Chaos coordinated neural key synchronization for enhancing security of IoT

The key exchange mechanism in this paper is built utilizing neural network coordination and a hyperchaotic (or chaotic) nonlinear dynamic complex system. This approach is used to send and receive sensitive data between Internet-of-Things (IoT) nodes across a public network. Using phishing, Man-In-The-Middle (MITM), or spoofing attacks, an attacker can easily target sensitive information during the exchange process. Furthermore, minimal research has been made on the exchange of input seed values for creating identical input at both ends of neural networks. The proposed method uses a 5D hyperchaotic or chaotic nonlinear complex structure to ensure the sharing of input seed value across two neural networks, resulting in the identical input on both ends. This study discusses two ways for sharing seed values for neural coordination. The first is a chaotic system with all real variables, whereas the second is a hyperchaotic system with at least one complex variable. Each neural network has its own random weight vector, and the outputs are exchanged. It achieves full coordination in some stages by altering the neuronal weights according to the mutual learning law. The coordinated weights are utilized as a key after the neural coordination technique. The network’s core structure is made up of triple concealed layers. So, determining the inner configuration will be tough for the intruder. The efficiency of the suggested model is validated by simulations, and the findings reveal that the suggested strategy outperforms current equivalent techniques.


Introduction
The power sector's automation is also transforming transportation, telecommunications, healthcare, finance, and security.Critical Energy Infrastructures (CEI) are distributed rapidly, resulting in dynamic networks that need careful security and speedy recovery in order to prevent intrusions.To connect services reliably, an intelligent energy meter in an intelligent power grid system uses an unreliable connection.Because the information is exchanged through an open channel, an attacker may present a multitude of security risks.Important attempts have been made in this regard to address privacy and security problems in IoT applications, the majority of which have focused on conventional approaches.A broad range of security considerations (secrecy, reliability, and authorization) must be resolved to protect IoT systems 1.A 5D hyperchaotic or chaotic nonlinear complex system uses chaotic synchronization to help in the sharing of same confidential seed variables at both sides.The same seed variable is used to generate the same inputs for neuronal sync.2. Man-In-The-Middle (MITM) assault protection and resiliency should be improved.As two networks' messages are intercepted by an intruder or assailant.Since the hacker is impersonating the actual sender, it's a risky assault.The perpetrator can fool the recipient into assuming they are transmitting a true message if they have the first grasp.3. The development of a cryptographic keys interchange system is important.So rather than sending the whole sensitive session key over such a private medium, all communications systems may use coordination over a public channel to generate a key directly.4. With security strengthening, a chaos-guided secure communication mechanism must be developed.5. To improve confidentiality and effectiveness, a method for coordinating the neuro key exchange process must be developed.
This paper's various contributions are summed up as follows: 1. To address the problems given by security vulnerabilities and apparent execution costs, the goal of this study is to clarify fundamental ideas and highlight methodologies for successful 5D hyperchaotic or chaotic nonlinear complex system-based neural network-guided safety-critical applications.2. The seed value transmitted from sender to receiver through 5D hyperchaotic or chaotic nonlinear complex system.This identical seed value will be used for generating identical input vector for neural key exchange.3.In this article, two schemes are considered for exchanging seed values for neural synchronization.One has all real variables and exhibits chaotic behavior, while the other has at least one complex variable and exhibits hyperchaotic behavior.4. To share the typical seed value for neural key exchange, complete Complex Anti-Coordination (CAC) of two equivalent hyperchaotic or chaotic systems is proposed.5.The fact that the master system's state parameter synchronizes with the slave system's state parameter provides strong data sharing protection.In prior sensitive communications investigations, this section had never been identified.6.Previously, protective connection systems relied solely on one sort of coordination.In any event, there are two types of coordination systems presented in this work (CS and AS).As a result, data transfer security will be improved.
7. The suggested approach takes significantly less time to coordinate than current strategies for various learning rules.8.The key exchange strategies described by Jeong et al. [12], Sarkar [31], Teodoro et al. [34], Dong and Huang [8] and Dolecki and Kozera [7] were investigated in the present study.This research focused on their weaknesses as well.To overcome the relevant problems, this article gives a TLTPM coordinating key agreement technique that results in a secret key with a flexible size.9.The secret key is created dynamically by sharing just few variables over the public medium using the neural coordination protocol at both ends, rather than being sent individually to the other system.
