Secure Communication Scheme

Chapter
Part of the Springer Tracts in Mechanical Engineering book series (SPTME)

Abstract

The last engineering application presented here deals with secure communication, for which only the theoretical foundations are presented based on non-autonomous compound remodulating scheme. In this chapter, we show that the SD oscillator might be used to satisfy the requirements of security of communications using its chaotic characteristics. In the proposed scheme, the driving signal is generated by the combination of multiple state variables.

Keywords

Chaotic System Chaotic Signal Phase Space Reconstruction Chaotic Characteristic Secure Communication System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Lai, Y. C., & Grebogi, C. (1993). Synchronization of chaotic trajectories using control. Physical Review E Statistical Physics Plasmas Fluids and Related Interdisciplinary Topics, 47(4), 2357–2360.Google Scholar
  2. 2.
    Halle, K. S., Wu, C. W., Itoh, M., & Chua, L. O. (1993). Spread spectrum communication through modulation of chaos in Chua’s circuit. International Journal of Bifurcation and Chaos, 3(2), 469–477.CrossRefMATHGoogle Scholar
  3. 3.
    Pecora, L. M., & Caroll, T. L. (1990). Synchronization in chaotic system. Physical Review Letters, 64(8), 821–824.MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Yang, T., & Chua, L. O. (1996). Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 43(9), 817–819.CrossRefGoogle Scholar
  5. 5.
    Ding, M., & Ott, E. (1994). Enhancing synchronization of chaotic systems. Physical Review E, 49(2), 945–948.CrossRefGoogle Scholar
  6. 6.
    Murali, K., & Lakshmanan, M. (1997). Synchronization through compound chaotic signal in Chua’s circuit and Murall-Lakshmanan-Chua circuit. International Journal of Bifurcation and Chaos, 7(2), 1619–1627.CrossRefMATHGoogle Scholar
  7. 7.
    Wu, X., Hu, H., & Zhang, B. (2004). Analyzing and improving a chaotic encryption method. Chaos, Soliton and Fractals, 22(4), 367–373.CrossRefMATHGoogle Scholar
  8. 8.
    Alvarez, G., & Li, S. J. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. Internatioal Journal of Bifurcation and Chaos, 16(8), 2129–2151.MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Alvarez, G., Montoya, F., Romera, M., & Pastor, G. (2004). Breaking parameter modulated chaotic secure communication system. Chaos Solitons and Fractals, 21(4), 783–787.CrossRefMATHGoogle Scholar
  10. 10.
    Li, S., Alvarez, G., & Chen, G. (2005). Breaking a chaos-based secure communication scheme designed by a improved modulation method. Chaos, Soliton and Fractals, 25(1), 109–120.CrossRefMATHGoogle Scholar
  11. 11.
    Senouci, A., Boukabou, A., Busawon, K., Bouridane, A., & Ouslimani, A. (2014). Robust chaotic communication based on indirect coupling synchronization. Circuits Systems and Signal Processing, 34(2), 393–418.CrossRefGoogle Scholar
  12. 12.
    Wang, X. Y., & Zhang, H. (2013). A robust secondary secure communication scheme based on synchronization of spatiotemporal chaotic systems. Zeitschrift Fur Naturforschung A, 68, 573–580.Google Scholar
  13. 13.
    Chandrasekaran, J., Subramanyan, B., & Selvanayagam, R. (2011). A chaos based approach for improving non linearity in S box design of symmetric key cryptosystems. Berlin: Springer.CrossRefGoogle Scholar
  14. 14.
    Matsumoto, T., Chua, L. O., Kobayashi, K. (1986). Hyperchaos: Laboratory experiment and numerical confirmation. IEEE Transactions on Circuits and Systems, CAS-33(11), 1143–1147.Google Scholar
  15. 15.
    Murali, K. (2000). Heterogeneous chaotic systems based cryptography. Physics Letters A, 272(3), 184–192.MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Murali, K. (2001). Digital signal transmission with cascaded heterogeneous chaotic systems. International Journal of Bifurcation and Chaos, 63(10), 2489–2497.MATHGoogle Scholar
