Introduction

The power sector’s automation is also transforming transportation, telecommunications, healthcare, finance, and security. Critical Energy Infrastructures (CEI) are distributed rapidly, resulting in dynamic networks that need careful security and speedy recovery in order to prevent intrusions. To connect services reliably, an intelligent energy meter in an intelligent power grid system uses an unreliable connection. Because the information is exchanged through an open channel, an attacker may present a multitude of security risks. Important attempts have been made in this regard to address privacy and security problems in IoT applications, the majority of which have focused on conventional approaches. A broad range of security considerations (secrecy, reliability, and authorization) must be resolved to protect IoT systems from assault. Current implementations do not effectively solve the complete range of protection for IoT environments due to the peculiar features of IoT nodes. Despite the fact that a number of key agreement techniques have been illustrated so far, as seen in “Related work”, the bulk of existing approaches lack the necessary safety characteristics for IoT security. The aforementioned methods lead to the design of a stable key exchange policy which can satisfy a variety of safety standards while ignoring the safety vulnerabilities and shortcomings that presently plague IoT key swap over processes. As a consequence, for mutual key synchronization across multiple IoT devices, this paper proposes a 5D hyperchaotic or chaotic nonlinear complex system-based neural net. By sharing the input seed value through hyperchaotic or chaotic communication, an equivalent input vector for both neural networks can be created. Even though this proposed solution will control the length of the session key, it will still provide an acceptable security level for use in real-world applications.

Following are the motivations of this paper:

  1. 1.

    A 5D hyperchaotic or chaotic nonlinear complex system uses chaotic synchronization to help in the sharing of same confidential seed variables at both sides. The same seed variable is used to generate the same inputs for neuronal sync.

  2. 2.

    Man-In-The-Middle (MITM) assault protection and resiliency should be improved. As two networks’ messages are intercepted by an intruder or assailant. Since the hacker is impersonating the actual sender, it’s a risky assault. The perpetrator can fool the recipient into assuming they are transmitting a true message if they have the first grasp.

  3. 3.

    The development of a cryptographic keys interchange system is important. So rather than sending the whole sensitive session key over such a private medium, all communications systems may use coordination over a public channel to generate a key directly.

  4. 4.

    With security strengthening, a chaos-guided secure communication mechanism must be developed.

  5. 5.

    To improve confidentiality and effectiveness, a method for coordinating the neuro key exchange process must be developed.

This paper’s various contributions are summed up as follows:

  1. 1.

    To address the problems given by security vulnerabilities and apparent execution costs, the goal of this study is to clarify fundamental ideas and highlight methodologies for successful 5D hyperchaotic or chaotic nonlinear complex system-based neural network-guided safety—critical applications.

  2. 2.

    The seed value transmitted from sender to receiver through 5D hyperchaotic or chaotic nonlinear complex system. This identical seed value will be used for generating identical input vector for neural key exchange.

  3. 3.

    In this article, two schemes are considered for exchanging seed values for neural synchronization. One has all real variables and exhibits chaotic behavior, while the other has at least one complex variable and exhibits hyperchaotic behavior.

  4. 4.

    To share the typical seed value for neural key exchange, complete Complex Anti-Coordination (CAC) of two equivalent hyperchaotic or chaotic systems is proposed.

  5. 5.

    The fact that the master system’s state parameter synchronizes with the slave system’s state parameter provides strong data sharing protection. In prior sensitive communications investigations, this section had never been identified.

  6. 6.

    Previously, protective connection systems relied solely on one sort of coordination. In any event, there are two types of coordination systems presented in this work (CS and AS). As a result, data transfer security will be improved.

  7. 7.

    The suggested approach takes significantly less time to coordinate than current strategies for various learning rules.

  8. 8.

    The key exchange strategies described by Jeong et al. [12], Sarkar [31], Teodoro et al. [34], Dong and Huang [8] and Dolecki and Kozera [7] were investigated in the present study. This research focused on their weaknesses as well. To overcome the relevant problems, this article gives a TLTPM coordinating key agreement technique that results in a secret key with a flexible size.

  9. 9.

    The secret key is created dynamically by sharing just few variables over the public medium using the neural coordination protocol at both ends, rather than being sent individually to the other system.

The rest of the article is broken down into six sections. “Related work” provides insight into related work. In “Proposed methodology”, the proposed approach is discussed. The results and interpretation are presented in “Results and analysis”. Conclusions and future scope are found in “Conclusion and future scope”.

Table 1 Strengths and constraints of cutting-edge techniques

Related work

Atan et al. [3] has proposed to develop a fuzzy set control scheme for synchronizing two non-identical hyperchaotic processes. To increase the performance of the system, fuzzy logic-based regulators are combined with strong control strategies such as sliding mode controls. The IFSMC regulator created by combining SMC and fuzzy logic-based IFLC was intended for hyperchaotic systems to take use of SMC and fuzzy logic-based IFLC. The goal of the work proposed by Tunç et al. [35] is to look at a few of the characteristics of FrRIDEs with Caputo fractional differential equations, which are nonlinear fractions delayed Volterra integro-differential equations. The reported results are also supported by the use of the Lyapunov–Razumikhin technique and the definition of an adequate Lyapunov function (LRM). Despite the fact that chaos dynamic models are predictable, long-term forecasting of their performance is difficult Casdagli [5]. Furthermore, the chaotic processes’ primary features include hypersensitivity, structural blending, and orbital concentration Cho and Miyano [6], Natiq et al. [22, 23]. As a result, complex systems are useful in a variety of areas, particularly computer engineering, telecommunications, physics, and technology Natiq et al. [25], Farhan et al. [10], Viet-Thanh et al. [36]. Because the features of chaos theory and the dispersion and confusing aspects of encryption Alvarez and Li [2] are comparable, a large number of chaos-based cryptography algorithms have been proposed in recent years Cao et al. [4], Moysis et al. [21]. This has necessitated the measurement of the chaotic processes’ complexities Natiq et al. [24], Farhan et al. [9]. Apart from quantum key distribution, Yan et al. [38] introduced an approach called quantum-based communication that allows users to send secret messages to each other without first creating a shared secret key. With the advancement of digital technology, a wide range of cellular products and systems became accessible. The majority of methods ignored the situation of multilevel verification, a cellphone user who has completed the enrollment process at the registration center, including all authorized mobile subscribers at the registration center. Regarding virtualization, Kou et al. [15] developed a novel multilevel multi-server security mechanism. Only specific sorts of customers may effectively verify with some of these types of mobile telecommunications companies, according to the suggested protocol. Vehicle accidents, financially harmful traffic congestion, theft, pushing to incorrect paths, and economic problems for corporations and governments are all possible outcomes of cyber threats to intelligent and automated cars. Waqas et al. [37] presented a reinforcement learning method that uses the communications link’s channel state information to identify malicious networks. They look at the vehicle-to-vehicle and vehicle-to-infrastructure network systems. Verification of both clients and Access points is required to establish a secured WLAN communication system, and an authenticating users technique must be used. Artificial Neural networks (ANN) are being commonly used for the cryptographic purpose Abdalrdha et al. [1]; Protic [29]; Hadke and Kale [11]. In the early 1990s, the chaos coordination mechanism was observed Pecora and Carroll [28]. Rehan [30] proposed a coordination and anti-coordination of disorderly oscillators under input saturation and disruption using basic output feedback controller. Jo et al. [13] created AAS-IoTSG, an anonymously key establishment method for the power system network. The blockchain, according to Lu et al. [18], offers multi-party cooperative secured data-sharing technologies. By adding confidentiality federated learning, the data sharing challenge was transformed into a machine-learning challenge. Makkar et al. [19] proposed IoT device safety by detecting spamming via ML algorithms. It is recommended that the machine intelligence system are being used to identify malware in IoT to accomplish this aim. Sarkar [31], Sarkar and Mandal [32] suggested several ways for increasing TPM’s weight range and therefore strengthening the symmetric keys exchange’s confidentiality. Instead of a full weight vector, Shishniashvili et al. [33] suggested utilizing portions of the aligned weight vectors as an encryption key. In quantum cryptography, the cooperation of devices connected could be utilized to reduce mistakes in the key establishment method Mehic et al. [20]. The researchers of Dong and Huang [8] proposed the CVTPM, that uses complex integers for all control factors. It’s unclear if the CVTPM can resist a majority threat because they only looked at the geometric threat. A VVTPM system has been proposed by Jeong et al. [12]. This approach, however, does not really give an accurate synchronization assessment. Teodoro et al. [34] suggested putting TPM structure on an FPGA to conduct key exchange by mutual training of these machines.

The merits and demerits of existing techniques are summarized in Table 1.

