Soft Computing in Communications pp 269-291 | Cite as
Fuzzy Chaotic Synchronization and Communication — Signal Masking and Encryption
Abstract
In this chapter, we address synthesis approaches for signal synchronization and secure communications of chaotic systems by using LMIbased fuzzy system design methods. Following a general form of TakagiSugeno fuzzy chaotic models, the structure of the response system is firstly proposed. Synthesizing from the observer and controller points of view, two developed drive-response systems achieve asymptotic synchronization. For chaotic communications, the asymptotical recovering of messages is ensured by the same framework. As a further application, a chaotic cryptosystem is proposed. The synchronization design is applied to transmit and decrypt the ciphertext. The combination of both chaotic signal and cyptosystem characteristics achieves communication with a higher level of security. Finally, several well-known chaotic systems are used in numerical simulations and DSP-based experiments.
Keywords
Chaotic synchronization Chaotic communication Cryptosystem T-S fuzzy modelPreview
Unable to display preview. Download preview PDF.
References
- 1.Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15: 116–132MATHCrossRefGoogle Scholar
- 2.Wang HO, Tanaka K, Griffin MF (1996) An approach to fuzzy control of nonlinear systems: stability and design issues.IEEE Trans Fuzzy Systems 4: 14–23CrossRefGoogle Scholar
- 3.Tanaka K, Ikeda T, Wang HO (1998) A unified approach to controlling chaos via an LMI-based fuzzy control system design.IEEE Trans Circuits Syst 45: 1021–1040MathSciNetMATHCrossRefGoogle Scholar
- 4.Tanaka K, Ikeda T, Wang HO (1998) Fuzzy regulators and fuzzy observers: relaxed stability conditions and LMI-based designs. IEEE Trans Fuzzy Systems 6: 250–265CrossRefGoogle Scholar
- 5.Boyd S, Ghaoui LE, Feron E, Balakrishnan V (1994) Linear matrix inequalities in system and control theory. SIAM, PhiladelphiaMATHCrossRefGoogle Scholar
- 6.Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 38: 821–824MathSciNetCrossRefGoogle Scholar
- 7.Carroll TL, Pecora LM (1991) Synchronizing chaotic circuits. IEEE Trans Circuits Syst 38: 453–456CrossRefGoogle Scholar
- 8.Chen C, Dong X (1998) From chaos to order methodologies, perspectives and applications. World Scientific, SingaporeMATHGoogle Scholar
- 9.Lakshmanan M, Murali K (1996) Chaos in nonlinear oscillators: controlling and synchronization. World Scientific, SingaporeMATHGoogle Scholar
- 10.Morgiil O, Solak E (1996) Observer based synchronization of chaotic systems. Phys Rev E 54: 4803–4811CrossRefGoogle Scholar
- 11.Huijberts HJC, Nijmeijer H, Pogromsky AYu(2000) An observer point of view on synchronization of discrete-time systems. Proc ISCAS 2000: 491–494.Google Scholar
- 12.Grassi G, Mascolo S (1999) Synchronizing hyperchaotic systems by observer design. IEEE Trans Circuits Syst II 46 : 478–483MATHCrossRefGoogle Scholar
- 13.Cuomo KM, Oppenheim AV, Strogatz SH (1993) Synchronization of Lorenzbased chaotic circuits with applicatons to communications. IEEE Trans Circuits Syst II 40: 626–633CrossRefGoogle Scholar
- 14.Kocarev LJ, Halle KD, Eckert K, Chua LO, Parlitz U (1992) Experimental demonstration of secure communications via chaotic synchronization. Int J Bifurcation Chaos 2: 709–713MATHCrossRefGoogle Scholar
- 15.Liao TL, Huang NS (1999) An observer-based approach for chaotic synchronization with applications to secure communications. IEEE Trans Circuits Syst I 46: 1144–1150MATHCrossRefGoogle Scholar
- 16.Wu CW, Chua LO (1993) A simple way to synchronize chaotic systems with applications to secure communication systems. Int J Bifurcation Chaos 3: 1619–1627MATHCrossRefGoogle Scholar
- 17.Halle KS, Wu CW, Itoh M, Chua LO (1993) Spread spectrum communication through modulation of chaos. Int J Bifurcation Chaos 3: 469–477MATHCrossRefGoogle Scholar
- 18.Lian KY, Chiang TS, Liu P (2000) Discrete-time chaotic systems: applications in secure communications. Int J Bifurcation Chaos 10: 2193–2206MathSciNetMATHGoogle Scholar
- 19.Lian KY, Chiang TS, Liu P, Chiu CS (2001) LMI-based fuzzy chaotic synchronization and communication. IEEE Trans Fuzzy Systems 9: 539 - 553CrossRefGoogle Scholar
- 20.Lian KY, Chiang TS, Chiu CS, Liu P (2001) Synthesis of fuzzy modelbased design to synchronization and secure communication for chaotic systems. IEEE Trans Syst Man Cybern Part B 31: 66–83CrossRefGoogle Scholar
- 21.Short K (1994) Steps toward unmasking secure communications. Int J Bifurcation Chaos 4: 959–977MATHCrossRefGoogle Scholar
- 22.Garey MR, Johnson DS (1976) Computers and intractability: a guide to the theory of NP-completeness. WH Freeman & Co, San FranciscoGoogle Scholar
- 23.Denning DER (1982) Cryptography and data security. Addison Wesley, New YorkMATHGoogle Scholar