[ieee milcom 2012 - 2012 ieee military communications conference - orlando, fl, usa...

6
Partitioned Cyclic Code Shift Keying for JTIDS Hong-Jun Noh and Jae-Sung Lim Graduate School of Information Technology, Ajou University Suwon, South Korea {nonoboy, jaslim}@ajou.ac.kr Abstract—In this paper, we propose partitioned cyclic code shift keying (PCCSK) for the Joint Tactical Information Distri- bution System (JTIDS) by combining a Hadamard matrix and a modified maximal length sequence (MMLS). The proposed approach adaptively increases the transmission data rate within a limited transmission range in the battlefield. By exploiting a new code set as a spreading code and by adopting code selection, the system is easily able to achieve higher spectral efficiency. For additional performance enhancement, we apply adaptive channel coding with PCCSK, and we derive the appropriate code pairs. Monte Carlo simulations are conducted to show the transmission ranges of the proposed scheme, and the results show that PCCSK with adaptive coding can support a higher data rate with a reasonable transmission range. I. I NTRODUCTION In 1997, the concept of network-centric warfare (NCW) was introduced as an information and intelligence architecture based on sensors, information, and engagement grids in order to enable new operational concepts of speed of command and self-synchronization [1]. Without the mass associated with conventional styles of warfare, maneuver and information are critical to NCW. This implies that shooters and decision makers, who are physically separated, are linked via a ubi- quitous network. Therefore, tactical data links are playing an increasingly important role in the modern battlefield, and they have attracted considerable attention in recent years. Many investigations into tactical data links have been undertaken [2]–[4]. Link 16, also known as the Joint Tactical Information Distri- bution System (JTIDS) and/or the Multifunctional Information Distribution System (MIDS), was designated as the United States Department of Defense’s primary tactical data link for all military service and defense agency command, control, and intelligence (C2I) systems. As it is used in the battlefield, it must have sufficient timeliness, high capacity, strict security, and survivability [3]. The primary drawback of Link-16 is its limited data rate [4]. The conventional Link-16 system is unable to support higher data rate applications (video/imagery and TCP/IP packet switching), and it is necessary to make better use of Link-16 networks for existing high data rate applications (e.g., secure voice systems) [4]–[7]. To meet these challenging requirements, transmission tech- niques must be carefully considered. Therefore, research has been focused on transmission techniques and their perfor- mance in Link-16 [3]–[6]. Link performances have been evaluated by theoretical analysis and simulation, according to the specifications of the Link-16 system that have been disclosed [3]. In order to increase transmission performance, an alternative waveform with variable channel coding was proposed in [4]. Link-16 Enhanced Throughput (LET) was developed to obtain enhanced throughput over a Link-16 net- work by changing to the Link-16 baseband coding [5]. In [5], the combined Reed Solomon channel coding (RS) and cyclic code shift keying (CCSK) modulation schemes are replaced with a RS and convolutional coding scheme. However, the existing schemes inevitably experience degradation in their low probability of intercept/detection (LPI/LPD) performance at the enhanced data rates. To evaluate the performance of Link-16, we should study the transmitter and receiver components of JTIDS. In JTIDS, some well-known transmission techniques have been applied, such as channel coding, CCSK, interleaving, and frequency hop- ping. Particularly, CCSK which is a form of M -ary signaling over a communication channel shows dramatic performance gains, especially in its LPI/LPD properties. It has also been shown that CCSK requires significantly fewer computations than the existing orthogonal signaling schemes and, for codes that provide LPI, the cyclic shifts are correlated with each other; that is, the cyclic autocorrelation function has non-zero side lobes [8]. In this paper, we discuss a CCSK technique for JTIDS in order to increase transmission performance. The main contri- bution of this paper is a method for adaptively increasing the transmission data rate. To this end, we propose a partitioned CCSK (PCCSK) scheme. More specifically, we construct a spreading code as a set of partitioned sub-spreading codes by combining a Hadamard matrix and a modified maximal length sequence (MMLS). In contrast to the conventional maximal length sequence (MLS) or MMLS, the new code set is constructed with multiple sub-codewords. As multiple sub-spreading codes participate in CCSK, we obtain a higher resource granularity. Moreover, we also improve the system capacity with a reasonable transmission range. For an addi- tional performance enhancement, we apply adaptive channel coding with PCCSK and derive the appropriate code pairs. The rest of the paper is organized as follows. In Section II, the overall system model is described. We introduce the proposed PCCSK scheme in Section III, and present our sim- ulation results in Section IV. Finally, we draw our conclusions in Section V. 978-1-4673-3/12/$31.00 ©2013 IEEE 978-1-4673-3/12/$31.00 ©2013 IEEE

