scholarly journals Estimation of confidentiality of a communication system based on chaotic time-delay generator with switchable delay time

Author(s):  
Vladimir Ponomarenko ◽  
Elena Navrotskaya ◽  
Danil Kul’minskii ◽  
Mikhail Prokhorov

Introduction: Communication systems based on the use of dynamical chaos have a number of positive features. Dynamical chaoshas the properties of random processes, which allows systems based on it to ensure the information transmission confidentiality.However, a quantitative security assessment of such systems is a complicated problem, since the methods for evaluating cryptographicstrength are well developed only for the classical encryption algorithms. Purpose: Development of a method for quantitative estimationof confidentiality of a binary signal hidden transmission in a communication system based on a chaotic time-delay oscillator withswitchable delay time. Results: A method is proposed for estimating the confidentiality of a binary information signal transmissionin a communication system using a chaotic time-delay oscillator with switchable delay time as a transmitter. The method is based onestimating the power of the key space for the chaotic communication system under study. We have considered the cases when sometransmitter parameters are known, and the most general case when all the transmitter parameters are unknown. A communicationsystem based on dynamical chaos may have a much higher confidentiality than the classical cryptographic algorithm using a cipher witha key length of 56 bits, but is significantly inferior in terms of cryptographic strength to a cipher with a key length of 128 bits. Practicalrelevance: The proposed method allows us to obtain a quantitative estimation of confidentiality of communication systems based ondynamical chaos, and compare it with the known strength of classical cryptographic algorithms.

Author(s):  
Arsyad Ramadhan Darlis

In 1992, Wornell and Oppenheim did research on a modulation which is formed by using wavelet theory. In some other studies, proved that this modulation can survive on a few channels and has reliability in some applications. Because of this modulation using the concept of fractal, then it is called as fractalmodulation. Fractal modulation is formed by inserting information signal into fractal signals that are selffractal similary. This modulation technique has the potential to replace the OFDM (Orthogonal Frequency Division Multiplexing), which is currently used on some of the latest telecommunication technologies. The purpose of this research is to implement the fractal communication system using Digital Signal Processing Starter Kit (DSK) TMS320C6713 without using AWGN and Rayleigh channel in order to obtain the ideal performance of the system. From the simulation results using MATLAB7.4. it appears that this communication system has good performance on some channels than any other communication systems. While in terms of implementation by using (DSK) via TMS320C6713 Code Composer Studio (CCS), it can be concluded that thefractal communication system has a better execution time on some tests.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Meilian Li ◽  
Shah Nazir ◽  
Habib Ullah Khan ◽  
Sara Shahzad ◽  
Rohul Amin

Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes.


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Author(s):  
Kamal Hamid ◽  
Nadim Chahine

Wireless communications became one of the most widespread means for transferring information. Speed and reliability in transferring the piece of information are considered one of the most important requirements in communication systems in general. Moreover, Quality and reliability in any system are considered the most important criterion of the efficiency of this system in doing the task it is designed to do and its ability for satisfactory performance for a certain period of time, Therefore, we need fault tree analysis in these systems in order to determine how to detect an error or defect when happening in communication system and what are the possibilities that make this error happens. This research deals with studying TETRA system components, studying the physical layer in theory and practice, as well as studying fault tree analysis in this system, and later benefit from this study in proposing improvements to the structure of the system, which led to improve gain in Link Budget. A simulation and test have been done using MATLAB, where simulation results have shown that the built fault tree is able to detect the system’s work by 82.4%.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Iztok Dogsa ◽  
Mihael Spacapan ◽  
Anna Dragoš ◽  
Tjaša Danevčič ◽  
Žiga Pandur ◽  
...  

AbstractBacterial quorum sensing (QS) is based on signal molecules (SM), which increase in concentration with cell density. At critical SM concentration, a variety of adaptive genes sharply change their expression from basic level to maximum level. In general, this sharp transition, a hallmark of true QS, requires an SM dependent positive feedback loop, where SM enhances its own production. Some communication systems, like the peptide SM-based ComQXPA communication system of Bacillus subtilis, do not have this feedback loop and we do not understand how and if the sharp transition in gene expression is achieved. Based on experiments and mathematical modeling, we observed that the SM peptide ComX encodes the information about cell density, specific cell growth rate, and even oxygen concentration, which ensure power-law increase in SM production. This enables together with the cooperative response to SM (ComX) a sharp transition in gene expression level and this without the SM dependent feedback loop. Due to its ultra-sensitive nature, the ComQXPA can operate at SM concentrations that are 100–1000 times lower than typically found in other QS systems, thereby substantially reducing the total metabolic cost of otherwise expensive ComX peptide.


Biosensors ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 65
Author(s):  
Puneet Manocha ◽  
Gitanjali Chandwani

Molecular communication is a bioinspired communication that enables macro-scale, micro-scale and nano-scale devices to communicate with each other. The molecular communication system is prone to severe signal attenuation, dispersion and delay, which leads to performance degradation as the distance between two communicating devices increases. To mitigate these challenges, relays are used to establish reliable communication in microfluidic channels. Relay assisted molecular communication systems can also enable interconnection among various entities of the lab-on-chip for sharing information. Various relaying schemes have been proposed for reliable molecular communication systems, most of which lack practical feasibility. Thus, it is essential to design and develop relays that can be practically incorporated into the microfluidic channel. This paper presents a novel design of passive in-line relay for molecular communication system that can be easily embedded in the microfluidic channel and operate without external energy. Results show that geometric modification in the microfluidic channel can act as a relay and restore the degraded signal up-to 28%.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 696
Author(s):  
Satyanarayana P ◽  
Charishma Devi. V ◽  
Sowjanya P ◽  
Satish Babu ◽  
N Syam Kumar ◽  
...  

Machine learning (ML) has been broadly connected to the upper layers of communication systems for different purposes, for example, arrangement of cognitive radio and communication network. Nevertheless, its application to the physical layer is hindered by complex channel conditions and constrained learning capacity of regular ML algorithms. Deep learning (DL) has been as of late connected for some fields, for example, computer vision and normal dialect preparing, given its expressive limit and advantageous enhancement ability. This paper describes about a novel use of DL for the physical layer. By deciphering a communication system as an auto encoder, we build up an essential better approach to consider communication system outline as a conclusion to-end reproduction undertaking that tries to together enhance transmitter and receiver in a solitary procedure. This DL based technique demonstrates promising execution change than traditional communication system.  


2003 ◽  
Vol 13 (06) ◽  
pp. 1599-1608 ◽  
Author(s):  
Chao Tao ◽  
Gonghuan Du ◽  
Yu Zhang

In this paper, we propose a new approach to breaking down chaotic communication scheme by attacking its encryption keys. A remarkable advancement is that it can decode the hidden message exactly. This makes it become possible to break down some cascaded chaotic communication systems. We also decode digital information from the cascaded heterogeneous chaotic communication system and give the simulation results.


Sign in / Sign up

Export Citation Format

Share Document