Chaotic Secure Communication Based on Synchronization Control of Chaotic Pilot Signal

Author(s):  
Honghui Lai ◽  
Ying Huang
2013 ◽  
Vol 462-463 ◽  
pp. 706-711
Author(s):  
Guo Hua Li

Analyzing the problem of the existed chaotic masking secure communication, given a new chaotic communication method with the separation between chaos synchronization control signal and chaos modulated signal. A chaotic pilot signal is used independently to synchronize the chaos of the communication transceiver, it is a better solution for the original chaotic communication systems in which the information signal is much smaller than the chaotic modulation signal and anti-noise performance is poor. The circuit simulation based on Sprott system I was built to verify the new method of chaotic communication. Simulation results show that it is more flexible to achieve synchronization between communication terminals, more accurate for chaos synchronization, high performance of anti-noise, and the strength of the information signal is no affected by the chaotic signal.


2014 ◽  
Vol 2014 ◽  
pp. 1-5 ◽  
Author(s):  
Dongming Chen ◽  
Xinyu Huang ◽  
Tao Ren

Aiming at the abrupt faults of the chaotic system, an adaptive observer is proposed to trace the states of the master system. The sufficient conditions for synchronization of such chaotic systems are also derived. Then the feasibility and effectiveness of the proposed method are illustrated via numerical simulations of chaotic Chen system. Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.


Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2006 ◽  
Vol 16 (02) ◽  
pp. 419-425 ◽  
Author(s):  
MAO-YIN CHEN ◽  
DONG-HUA ZHOU ◽  
YUN SHANG

This Letter considers the problem of chaotic secure communication in the drive-response framework. The drive system can be augmented into a higher order system, and then a sliding mode observer based response system can be constructed to synchronize this augmented system. If they satisfy certain conditions, the hidden message can be recovered directly by the concept of equivalent control. Theoretical analysis and numerical simulation verify the effectiveness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document