Proposed methodology

Applying chaotic synchronization, a 5D hyperchaotic or chaotic nonlinear complex system aids in the sharing of similar confidential seed variables at both ends. This similar seed variable is utilized to produce an equivalent inputs for neuronal sync.

Following Table 2 shows different symbols and their meanings.

Table 2 The symbols’ meaning

Take into account the hyperchaotic (or chaotic) nonlinear complex system with the following variables:

$$\begin{aligned}&{\dot{X}}=FX+Q(X,Z),\nonumber \\&{\dot{Z}}=f(X,-X,Z), \end{aligned}$$
(1)

Here, \(X=\left( a_1,\;a_2,\ldots a_m\right) ^{T} \)

$$\begin{aligned}&X=X^{l}+qX^{p},\;X^{l}=\left( a_1^{l},\;a_2^{l},......a_m^{l}\right) ^{T},\\&X^{p}=\left( a_1^{p},\;a_2^{p},......a_m^{p}\right) ^{T},\;q=\sqrt{-1},\\&Q=\left( u_1,\;u_2,.........u_n\right) ^{T} \end{aligned}$$

Chaotic system in real form can be presented as follows:

$$\begin{aligned}&{\dot{a}}(\mathrm{{tim}})=ca(\mathrm{{tim}})-b(\mathrm{{tim}})g(\mathrm{{tim}})-b(\mathrm{{tim}})+v,\nonumber \\&{\dot{b}}(\mathrm{{tim}})=-db(\mathrm{{tim}})+a(\mathrm{{tim}})g(\mathrm{{tim}}),\nonumber \\&{\dot{g}}(\mathrm{{tim}})=a(\mathrm{{tim}})b(\mathrm{{tim}})-eg(\mathrm{{tim}}) \end{aligned}$$
(2)

Here \(a\left( \mathrm{{tim}}\right) ,\;b(\mathrm{{tim}}) \) and \(g\left( \mathrm{{tim}}\right) \) are real-state parameters that behave in time but not uniformly, and \(c,d,e\;and\;v \) are system variables (Eq. 2). The system (Eq. 2)’s most notable feature is its ability to generate a wide range of attractors, including chaotic and unpredictable attractors. Furthermore, it has been successfully discovered that this system can also construct a chaos-based four-scroll attractor. As a generalizability of the structure (Eq. 2), this paper introduces a modern hyperchaotic (or chaotic) exhibit of complex parts in this study:

$$\begin{aligned}&{\dot{a}}_h(\mathrm{{tim}})=ca_h(\mathrm{{tim}})-vb_h(\mathrm{{tim}})g_h(\mathrm{{tim}})-b_h(\mathrm{{tim}})+v+P_1,\nonumber \\&{\dot{b}}_h(\mathrm{{tim}})=-db_h(\mathrm{{tim}})+a_h(\mathrm{{tim}})g_h(\mathrm{{tim}})+P_2 \end{aligned}$$
(3)

\(c,d\;and\;e \) are positive variables, and v is a control variable that could be either complex or real. The parameters \({a(\mathrm{{tim}})=a^{l}(\mathrm{{tim}})+qa^{p}(\mathrm{{tim}}),\;b(\mathrm{{tim}})=b^{l}(\mathrm{{tim}})+qb^{p}(\mathrm{{tim}})} \) represent complex factors, \(g\left( \mathrm{{tim}}\right) \) represent real factors, and the controlling p and l represent the imaginary and real components, respectively. This proposed system (Eq. 3) can be thought of as a variant of (Eq. 1), with \(X=\left( a_1,a_2\right) ^{T}=\left( a,b\right) ^{T}, \) and \(Z=g \). The variable v has a significant impact on the system’s operation (Eq. 3). System (Eq. 3) is a chaotic system if v is to be considered a real parameter. The proposed system (Eq. 3) will produce hyperchaotic behavior if \(v=v^{l}+qv^{p} \) considered as a complex variable. In a sense, the method for selecting variables, either complex or real, has an impact on the system’s behavior. This paper would like investigate the proposed system’s behavior to clarify this previously unknown impact. The first time where the variable v is a real number, and the second time if it is indeed a complex number. In addition, this paper looking at a new form of coordination known as Complex Anti-Coordination (CAC). CAC’s concept can be handled by coordinating AS and CS Rehan [30]. AS occurs when a real part of the master structure interacts with an imaginary part of a slave system, whereas CS occurs when a real part of slave system interacts with an imaginary part of master system. This paper presents a comprehensive system for considering and achieving the CAC of two equivalent chaotic dynamic nonlinear systems are a type of (Eq. 1). This paper chooses, for example, the chaotic nonlinear complex shown in Eq. (3) with clear aim of demonstrating the effects of the proposed system of two similar structures of the type (Eq. 1).

The basic features of the structure (Eq. 3) are investigated twice: once if v is the real variable and again if v is indeed the complex variable. A structure for CAC of nonlinear systems is presented in this paper.

If v is a real variable, this proposed technique investigates the basic dynamical analysis of the system (Eq. 3). To accomplish this case, the actual type of structure (Eq. 3) is as follows:

$$\begin{aligned}&{\dot{a}}^{l}(\mathrm{{tim}})=ca^{l}(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})+v,\nonumber \\&{\dot{a}}^{p}(\mathrm{{tim}})=ca^{p}(\mathrm{{tim}})-b^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{p}(\mathrm{{tim}}),\nonumber \\&{\dot{b}}^{l}(\mathrm{{tim}})=a^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{l}(\mathrm{{tim}}),\nonumber \\&{\dot{b}}^{p}(\mathrm{{tim}})=a^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{p}(\mathrm{{tim}}),\nonumber \\&{\dot{g}}(\mathrm{{tim}})=a^{l}(\mathrm{{tim}})b^{l}(\mathrm{{tim}})+a^{p}(\mathrm{{tim}})b^{p}(\mathrm{{tim}})-eg(\mathrm{{tim}}) \end{aligned}$$
(4)

System (Eq. 4) seems to contain 6 quadratic nonlinear and 1 constant terms. As monitoring, the system (Eq. 4) has several key dynamical features. It is noticed that the transition is constant over time in this system (Eq. 4): \(\big (a^{l}(\mathrm{{tim}}),a^{p}(\mathrm{{tim}}),b^{l}(\mathrm{{tim}}), a^{p}(\mathrm{{tim}}),g(\mathrm{{tim}})\big )\Rightarrow \big (a^{l}(\mathrm{{tim}}), -a^{p}(\mathrm{{tim}}),b^{l}(\mathrm{{tim}}),-b^{l}(\mathrm{{tim}}),g(\mathrm{{tim}})\big ) \big (a^{l}(\mathrm{{tim}}),a^{p}(\mathrm{{tim}}), b^{l}(\mathrm{{tim}}), a^{p}(\mathrm{{tim}}),g(\mathrm{{tim}})\big ) \) is the elucidation of system (Eq. 4), and \(\left( a^{l}(\mathrm{{tim}}), -a^{p}(\mathrm{{tim}}),b^{l}(\mathrm{{tim}}),-b^{l}(\mathrm{{tim}}),g(\mathrm{{tim}})\right) , \) is the resolution of the corresponding system. It is simple to locate \(\nabla .N=\frac{\lambda {\displaystyle {\dot{a}}}^{l}}{\lambda a^{l}}+\frac{\lambda {\displaystyle {\dot{a}}}^{p}}{\lambda a^{p}}+\frac{\lambda {\displaystyle {\dot{b}}}^{l}}{\lambda b^{l}}+\frac{\lambda {\displaystyle {\dot{b}}}^{p}}{\lambda b^{p}}+\frac{\lambda {\displaystyle {\dot{g}}}}{\lambda g}=2c-2d-e<0 \). When \(2c<\left( 2d+e\right) \), the structure is deformed, and it meets \(\frac{dN}{d\mathrm{{tim}}}=e^{-\left( 2c-2d-e\right) t} \) in sort mode. It implies that at time \(\mathrm{{tim}} \), the volume element \(N_0 \)contracts to the volume section \(N_0e^{-\left( 2c-2d-e\right) t} \). As \(\mathrm{{tim}}\rightarrow \infty \) is reached, any volume component containing the structure carrying with type rate form gathered to 0. Following that, the majority of the system aim will be limited to a 0 volume subset, and the dynamic change would be based on an attractor. Identifying the following set of parameters will help to find the system’s equilibrium conditions:

$$\begin{aligned}&0=ca^{l}(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})+v,\nonumber \\&0=ca^{p}(\mathrm{{tim}})-b^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{p}(\mathrm{{tim}}),\nonumber \\&0=a^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{l}(\mathrm{{tim}}),\nonumber \\&0=a^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{p}(\mathrm{{tim}}),^{}\nonumber \\&0=a^{l}(\mathrm{{tim}})b^{l}(\mathrm{{tim}})+a^{p}(\mathrm{{tim}})b^{p}(\mathrm{{tim}})-eg(\mathrm{{tim}}). \end{aligned}$$
(5)