The rest of the article is broken down into six sections."Related work" provides insight into related work.In "Proposed methodology", the proposed approach is discussed.The results and interpretation are presented in "Results and analysis".Conclusions and future scope are found in "Conclusion and future scope".

Related work
Atan et al. [3] has proposed to develop a fuzzy set control scheme for synchronizing two non-identical hyperchaotic processes.To increase the performance of the system, fuzzy logic-based regulators are combined with strong control strategies such as sliding mode controls.The IFSMC regulator created by combining SMC and fuzzy logic-based IFLC was intended for hyperchaotic systems to take use of SMC and fuzzy logic-based IFLC.The goal of the work proposed by Tunç et al. [35] is to look at a few of the characteristics of FrRIDEs with Caputo fractional differential equations, which are nonlinear fractions delayed Volterra integro-differential equations.The reported results are also supported by the use of the Lyapunov-Razumikhin technique and the definition of an adequate Lyapunov function (LRM).Despite the fact that chaos dynamic models are predictable, longterm forecasting of their performance is difficult Casdagli [5].Furthermore, the chaotic processes' primary features include hypersensitivity, structural blending, and orbital concentration Cho and Miyano [6], Natiq et al. [22,23].As a result, complex systems are useful in a variety of areas, particularly computer engineering, telecommunications, physics, and technology Natiq et al. [25], Farhan et al. [10], Viet-Thanh et al. [36].Because the features of chaos theory and the dispersion and confusing aspects of encryption Alvarez and Li [2] are comparable, a large number of chaos-based cryptography algorithms have been proposed in recent years Cao et al. [4], Moysis et al. [21].This has necessitated the measurement of the chaotic processes' complexities Natiq et al.Using a hash to assess the coordination of neural networks On the other side, network congestion might grow.If the hash functions were to be abused, a considerable quantity of data traffic would have been created Jeong et al. [12] Two vector-valued neural networks synchronized This approach does not work well for group synchronization Dong and Huang [8] Synchronization of two complex valued neural networks They only looked at the geometric assault; whether the CVTPM can resist a majority assault is unknown.In addition, effective group coordination is not achievable Teodoro et al. [34] FPGA-based TPM synchronization No group synchronization assessment method is proposed [24], Farhan et al. [9].Apart from quantum key distribution, Yan et al. [38] introduced an approach called quantum-based communication that allows users to send secret messages to each other without first creating a shared secret key.
With the advancement of digital technology, a wide range of cellular products and systems became accessible.The majority of methods ignored the situation of multilevel verification, a cellphone user who has completed the enrollment process at the registration center, including all authorized mobile subscribers at the registration center.Regarding virtualization, Kou et al. [15] developed a novel multilevel multi-server security mechanism.Only specific sorts of customers may effectively verify with some of these types of mobile telecommunications companies, according to the suggested protocol.Vehicle accidents, financially harmful traffic congestion, theft, pushing to incorrect paths, and economic problems for corporations and governments are all possible outcomes of cyber threats to intelligent and automated cars.Waqas et al. [37] presented a reinforcement learning method that uses the communications link's channel state information to identify malicious networks.They look at the vehicle-to-vehicle and vehicle-to-infrastructure network systems.Verification of both clients and Access points is required to establish a secured WLAN communication system, and an authenticating users technique must be used.Artificial Neural networks (ANN) are being commonly used for the cryptographic purpose Abdalrdha et al. [1]; Protic [29]; Hadke and Kale [11].In the early 1990s, the chaos coordination mechanism was observed Pecora and Carroll [28].
Rehan [30] proposed a coordination and anti-coordination of disorderly oscillators under input saturation and disruption using basic output feedback controller.Jo et al. [13] created AAS-IoTSG, an anonymously key establishment method for the power system network.The blockchain, according to Lu et al. [18], offers multi-party cooperative secured data-sharing technologies.By adding confidentiality federated learning, the data sharing challenge was transformed into a machine-learning challenge.Makkar et al. [19] proposed IoT device safety by detecting spamming via ML algorithms.