Upload: jae-sung

Post on 23-Dec-2016

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

Partitioned Cyclic Code Shift Keying for JTIDS

Hong-Jun Noh and Jae-Sung LimGraduate School of Information Technology,

Ajou University

Suwon, South Korea

{nonoboy, jaslim}@ajou.ac.kr

Abstract—In this paper, we propose partitioned cyclic codeshift keying (PCCSK) for the Joint Tactical Information Distri-bution System (JTIDS) by combining a Hadamard matrix anda modified maximal length sequence (MMLS). The proposedapproach adaptively increases the transmission data rate withina limited transmission range in the battlefield. By exploiting anew code set as a spreading code and by adopting code selection,the system is easily able to achieve higher spectral efficiency. Foradditional performance enhancement, we apply adaptive channelcoding with PCCSK, and we derive the appropriate code pairs.Monte Carlo simulations are conducted to show the transmissionranges of the proposed scheme, and the results show that PCCSKwith adaptive coding can support a higher data rate with areasonable transmission range.

I. INTRODUCTION

In 1997, the concept of network-centric warfare (NCW)

was introduced as an information and intelligence architecture

based on sensors, information, and engagement grids in order

to enable new operational concepts of speed of command

and self-synchronization [1]. Without the mass associated

with conventional styles of warfare, maneuver and information

are critical to NCW. This implies that shooters and decision

makers, who are physically separated, are linked via a ubi-

quitous network. Therefore, tactical data links are playing an

increasingly important role in the modern battlefield, and they

have attracted considerable attention in recent years. Many

investigations into tactical data links have been undertaken

[2]–[4].

Link 16, also known as the Joint Tactical Information Distri-

bution System (JTIDS) and/or the Multifunctional Information

Distribution System (MIDS), was designated as the United

States Department of Defense’s primary tactical data link for

all military service and defense agency command, control, and

intelligence (C2I) systems. As it is used in the battlefield, it

must have sufficient timeliness, high capacity, strict security,

and survivability [3]. The primary drawback of Link-16 is

its limited data rate [4]. The conventional Link-16 system is

unable to support higher data rate applications (video/imagery

and TCP/IP packet switching), and it is necessary to make

better use of Link-16 networks for existing high data rate

applications (e.g., secure voice systems) [4]–[7].

To meet these challenging requirements, transmission tech-

niques must be carefully considered. Therefore, research has

been focused on transmission techniques and their perfor-

mance in Link-16 [3]–[6]. Link performances have been

evaluated by theoretical analysis and simulation, according

to the specifications of the Link-16 system that have been

disclosed [3]. In order to increase transmission performance,

an alternative waveform with variable channel coding was

proposed in [4]. Link-16 Enhanced Throughput (LET) was

developed to obtain enhanced throughput over a Link-16 net-

work by changing to the Link-16 baseband coding [5]. In [5],

the combined Reed Solomon channel coding (RS) and cyclic

code shift keying (CCSK) modulation schemes are replaced

with a RS and convolutional coding scheme. However, the

existing schemes inevitably experience degradation in their

low probability of intercept/detection (LPI/LPD) performance

at the enhanced data rates.

To evaluate the performance of Link-16, we should study the

transmitter and receiver components of JTIDS. In JTIDS, some

well-known transmission techniques have been applied, such

as channel coding, CCSK, interleaving, and frequency hop-

ping. Particularly, CCSK which is a form of M -ary signaling

over a communication channel shows dramatic performance

gains, especially in its LPI/LPD properties. It has also been

shown that CCSK requires significantly fewer computations

than the existing orthogonal signaling schemes and, for codes

that provide LPI, the cyclic shifts are correlated with each

other; that is, the cyclic autocorrelation function has non-zero

side lobes [8].

