scispace - formally typeset
Search or ask a question
Topic

Keying

About: Keying is a research topic. Over the lifetime, 6598 publications have been published within this topic receiving 82943 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The concept of coordinated multipoint SSK (CoMP-SSK) modulation is put forth as a way of exploiting network cooperation and the spatial-constellation diagram to achieve high data rates.
Abstract: In this paper, we study the performance of space-shift keying (SSK) modulation for multiple-input-multiple-output (MIMO) wireless systems in the presence of multiple-access interference. More specifically, a synchronous multiuser scenario is considered. The main technical contributions of this paper are given as follows: Two receiver structures based on the maximum-likelihood (ML) criterion of optimality are developed and analytically studied, i.e., single- and multiuser detectors. Accurate frameworks for computing the average bit error probability (ABEP) over independent identically distributed (i.i.d.) Rayleigh fading channels are proposed. Furthermore, simple and easy-to-use lower and upper bounds for performance analysis and system design are introduced. The frameworks account for the near-far effect, which significantly affects the achievable performance in multiple-access environments. In addition, we extend the analysis to generalized SSK (GSSK) modulation, which foresees multiple active antennas at the transmitter. With respect to SSK modulation, GSSK modulation achieves higher data rates at the cost of increased complexity at the transmitter. The performance of SSK and GSSK modulations is compared with that of conventional phase-shift keying (PSK) and quadrature amplitude modulation (QAM) schemes, and it is shown that SSK and GSSK modulations can outperform conventional schemes for various system setups and channel conditions. In particular, the performance gain of SSK and GSSK modulations increases for increasing values of the target bit rate and of the number of antennas at the receiver. Finally, we put forth the concept of coordinated multipoint (or network MIMO) SSK (CoMP-SSK) modulation as a way of exploiting network cooperation and the spatial-constellation diagram to achieve high data rates. Analytical derivations and theoretical findings are substantiated through extensive Monte Carlo simulations for many setups.

97 citations

Journal ArticleDOI
TL;DR: The new proposed scheme is spectrally more efficient for data transmission, while keeping the same outage probability for voice and data (both classes) as the scheme employing BPSK/M-AM, and provides, as a by-product, aSpectrally efficient way of transmitting voice and a single-class data.
Abstract: In this paper, a new technique for simultaneous voice and multiclass data transmission over fading channels using adaptive hierarchical modulation is proposed. According to the link quality, the proposed scheme changes the constellation size as well as the priority parameters of the hierarchical signal constellations and assigns available subchannels (i.e., different bit positions) to different kinds of bits. Specifically, for very bad channel conditions, it only transmits voice with binary phase-shift keying (BPSK). As the channel condition improves, a variable-rate adaptive hierarchical M-ary quadrature amplitude modulation (M-QAM) is used to increase the data throughput. The voice bits are always transmitted in the lowest priority subchannel (i.e., the least significant bit (LSB) position) of the quadrature (Q) channel of the hierarchical M-QAM. The remaining (log2M-1) subchannels, called data subchannels, are assigned to two different classes of data according to the selected priority parameters. Closed-form expressions as well as numerical results for outage probability, achievable spectral efficiency, and average bit error rate (BER) for voice and data transmission over Nakagami-m fading channels are presented. The adaptive techniques employing hybrid binary shift keying (BPSK)/M-ary AM (M-AM) and uniform M-QAM for simultaneous voice and two different classes of data transmission are also extended. Compared to the extended schemes, the new proposed scheme is spectrally more efficient for data transmission, while keeping the same outage probability for voice and data (both classes) as the scheme employing BPSK/M-AM. The new scheme also provides, as a by-product, a spectrally efficient way of transmitting voice and a single-class data

97 citations

Journal ArticleDOI
TL;DR: The effectiveness of the proposed scheme is demonstrated through the numerical simulation of an illustrative communication system and Synchronization between the chaotic circuits of the transmitter and receiver modules is guaranteed through the Lyapunov stability theorem.
Abstract: This paper presents a secure digital communication system based on chaotic modulation, cryptography, and chaotic synchronization techniques. The proposed system consists of a Chaotic Modulator (CM), a Chaotic Secure Transmitter (CST), a Chaotic Secure Receiver (CSR) and a Chaotic Demodulator (CDM). The CM module incorporates a chaotic system and a novel Chaotic Differential Peaks Keying (CDPK) modulation scheme to generate analog patterns corresponding to the input digital bits. The CST and CSR modules are designed such that a single scalar signal is transmitted in the public channel. Furthermore, by giving certain structural conditions of a particular class of chaotic system, the CST and the nonlinear observer-based CSR with an appropriate observer gain are constructed to synchronize with each other. These two slave systems are driven simultaneously by the transmitted signal and are designed to synchronize and generate appropriate cryptography keys for encryption and decryption purposes. In the CDM module, a nonlinear observer is designed to estimate the chaotic modulating system in the CM. A demodulation mechanism is then applied to decode the transmitted input digital bits. The effectiveness of the proposed scheme is demonstrated through the numerical simulation of an illustrative communication system. Synchronization between the chaotic circuits of the transmitter and receiver modules is guaranteed through the Lyapunov stability theorem. Finally, the security features of the proposed system in the event of attack by an intruder in either the time domain or the frequency domain are discussed.

97 citations

Patent
22 Sep 2004
TL;DR: In this paper, a keying system for selective interconnection between a receptacle socket and a connector plug terminating an optic fibre, the connector plug adapted for insertion into the receptacle sockets, is presented.
Abstract: A keying system for providing selective interconnection between a receptacle socket and a connector plug terminating an optic fibre, the connector plug adapted for insertion into the receptacle socket. The keying system comprises a raised boss configured to one of a plurality of predefined boss keying geometries and a cavity configured to one of a plurality of predefined cavity keying geometries. The boss is either in one of the receptacle socket or on a forward end of the connector plug and the cavity is formed in the other of the receptacle socket or the forward end of the connector plug. At least one of the predefined boss keying geometries matches at least one of the predefined cavity keying geometries. When the boss keying geometry matches the cavity keying geometry, the boss can be inserted into the cavity thereby interconnecting the connector plug with the receptacle socket. In this manner correct interconnections between connectors and other connectors or sockets can be insured thereby providing an enhanced level of security.

97 citations

Patent
11 Nov 2011
TL;DR: In this paper, the secure provisioning of the keying materials is based on a revision of firmware installed in the platform, which can be used both online and offline to devices in a remote platform.
Abstract: Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform.

97 citations


Network Information
Related Topics (5)
Transmission (telecommunications)
171.3K papers, 1.2M citations
85% related
Optical fiber
167K papers, 1.8M citations
84% related
Wireless
133.4K papers, 1.9M citations
84% related
Network packet
159.7K papers, 2.2M citations
84% related
Wireless network
122.5K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023137
2022286
2021170
2020238
2019301
2018291