Electronic circuit realization and synchronization application of Sprott 94 S chaotic system for secure communication systems

Author(s):  
I. Koyuncu ◽  
M. Alcin ◽  
I. Pehlivan
1995 ◽  
Vol 05 (01) ◽  
pp. 297-302 ◽  
Author(s):  
JÖRG SCHWEIZER ◽  
MICHAEL PETER KENNEDY ◽  
MARTIN HASLER ◽  
HERVÉ DEDIEU

Since Pecora & Carroll [Pecora & Carroll, 1991; Carroll & Pecora, 1991] have shown that it is possible to synchronize chaotic systems by means of a drive-response partition of the systems, various authors have proposed synchronization schemes and possible secure communications applications [Dedieu et al., 1993, Oppenheim et al., 1992]. In most cases synchronization is proven by numerically computing the conditional Lyapunov exponents of the response system. In this work a new synchronization method using error-feedback is developed, where synchronization is provable using a global Lyapunov function. Furthermore, it is shown how this scheme can be applied to secure communication systems.


Mathematics ◽  
2021 ◽  
Vol 9 (20) ◽  
pp. 2593
Author(s):  
Zain-Aldeen S. A. Rahman ◽  
Basil H. Jasim ◽  
Yasir I. A. Al-Yasir ◽  
Yim-Fun Hu ◽  
Raed A. Abd-Alhameed ◽  
...  

This article presents a novel four-dimensional autonomous fractional-order chaotic system (FOCS) with multi-nonlinearity terms. Several dynamics, such as the chaotic attractors, equilibrium points, fractal dimension, Lyapunov exponent, and bifurcation diagrams of this new FOCS, are studied analytically and numerically. Adaptive control laws are derived based on Lyapunov theory to achieve chaos synchronization between two identical new FOCSs with an uncertain parameter. For these two identical FOCSs, one represents the master and the other is the slave. The uncertain parameter in the slave side was estimated corresponding to the equivalent master parameter. Next, this FOCS and its synchronization were realized by a feasible electronic circuit and tested using Multisim software. In addition, a microcontroller (Arduino Due) was used to implement the suggested system and the developed synchronization technique to demonstrate its digital applicability in real-world applications. Furthermore, based on the developed synchronization mechanism, a secure communication scheme was constructed. Finally, the security analysis metric tests were investigated through histograms and spectrograms analysis to confirm the security strength of the employed communication system. Numerical simulations demonstrate the validity and possibility of using this new FOCS in high-level security communication systems. Furthermore, the secure communication system is highly resistant to pirate attacks. A good agreement between simulation and experimental results is obtained, showing that the new FOCS can be used in real-world applications.


2018 ◽  
Vol 7 (3) ◽  
pp. 1245 ◽  
Author(s):  
Aceng Sambas ◽  
Mustafa Mamat ◽  
Sundarapandian Vaidyanathan ◽  
Muhammad Mohamed ◽  
Mada Sanjaya

In the chaos literature, there is currently significant interest in the discovery of new chaotic systems with hidden chaotic attractors. A new 4-D chaotic system with only two quadratic nonlinearities is investigated in this work. First, we derive a no-equilibrium chaotic system and show that the new chaotic system exhibits hidden attractor. Properties of the new chaotic system are analyzed by means of phase portraits, Lyapunov chaos exponents, and Kaplan-Yorke dimension. Then an electronic circuit realization is shown to validate the chaotic behavior of the new 4-D chaotic system. Finally, the physical circuit experimental results of the 4-D chaotic system show agreement with numerical simulations.


2008 ◽  
Vol 18 (11) ◽  
pp. 3325-3339 ◽  
Author(s):  
SHIH-LIANG CHEN ◽  
SHU-MING CHANG ◽  
WEN-WEI LIN ◽  
TINGTING HWANG

In this paper, we propose a robust hyper-chaotic system that is suitable for digital secure-communication. The system consists of many coupled robust logistic maps that form a hyper-chaotic system. It has a higher degree of complexity than traditional discrete-time secure-communication systems that use only a single map. Moreover, the system has a very large parameter space which grows along with system precision. Hence, attacking the system by the method of map reconstruction in current computation technology is not feasible. Statistical analysis shows that the system achieves very high security level. Finally, two hardware architectures (multiple-cycle and pipelined) are proposed for area and performance optimization, respectively.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Xikui Hu ◽  
Ping Zhou

In this paper, a 3D multistability chaotic system with two coexisting conditional symmetric attractors is studied by using a circuit block diagram and realized by using an electronic circuit. The simulation results show that two coexisting conditional symmetric attractors are emerged in this electronic circuit. Furthermore, synchronization of this 3D multistability chaotic system and its electronic circuit is studied. It shows that linear resistor and linear capacitor in parallel coupling can achieve synchronization in this chaotic electronic circuit. That is, the output voltage of chaotic electronic circuit is coupled via one linear resistor and one linear capacitor in parallel coupling. The simulation results verify that synchronization of the chaotic electronic circuit can be achieved.


2013 ◽  
Vol 22 (04) ◽  
pp. 1350022 ◽  
Author(s):  
SERDAR ÇİÇEK ◽  
YILMAZ UYAROĞLU ◽  
İHSAN PEHLİVAN

Nowadays, many simulations, implementations, synchronization and secure communication applications of chaotic circuits have been introduced in literature. However, electronics circuit design and implementation of nonlinear Sprott Case H chaotic system and its synchronization were not found in the literature. In this paper, numerical model, electronics circuit simulation and implementation electronics circuits of the Sprott Case H chaotic system and its synchronization by the method of Pecora and Carroll (P–C) complete replacement (CR) were performed. The simulation and implementation results showed that the Sprott Case H chaotic system can be synchronized and thus can be used for secure communication and encryption applications.


2017 ◽  
Vol 27 (08) ◽  
pp. 1750130 ◽  
Author(s):  
Xiong Wang ◽  
Akif Akgul ◽  
Serdar Cicek ◽  
Viet-Thanh Pham ◽  
Duy Vo Hoang

Recent evidence suggests that a system with only stable equilibria can generate chaotic behavior. In this work, we study a chaotic system with two stable equilibrium points. The dynamics of the system is investigated via phase portrait, bifurcation diagram and Lyapunov exponents. The feasibility of the system is introducing its electronic realization. Moreover, the chaotic system is used in Symmetric Chaos Shift Keying (SCSK) and Chaotic ON-OFF Keying (COOK) modulated communication designs for secure communication. It is determined that the SCSK modulated communication system implemented with the chaotic system is more successful than COOK modulation for secure communication.


2018 ◽  
Vol 73 (6) ◽  
pp. 521-531 ◽  
Author(s):  
Metin Varan ◽  
Akif Akgül ◽  
Emre Güleryüz ◽  
Kasım Serbest

AbstractHartley chaotic system is topologically the simplest, but its dynamical behaviours are very rich and its synchronisation has not been seen in literature. This paper aims to introduce a simple chaotic system which can be used as alternative to classical chaotic systems in synchronisation fields. Time series, phase portraits, and bifurcation diagrams reveal the dynamics of the mentioned system. Chaotic Hartley model is also supported with electronic circuit model simulations. Its exponential dynamics are hard to realise on circuit model; this paper is the first in literature that handles such a complex modelling problem. Modelling, synchronisation, and circuit realisation of the Hartley system are implemented respectively in MATLAB-Simulink and ORCAD environments. The effectiveness of the applied synchronisation method is revealed via numerical methods, and the results are discussed. Retrieved results show that this complex chaotic system can be used in secure communication fields.


Sign in / Sign up

Export Citation Format

Share Document