It is recommended that the machine intelligence system are being used to identify malware in IoT to accomplish this aim.Sarkar [31], Sarkar and Mandal [32] suggested several ways for increasing TPM's weight range and therefore strengthening the symmetric keys exchange's confidentiality.Instead of a full weight vector, Shishniashvili et al. [33] suggested utilizing portions of the aligned weight vectors as an encryption key.In quantum cryptography, the cooperation of devices connected could be utilized to reduce mistakes in the key establishment method Mehic et al. [20].The researchers of Dong and Huang [8] proposed the CVTPM, that uses complex integers for all control factors.It's unclear if the CVTPM can resist a majority threat because they only looked at the geometric threat.A VVTPM system has been proposed by Jeong et al. [12].This approach, however, does not really give an accurate synchronization assessment.Teodoro et al. [34] suggested putting TPM structure on an FPGA to conduct key exchange by mutual training of these machines.
The merits and demerits of existing techniques are summarized in Table 1.

Proposed methodology
Applying chaotic synchronization, a 5D hyperchaotic or chaotic nonlinear complex system aids in the sharing of similar confidential seed variables at both ends.This similar seed variable is utilized to produce an equivalent inputs for neuronal sync.
Following Table 2 shows different symbols and their meanings.Take into account the hyperchaotic (or chaotic) nonlinear complex system with the following variables: Here, Chaotic system in real form can be presented as follows: Here a (tim) , b(tim) and g (tim) are real-state parameters that behave in time but not uniformly, and c, d, e and v are system variables (Eq.2).The system (Eq.2)'s most notable feature is its ability to generate a wide range of attractors, including chaotic and unpredictable attractors.Furthermore, it has been successfully discovered that this system can also construct a chaos-based four-scroll attractor.As a generalizability of the structure (Eq.2), this paper introduces a modern hyperchaotic (or chaotic) exhibit of complex parts in this study: c, d and e are positive variables, and v is a control variable that could be either complex or real.The parameters a(tim) = a l (tim) + qa p (tim), b(tim) = b l (tim) + qb p (tim) represent complex factors, g (tim) represent real factors, and the controlling p and l represent the imaginary and real components, respectively.This proposed system (Eq.3) can be thought of as a variant of (Eq.1), with X = (a 1 , a 2 ) T = (a, b) T , and Z = g.The variable v has a significant impact on the system's operation (Eq.3).System (Eq. 3) is a chaotic system if v is to be considered a real parameter.The proposed system (Eq.3) will produce hyperchaotic behavior if v = v l + qv p considered as a complex variable.In a sense, the method for selecting variables, either complex or real, has an impact on the system's behavior.This paper would like investigate the proposed system's behavior to clarify this previously unknown impact.The first time where the variable v is a real number, and the second time if it is indeed a complex number.In addition, this paper looking at a new form of coordination known as Complex Anti-Coordination (CAC).CAC's concept can be handled by coordinating AS and CS Rehan [30].AS occurs when a real part of the master structure interacts with an imaginary part of a slave system, whereas CS occurs when a real part of slave system interacts with an imaginary part of master system.This paper presents a comprehensive system for considering and achieving the CAC of two equivalent chaotic dynamic nonlinear systems are a type of (Eq.1).This paper chooses, for example, the chaotic nonlinear complex shown in Eq. ( 3) with clear aim of demonstrating the effects of the proposed system of two similar structures of the type (Eq.1).The basic features of the structure (Eq. 3) are investigated twice: once if v is the real variable and again if v is indeed the complex variable.A structure for CAC of nonlinear systems is presented in this paper.
