scholarly journals Analysis of a Chaotic System with Line Equilibrium and Its Application to Secure Communications Using a Descriptor Observer

Technologies ◽  
2019 ◽  
Vol 7 (4) ◽  
pp. 76 ◽  
Author(s):  
Lazaros Moysis ◽  
Christos Volos ◽  
Viet-Thanh Pham ◽  
Sotirios Goudos ◽  
Ioannis Stouboulos ◽  
...  

In this work a novel chaotic system with a line equilibrium is presented. First, a dynamical analysis on the system is performed, by computing its bifurcation diagram, continuation diagram, phase portraits and Lyapunov exponents. Then, the system is applied to the problem of secure communication. We assume that the transmitted signal is an additional state. For this reason, the nonlinear system is rewritten in a rectangular descriptor form and then an observer is constructed for achieving synchronization and input reconstruction. If we assume some rank conditions (on the nonlinearities and the solvability of a linear matrix inequality (LMI)) on the system matrices then the observer synchronization can be feasible. We evaluate and demonstrate our approach with specific numerical results.

2021 ◽  
pp. 107754632098773
Author(s):  
Pushali Trikha ◽  
Lone S Jahanzaib ◽  
Nasreen ◽  
Dumitru Baleanu

This study introduces a novel 3-D fractional chaotic system with two quadratic terms and no equilibrium point. Thorough dynamical analysis of the introduced system is done studying Lyapunov dynamics with respect to fractional order and parameter value, Kaplan–Yorke dimension, bifurcation analysis, phase portraits, existence, and uniqueness of solution, dissipative and symmetric character, etc. The novel system is anti-synchronized using the novel technique ‘triple compound combination’ considering uncertainties and disturbances on a parallel system by two methods—nonlinear and adaptive sliding mode control. A proposed application of achieved synchronization in secure communication is presented. A comparative study of obtained results with published literature is also presented.


Author(s):  
Namrata Biswas ◽  
Raja Mohamed I

Abstract In this paper, a new chaotic system has been introduced and the fundamental properties of the system were investigated and presented using a bifurcation diagram, max Lyapunov exponent (LE) and phase portraits. The synchronization of the drive and response system has been done using the threshold control parameter. Later the differential chaos shift keying (DCSK) modulation scheme has been carried out for the system as it is the most efficient modulation scheme. The demodulator detects the data without the use of chaotic signal phase recovery, as it uses the non-coherent detection technique. The results were compared with other modulation schemes using the bit error rate (BER) graph. It reveals that the proposed chaos-based system could be used for secure communication. The system has been implemented using the MATLAB Simulink technique.


1995 ◽  
Vol 05 (01) ◽  
pp. 297-302 ◽  
Author(s):  
JÖRG SCHWEIZER ◽  
MICHAEL PETER KENNEDY ◽  
MARTIN HASLER ◽  
HERVÉ DEDIEU

Since Pecora & Carroll [Pecora & Carroll, 1991; Carroll & Pecora, 1991] have shown that it is possible to synchronize chaotic systems by means of a drive-response partition of the systems, various authors have proposed synchronization schemes and possible secure communications applications [Dedieu et al., 1993, Oppenheim et al., 1992]. In most cases synchronization is proven by numerically computing the conditional Lyapunov exponents of the response system. In this work a new synchronization method using error-feedback is developed, where synchronization is provable using a global Lyapunov function. Furthermore, it is shown how this scheme can be applied to secure communication systems.


Author(s):  
Aceng Sambas ◽  
Mustafa Mamat ◽  
Ayman Ali Arafa ◽  
Gamal M Mahmoud ◽  
Mohamad Afendee Mohamed ◽  
...  

<p>A new chaotic system with line equilibrium is introduced in this paper. This system consists of five terms with two transcendental nonlinearities and two quadratic nonlinearities. Various tools of dynamical system such as phase portraits, Lyapunov exponents, Kaplan-Yorke dimension, bifurcation diagram and Poincarè map are used. It is interesting that this system has a line of fixed points and can display chaotic attractors. Next, this paper discusses control using passive control method. One example is given to insure the theoretical analysis. Finally, for the  new chaotic system, An electronic circuit for realizing the chaotic system has been implemented. The numerical simulation by using MATLAB 2010 and implementation of circuit simulations by using MultiSIM 10.0 have been performed in this study.</p>


Author(s):  
Qiang Lai ◽  
Ziling Wang ◽  
Paul Didier Kamdem Kuate

This paper proposes an interesting autonomous chaotic system with hidden attractors and coexisting attractors. The system has no equilibrium, one equilibrium, three equilibria and line equilibria for different parameter regions. The existence of hidden attractors and coexisting attractors of the system has been revealed by using simulation analysis. The bifurcation diagram shows the period-doubling bifurcation route to chaos with the variation of parameters. The analog circuit and FPGA implementation of the system are presented. The synchronization for secure communication of the system is investigated. The synchronization conditions are established by using the adaptive control method.


Telecom ◽  
2020 ◽  
Vol 1 (3) ◽  
pp. 283-296
Author(s):  
Lazaros Moysis ◽  
Christos Volos ◽  
Ioannis Stouboulos ◽  
Sotirios Goudos ◽  
Serdar Çiçek ◽  
...  

In this study, a novel two-parameter, three-dimensional chaotic system is constructed. The system has no linear terms and its equilibrium is a line, so it is a system with hidden attractors. The system is first studied by computation of its bifurcation diagrams and diagram of Lyapunov exponents. Then, the system is applied to two encryption related problems. First, the problem of secure communications is considered, using the symmetric chaos shift keying modulation method. Here, the states of the chaotic system are combined with a binary information signal in order to mask it, safely transmit it through a communication channel, and successfully reconstruct the information at the receiver end. In the second problem, the states of the system are utilized to design a simple rule to generate a bit sequence that possesses random properties, and is thus suitable for encryption related applications. For both applications, simulations are performed through Matlab to verify the soundness of the designs.


2019 ◽  
Vol 1179 ◽  
pp. 012086
Author(s):  
E Tlelo-Cuautle ◽  
A Sambas ◽  
S Vaidyanathan ◽  
Sen Zhang ◽  
Mujiarto ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document