Clearly, proposed system does not have a single fixed point. The nonzero measurements are calculated as follows:

$$\begin{aligned}&{E}_1=\left( -\frac{v}{c},0,0,0,0\right) ,\nonumber \\&{E}_2=\left( -\sqrt{de},0,\frac{e^{\displaystyle \frac{1}{4}}\left( e^{\displaystyle \frac{1}{4}}+{\delta }_1\right) }{2\sqrt{d}},0,-\frac{1}{2}\left( 1+\frac{{\delta }_1}{e^{\displaystyle \frac{1}{4}}}\right) \right) ,\nonumber \\&{E}_3=\left( -\sqrt{de},0,\frac{e^{\displaystyle \frac{1}{4}}\left( e^{\displaystyle \frac{1}{4}}-{\delta }_1\right) }{2\sqrt{d}},0,\frac{1}{2}\left( -1+\frac{{\delta }_1}{e^{\displaystyle \frac{1}{4}}}\right) \right) ,\nonumber \\&{E}_4=\left( \sqrt{de},0,\frac{-e^{\displaystyle \frac{1}{4}}\left( e^{\displaystyle \frac{1}{4}}+{\delta }_2\right) }{2\sqrt{d}},0,-\frac{1}{2}\left( 1+\frac{{\delta }_2}{e^{\displaystyle \frac{1}{4}}}\right) \right) ,\nonumber \\&{E}_5=\left( \sqrt{de},0,\frac{e^{\displaystyle \frac{1}{4}}\left( -e^{\displaystyle \frac{1}{4}}-{\delta }_2\right) }{2\sqrt{d}},0,\frac{1}{2}\left( -1+\frac{{\delta }_2}{e^{\displaystyle \frac{1}{4}}}\right) \right) ,\nonumber \\ \end{aligned}$$
(6)

where \( \delta _1=\sqrt{\left( 1+4cd\right) \sqrt{e}-4\sqrt{dv}}, \delta _2=\sqrt{\left( 1+4cd\right) \sqrt{e}+4\sqrt{dv}}\)

The Jacobian matrix of system (Eq. 4) at \(E_1 \) is used to investigate the intensity of \(E_1 \).

$$\begin{aligned} Jac_{E_1}=\begin{pmatrix} c&{}\quad 0&{}\quad -1&{}\quad 0&{}\quad 0\\ 0&{}\quad c&{}\quad 0&{}\quad -1&{}\quad 0\\ 0&{}\quad 0&{}\quad -d&{}\quad 0&{}\quad -\frac{v}{c}\\ 0&{}\quad 0&{}\quad 0&{}\quad -d&{} \quad 0\\ 0&{}\quad 0&{}\quad -\frac{v}{c}&{}\quad 0 &{}\quad -e\end{pmatrix} \end{aligned}$$

The polynomial state that is most well known is:

$$\begin{aligned} \left( \psi -c\right) ^{2}\left( \psi +d\right) \left( \psi ^{2}+\left( d+e\right) \psi +de-\frac{v^{2}}{c^{2}}\right) =0\nonumber \\ \end{aligned}$$
(7)

The eigenvalues at that point are

$$\begin{aligned}&\psi _1=\psi _2=c,\;\psi _3=-d,\\&\psi _{4.5}=\frac{1}{2c}\left[ -c(d+e)\pm \sqrt{c^{2}(d-e)^{2}+4v^{2}}\right] . \end{aligned}$$

If c has negative estimations and d is positive, \(dc^{2}e<v^{2} \), the negotiated point \(\left( -\frac{v}{c},0,0,0,0\right) \) is e stable fixed point; otherwise, it is not.

Similarly, this paper investigated the reliability of \(E_2,\;E_3,E_4,\;E_5 \)

In vector information, system (Eq. 4) can be written as:

$$\begin{aligned} {\dot{\alpha }}(\mathrm{{tim}})=\sigma (\alpha (\mathrm{{tim}});H) \end{aligned}$$
(8)

Here, \(\begin{array}{l}\alpha (\mathrm{{tim}})\!=\!\big (a^{l}(\mathrm{{tim}}), a^{p}(\mathrm{{tim}}),b^{l}(\mathrm{{tim}}),b^{p}(\mathrm{{tim}}),g(\mathrm{{tim}})\!\big )^{\!T}\end{array} \) represents state space vector,

$$\begin{aligned} \sigma =\left( \sigma _1(\mathrm{{tim}}),\;\sigma _2(\mathrm{{tim}}),\;\sigma _3(\mathrm{{tim}}),\sigma _4(\mathrm{{tim}}),\sigma _5(\mathrm{{tim}})\right) ^{T} \end{aligned}$$

H is the variable configuration, and \(\left( ...\right) ^{T} \) is the transpose. The following are the criteria for slight variations\(\eta \alpha \) from the path \(\alpha \left( \mathrm{{tim}}\right) \):

$$\begin{aligned} \eta {\dot{\alpha }}(\mathrm{{tim}})=Jac_{vi}(\alpha (\mathrm{{tim}});M)\eta \alpha ,\;v=D=1,2,3,4,5\nonumber \\ \end{aligned}$$
(9)

\(Jac_{vi}\left( \alpha \left( \mathrm{{tim}}\right) ;H\right) \) denotes the Jacobian structure of the form:

$$\begin{aligned} Jac_{vi}= & {} \begin{pmatrix}\frac{\eta \sigma _1(\mathrm{{tim}})}{\eta a^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _1(\mathrm{{tim}})}{\eta a^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _1(\mathrm{{tim}})}{\eta b^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _1(\mathrm{{tim}})}{\eta b^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _1(\mathrm{{tim}})}{\eta g(\mathrm{{tim}})}\\ \frac{\eta \sigma _2(\mathrm{{tim}})}{\eta a^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _2(\mathrm{{tim}})}{\eta a^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _2(\mathrm{{tim}})}{\eta b^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _2(\mathrm{{tim}})}{\eta b^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _2(\mathrm{{tim}})}{\eta g(\mathrm{{tim}})}\\ \frac{\eta \sigma _3(tim)}{\eta a^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _3(\mathrm{{tim}})}{\eta a^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _3(\mathrm{{tim}})}{\eta b^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _3(\mathrm{{tim}})}{\eta b^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _3(\mathrm{{tim}})}{\eta g(\mathrm{{tim}})}\\ \frac{\eta \sigma _4(\mathrm{{tim}})}{\eta a^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _4(\mathrm{{tim}})}{\eta a^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _4(\mathrm{{tim}})}{\eta b^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _4(\mathrm{{tim}})}{\eta b^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _4(\mathrm{{tim}})}{\eta g(\mathrm{{tim}})}\\ \frac{\eta \sigma _5(\mathrm{{tim}})}{\eta a^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _5(\mathrm{{tim}})}{\eta a^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _5(\mathrm{{tim}})}{\eta b^{l}(\mathrm{{tim}})}&{}\frac{\eta \sigma _5(\mathrm{{tim}})}{\eta b^{p}(\mathrm{{tim}})}&{}\frac{\eta \sigma _5(\mathrm{{tim}})}{\eta g(\mathrm{{tim}})}\end{pmatrix}\\= & {} \begin{pmatrix}c&{}\quad 0&{}\quad -g-1&{}\quad 0&{}\quad -b^{l}\\ 0&{}\quad c&{}\quad 0&{}\quad -g-1&{}\quad -b^{p}\\ g&{}\quad 0&{}\quad -d&{}\quad 0&{}\quad a^{l}\\ 0&{}\quad g&{}\quad 0&{}\quad -d&{}\quad a^{p}\\ b^{l}&{}\quad b^{p}&{}\quad a^{l}&{}\quad a^{p}&{}\quad -e\end{pmatrix} \end{aligned}$$

The system’s Lyapunov notation \(i_1 \) is defined by:

$$\begin{aligned} i_1=\lim _{\mathrm{{tim}}\rightarrow \rightarrow \infty }\frac{1}{\mathrm{{tim}}}\log \frac{\left| \left| \lambda \alpha (\mathrm{{tim}})\right| \right| }{\left| \left| \lambda \alpha (0)\right| \right| } \end{aligned}$$
(10)

Equations (8) and (9) should be mathematically determined at all times to determine \(i_1 \). The order 4 Runge–Kutta technique is used to record \(i_1 \). As for preliminary condition \(\mathrm{{tim}}_0=0,\;a^{l}\left( 0\right) =1,\;a^{p}\left( 0\right) =2,\;b^{l}\left( 0\right) =3,\;b^{p}\left( 0\right) =4,\;g\left( 0\right) =5 \) , and \(c=16.5,\;d=24,\;e=2,v=2 \). The Lyapunov coefficients are as follows: \(i_1=4.01,\;i_2=0,\;i_3=0,\;i_4=-10.99 \), and \(i_5=-17.68 \).