In this paper, we discuss a CCSK technique for JTIDS in

order to increase transmission performance. The main contri-

bution of this paper is a method for adaptively increasing the

transmission data rate. To this end, we propose a partitioned

CCSK (PCCSK) scheme. More specifically, we construct a

spreading code as a set of partitioned sub-spreading codes

by combining a Hadamard matrix and a modified maximal

length sequence (MMLS). In contrast to the conventional

maximal length sequence (MLS) or MMLS, the new code

set is constructed with multiple sub-codewords. As multiple

sub-spreading codes participate in CCSK, we obtain a higher

resource granularity. Moreover, we also improve the system

capacity with a reasonable transmission range. For an addi-

tional performance enhancement, we apply adaptive channel

coding with PCCSK and derive the appropriate code pairs.

The rest of the paper is organized as follows. In Section

II, the overall system model is described. We introduce the

proposed PCCSK scheme in Section III, and present our sim-

ulation results in Section IV. Finally, we draw our conclusions

in Section V.

978-1-4673-3/12/$31.00 ©2013 IEEE978-1-4673-3/12/$31.00 ©2013 IEEE

Page 2: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

Fig. 1. Signal transmission model of JTIDS

II. SYSTEM MODEL DESCRIPTION

A. Joint Tactical Information Distribution System

The typical signal transmission model of JTIDS can be

simplified to that shown in Fig. 1. JTIDS is based on a time

division multiple access (TDMA) protocol, and all communi-

cation takes place in time slots whose size is fixed to 7.8125

milliseconds. Information in each time slot is generally carried

in a number of 75-bit words, which are arranged as 15 symbols

of 5 bits each. These words are subject to forward error

correction (FEC) using a RS code (RS(31, 15)) which adds 16

parity symbols to each 15 information symbols, giving a total

of 31 symbols per word. The RS coded symbols containing

5 bits of information are modulated using CCSK and spread

to a 32-chip sequence known as a CCSK symbol. The CCSK

chips are then further processed by being combined with a 32-

bit pseudo-random noise sequence for transmission security.

After this, the chips are modulated using minimum shift keying

(MSK) to generate analog pulses. In some cases, the start of

the pulse train is jittered pseudo-randomly within a time slot.

The instantaneous noise bandwidth of the signal is approx-

imately 3 MHz, and each pulse is transmitted over a carrier

frequency that is pseudo-randomly selected from a set of 51

between 960 MHz and 1215 MHz [9]. The Link-16 message

data can be sent with either a single- or double-pulse structure

[10]. In a double-pulse structure, each 32-chip symbol is

mapped onto two consecutive pulses that are guaranteed to

be on separate frequencies. This repetition provides robust-

ness against fading and/or jamming as it provides frequency

diversity.

The data rate of JTIDS varies depending on the system con-

figuration. Fig. 2 depicts the JTIDS symbol packing structures.

The data contained in JTIDS messages is always transmitted

as fixed-length, 3-word blocks of 225 bits each. These 3-

word blocks may be packed into a time slot at different

densities. In the standard double-pulse (STDP) mode, one 3-

word block is transmitted in each time slot. It is possible to

send two 3-word blocks in one slot using either the packed-

2 double-pulse (P2DP) mode or the packed-2 single-pulse

(P2SP) mode. For P2SP the information is not repeated on

two separate pulses, so that twice as much as information can

be sent in the same number of pulses as STDP. The trade-

off for this extra throughput is a reduction in jam resistance

and/or fading protection. For P2DP, the increased throughput is

accomplished by increasing the number of pulses per time slot.

In order to accommodate the longer pulse train, the jittering of

the start of the pulse train is eliminated. Finally, the packed-

4 single pulse (P4SP) mode can be used to send four 3-

word blocks per time slot. In this mode, each information

Fig. 2. JTIDS symbol packing structure

symbol packet contains only one pulse and the timing jitter

is eliminated. The theoretical maximum throughput for P4SP

(i.e., using every time slot) is generally calculated as 115,200

bps for a single terminal. For the P2 modes, the throughput is

57,600 bps, and for STDP it is 28,800 bps. If we recall that

the channel bandwidth of JTIDS is 3 MHz, we can see that

the spectral efficiency of JTIDS is too low.

B. Cyclic Code Shift KeyingIn JTIDS, the spread spectrum technique of CCSK is used

to obtain anti-jamming and LPI/LPD performance. CCSK

provides M -ary baseband modulation before MSK modulation

and is applied to the interleaved symbols of the RS codewords.

