scholarly journals An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Mauricio Zapateiro De la Hoz ◽  
Leonardo Acho ◽  
Yolanda Vidal

Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

2009 ◽  
Vol 10 (1) ◽  
pp. 21-27
Author(s):  
Isaac Campos-Cantón ◽  
◽  
Eric Campos-Cantón ◽  
José Salomé Murguía-Ibarra ◽  
Mayra Elizabeth Chavira-Rodríguez ◽  
...  

2000 ◽  
Vol 10 (02) ◽  
pp. 345-357 ◽  
Author(s):  
TAO YANG ◽  
LEON O. CHUA

A chaotic impulse radio system is an ultrawide-band communication system that uses a train of very narrow baseband impulses as a carrier. In the transmitter of a chaotic impulse radio system, a message signal is modulated by two kinds of pulse carriers. Firstly, a frequency modulation is used to modulate the message signal into a subcarrier that functions as the clock pulses of a chaotic circuit. Driven by the modulated clock pulses, the chaotic circuit outputs a chaotic impulse positioning sequence which generates the positions of the carrier impulses. The specially designed chaotic circuit in the transmitter guarantees that the time intervals between the carrier impulses are chaotic. Thus the energy of the impulse carrier is distributed evenly over the entire bandwidth. In the receiver of a chaotic impulse radio system the message signal is demodulated in two stages. At the first stage, the time interval between two consecutive impulses is recovered. At the second stage, a simple algorithm based on the knowledge of the chaotic circuit in the transmitter is used to calculate partially the locations of the inner clock pulses which in turn are used to demodulate the message signal. No synchronization at any level is needed in this chaotic impulse radio system. The security of this chaotic impulse radio system depends on the hardware parameters of the chaotic circuit and the inner clock pulse train. Simulation results are presented to illustrate the design procedure of an example of this chaotic impulse radio system.


Significant research efforts have been invested in recent years to export new concepts for secure cryptographic methods. Many mathematicians are attracted by Chaos functions as it has sensitive nature toward its initial conditions and their colossal suitability to problems in daily life. Inspired by new researches, a new chaotic cryptography algorithm is proposed in this paper. The key feature of this approach is that instantaneous key is generated at host independently that is used to determine the type of operations on each pixel. The information available in images is 24 bit RGB these value are modified mathematically using eight reversible operations. Also during encryption, the control parameter of the chaotic system is updated timely.


2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
Amir Anees ◽  
Iqtadar Hussain ◽  
Abdulmohsen Algarni ◽  
Muhammad Aslam

The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial conditions, and randomness tests. Furthermore, with the detailed analysis of initial parameters, it is justified that Extended Logistic map can be used in secure communication, particularly watermarking. Fourth, to check the robustness of proposed watermarking scheme, we have done a series of analyses and standard attacks. The results confirm that the proposed watermarking scheme is robust against visual and statistical analysis and can resist the standard attacks.


2019 ◽  
Vol 9 (1) ◽  
pp. 185 ◽  
Author(s):  
Teh-Lu Liao ◽  
Pei-Yen Wan ◽  
Jun-Juh Yan

This paper is concerned with the design of synchronized large-scale chaos random number generators (CRNGs) and its application to secure communication. In order to increase the diversity of chaotic signals, we firstly introduce additional modulation parameters in the original chaotic Duffing map system to modulate the amplitude and DC offset of the chaotic states. Then according to the butterfly effect, we implement modulated Duffing map systems with different initial values by using the microcontroller and complete the design of large-scale CRNGs. Next, a discrete sliding mode scheme is proposed to solve the synchronization problem of the master-slave large-scale CRNGs. Finally, we integrate the aforementioned results to implement an innovative secure communication system.


2013 ◽  
Vol 311 ◽  
pp. 99-104 ◽  
Author(s):  
Yi Te Chiang ◽  
He Sheng Wang ◽  
Yung Nien Wang

In this paper, we propose a novel method to generate pseudo-random-noise (PRN) bits for navigation applications. In the present method, the code sequence generator is constructed based on two chaotic logistic maps running parallel and starting from independent initial conditions. The logistic map is a simple mathematical model that shows bewildering complex behavior. By appro-priately setting the initial conditions, the PRN sequence is then generated by comparing the outputs of both logistic maps. Several simulations are set up to verify the correlation properties of the pseudo-random bit generator (PRBG). The result shows that the code sequences generated by the proposed PRBG have great auto- and cross-correlation properties, which are very similar to the PRN sequences used by GPS navigation system. The RPBG sequences are therefore suitable for signal ranging that is used comprehensively in the navigation system. On the other hand, the chaotic nature of the proposed PRBG codes can provide more secure communication than the traditional PRN sequences. The proposed PRN sequences are well suitable to be incorporated with the so-called chaotic shift keying (CSK) modulation.


Author(s):  
H-K Chen ◽  
T-N Lin

A simple satellite is a symmetric gyro. Satellites are used for communications, weather forecasts, surveying and in several other scientific and military applications. In particular, for military use secure communications are very important. As chaotic signals are usually broadband and noise like, synchronized chaotic systems can be used as cipher generators for secure communication. This paper presents chaos synchronization of two identical chaotic motions of symmetric gyros. It has been demonstrated that applying four different kinds of one-way coupling conditions can synchronize two identical chaotic systems. The sign of the sub-Liapunov exponent has been used as an indicator for the occurrence of chaos synchronization. It has also been found that when chaos synchronization occurs the positive major sub-Liapunov exponent transverses the zero value and becomes negative for the last time. Chaos synchronization can also be shown by phase trajectory. In addition, synchronization time is also examined. Furthermore, it has been found that different distances of the initial conditions between the master system and slave system do not affect the occurrence of chaos synchronization.


Sign in / Sign up

Export Citation Format

Share Document