Since one of the Lyapunov exponents is positive, proposed structure (Eq. 4) under this option of cdeand v is a chaotic system.

According to guess of Kaplan–Yorke, the Lyapunov measure or the attractors of (Eq. 4)’s dimension are:

$$\begin{aligned} L=\mu +\frac{\sum _{v=1}^\mu i_v}{\left| i_{\mu +1}\right| } \end{aligned}$$
(11)

This paper likes to highlight the effect of the variable selection approach, either complex or real, on the features and behavior of the proposed system. In the system, this paper considers \(v=v^{l}+qv^{p} \) to be a complex variable. In this vein, the real form of the paradigm investigates:

$$\begin{aligned}&{\dot{a}}^{l}(\mathrm{{tim}})=ca^{l}(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{l}(\mathrm{{tim}})+v^{l},\nonumber \\&{\dot{a}}^{p}(\mathrm{{tim}})=ca^{p}(\mathrm{{tim}})-b^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-b^{p}(\mathrm{{tim}})+v^{p},\nonumber \\&{\dot{b}}^{l}(\mathrm{{tim}})=a^{l}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{l}(\mathrm{{tim}}),\nonumber \\&{\dot{b}}^{p}(\mathrm{{tim}})=a^{p}(\mathrm{{tim}})g(\mathrm{{tim}})-db^{p}(\mathrm{{tim}}),\nonumber \\&{\dot{g}}(\mathrm{{tim}})=a^{l}(\mathrm{{tim}})b^{l}(\mathrm{{tim}})+a^{p}(\mathrm{{tim}})b^{p}(\mathrm{{tim}})-eg(\mathrm{{tim}})\nonumber \\ \end{aligned}$$
(12)

System (Eq. 12) seems to have 6 quadratic nonlinear and 2 constant terms. The system’s (Eq. 12) birefringent condition is the same in system (Eq. 4). Regardless, there is no modification that makes structure (Eq. 12) a symmetric system, despite the fact that this is evident in the system (Eq. 4). Situations (Eq. 12) have stabilized, indicating that they are essentially the same as other identified in the system (Eq. 4), but with a more intertwined form, as shown by the following:

$$\begin{aligned}&E_1=\left( -\frac{v^{l}}{c},-\frac{v^{p}}{c},0,0,0\right) ,\nonumber \\&E_2=\left( -\frac{\mathrm{{dev}}^{l}}{\delta _3},-\frac{\mathrm{{dev}}^{p}}{\delta _3},\frac{v^{l}\delta _4}{2\delta _3},\frac{v^{p}\delta _4}{2\delta _3},-\frac{\delta _4}{2e}\right) ,\nonumber \\&E_3=\left( \frac{\mathrm{{dev}}^{l}}{\delta _3},\frac{\mathrm{{dev}}^{p}}{\delta _3},\frac{v^{l}\delta _5}{2\delta _3},\frac{v^{p}\delta _5}{2\delta _3},\frac{\delta _5}{2e}\right) ,\nonumber \\&E_4=\left( -\frac{\mathrm{{dev}}^{l}}{\delta _3},-\frac{\mathrm{{dev}}^{p}}{\delta _3},\frac{v^{l}\delta _6}{2\delta _3},\frac{v^{p}\delta _6}{2\delta _3},-\frac{\delta _6}{2e}\right) ,\nonumber \\&E_5=\left( \frac{\mathrm{{dev}}^{l}}{\delta _3},\frac{\mathrm{{dev}}^{p}}{\delta _3},\frac{v^{l}\delta _7}{2\delta _3},\frac{v^{p}\delta _7}{2\delta _3},\frac{\delta _7}{2e}\right) \end{aligned}$$
(13)

Where \(\begin{array}{l}\delta _3=\sqrt{de\left[ \left( v^{l}\right) ^{2}+\left( v^{p}\right) ^{2}\right] },\\ \delta _4=e+\sqrt{e\left( e+4cde-4\delta _3\right) },\\ \delta _5=-e+\sqrt{e\left( e+4cde+4\delta _3\right) },\\ \delta _6=e-\sqrt{e\left( e+4cde-4\delta _3\right) },\\ \delta _7=-e-\sqrt{e\left( e+4cde+4\delta _3\right) }\end{array} \)

$$\begin{aligned} Jac_{E_1}=\begin{pmatrix}c&{}\quad 0&{}\quad -1&{}\quad 0&{}\quad 0\\ 0&{}\quad c&{}\quad 0&{}\quad -1&{}\quad 0\\ 0&{}\quad 0&{}\quad -d&{}\quad 0&{}\quad \frac{-v^{l}}{c}\\ 0&{}\quad 0&{}\quad 0&{}\quad -d&{}\quad \frac{-v^{p}}{c}\\ 0&{}\quad 0&{}\quad \frac{-v^{l}}{c}&{}\quad \frac{-v^{p}}{c}&{}\quad -e\end{pmatrix} \end{aligned}$$

Its characteristic polynomial is:

$$\begin{aligned}&\left( \psi -c\right) ^{2}\left( \psi +d\right) \nonumber \\&\left\{ \psi ^{2}+(d+e)\psi +de-\frac{\left[ \left( v^{l}\right) ^{2}+\left( v^{p}\right) ^{2}\right] }{a^{2}}\right\} =0 \end{aligned}$$
(14)

The eigenvalues are:

$$\begin{aligned}&\psi _1=\psi _2=c,\;\psi _3=-d\\&\psi _{4.5}\\&\quad =\frac{1}{2c}\left( -c(d+e)\pm \sqrt{c^{2}(d-e)^{2}\!+\!4\left[ \left( v^{l}\right) ^{2}\!+\!\left( v^{p}\right) ^{2}\right] }\right) \end{aligned}$$

This fixed point is stable if: \(c<0,\;d>0,\;dc^{2}e<\left[ \left( v^{l}\right) ^{2}+\left( v^{p}\right) ^{2}\right] \)

Otherwise, it is an unstable fixed point. As with \(E_1 \), the stability of\(E_2,\;E_3,\;E_4,\;E_5 \)can be tested.

Two equivalent chaotic (or hyperchaotic) complex nonlinear systems of the type (Eq. 1) are considered, one of which is the master system (signified by the subscript r) as follows:

$$\begin{aligned} \left\{ \begin{array}{l}{\dot{X}}_r=\dot{X}_r^{l}\;+q\dot{X}_r^{p}=FX_r+Q(X_r)\\ {\dot{Z}}=f(X,\;\_X,\;Z)\end{array}\right. \end{aligned}$$
(15)

and the second is the monitored slave system (defined by the subscript h) as follows:

$$\begin{aligned} {\dot{X}}_h=\dot{X}_h^{l}+q\dot{X}_h^{p}=FX_h+Q(X_h)+P \end{aligned}$$
(16)

Where, the added substance complicated monitor \(P=\left( P_1,\;P_2,...,\;P_m\right) ^{T}=P^{l}+qP^{p},\;P^{l}=\left( P_1^{l},\;P_2^{l},...,\;P_m^{l}\right) ^{T},P^{p}=\left( P_1^{p}, P_2^{p},...,\;P_m^{p}\right) ^{T} \)

Two combined, complex dimensional structures will display CAC in a master slave configuration if a complicated error task vector Eoccurs, for example:

$$\begin{aligned} E=E^{l}+qE^{p}=\lim _{\mathrm{{tim}}\rightarrow \infty }\left\| X_{h\;}+\;qX_r\right\| =0 \end{aligned}$$
(17)

Where \(E=E^{l}+qE^{p}=\left( s_{a_1},\;s_{a_2},...,\;s_{a_m}\right) ^{T} \) , \(X_r \) and \(X_h \) are the master and slave’s vector which are complex in nature.

$$\begin{aligned}&E^{l}=(s_{a_1^{l}},\;s_{a_2^{l}},...,s_{a_m^{l}})=X_h^{l}-X_r^{p}=0 \end{aligned}$$
(18)
$$\begin{aligned}&E^{p}=(s_{a_1^{p}},\;s_{a_2^{p}},...,s_{a_n^{p}})=X_h^{p}+X_r^{l}=0 \end{aligned}$$
(19)

