scholarly journals Chaotic Secure Communication Systems with an Adaptive State Observer

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Wei-Der Chang ◽  
Shun-Peng Shih ◽  
Chih-Yung Chen

This paper develops a new digital communication scheme based on using a unified chaotic system and an adaptive state observer. The proposed communication system basically consists of five important elements: signal modulation, chaotic encryption, adaptive state observer, chaotic decryption, and signal demodulation. A sequence of digital signals will be delivered from the transmitter to the receiver through a public channel. It is rather reasonable that if the number of signals delivered on the public channel is fewer, then the security of such communication system is more guaranteed. Therefore, in order to achieve this purpose, a state observer will be designed and its function is to estimate full system states only by using the system output signals. In this way, the signals delivered on the public channel can be reduced mostly. According to these estimated state signals, the original digital sequences are then retrieved completely. Finally, experiment results are provided to verify the applicability of the proposed communication system.

2013 ◽  
Vol 27 (31) ◽  
pp. 1350201
Author(s):  
XING-YUAN WANG ◽  
BING XU ◽  
YUTIAN MA

Aiming at the drawbacks of the chaotic masking scheme, this paper optimizes this conventional scheme by using improved state observer method and system-alternating method, proposes a new secure communication scheme which can improve these drawbacks of chaotic method: (1) Restriction that the power of useful signal must be smaller than that of chaotic signal. (2) Low security. In addition, the model of this whole communication system is constructed under the system simulation environment of Simulink.


2003 ◽  
Vol 13 (06) ◽  
pp. 1599-1608 ◽  
Author(s):  
Chao Tao ◽  
Gonghuan Du ◽  
Yu Zhang

In this paper, we propose a new approach to breaking down chaotic communication scheme by attacking its encryption keys. A remarkable advancement is that it can decode the hidden message exactly. This makes it become possible to break down some cascaded chaotic communication systems. We also decode digital information from the cascaded heterogeneous chaotic communication system and give the simulation results.


Mathematics ◽  
2021 ◽  
Vol 9 (20) ◽  
pp. 2593
Author(s):  
Zain-Aldeen S. A. Rahman ◽  
Basil H. Jasim ◽  
Yasir I. A. Al-Yasir ◽  
Yim-Fun Hu ◽  
Raed A. Abd-Alhameed ◽  
...  

This article presents a novel four-dimensional autonomous fractional-order chaotic system (FOCS) with multi-nonlinearity terms. Several dynamics, such as the chaotic attractors, equilibrium points, fractal dimension, Lyapunov exponent, and bifurcation diagrams of this new FOCS, are studied analytically and numerically. Adaptive control laws are derived based on Lyapunov theory to achieve chaos synchronization between two identical new FOCSs with an uncertain parameter. For these two identical FOCSs, one represents the master and the other is the slave. The uncertain parameter in the slave side was estimated corresponding to the equivalent master parameter. Next, this FOCS and its synchronization were realized by a feasible electronic circuit and tested using Multisim software. In addition, a microcontroller (Arduino Due) was used to implement the suggested system and the developed synchronization technique to demonstrate its digital applicability in real-world applications. Furthermore, based on the developed synchronization mechanism, a secure communication scheme was constructed. Finally, the security analysis metric tests were investigated through histograms and spectrograms analysis to confirm the security strength of the employed communication system. Numerical simulations demonstrate the validity and possibility of using this new FOCS in high-level security communication systems. Furthermore, the secure communication system is highly resistant to pirate attacks. A good agreement between simulation and experimental results is obtained, showing that the new FOCS can be used in real-world applications.


2015 ◽  
Vol 25 (10) ◽  
pp. 1550134 ◽  
Author(s):  
A. S. Karavaev ◽  
D. D. Kulminskiy ◽  
V. I. Ponomarenko ◽  
M. D. Prokhorov

We develop an experimental secure communication system with chaotic switching. The proposed scheme is based on time-delayed feedback oscillator with switching of chaotic regimes. The scheme shows high tolerance to external noise and amplitude distortions of the signal in a communication channel.


1993 ◽  
Vol 2 (4) ◽  
pp. 339-350 ◽  
Author(s):  
Friedhelm Neidhardt

The public can be considered as a communication field with three main actors: speakers, communicators, and the audience. The characteristics of these actors and the features of their interaction constitute the social infrastructure of public knowledge production. There is both theoretical reason and practical evidence to suggest that the mass media tend to construct science stories in terms of spectacular events, simple causes and unambiguous moral positions. These tendencies create some elementary problems where `science meets the public'. By `popularization' the distance between the communication systems of science and of the public can be reduced but not eliminated.


The security factor is one of the major concerns in today’s world. As security is the breath of communication, as much as we can make our communication system secure, the system will be more trustworthy and be more restricted to snap as well as can save guard from the unauthorized attempt. Either symmetric or asymmetric encryption was used in the earlier method to ensure data security. However, any of them alone makes the system either unsecured or time-consuming. In our thesis work, we have used both the techniques together to make the system as much as reliable and also to make it faster using the hybridization of asymmetric RSA encryption and symmetric modified vigenere technique. This hybridization method sends the vigenere table as an encrypted string using an asymmetric process with the collaboration of the RSA encryption algorithm where the string will be encrypted by the public key generated by the receiver. Later the string will be decrypted using the receiver’s private key. Therefore, we can claim that the extended vigenere method with the collaboration of RSA makes the overall communication more secure, stable, reliable, and faster.


2013 ◽  
Vol 68 (8-9) ◽  
pp. 573-580 ◽  
Author(s):  
Xing-Yuan Wang ◽  
Hao Zhang

This paper deals with the synchronization of spatiotemporal chaotic systems and presents a new robust secondary chaotic secure communication system for digital signal transmissions which can recover digital signal even though the transmitted signal is influenced by limited noise. The transmitter terminal and the receiver terminal both contain a spatiotemporal chaotic system and a hyperchaotic system. The asymptotic convergence of the errors between the states of the transmitter terminal and the receiver terminal has been proved based on the Lyapunov stable theory and active-passive decomposition (APD) method. Moreover, a random digital signal and a binary Lena image are encrypted and decrypted successfully to verify the efficiency of the proposed robust secure communication system.


2009 ◽  
Vol 19 (12) ◽  
pp. 4217-4226 ◽  
Author(s):  
R. TREJO-GUERRA ◽  
E. TLELO-CUAUTLE ◽  
C. CRUZ-HERNÁNDEZ ◽  
C. SÁNCHEZ–LÓPEZ

This work shows the experimental implementation of a chaotic communication system based on two Chua's oscillators which are synchronized by Hamiltonian forms and observer approach. The chaotic communication scheme is realized by using the commercially available positive-type second generation current conveyor (CCII+), which is included into the AD844 device. As a result, experimental measurements are provided to demonstrate the suitability of the CCII+ to implement chaotic communication systems.


Sign in / Sign up

Export Citation Format

Share Document