  17. 17.
    Freeman, G. A. (2012). Synchronizing chest compression and ventilation in cardiac resuscitation.Google Scholar
  18. 18.
    Wang, Q. Y., Lu, Q. S., & Chen, G. R. (2008). Synchronization transition induced by synaptic delay in coupled fast-spiking neurons. International Journal of Bifurcation and Chaos, 18(4), 1189–1198.MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Hsiao, F. H., Hsieh, K. P., Lin, Z. H. (2014). Exponential optimal synchronization of chaotic cryptosystems: Neural-network-based approach. In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 35–42).Google Scholar
  20. 20.
    Okura, J. (1999). Time-base corrector circuit capable of adding color burst signal to output signal based on kind of input video signal.Google Scholar
  21. 21.
    Zhang, R., Hu, M., & Xu, Z. Y. (2007). Impulsive synchronization of rø”sler systems with parameter driven by an external signal. Physics Letters A, 364(3–4), 239–243.Google Scholar
  22. 22.
    Li, S. J., Chen, G. R., & Alvarez, G. (2005). Return-map cryptanalysis revisited. International Journal of Bifurcation and Chaos, 16(5), 1557–1568.MathSciNetCrossRefMATHGoogle Scholar
  23. 23.
    Perez, G., & Cerdeira, H. A. (1995). Extracting messages masked by chaos. Physical Review Letters, 74(11), 1970–1973.CrossRefGoogle Scholar
  24. 24.
    Guedes de Oliveira, A., & Jones, A. J. (2011). Synchronization of chaotic maps by feedback control and application to secure communications using chaotic neural networks. International Journal of Bifurcation and Chaos, 8(11), 2225–2237.CrossRefMATHGoogle Scholar
  25. 25.
    Yang, T., Yang, L. B., & Yang, C. M. (1998). Breaking chaotic secure communications using a spectogram. Physics Letters A, 247(1), 105–111.CrossRefGoogle Scholar
  26. 26.
    Alvarez, G., & Li, S. J. (2004). Estimating short-time period to break different types of chaotic modulation based secure communications. Annales de L’Institut Henri Poincaré, 22(5), 597–608.Google Scholar
  27. 27.
    Jovic, B. (2011). Application of chaotic synchronization to secure communications. Berlin: Springer.CrossRefMATHGoogle Scholar
  28. 28.
    Dedieu, H., Kennedy, M. P., & Hasler, M. (1993). Chaos shift keying: Modulation and demodulation of a chaotic carrier using self-synchronizing. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 40(10), 634–641.CrossRefGoogle Scholar
  29. 29.
    Skufca, J. D., & Bollt, E. M. (2004). Communication and synchronization in disconnected networks with dynamic topology: Moving neighborhood networks. Mathematical Biosciences and Engineering MBE, 1(2), 347–359.MathSciNetCrossRefMATHGoogle Scholar
  30. 30.
    Paul, R. S., Rajasekar, S., & Murali, K. (1999). Coexisting chaotic attractors, their basin of attractions and synchronization of chaos in two coupled duffing ocsilattors. Physics Letters A, 264(4), 283–288.MathSciNetCrossRefMATHGoogle Scholar
  31. 31.
    Chen, J. Y., Wong, K. W., Cheng, L. M., & Shuai, J. W. (2003). A secure communication scheme based on the phase synchronization of chaotic systems. Chaos, 13(2), 508–514.CrossRefGoogle Scholar
  32. 32.
    Fallahi, K., Raoufi, R., & Khoshbin, H. (2008). An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm. Communications in Nonlinear Science and Numerical Simulation, 13(4), 763–781.MathSciNetCrossRefMATHGoogle Scholar
  33. 33.
    Grzybowski, J. M. V., Rafikov, M., & Balthazar, J. M. (2009). Synchronization of the unified chaotic system and application in secure communication. Communications in Nonlinear Science and Numerical Simulation, 14(6), 2793–2806.MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  1. 1.School of AstronauticsHarbin Institute of TechnologyHarbinChina
  2. 2.Laboratoire de Mécanique et d’Acoustique, CNRSMarseille Cedex13France

Personalised recommendations