Now, the meaning of CAC is applied to the systems (Eq. 15) and (Eq. 16):

$$\begin{aligned} \dot{E}=\dot{E}^{l}\;+q\dot{E}^{p}=X_h+qX_r \end{aligned}$$
(20)

So,

$$\begin{aligned}&\dot{E}=\dot{E}^{l}\;+q\dot{E}^{p}={\dot{X}}_h+q{\dot{X}}_r\nonumber \\&\dot{E}=\dot{E}^{l}\;+q\dot{E}^{p}=\left[ \dot{X}_h^{m}-\dot{X}_r^{p}\right] +q\left[ \dot{X}_h^{p}+\dot{X}_r^{m}\right] \end{aligned}$$
(21)

moreover, the error complex dynamical system can be derived from chaotic complex systems (Eq. 15) and (Eq. 16) as follows:

$$\begin{aligned} \dot{E}= & {} \dot{E}^{l}\;+q\dot{E}^{p}=FX_h^{l}+Q^{l}(X_h)\nonumber \\&-\;FX_r^{p}-Q^{p}(X_r)+L^{l}\nonumber \\&+\;j\left[ FX_h^{p}+Q^{p}(X_h)+FX_r^{l}+Q^{l}(X_r)+L^{p}\right] \end{aligned}$$
(22)

The error complex structure, which is obtained by separating the real and imaginary parts of Eq. (22), is as follows:

$$\begin{aligned} \left\{ \begin{array}{l}\dot{E}^{l}=FX_h^{l}+Q^{l}(X_h)-FX_r^{p}-Q^{p}(X_r)+L^{l}\\ \dot{E}^{p}=FX_h^{p}+Q^{p}(X_h)+FX_r^{l}+Q^{l}(X_r)+L^{p} \end{array}\right. \end{aligned}$$
(23)

The positive unequivocal quantity of Lyapunov function with respect to positive parameters in the system (Eq. 23) is:

$$\begin{aligned} N(\mathrm{{tim}})= & {} \frac{1}{2}\left[ \left( E^{l}\right) ^{T}E^{l}\;+\left( E^{p}\right) ^{T}E^{p}\;\right] \nonumber \\= & {} \frac{1}{2}\left( \sum _{i=1}^{m}s_{a_i^{l}}^{2}\;+\sum _{i=1}^{m}s_{a_i^{p}}^{2}\;\right) \end{aligned}$$
(24)

Remember some along the chaos system’s path (Eq. 23), the average period derivative of \(N(\mathrm{{tim}}) \) is as follows:

$$\begin{aligned}&\dot{N}(\mathrm{{tim}})\nonumber \\&\quad =\left( \dot{E}^{l}\right) ^{T}E^{l}\;+\left( \dot{E}^{p}\right) ^{T}E^{p}\nonumber \\&\quad =\left( FX_h^{l}+Q^{l}(X_h)-FX_r^{p}-Q^{p}(X_r)+L^{l}\right) ^{T}E^{l} \nonumber \\&\qquad +\left( FX_h^{p}+Q^{p}(X_h)+FX_r^{l}+Q^{l}(X_r)+L^{p}\right) ^{T}E^{p}\nonumber \\ \end{aligned}$$
(25)

The main subsidiary \(\dot{N}(\mathrm{{tim}})<0 \) is made by a wise strategy of the controller \(L^{l},\;L^{p} \). Thus, the ability to perform CAC is gained. As a result, the slave and master systems’ requirements would be globally synced asymptotically.

Remark 1

According to Eq. (18), the difference between slave system’s real part \(a_h^{l} \) and master system’s imaginary part \(a_r^{p} \)goes to zero as \(\mathrm{{tim}}\rightarrow \infty \) (CS).

Remark 2

When \(\mathrm{{tim}}\rightarrow \infty \), the whole imaginary part of slave system \(a_h^{p} \) and the real part of master system \(a_r^{l} \) disappear in Eq. (19) (AS).

Remark 3

CAC combines CS and AS in Remarks 1 and 2.

Finally, this scheme is described by implementing it in “Proposed methodology” for chaotic attractors of complex nonlinear systems (Eq. 3).

This segment analyzes the CAC issue of a chaotic complex system (Eq. 3) with some parameters. As a result, the master and slave systems are described as follows:

$$\begin{aligned} {\dot{a}}_r(\mathrm{{tim}})= & {} ca_r(\mathrm{{tim}})-b_r(\mathrm{{tim}})g_r(\mathrm{{tim}})-b_r(\mathrm{{tim}})+v,\nonumber \\ {\dot{b}}_r(\mathrm{{tim}})= & {} -db_r(\mathrm{{tim}})+a_r(\mathrm{{tim}})g_r(\mathrm{{tim}}),\nonumber \\ {\dot{z}}_r(\mathrm{{tim}})= & {} \frac{1}{2}\left[ {{{\overline{a}}}}_r(\mathrm{{tim}})b_r(\mathrm{{tim}}) +a_r(\mathrm{{tim}}){{{\overline{b}}}}_r(\mathrm{{tim}})\right] -eg(\mathrm{{tim}})\nonumber \\ \end{aligned}$$
(26)

and

$$\begin{aligned} {\dot{a}}_h(\mathrm{{tim}})= & {} ca_h(\mathrm{{tim}})- b_h(\mathrm{{tim}})g_h(\mathrm{{tim}})-b_h(\mathrm{{tim}})+v\;+P_1,\nonumber \\ {\dot{b}}_h(\mathrm{{tim}})= & {} -db_h(\mathrm{{tim}})+a_h(\mathrm{{tim}})g_h(\mathrm{{tim}})+P_2 \end{aligned}$$
(27)

where \(a_r=a_r^{l}+qa_r^{p},\;b_r=b_r^{l}+qb_r^{p},\;a_h=a_h^{l}+qa_h^{p},\;b_h=b_h^{l}+qb_h^{p} \) and \(P_1=P_1^{l}+qP_1^{p},\;P_2=P_2^{l}+qP_2^{p} \) are complex capacities, which is to be decided.

With the intention of achieving control signals in mind, the complex chaotic states between the supervised slave system and the supervising expert system are described as:

$$\begin{aligned}&s_a=a_h+qa_r\nonumber \\&s_b=b_h+qb_r \end{aligned}$$
(28)

where \(s_a=s_a^{m}+qs_a^{p},\;s_b=s_b^{m}+qs_b^{p}, \) denotes the capacity for complex errors.

This paper uses condition (Eq. 26) from (Eq. 27) and using (Eq. 28) to get the complex error dynamical structure (Eq. 23):

$$\begin{aligned} {{\dot{s}}}_a= & {} {\dot{s}}_a^{m}+q{\dot{s}}_a^{p}={{\dot{a}}}_e+q{{\dot{a}}}_{r\;},\nonumber \\= & {} cs_a-s_b-s_bg+v+qv+P_{1\;\;},\nonumber \\ {{\dot{s}}}_b= & {} {\dot{s}}_b^{m}\;+q{\dot{s}}_b^{p}={{\dot{b}}}_e+q{\dot{br}},\nonumber \\= & {} -ds_{b\;}+gs_a+P_{2\;} \end{aligned}$$
(29)

Condition (Eq. 29), on the other hand, represents a complex dynamical system in which the “errors” evolve over time.

