf. Theory, Vol. 43, pp. 1767–1773, Nov. 1997. doi: https://doi.org/10.1109/18.641543
  • W. Kositwattanarerk, S. S. Ong, and F. Oggier, “Construction A of lattices over number fields and block fading (wiretap) coding,” IEEE Trans. Inf. Theory, Vol. 61, pp. 2273–2282, May 2015. doi: https://doi.org/10.1109/TIT.2015.2416340
  • F. Oggier and J. Belfiore, “On the secrecy gain of extremal even l-Modular lattices,” Taylor and Francis Exp. Math., Published online: Jan. 2018.
  • A. Vardy, “Even more efficient bounded-distance decoding of the hexacode, the Golay code, and the leech lattice,” IEEE Trans. Inf. Theory, Vol. 41, pp. 1495–1499, Sept. 1995. doi: https://doi.org/10.1109/18.412695
  • G. Kaddoum, F. Gagnon, and F. Richardson, “Design of a multi-carrier DCSK system,” in International Symposium on Wireless Communication Systems, Aug. 2012.
  • L. Kong, G. Kaddoum, and Z. Rezki, “Highly accurate and asymptotic analysis on the SOP over SIMO α-µ fading channels,” IEEE Commun. Lett., Vol. 22, pp. 2088–2091, Aug. 2018. doi: https://doi.org/10.1109/LCOMM.2018.2861877
  • S. Vuppala and G. Kaddoum, “Secrecy capacity analysis in D2D underlay cellular networks: colluding eavesdroppers,” in IEEE 28th Annual Internationa Symposium on Personal, Indoor and Mobile Communications, Oct. 2017.
  • F. Jameel, S. Wyne, G. Kaddoum, and T. Doung, “A comprehensive survey on cooperative relaying and jamming strategies for physical layer security,” IEEE Commun. Surv. Tutorials, Early access: Aug. 2018. doi: https://doi.org/10.1109/COMST.2018.2865607
  • S. Vuppala, Y. J. Tolossa, G. Kaddoum, and G. Abreu, “On the physical layer security analysis of hybrid millimeter wave networks,” IEEE Trans. Commun., Vol. 66, pp. 1139–1152, Mar. 2018. doi: https://doi.org/10.1109/TCOMM.2017.2776944
  • V. Turunen, M. Kosunen, M. Vaarakangas, and J. Ryynanen, “Correlation-based detection of OFDM signals in the angular domain,” IEEE Trans. Veh. Technol., Vol. 61, pp. 951–958, Mar. 2012. doi: https://doi.org/10.1109/TVT.2012.2183009
  • S. Verdu and S. Shami, “Spectral efficiency of CDMA with random spreading,” IEEE Trans. Inf. Theory, Vol. 45, pp. 622–640, Mar. 1999. doi: https://doi.org/10.1109/18.749007
  • Z. Gu, Y. Gao, W. Liu, and M. Jin, “Decision probability oredered successive interference cancellation for massive MIMO,” in IEEE International Conference on Computer and Communications, Oct. 2016.
  • A. Inger, R. Zamir, and M. Feder, “Finite-dimensional infinite constellations,” IEEE Trans. Inf. Theory, Vol. 59, pp. 1630–1656, Mar. 2013. doi: https://doi.org/10.1109/TIT.2012.2224145
  • U. Erez, S. Litsyn, and R. Zamir, “Lattices which are good for (almost) everything,” IEEE Trans. Inf. Theory, Vol. 51, pp. 3401–3416, Oct. 2005. doi: https://doi.org/10.1109/TIT.2005.855591
  • Y. Domb, R. Zamir, and M. Feder, “The random coding bound is tight for the average linear code or lattice,” IEEE Trans. Inf. Theory, Vol. 62, pp. 121–130, Jan. 2016. doi: https://doi.org/10.1109/TIT.2015.2496308
  • G. Caire and C. Leanderson, “Throughput performance of an Incremental- redundancy ARQ scheme in the block- fading Gaussian collision channel,” in International Symposium on Information Theory, June 2001.
  • G. Ungerboeck, “Channel coding with multilevel/phase signals,” IEEE Trans. Inf. Theory, Vol. 28, pp. 55–67, Jan. 1982. doi: https://doi.org/10.1109/TIT.1982.1056454

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.