Each 5-bit symbol of the RS codewords is represented by a

32-chip. Starting with the base sequence (s0), there are 32

unique sequences that represent the values of the 5-bit symbols

between 0 and 31. Each sequence is derived by cyclically

shifting s0 to the left between 1 and 31 times to obtain a

unique sequence for all possible combinations of 5 bits. This

is illustrated in Table I.

TABLE I32-CHIP CCSK CODEWORDS

5-bit symbol 32-chip CCSK sequence chosen for JTIDS

00000 s0 = 01111100111010010000101011101100

00001 s1 = 11111001110100100001010111011000

00010 s2 = 11110011101001000010101110110001

.

.

....

11111 s31 = 00111110011101001000010101110110

The receiving terminal matches each of the received chip

sequences to entries in a look-up table and, when the percent-

age match exceeds a programmed threshold level, the terminal

decodes the chip sequence as the appropriate RS symbol. The

calculation of percentage match is accomplished by computing

the cross-correlation between the received 32-chip sequence

and all possible 32-chip CCSK codewords. If we denote a

received sequence after MSK demodulation by the row vector

r, then cross-correlation is defined as

κi = snrT (1)

where (·)T denotes the transpose and all zeros in the sequences

are replaced by −1.

Page 3: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

III. PROPOSED SCHEME

A. Partitioned Cyclic Code Shift Keying

In this section, we propose a PCCSK scheme for JTIDS.

The proposed scheme consists of two steps: (i) PCCSK code

set construction based on the required data rate, (ii) appropriate

code selection and modulation.

In conventional CCSK, the spreading codewords are gener-

ated by the MMLS [8]. An MMLS is made by inserting −1or +1 in an MLS, which is a sequence of length M = 2γ − 1whose cyclic auto-correlation has a peak of M and side lobes

of 0. Unfortunately, in such MLSs, M is not a power of two, so

the number of bits transmitted is less than γ. To alleviate this

problem, an MMLS is used to extend the length to M = 2γ .

This modification results in the occurrence of non-zero auto-

correlation side lobe values, unlike with the true MLS.

The new spreading code set for PCCSK is constructed by

combining MMLS and Hadamard matrices. Let M = 2γ be

the total length of the transmitted codeword and L = 2α be

the length of the sub-spreading codeword, where α ≤ γ. Let

us define the L× L cyclic shifting matrix SL as

SL =

⎡⎢⎢⎢⎢⎢⎢⎣

0 0 · · · 0 11 0 · · · 0 0

0 1. . .

......

.... . .

. . . 0 00 · · · 0 1 0

⎤⎥⎥⎥⎥⎥⎥⎦. (2)

We extend the MMLS of length L to the base sub-spreading

code set U(L) using SL. We can then construct a new

spreading code set C(M) as

C(M = 2γ) = U(L = 2α)⊗H(2β) (3)

for β = γ − α, where ⊗ denotes the Kronecker product and

H(φ) is the Hadamard matrix of order φ.

Fig. 3 shows the whole PCCSK code set generation process

when β = 2. In this case, one codeword has four partitioned

codewords. If d is the total number of partitioned codewords

in one transmitted codeword, we can easily find that d = 2β .

As shown in Fig. 3, the PCCSK code set looks similar to the

Fig. 3. A spread code set for PCCSK (α = γ − 2, β = 2)

CCSK code set, in that the cyclic shift is applied to all the

codewords. However, the length of the base MMLS of PCCSK

is shorter than in conventional CCSK. Using this code set, we

can send variable sizes of data.

For higher information granularity, a smaller value of α is

better, but when α = 0, C(M) becomes the conventional

Hadamard matrix. On the other hand, when α = γ, C(M)becomes the conventional CCSK code set. Therefore, the

determination of the length of the smallest sub-spreading code

is important. We will discuss this code selection problem for

JTIDS in the following subsection.

Fig. 4. Sub-code selection for PCCSK (α = γ − 2, β = 2)

Fig. 4 illustrates an example of code selection for PCCSK.

Let us define CP (d,M) as the selected partitioned code set

for data transmission, where d is the number of partitions and

q is the transmitted codeword. So, the length of the partitioned

codeword L is the same as M/d. If d = 1, then CP (1,M)is equal to C(M), so we consider the case d > 1. When the

selected set of partitioned codes is CP (d,M), the proposed

partitioned CCSK scheme transmits

d · log2 L = d · log2(M/d) = d · (log2 M − log2 d)

= d · (γ − β) = d · ibits(4)

in a single codeword transmission. As d > 1, d is larger than

log2 d. Because M > d, the proposed scheme has a higher

data transmission rate than the conventional CCSK scheme.