If v is a real variable, this proposed technique investigates the basic dynamical analysis of the system (Eq.3).To accomplish this case, the actual type of structure (Eq. 3) is as follows: System (Eq. 4) seems to contain 6 quadratic nonlinear and 1 constant terms.As monitoring, the system (Eq.4) has several key dynamical features.It is noticed that the transition is constant over time in this system (Eq.4): is the elucidation of system (Eq.4), and a l (tim), −a p (tim), b l (tim), −b l (tim), g(tim) , is the resolution of the corresponding system.It is simple to locate When 2c < (2d + e), the structure is deformed, and it meets d N dtim = e −(2c−2d−e)t in sort mode.It implies that at time tim, the volume element N 0 contracts to the volume section N 0 e −(2c−2d−e)t .As tim → ∞ is reached, any volume component containing the structure carrying with type rate form gathered to 0. Following that, the majority of the system aim will be limited to a 0 volume subset, and the dynamic change would be based on an attractor.Identifying the following set of parameters will help to find the system's equilibrium conditions: (5) Clearly, proposed system does not have a single fixed point.The nonzero measurements are calculated as follows: where √ dv The Jacobian matrix of system (Eq.4) at E 1 is used to investigate the intensity of E 1 .
The polynomial state that is most well known is: The eigenvalues at that point are If c has negative estimations and d is positive, dc 2 e < v 2 , the negotiated point − v c , 0, 0, 0, 0 is e stable fixed point; otherwise, it is not.
Similarly, this paper investigated the reliability of E 2 , E 3 , E 4 , E 5 In vector information, system (Eq.4) can be written as: Here, α(tim) = a l (tim), a p (tim), b l (tim), b p (tim), g(tim) T represents state space vector, H is the variable configuration, and (...) T is the transpose.The following are the criteria for slight variationsηα from the path α (tim): J ac vi (α (tim) ; H ) denotes the Jacobian structure of the form: The system's Lyapunov notation i 1 is defined by: Equations ( 8) and ( 9) should be mathematically determined at all times to determine i 1 .The order 4 Runge-Kutta technique is used to record i 1 .As for preliminary condition Since one of the Lyapunov exponents is positive, proposed structure (Eq.4) under this option of c, d, eand v is a chaotic system.
According to guess of Kaplan-Yorke, the Lyapunov measure or the attractors of (Eq.4)'s dimension are: (11) This paper likes to highlight the effect of the variable selection approach, either complex or real, on the features and behavior of the proposed system.In the system, this paper considers v = v l + qv p to be a complex variable.In this vein, the real form of the paradigm investigates: System (Eq.12) seems to have 6 quadratic nonlinear and 2 constant terms.The system's (Eq.12) birefringent condition is the same in system (Eq.4).Regardless, there is no modification that makes structure (Eq.12) a symmetric system, despite the fact that this is evident in the system (Eq.4).Situations (Eq.12) have stabilized, indicating that they are essentially the same as other identified in the system (Eq.4), but with a more intertwined form, as shown by the following: Where Its characteristic polynomial is: The eigenvalues are: This fixed point is stable if: Otherwise, it is an unstable fixed point.As with E 1 , the stability ofE 2 , E 3 , E 4 , E 5 can be tested.
Two equivalent chaotic (or hyperchaotic) complex nonlinear systems of the type (Eq. 1) are considered, one of which is the master system (signified by the subscript r ) as follows: and the second is the monitored slave system (defined by the subscript h) as follows: Where, the added substance complicated monitor P = (P 1 , P 2 , ..., P m ) T = P l +q P p , P l = P l 1 , P l 2 , ..., P l m T , Two combined, complex dimensional structures will display CAC in a master slave configuration if a complicated error task vector Eoccurs, for example: Where E = E l + q E p = s a 1 , s a 2 , ..., s a m T , X r and X h are the master and slave's vector which are complex in nature.
Now, the meaning of CAC is applied to the systems (Eq.15) and (Eq.16): So, moreover, the error complex dynamical system can be derived from chaotic complex systems (Eq.15) and (Eq.16) as follows: The error complex structure, which is obtained by separating the real and imaginary parts of Eq. ( 22), is as follows: The positive unequivocal quantity of Lyapunov function with respect to positive parameters in the system (Eq.23) is: Remember some along the chaos system's path (Eq.23), the average period derivative of N (tim) is as follows: The main subsidiary Ṅ (tim) < 0 is made by a wise strategy of the controller L l , L p .Thus, the ability to perform CAC is gained.As a result, the slave and master systems' requirements would be globally synced asymptotically.
