I. Introduction
A wireless communication system is easily attacked by malicious users for its inherent openness to natural environments and broadcast characteristics. To protect the system from being attacked, chaotic communication is a powerful encryption technique [1], thanks to the high-security properties of chaotic sequences [2] such as sensitivity of initial value, good auto-correlation, resistance to interference, pseudo randomness and ergodicity. Chaotic communication techniques are widely used in data transmission, including ultra-wide-band (UWB) [1], [3], power line communication (PLC) [4], and vehicle-to-vehicle (V2V) communication [5]. The chaotic sequences are used to modulate information bits, and this kind of techniques is referred to as chaotic modulation, which can be classified as coherent and non-coherent types. Their difference is that the former needs to regenerate the chaotic sequence at the receiver while this procedure is not required in the latter. Therefore, non-coherent modulation has less complexity than the coherent one, and has been widely discussed [6], [7].