Thus, the larger the selected value of d, the more data can

be transmitted. The transmitted spread sequence matrix Qγ is

given by

Qγ = {Qγ,1, Qγ,2, . . . , Qγ,d}. (5)

Although PCCSK has a good data rate performance, it

also has some limitations. First, we should select the base

MMLS very carefully because some MMLSs have positive

values of the auto-correlation side lobe, and the concatena-

tion of these sequences results in larger values of the auto-

correlation side lobe. Thus, we should select an MMLS that

has a negative auto-correlation side lobe value. The second

limitation of PCCSK is the degradation in processing gain

because of the partitioning. In JTIDS, this degradation causes

the transmission range to decrease. Thus, we should select

an appropriate code for transmission, not only for the data

rate but also for the range of operation. We demonstrate the

transmission range of PCCSK by simulation in section IV.

Page 4: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

B. Code Selection of PCCSK

In this subsection, we show the error performance of

PCCSK and the selection process for an appropriate data

rate. JTIDS uses the RS code with n = 31 and k = 15for FEC. A code rate for RS(31, 15) is almost 1/2, so the

error correction capability is very powerful but the overhead

of data transmission is also large. Therefore, LET varies the

RS code rate to enhance the system throughput. PCCSK can

also increase the capacity and error performance by applying

an adaptive RS code rate.

Before we adopt the variable RS code rate, we derive the

error performance of PCCSK. The equations for evaluating

CCSK performance are given in [7]. They calculate an upper

bound for the probability of symbol error for a given number

N of chip errors. A CCSK symbol error occurs when κi ≥ κ0,

where κi is the ith cross-correlation value from (1) when a

chip error occurs and the 0th codeword is the desired one. In

[7], κi was found to be

κi = hi + 2(N − 2q), 0 ≤ q ≤ N , 1 ≤ i ≤M − 1 (6)

by observation, where hi is the ith cross-correlation value in

the no error case. They also derived the conditional probability

mass function (pmf) for κi as

P{κi = hi + 2(N − 2q)|N = j} =((M+hi)/2

q

)((M−hi)/2

j−q

)(Mj

) .

(7)

Using (7), the conditional probability of symbol error for

CCSK can be derived, and then the probability of CCSK

symbol error is obtained as

PSCCSK=

M∑j=0

P{symbol error|N = j}P{N = j}. (8)

For JTIDS, N is a binomial random variable with a pmf

P{N = j} =(M

j

)P jc (1− Pc)

M−j , j = 0, 1, . . . , 32 (9)

where Pc is the probability of chip error at the output of

the MSK chip demodulator. In this subsection, we assume a

coherent matched filter. Therefore, the probability of channel

chip error is calculated as

Pc = Q

(√2Ec

N0

). (10)

By substituting M with L and calculating hi for a parti-

tioned code set, we obtain the results for PCCSK with M = 32shown in Fig. 5. In Fig. 5, the results of a Monte Carlo

simulation are also denoted. The transmission power is fixed

in a JTIDS terminal, so the graph depicts the same chip

energy environment. As can be seen, the analytic results for

PCCSK are similar to those of the simulation. We can also

Fig. 5. Probability of symbol error for PCCSK in AWGN: analytic upperbound versus Monte Carlo simulation

recognize the performance degradation caused by a decrease

in processing gain. At PS = 10−5, one partition brings out

a 3 dB increase in Ec/N0, which means that the transmitter

should double its transmission power.

If we select an appropriate RS code for PCCSK, we can

alleviate the performance degradation due to processing gain.

First, we select a larger n for a higher data rate, because the

RS code performs better with a longer codeword. Second, we

set the larger RS code to PCCSK, which has a larger value

of d. The message length in the conventional JTIDS is very

short, and therefore the bigger n is not suitable for low data

rate transmissions.

Table II shows the selected RS and PCCSK pairs. Case 0is identical to the conventional JTIDS waveform, and the data

rate is normalized by the data rate of case 0. Cases 1 to 3relate to each other when only PCCSK is applied to JTIDS;

PCCSK with variable RS code rates are illustrated by cases

4 to 6. For an exact comparison of performance, whether or

not adaptive coding is applied, both cases have the same code

rates.