Remark 1 According to Eq. ( 18), the difference between slave system's real part a l h and master system's imaginary part a p r goes to zero as tim → ∞ (CS).
Remark 2 When tim → ∞, the whole imaginary part of slave system a p h and the real part of master system a l r disappear in Eq. ( 19) (AS).

Remark 3 CAC combines CS and AS in Remarks 1 and 2. 123
Finally, this scheme is described by implementing it in "Proposed methodology" for chaotic attractors of complex nonlinear systems (Eq.3).
This segment analyzes the CAC issue of a chaotic complex system (Eq.3) with some parameters.As a result, the master and slave systems are described as follows: and where a r = a l r +qa With the intention of achieving control signals in mind, the complex chaotic states between the supervised slave system and the supervising expert system are described as: where s a = s m a + qs This paper uses condition (Eq.26) from (Eq. 27) and using (Eq.28) to get the complex error dynamical structure (Eq.23): Condition (Eq.29), on the other hand, represents a complex dynamical system in which the "errors" evolve over time.
A complex Lyapunov function can now be defined as follows for positive parameters c, d: Along the framework's arrangement (Eq.29), the subsidiary of Ṅ (tim) is: For the complex control capabilities, there are various options.In the event that this paper considers such controllers as: The following is a true representation of the dynamic control work (Eq.32): Remark 4 As we look at the CAC issue for the framework (Eq.3), and the variable v has a complicated system and hyperchaotic behavior (v = v m + J acv p ), we get the corresponding controller in condition (Eq.33):  The CAC of chaotic (or hyperchaotic) dynamic system, where a parameter of the primary system coordinates with an alternative parameter of the secondary system, is a motivating type of coordination since it provides incredible protection in safe interaction.This paper considers system (Eq.26), which is chaotic (or hyperchaotic), as a sender system, and system (Eq.27) as a receiver, which is chaotic (or hyperchaotic).With one aspect, this paper chooses l (tim) = 6 cos tim + 4 as the information movement.Suppose that l (tim) = l (tim)+a l r is applied to the vector b . The chaotic (or hyperchaotic) structure seen in Fig. 1 is used to encrypt and decrypt the data signal l (tim) It shows an outline for proposed CAC communication system, in which the chaotic (or hyperchaotic) systems (Eq.26) and (Eq.27), including both, are the sender and receiver systems.
Figures 2, 3, 4 and 5 depict the numerical effects of application to secure communications.Figures 2 and 3 display the data signal l (tim) and the transmitted signal l (tim), respectively.Figure 4 depicts the recovered information signals, which is whatever has been transmitted by l * (tim) = l (tim) + a  Strong data sharing protection attributed to the reason that the master system's state parameter synchronizes with slave system's state parameter.This portion has never been discovered in previous sensitive communications examinations.2. Prior protection connectivity systems were based on a single type of coordination.In any case, this paper offers two types of coordination systems (CS and AS).This will result in increased data transfer protection.
Two neural networks will be involved in the coordinating procedure at any one moment.Both have a unique neural network structure known as the Triple Layer Tree Parity Machine (TLTPM).Reciprocal learning will fully coordinate all devices.The same TLTPM's weights can then be used as a session key.Let A and B are two IoT devices.Initializing, estimation, modification, assessment, and termination are the five steps of the neural coordination procedure to generate a common session key at both IoT devices.Otherwise, the computation will be finished.

Termination strategy:
A and B establish their shared key by coordinating their weights.The neural key agreement operation is approaching completion.
Once the outcomes of the both TLTPMs G and D matched, ζ G = ζ D modifies the weights according to one of the rules: Using Hebbian learning algorithm, both TLTPMs will be learnt from each other (Eq.36).
These TLTPMs are learnt by reversing their outputs in the Anti-Hebbian direction (Eq.37).
The random-walk learning rule is used when the predetermined value of result isn't relevant for altering because it is the identical for the two TLTPMs (Eq.38).
As cryptographic keys, use these coordinated weights.