A complex Lyapunov function can now be defined as follows for positive parameters cd:

$$\begin{aligned} k(\mathrm{{tim}})={\textstyle \frac{1}{2}}(\;[\;(\;s_a^{m})^{2}+(s_b^{m})^{2}+(s_a^{p})^{2}+(s_b^{p})^{2}+(s_b^{p})^{2}\;]\;)\nonumber \\ \end{aligned}$$
(30)

Along the framework’s arrangement (Eq. 29), the subsidiary of \({\dot{N}}(\mathrm{{tim}}) \) is:

$$\begin{aligned} {\dot{N}}(\mathrm{{tim}})= & {} s_a^{m}{\dot{s}}_a^{m}+s_b^{m}{\dot{s}}_b^{m}+s_a^{p}{\dot{s}}_a^{p}+s_b^{p}{\dot{s}}_b^{p},\nonumber \\= & {} s_a^{m}[\;cs_a^{m}-s_b^{m}-s_b^{m}g+v+P_1^{m}]\nonumber \\&+s_b^{m}[-ds_b^{m}+gs_a^{m}+P_2^{m}]\nonumber \\&+s_a^{p}[cs_a^{p}-s_{b\;}^{p}-s_b^{p}g+V++P_1^{p\;\;}]\nonumber \\&+s_b^{p}[-ds_b^{p}+gs_a^{p}+P_2^{p}]\end{aligned}$$
(31)

For the complex control capabilities, there are various options. In the event that this paper considers such controllers as:

$$\begin{aligned}&P_1=P_1^{m}+qP_1^{p}=\left( 1-c\right) s_a+s_{b\;}+s_bg-v\left( 1+q\right) ,\nonumber \\&P_{2\;}=P_1^{m\;}+qP_1^{p}=-gs_a\; \end{aligned}$$
(32)

The following is a true representation of the dynamic control work (Eq. 32):

$$\begin{aligned} P_1^{m}= & {} \left( 1-c\right) s_a^{m}+s_b^{m}+s_b^{m}g-v,\nonumber \\= & {} \left( 1-c\right) \left( a_h^{m}-a_r^{p}\right) +\left( b_h^{m}-b_r^{p}\right) \left( 1+g\right) -v,\nonumber \\ p_1^{p}= & {} \left( 1-c\right) s_a^{p}+s_b^{p}+s_b^{p}g-v,\nonumber \\= & {} \left( 1-c\right) \left( a_h^{p}+a_r^{m}\right) +\left( a_h^{p}+a_r^{m}\right) \left( 1+g\right) -v,\nonumber \\ p_2^{m}= & {} -gs_a^{m}=-g\left( a_h^{m}-a_r^{p}\right) ,\nonumber \\ p_2^{p}= & {} -gs_a^{p}=-g\left( a_h^{p}+a_r^{m}\right) \end{aligned}$$
(33)

Where \(\;\;s_a^{m}=a_h^{m}-a_r^{p},\;\;\;s_b^{m}=b_h^{m}-b_r^{p},\;\;\;s_a^{p}=a_r^{m}+a_h^{p},\;\;\;s_b^{p}=b_r^{m}+b_h^{p}\; \)

then Eq. (31) will be as:

$$\begin{aligned} {\dot{N}}\left( \mathrm{{tim}}\right) =-\left[ \left( s_a^{m}\right) ^{2}+\left( s_b^{m}\right) ^{2}+\left( s_a^{p}\right) ^{2}+\left( s_b^{p}\right) ^{2}\right] \;<0 \end{aligned}$$
(34)

\({\dot{N}}(\mathrm{{tim}}) \) is a positively distinctive potential in the segment of zero organization of errors representation (Eq. 29), and its derivative is adversely different.

As a result, Lyapunov’s immediate strategy indicates that the framework’s balance purposes \(s_a^{m}=a_h^{m}-a_r^{p}=0,\;\;s_a^{p}=a_r^{g}+a_h^{p}=0,\;\;s_b^{m}=b_h^{m}-b_r^{p}=0,\;\;s_b^{p}=b_r^{m}+b_h^{p}=0\; \) of the system (Eq. 29) is asymptotically stable and \(s_a\rightarrow 0,\;\;\;s_b\rightarrow 0\;as\;\mathrm{{tim}}\;\rightarrow \infty \)

Remark 4

As we look at the CAC issue for the framework (Eq. 3), and the variable v has a complicated system and hyperchaotic behavior \(\left( v=v^{m}+Jacv^{p}\right) \), we get the corresponding controller in condition (Eq. 33):

$$\begin{aligned} P_1^{m}= & {} \left( 1-c\right) s_a^{m}+s_b^{m}+s_b^{m}g-v^{m}+v^{p},\nonumber \\= & {} \left( 1-c\right) \left( a_h^{g}-a_r^{p}\right) +\left( b_h^{m}-b_r^{p}\right) \left( 1+g\right) -v^{m}\!+\!v^{p},\nonumber \\ P_1^{p}= & {} \left( 1-c\right) s_a^{p}+s_b^{p}+s_b^{p}g-v^{m}-v^{p},\nonumber \\= & {} \left( 1-c\right) \left( a_h^{p}+a_r^{m}\right) +\left( a_h^{p}\!+\!a_r^{m}\right) \left( 1\!+\!g\right) -v^{m}-v^{p},\nonumber \\ P_2^{m}= & {} -gs_a^{m}=-g\left( a_h^{m}-a_r^{p}\right) ,\nonumber \\ P_2^{p}= & {} -gs_a^{p}=-g\left( a_h^{p}+a_r^{m}\right) \end{aligned}$$
(35)
Fig. 1
figure 1

CAC communication

Fig. 2
figure 2

\(l\; \) vs. \(\mathrm{{tim}}\; \)

The CAC of chaotic (or hyperchaotic) dynamic system, where a parameter of the primary system coordinates with an alternative parameter of the secondary system, is a motivating type of coordination since it provides incredible protection in safe interaction. This paper considers system (Eq. 26), which is chaotic (or hyperchaotic), as a sender system, and system (Eq. 27) as a receiver, which is chaotic (or hyperchaotic). With one aspect, this paper chooses \(l\left( \mathrm{{tim}}\right) =6\cos \;\mathrm{{tim}}+4 \) as the information movement. Suppose that \({{\widehat{l}}}\left( \mathrm{{tim}}\right) =l\left( \mathrm{{tim}}\right) +a_r^{l} \) is applied to the vector \(b_r^{p}\Rightarrow \widehat{l}\left( \mathrm{{tim}}\right) =\widehat{l}\left( \mathrm{{tim}}\right) +b_r^{p}=l\left( \mathrm{{tim}}\right) +x_r^{l}+b_r^{p}. \) . The chaotic (or hyperchaotic) structure seen in Fig. 1 is used to encrypt and decrypt the data signal \(l\left( \mathrm{{tim}}\right) \) It shows an outline for proposed CAC communication system, in which the chaotic (or hyperchaotic) systems (Eq. 26) and (Eq. 27), including both, are the sender and receiver systems.

Figures 2, 3, 4 and 5 depict the numerical effects of application to secure communications. Figures 2 and 3 display the data signal \(l\left( \mathrm{{tim}}\right) \) and the transmitted signal \(\widehat{l}\left( \mathrm{{tim}}\right) \), respectively. Figure 4 depicts the recovered information signals, which is whatever has been transmitted by \(l^*\left( \mathrm{{tim}}\right) =l\left( \mathrm{{tim}}\right) +a_h^{p}-b_h^{l} \) . Because, after completing CAC with the controller system (35) \(a_r^{l}+a_h^{p}=0,\;b_h^{l}-b_r^{p}=0. \) The failure trajectory between the original data signal and the decrypted one is depicted in Fig. 5. It is not complicated to see from Fig. 5 that the data signal \(l\left( \mathrm{{tim}}\right) \) is exactly retrieved after a small residual.

  1. 1.

    As a result, this may concluded that safe communication in terms of CAC has the following advantages:

    Strong data sharing protection attributed to the reason that the master system’s state parameter synchronizes with slave system’s state parameter. This portion has never been discovered in previous sensitive communications examinations.

  2. 2.

    Prior protection connectivity systems were based on a single type of coordination. In any case, this paper offers two types of coordination systems (CS and AS). This will result in increased data transfer protection.

Fig. 3
figure 3

\({{\widehat{l}}}\) vs. \(\mathrm{{tim}}\; \)

Fig. 4
figure 4

\(l^*\) vs. \(\mathrm{{tim}}\; \)

Fig. 5
figure 5

\(l-l^*\) vs. \(\mathrm{{tim}}\; \)

Table 3 p_Value comparisons

Two neural networks will be involved in the coordinating procedure at any one moment. Both have a unique neural network structure known as the Triple Layer Tree Parity Machine (TLTPM). Reciprocal learning will fully coordinate all devices. The same TLTPM’s weights can then be used as a session key. Let A and B are two IoT devices. Initializing, estimation, modification, assessment, and termination are the five steps of the neural coordination procedure to generate a common session key at both IoT devices.

  1. 1.

    Initializing step: A and B both set the identical TLTPM framework in their IoT devices. The weights then are produced randomly.

  2. 2.

    Estimation step: For each learning phase, A and B obtain the same input vector generated from the common seed value through chaos coordination. They measure the contribution of the TLTPMs and share the results.

  3. 3.

    Modification step: After obtaining another party’s outcomes, they compare the two outcomes to whether they are similar. A and B will make the required adjustments.

  4. 4.

    Assessment step: A and B must decide whether optimum coordination has been reached if the weights are efficiently updated. The method moves on to the next level if complete synchronization is achieved.

    Otherwise, the computation will be finished.

  5. 5.

    Termination strategy: A and B establish their shared key by coordinating their weights. The neural key agreement operation is approaching completion.