TABLE IIPCCSK WITH ADAPTIVE CODING

Case RS(n, k) PCCSK Data rate

0 RS(31, 15) CP (1, 32) ×11 RS(31, 15) CP (2, 32) ×1.62 RS(31, 15) CP (4, 32) ×2.43 RS(31, 15) CP (8, 32) ×3.24 RS(63, 49) CP (1, 32) ×1.65 RS(127, 93) CP (2, 32) ×2.46 RS(255, 165) CP (4, 32) ×3.2

The performance of the RS code is well defined in [11] as

PSRS≈ 1

n

n∑e=t+1

e

(n

e

)P eS(1− PS)

n−e (11)

Page 5: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

Fig. 6. Probability of symbol error for PCCSK with adaptive coding inAWGN: analytic upper bound

where e denotes the channel symbol errors per word and t =(n−k)/2. In JTIDS, CCSK and RS have the same number of

information bits in a symbol, so (8) is directly applied to (11).

In PCCSK, the following equation (12) has to be multiplied

by (8) to adjust the scale of information bits for RS where

m = log2(n+ 1).

2α−1

2α − 1· 2

m − 1

2m−1(12)

Fig. 6 shows the performance of the RS and PCCSK pairs.

We can observe a performance enhancement when the adaptive

coding is applied to PCCSK. In non-adaptive coding cases, the

required Ec/N0s differ by 3 dB between adjacent partitions

at PS = 10−5. In the adaptive coding cases, however, the

difference between the Ec/N0s is less than 2 dB. Thus, we

can conclude that adaptive coding alleviates the performance

degradation caused by the decrease in processing gain in

PCCSK. In the following section, we use cases 4 to 6 to derive

simulation results.

IV. SIMULATION RESULTS

We evaluated the performance of the proposed algorithm

in JTIDS. The major simulation parameters are described in

Table III. The number of transmission channels is 51, and 3

MHz bandwidth is allocated to each channel. The propagation

channel is characterized by a two-ray model.

First, we compare the proposed scheme with LET-type

waveforms. LET uses the concatenated code of RS and convol-

utional code for a higher data rate. The bit error rate for both

PCCSK and LET is shown in Fig. 7. Code rates of 1/3 and

1/2 are selected for convolutional codes whose constrained

lengths are l = 8 and l = 9, respectively. These convolutional

codes are decoded by Viterbis algorithm with hard decisions.

The performance of the LET-type waveforms is dominated by

the convolutional code rate. In this simulation environment, we

can see that the PCCSK outperforms LET-type waveforms.

Fig. 7. Bit error rate for PCCSK and LET-type waveforms withNakagami(μ = 2) fading channel

Second, we derived the transmission range of JTIDS with

and without jamming to identify the limitation of PCCSK. In

contrast to the numerical results with additive white Gaussian

noise (AWGN) of III-B, we made an effort to reflect a practical

environment in our simulation. We assume that the altitude of

aircraft using JTIDS is 7 km. For the multi-path model, we

consider line-of-sight (LOS) signal and the reflected signal

from the ground. The second ray to arrive via reflection

experiences more attenuation and delay, and both rays undergo

path loss with Nakagami fading (μ = 2) where μ is the

fading figure. In addition, the double-pulse was applied to

the non-jamming and jamming environments using equal gain

combining (EGC) and selection combining (SC), respectively.

In JTIDS, the message error rate is a standard for evaluating

the communication performance, and an error rate of less

than 1 % is necessary to guarantee the communication. Under

this environment, Fig. 8 shows the transmission range of

the proposed PCCSK waveforms without jamming. We can

see that the error performance curve differs from the Ec/N0

graph because the scale of the horizontal axis is different.

Over the distance scale, the received signal power degraded

TABLE IIISIMULATION PARAMETERS

Parameters Values

Center frequency 969-1206MHz

Bandwidth 3MHz

No. of channels 51

Transmission power 200W

Diversity combining EGC and SC

Spreading code MMLS and CP

Total spreading code length (M ) 32

Channel model Two-ray model

Fading Nakagami fading (μ = 2)

Detection Non coherent detection

Page 6: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Partitioned

Fig. 8. Message error rate for PCCSK with adaptive coding

by the square of the distance. From the graph, we see that

the conventional JTIDS waveform outperforms PCCSK with

regard to transmission range, but if we consider the practical

LOS communication range, other waveforms can perform well

in some limited circumstances. Using the results from Fig. 8,

we can anticipate the transmission range of each waveform.

