2017 ◽  
Vol 27 (08) ◽  
pp. 1750130 ◽  
Author(s):  
Xiong Wang ◽  
Akif Akgul ◽  
Serdar Cicek ◽  
Viet-Thanh Pham ◽  
Duy Vo Hoang

Recent evidence suggests that a system with only stable equilibria can generate chaotic behavior. In this work, we study a chaotic system with two stable equilibrium points. The dynamics of the system is investigated via phase portrait, bifurcation diagram and Lyapunov exponents. The feasibility of the system is introducing its electronic realization. Moreover, the chaotic system is used in Symmetric Chaos Shift Keying (SCSK) and Chaotic ON-OFF Keying (COOK) modulated communication designs for secure communication. It is determined that the SCSK modulated communication system implemented with the chaotic system is more successful than COOK modulation for secure communication.


2021 ◽  
Vol 1764 (1) ◽  
pp. 012205
Author(s):  
Volodymyr Rusyn ◽  
Mujiarto ◽  
Mustafa Mamat ◽  
Firmansyah Azharul ◽  
W. S. Mada Sanjaya ◽  
...  

2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Eunro Kim ◽  
Inseok Yang ◽  
Dongik Lee

The time-delay robust nonlinear dynamic inversion (TDRNDI) control technique is proposed to synchronize time-delay Chen systems. The time-delay Chen circuit is simple but exhibits complex irregular (chaotic) behavior. For this reason, this circuit can be efficiently used to encrypt messages for secure communication. In this paper, the nonlinear control-based chaos synchronization problem is considered. The proposed TDRNDI controller is a modified version of a robust nonlinear dynamic inversion (RNDI) applicable to chaotic systems, including time-delay systems. The performance and feasibility of the proposed TDRNDI controller are demonstrated by conducting numerical simulations with application to a secure communication network.


2015 ◽  
Vol 9 ◽  
pp. 545-557 ◽  
Author(s):  
Aceng Sambas ◽  
Mustafa Mamat ◽  
Mada Sanjaya W.S. ◽  
Zabidin Salleh ◽  
Fatma Susilawati Mohamad

2017 ◽  
Vol 27 (04) ◽  
pp. 1850057 ◽  
Author(s):  
Uğur Erkin Kocamaz ◽  
Serdar Çiçek ◽  
Yılmaz Uyaroğlu

This work deals with the passive control-based chaos synchronization with circuit design for secure communication. First, the numerical simulation and electronic circuit design of a simple five-term chaotic system are performed. The numerical simulation and electronic circuit design outputs have confirmed each other. Then, the passive control method is applied for synchronizing two identical five-term chaotic systems using only one state control signal. After the synchronization study, design and analysis for secure communication by chaotic masking method are conducted in Matlab–Simulink platform. Finally, an electronic circuit design is performed for the designed communication system. In the designed communication system with Matlab–Simulink platform and electronic circuit design, information signal which is sent from the transmitter unit is successfully retrieved at the receiver unit. As a result, the electronic circuit design has shown that a single state passivity-based synchronization signal can be effectively used for secure data communication applications for the real environment.


2015 ◽  
Vol 76 (1) ◽  
Author(s):  
Fawad Salam Khan ◽  
Talha Naqash ◽  
Muhammad Ibrar Khatak ◽  
Raja Masood Larik

Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. Effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. Usage of licensed spectrum is increasing day by day so Cognitive Radio is proposed as a solution to meet the demands. CR is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. In this paper, we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. Anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. The conceivable results incorporate coordinating the benefits of spread range balance, utilizing encryption calculations (Encryption keys), and its possibility to switch over different recurrence groups. We concentrate on the different requisitions of CR and the various philosophies which empower a safe Communication system. 


Sign in / Sign up

Export Citation Format

Share Document