Design and optimization of differential chaos shift keying scheme with code index modulation

Weikai Xu, Yunsheng Tan, Chung Ming Lau, Geza Kolumban

Research output: Journal article publicationJournal articleAcademic researchpeer-review

52 Citations (Scopus)


Energy usage and data rate of differential chaos shift keying (DCSK) are both inefficient since half of the symbol duration is used to transmit reference. To improve the energy efficiency and data rate, we propose a new chaos modulation scheme which combines DCSK with code index modulation (CIM) referred to as CIM-DCSK. In the proposed scheme, a short reference signal is transmitted first. Then $P$repeated reference signals, which serve as information-bearing signals, are simultaneously modulated by an information bit and a Walsh code with a specific index which is determined by an extra information symbol. The analytical bit error rate (BER) performance of the proposed scheme is derived and verified by simulations. Further, we improve the performance of the proposed system by applying noise-reduction and optimizing power coefficients on the reference and the information-bearing signals of CIM-DCSK. Simulation and analytical results show that these optimization methods significantly boost the BER performances of the proposed schemes. Finally, the BER performances of the proposed systems are compared with that of the conventional DCSK system and the short reference DCSK (SR-DCSK) system. Numerical results show that the proposed schemes outperform both DCSK and SR-DCSK.
Original languageEnglish
Pages (from-to)1970-1980
Number of pages11
JournalIEEE Transactions on Communications
Issue number5
Publication statusPublished - 1 May 2018


  • Chaos communications
  • Code index modulation
  • Differential chaos shift keying (dcsk)
  • Short reference differential chaos shift keying (sr-dcsk)

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Design and optimization of differential chaos shift keying scheme with code index modulation'. Together they form a unique fingerprint.

Cite this