JTIDS terminals exchange positioning reports with each other,

so we can choose appropriate waveforms.

Fig. 9 shows the anti-jamming performance of the proposed

scheme. In this graph, the jammer position is set to be 500 km

from the receiving node. We can see that the error performance

is slightly degraded by the jammer, and when the position

of the transmitter node is farther from the receiver than the

jammer, the degree of attenuation is greater. However, when

the jammer is farther from the receiver than the transmitter,

the received jamming signal is lower than the received trans-

mission signal, so the performance degradation is very small.

By default, JTIDS has a large number of frequency hopping

channels to secure communication, so even if the waveform

changes, a certain level of anti-jamming performance will be

maintained.

V. CONCLUSION

In this paper, we have described an anti-jamming and

LPI/LPD communication technique known as CCSK, which

uses cyclic shifts of a base sequence to modulate a carrier. This

exhibits excellent anti-jamming and LPI/LPD performance, but

has a limited spectral efficiency. Therefore, we proposed an

approach that increases the transmission data rate adaptively,

within a limited transmission range, in the battlefield. In the

proposed scheme, we constructed a spreading code as a set of

partitioned sub-spreading codes. These were applied to CCSK

modulation and spread data symbols based on user require-

ments. By exploiting a new code set as a spreading code, the

system was easily able to achieve a higher spectral efficiency.

We also compared the error rate performance between variable

RS and PCCSK pairs, and derived the appropriate code pairs

and their transmission ranges.

Fig. 9. Message error rate for PCCSK with adaptive coding under jam-mer(1000W, 500km, 20 jamming channels)

ACKNOWLEDGMENT

“This research was supported by the MKE(The Ministry

of Knowledge Economy), Korea, under the ITRC(Information

Technology Research Center) support program supervised by

the NIPA(National IT Industry Promotion Agency” (NIPA-

2012-(H0301-12-2003))

REFERENCES

[1] D. Dusseau and C. Brock, “Network centric interoperability - using avariable message format (vmf) based data-link to improve situationalawareness and close air support (cas),” IEEE Aerospace and ElectronicSystems Magazine, vol. 19, no. 9, pp. 8–13, 2004.

[2] N. Friedman, Naval Institute Guide to World Naval Weapon Systems,5th ed. United States Naval Institute Press, May 2006.

[3] H. Wang, J. Kuang, Z. Wang, and H. Xu, “Transmission performanceevaluation of jtids,” in Proc. IEEE Military Communications Conf.MILCOM 2005, 2005, pp. 2264–2268.

[4] K. K. Cham and R. C. Robertson, “Performance analysis of an alterna-tive link-16/jtids waveform transmitted over a channel with pulse-noiseinterference,” in Proc. IEEE Military Communications Conf. MILCOM2008, 2008, pp. 1–7.

[5] J. Asenstorfer, T. Cox, and D. Wilksch, “Tactical data link systemsand the australian defence force (adf) - technology developments andinteroperability issues,” Defence Science and Technology Organization(DSTO), Tech. Rep., Feb. 2004.

[6] C. W. Stinson, “Internet protocol (ip) over link-16,” Master’s thesis, AirForce Institute of Technology - Graduate School of Engineering andManagement, 2003.

[7] C.-H. Kao, C. Robertson, and K. Lin, “Performance analysis andsimulation of cyclic code-shift keying,” in Proc. IEEE Military Com-munications Conf. MILCOM 2008, 2008, pp. 1–6.

[8] G. M. Dillard, M. Reuter, J. Zeiddler, and B. Zeidler, “Cyclic codeshift keying: a low probability of intercept communication technique,”vol. 39, no. 3, pp. 786–798, 2003.

[9] TADIL J: Introduction to Tactical Digital Information Link J and QuickReference Guide, Air Land Sea Application Center, June 2000.

[10] Understanding Link-16: A Guidebook for New Users, Northrop Grum-man Corporation, San Diego, Sep. 2001.

[11] J. G. Proakis, Digital Communications, 4th ed. New York: Mc GrawHill, 2001.