Once the outcomes of the both TLTPMs G and D matched, \(\zeta ^{G}=\zeta ^{D} \) modifies the weights according to one of the rules:

Using Hebbian learning algorithm, both TLTPMs will be learnt from each other (Eq. 36).

$$\begin{aligned} \delta _{v,w}^{q+}=\mathrm{{fun}}\left( \delta _{v,w}^{q}+\gamma _{v,w}^{q}\zeta \Phi \left( \xi _v^{q}\zeta \right) \Phi \left( \zeta ^{G}\zeta ^{D}\right) \right) \end{aligned}$$
(36)

These TLTPMs are learnt by reversing their outputs in the Anti-Hebbian direction (Eq. 37).

$$\begin{aligned} \delta _{v,w}^{q+}=\mathrm{{fun}}\left( \delta _{v,w}^{q}-\gamma _{v,w}^{q}\zeta \Phi \left( \xi _v^{q}\zeta \right) \Phi \left( \zeta ^{G}\zeta ^{D}\right) \right) \end{aligned}$$
(37)

The random-walk learning rule is used when the predetermined value of result isn’t relevant for altering because it is the identical for the two TLTPMs (Eq. 38).

$$\begin{aligned} \delta _{v,w}^{q+}=\mathrm{{fun}}\left( \delta _{v,w}^{q}\;+\gamma _{v,w}^{q}\Phi \left( \xi _v^{q}\zeta \right) \Phi \left( \zeta ^{G}\zeta ^{D}\right) \right) \end{aligned}$$
(38)

As cryptographic keys, use these coordinated weights.

Results and analysis

The findings of the NIST test suite [26] on the synced neuronal session key are shown in Table 3. The p_Value evaluation is carried out for the TLTPM and VVTPM Jeong et al. [12], CVTPM Huang [8], Liu et al. [17], and Dolecki and Kozera [7] methods. The TLTPM’s p_Value has indeed been emerged as a promising alternative than others.

Using Eq. (10), this paper calculates \(i_1,D=1,2,\ldots ,5 \) and plots the estimates of \(i_1,i_2,...,\;i_5 \) versus c in Fig. 6.

As seen in Fig. 6, the system (Eq. 4) has chaotic attractors if \(c\in \left[ 7.6,19.8\right] . \) For just c lying in the intervals of time \(\left( 0,7.6\right) ,\;(19.8,30], \) the sporadic attractors of (Eq. 4) occur. This paper performs a comparative analysis of alternative variables, much as performed with variable c, and found chaotic results in each case. As a consequence, we are satisfied with the findings of variable c.

Fig. 6
figure 6

\(i_1,\;i_2,\;i_3,\;i_4,\;i_5 \)

Fig. 7
figure 7

\(\left( c,a^{l}\left( \mathrm{{tim}}\right) \right) \)

This paper finds the differentiation graphs details of the structure (Eq. 4) in Figs. 7, 8, 9, 10, and 11 as the variable a differs or changes and ensure proposed framework is chaotic. Upon on level pivot, a differentiation graph structures a system variable and on the vertical hub, a summary of the attractor’s operation. As a result, differentiation graphs are c unique way to visualize how a system’s behavior varies as a variable is estimated.

Differentiation graphs for \(c\in \left[ 0,30\right] \) are seen in Figs. 7, 8, 9, 10, and 11. Whenever \(c\in \left[ 7.6,19.8\right] , \) system (4) has configurations that reach chaotic attractors and \(c\in \left( 0.7.6\right) ,\;(19.8,30]\) has periodic activity, it can be detected. Figures 7, 8, 9, 10, and 11 have the same dynamical behavior as Fig. 6. Following Figs. 6, 7, 8, 9, 10 and 11 are the bifurcation graphs for \(c=16.5,\;d=24,\;e=2,\;v=2 \) and the initial conditions \(\mathrm{{tim}}_0=0,\;a^{l}\left( 0\right) =1,\;a^{p}\left( 0\right) =2,\;b^{l}\left( 0\right) =3,\;b^{p}\left( 0\right) =4,g\left( 0\right) =5. \)

Fig. 8
figure 8

\(\left( c,a^{p}\left( \mathrm{{tim}}\right) \right) \)

The outcome of the frequency test in the synced neural key indicates a percentage of 1 and 0. The result is 0.785469, which is quite superior than the result 0.538632 in Jeong et al. [12], 0.512374 in Dong and Huang [8], 0.1329 in Karakaya et al. [14], 0.632558 in Patidar et al. [27], and 0.629806 in Liu et al. [16]. Table 4 shows the p_Value comparisons for the frequency strategy.

Fig. 9
figure 9

\(\left( c,b^{l}\left( \mathrm{{tim}}\right) \right) \)

Fig. 10
figure 10

\(\left( c,b^{p}\left( \mathrm{{tim}}\right) \right) \)

Fig. 11
figure 11

\(\left( c,g\left( \mathrm{{tim}}\right) \right) \)

Table 4 Frequency test’s  p_Value

To investigate this theory mathematically (using, for example, Mathematica 7) in different parts to determine the best points. If \(d=24,\;e=2 \) and \(v=2 \) are chosen with corresponding constraints \(\mathrm{{tim}}_0=0,\;a^{l}\left( 0\right) =1,\;a^{p}\left( 0\right) =2,\;b^{l}\left( 0\right) =3,\;b^{p}\left( 0\right) =4,\;g\left( 0\right) =5, \) the action to take of system (4) includes chaotic attractor (Figs. 12, 13). The operation in Figs. 14 and 15 is intermittent, with \(c=22. \)

Fig. 12
figure 12

\(a^{l} \) vs. g vs. \(b^{l} \)

Fig. 13
figure 13

\(b^{l} \) vs. g vs. \(b^{p} \)

For various learning, weight range, and constant TLTPM size, Table 5 analyzes the synchronization periods of TLTPM and CVTPM methods. When \(\lambda \) increases in all three rules, there is a propensity for the sync step to rise. In the \(\lambda \) range of 5–15, Hebbian takes fewer sync stages than other two rules, but when the \(\lambda \) rises, Hebbian uses more sync steps than the others.

Fig. 14
figure 14

\(b^{l} \) vs. g vs. \(a^{p} \)

Fig. 15
figure 15

\(a^{p} \) vs. \(b^{p} \) vs. \(b^{l} \)

Table 5 TLTPM and CVTPM syncing times are compared

For system (Eq. 3) with a complex parameter\(v=v^{l}+qv^{p} \), the Lyapunov Exponents and bifurcation diagrams are recorded and described in Figs. 16, 17, 18, 19, 20 and 21. These figures are depicted with identical parameters in the previous segment’s initial conditions, \(v=2+3q \). As seen in Fig. 16, ignoring \(i_4,\;i_5 \) the system (Eq. 3) contains hyperchaotic attractor in the interval \(\left[ 7.6,19.9\right] \) and cyclic attractors if \(c\in \left( 0,\;7.6\right) ,\;(19.9,\;30]\). Figure 16 depicts the most remarkable perspective that could be used in this review. The chaotic activity was distorted, and a dynamic parameter was regulated in system (Eq. 3) with the replacement of one of the actual parameters. This illustrates the effect of dynamic parameters on the characteristics and performance of nonlinear dynamic systems. Following Figs. 16, 17, 18, 19, 20 and 21 are the bifurcation graphs for the bifurcation graphs for \(c=16.5,\;d=24,\;e=2,\;v=2+3q \) .

Fig. 16
figure 16

\(i_1,\;i_2,\;i_3\) (with excluding \(i_4,\;i_5) \) vs. \(\mathrm{{tim}} \)

Fig. 17
figure 17

\(\left( c,a^{l}\left( \mathrm{{tim}}\right) \right) \)

Fig. 18
figure 18

\(\left( c,a^{p}\left( \mathrm{{tim}}\right) \right) \)

Table 6 compares the TLTPM and VVTPM time synchronization approaches using the Random Walk method. The TLTPM, which uses the Random Walk learning algorithm, has a much faster coordinating period than the VVTPM.

Fig. 19
figure 19

\(\left( c,b^{l}\left( \mathrm{{tim}}\right) \right) \)

Fig. 20
figure 20

\(\left( c,b^{p}\left( \mathrm{{tim}}\right) \right) \)

Fig. 21
figure 21

\(\left( c,g\left( \mathrm{{tim}}\right) \right) \)

The structure in Figs. 22 and 23 are hyperchaotic, and the cyclic attractor in Figs. 24, 25 with identical parameters in initial conditions in the preceding part with \(v=2+3q \).

To demonstrate and confirm the proposed scheme’s estimate, we compare the CAC’s amusement outcomes in two similar chaotic dynamic frameworks (Eq. 26) and (Eq. 27). The frameworks (Eq. 26) and (Eq. 27) with the help of system controller (Eq. 32) are numerically illuminated, and the variables are initialized to \(\rho =23,\;\mu =6,\;\nu =10. \). The requirement of the master system, as well as the basic state of the slave show \(\xi ,\;\tau \), is taken into account. \(\begin{array}{l}\begin{array}{l}\left( a_r\left( 0\right) ,\;b_r\left( 0\right) \;\;\;g_r\left( 0\right) \right) ^{T}=\left( 1+2q,\;3+4q,\;5\right) ^{T},\\ \;\left( a_h\left( 0\right) ,\;b_h\left( 0\right) ,\;g_h\left( 0\right) \right) ^{T}=\left( -1-2q,\;-3-4q,-5\right) ^{T}\end{array}\\ \end{array} \)

Table 6 TLTPM and VVTPM syncing times are compared
Fig. 22
figure 22

g vs. \(b^{l} \) vs. \(a^{l} \)

Fig. 23
figure 23

\(b^{l} \) vs. g vs. \(b^{p} \)

Fig. 24
figure 24

\(b^{l} \) vs. g vs. \(a^{p} \)

Fig. 25
figure 25

\(b^{l} \) vs. \(a^{p} \) vs. \(b^{p} \)

The courses of action of (Eq. 26) and (Eq. 27) are schemed in Figs. 25, 26, 27 and 28 under different starting conditions, demonstrating that CAC is to ensure proficiency after a period \(\mathrm{{tim}} \). It can be seen by us that each \(a_h^{m}\left( \mathrm{{tim}}\right) ,\;b_h^{m}\left( \mathrm{{tim}}\right) \) posses a comparative symbol \(a_r^{p}\left( \mathrm{{tim}}\right) ,\;b_r^{p}\left( \mathrm{{tim}}\right) \) when \(a_h^{p}\left( \mathrm{{tim}}\right) ,\;b_h^{p}\left( \mathrm{{tim}}\right) \) have an opposite sign of \(a_r^{m}\left( \mathrm{{tim}}\right) ,\;b_r^{m}\left( \mathrm{{tim}}\right) . \) This implies that LS bridges the gap between the hypothetical (Eq. 26) and the real (Eq. 27) framework pieces. While ALS happens among the real slave framework piece (Eq. 26) and the hypothetical fundamental framework part (Eq. 27). As a result, the CAC provides a higher level of unambiguous security in secure communications. CAC is adept within a short time interval, as seen in Figs. 25, 26, 27 and 28.

Fig. 26
figure 26

\(a_r^{l}\left( \mathrm{{tim}}\right) \;and\;a_h^{p}\left( \mathrm{{tim}}\right) \)

Fig. 27
figure 27

\(a_r^{p}\left( \mathrm{{tim}}\right) \;and\;a_h^{l}\left( \mathrm{{tim}}\right) \)

Fig. 28
figure 28

\(b_r^{l}\left( \mathrm{{tim}}\right) \;and\;b_h^{p}\left( \mathrm{{tim}}\right) \)

Fig. 29
figure 29

\(b_r^{p}\left( \mathrm{{tim}}\right) \;and\;b_h^{l}\left( \mathrm{{tim}}\right) \)

Figures 29, 30, 31 and 32 depict the CAC mistakes. Clearly, the CAC mistakes \(s_a^{m},\;s_a^{p},\;s_b^{m},\;s_b^{p} \) converge to zero as \(\mathrm{{tim}}\;\rightarrow \infty \) based on the preceding exschemeatory considerations. After a small estimate of \(\mathrm{{tim}} \), the errors will approach zero.

Fig. 30
figure 30

\(e_a^{l} \) vs. \(\mathrm{{tim}} \)

Fig. 31
figure 31

\(e_a^{p} \) vs. \(\mathrm{{tim}} \)

Another phenomena are depicted in Figs. 34 and 35, but it does not appear in a wide range of synchronization in written work. In CAC, the attractors of the master and slave frameworks move in opposite or orthogonal directions with a hazy structure, as seen in Figs 34 and 35.

Fig. 32
figure 32

\(e_b^{l} \) vs. \(\mathrm{{tim}} \)

Fig. 33
figure 33

\(e_b^{p} \) vs. \(\mathrm{{tim}} \)

Figures 36, 37, 38 and 39 depict the master system’s (Eq. 26) and slave system’s module and step failures (Eq. 27). From Figs. 36 and 37, it has been seen that the modules errors \(\beta a_r-\beta a_h,\;\beta b_r-\beta b_h \) converge to 0 as \(\mathrm{{tim}}\rightarrow \infty \) while the phases’ errors are shown in Figs. 38 and 39, which are \(\phi a_r-\phi a_h,\;\phi b_r-\phi b_h, \) to \(\frac{\pi }{2} \) as \(\mathrm{{tim}}\rightarrow \infty \).

Fig. 34
figure 34

\(\left( b_r^{l}\left( \mathrm{{tim}}\right) ,b_h^{p}\left( \mathrm{{tim}}\right) \right) \) vs. \(\left( a_r^{p}\left( \mathrm{{tim}}\right) ,a_h^{l}\left( \mathrm{{tim}}\right) \right) \) vs. \((a_r^{l}(\mathrm{{tim}}),a_h^{p}(\mathrm{{tim}}))\)

Fig. 35
figure 35

\(\left( b_r^{p}\left( \mathrm{{tim}}\right) ,\;b_h^{l}\left( \mathrm{{tim}}\right) \right) \) vs. \(\left( a_r^{l}\left( \mathrm{{tim}}\mathrm{{tim}}\right) ,\;a_h^{p}\left( \mathrm{{tim}}\right) \right) \) vs. \((b_r^{l}(\mathrm{{tim}}),b_h^{p}(\mathrm{{tim}})) \)

The Anti-Hebbian harmonizing durations of the TLTPM and TPM-FPGA methods are compared in Table 7. The TLTPM’s sync interval is much shorter than the TPM- FPGA’s, as shown by the table. The Anti-Hebbian, in compared to others, takes less time ( \(\lambda \) value between 20 and 30).

Fig. 36
figure 36

\(\beta a_r-\beta a_h \) vs. \(\mathrm{{tim}} \)

Fig. 37
figure 37

\(\beta b_r-\beta b_h \) vs. \(\mathrm{{tim}} \)

Fig. 38
figure 38

\(\phi a_r-\phi a_h \) vs. \(\mathrm{{tim}} \)

Fig. 39
figure 39

\(\phi b_r-\phi b_h \) vs. \(\mathrm{{tim}} \)

Table 7 TLTPM and TPM-FPGA sync times are compared

Conclusion and future scope

The key exchange techniques proposed by Dong and Huang [8] and Jeong et al. [12] were the subject of the first part of this study. Their shortcomings were also stated in this article. Second, this paper has proposed neural network coordination using the 5D hyperchaotic (or chaotic) nonlinear dynamic complex system to construct the key exchange mechanism to solve the current problems. Third, while there are no complex variables, the properties and components of this system were analyzed, and when there are complex variables, they were studied again. The surprise was that if all of the variables were real, the system had chaotic behavior, but if one of the variables in the complex, the behavior shifted to become hyperchaotic. Fourth, Complex Ant-Coordination (CAC) is a new kind of complex coordination that this paper implement. A definition of CAC is provided for two uncertain chaotic (or hyperchaotic) complex structures. The CAC of two unknown hyperchaotic (or chaotic) nonlinear complex systems is also investigated. CAC provides more transparent protection in secured exchanges. Via various state parameters, the attractors of the master and slaves systems shift in the opposite or anisotropic direction to one another, which is typical of a CAS. This effect did not occur and did not appear in the arrangement with any kind of coordination. Not only does the proposed strategy has the requisite security measures, but it also has a greater level of effectiveness. This article discusses the comprehensive security assessment. Fourth, the agreement’s practicality is assessed, and contemporary CVTPM, TPM-FPGA, and VVTPM methods are compared. Finally, experiments are used to assess the values for \(\tau 1,\;\tau 2,\;\tau 3,\;N \)and \(\lambda \), which emphasize protection against an attacking network. This indicates that two approved TLTPMs would most likely share a secret key in a channel. Finally, the findings show that the proposed approach is a successful key swap over mechanism for IoT devices including both terms of effectiveness and protection. To increase the security of IoT devices in the future, a more comprehensive security review will be performed. Two main aspects would need to be changed in the future. One is to further minimize neuronal coordinating latency, and the other is to execute a fresh neuronal synchronization instead of a long one. A far more extensive investigation of the network’s protection is expected in the future.