As seen in Fig. 6, the system (Eq.4) has chaotic attractors if c ∈ [7.6, 19.8] .For just c lying in the intervals of time (0, 7.6) , (19.8, 30], the sporadic attractors of (Eq.4) occur.This paper performs a comparative analysis of alternative variables, much as performed with variable c, and found chaotic results in each case.As a consequence, we are satisfied with the findings of variable c.
This paper finds the differentiation graphs details of the structure (Eq.4) in Figs. 7, 8, 9, 10, and 11 as the variable a differs or changes and ensure proposed framework is chaotic.Upon on level pivot, a differentiation graph structures a system variable and on the vertical hub, a summary of the attractor's operation.As a result, differentiation graphs are c unique way to visualize how a system's behavior varies as a variable is estimated.
To investigate this theory mathematically (using, for example, Mathematica    For various learning, weight range, and constant TLTPM size, Table 5 analyzes the synchronization periods of TLTPM and CVTPM methods.When λ increases in all three rules, there is a propensity for the sync step to rise.In the λ range of 5-15, Hebbian takes fewer sync stages than other two rules, but when the λ rises, Hebbian uses more sync steps than the others. For system (Eq.3) with a complex parameterv = v l + qv p , the Lyapunov Exponents and bifurcation diagrams are These figures are depicted with identical parameters in the previous segment's initial conditions, v = 2 + 3q.As seen in Fig. 16, ignoring i 4 , i 5 the system (Eq.3) contains hyperchaotic attractor in the interval [7.6, 19.9] and cyclic attractors if c ∈ (0, 7.6) , (19.9, 30]. Figure 16 depicts the most remarkable perspective that could be used in this review.The chaotic activity was distorted, and a dynamic parameter was regulated in system (Eq.3) with the replacement of one of the actual parameters.This illustrates the effect of dynamic parameters on the characteristics and performance of nonlinear dynamic systems.Following Figs.16     To demonstrate and confirm the proposed scheme's estimate, we compare the CAC's amusement outcomes in two   similar chaotic dynamic frameworks (Eq.26) and (Eq.27).The frameworks (Eq.26) and (Eq.27) with the help of system controller (Eq.32) are numerically illuminated, and the variables are initialized to ρ = 23, μ = 6, ν = 10..The requirement of the master system, as well as the   This implies that LS bridges the gap between the hypothetical (Eq.26) and the real (Eq.27) framework pieces.While ALS happens among the   considerations.After a small estimate of tim, the errors will approach zero.Another phenomena are depicted in Figs.34 and 35, but it does not appear in a wide range of synchronization in written work.In CAC, the attractors of the master and slave frameworks move in opposite or orthogonal directions with a hazy structure, as seen in Figs 34 and 35.Figures 36,37,38 and 39 depict the master system's (Eq.26) and slave system's module and step failures (Eq.27).From Figs. 36 and 37, it has been seen that the modules errors βa r − βa h , βb r − βb h converge to 0 as tim → ∞ while   7.The TLTPM's sync interval is much shorter than the TPM-FPGA's, as shown by the table.The Anti-Hebbian, in com-

Conclusion and future scope
The key exchange techniques proposed by Dong and Huang [8] and Jeong et al. [12] were the subject of the first part of this study.Their shortcomings were also stated in this article.Second, this paper has proposed neural network coordination using the 5D hyperchaotic (or chaotic) nonlinear dynamic  complex system to construct the key exchange mechanism to solve the current problems.Third, while there are no complex variables, the properties and components of this system were analyzed, and when there are complex variables, they were studied again.The surprise was that if all of the variables were real, the system had chaotic behavior, but if one of the variables in the complex, the behavior shifted to become hyperchaotic.Fourth, Complex Ant-Coordination (CAC) is a new kind of complex coordination that this paper implement.A definition of CAC is provided for two uncertain chaotic (or hyperchaotic) complex structures.The CAC of two unknown hyperchaotic (or chaotic) nonlinear complex systems is also investigated.CAC provides more transparent protection in secured exchanges.Via various state parameters, the attractors of the master and slaves systems shift in the opposite or anisotropic direction to one another, which is typical of a CAS.This effect did not occur and did not appear in the arrangement with any kind of coordination.Not only does the proposed strategy has the requisite security measures, but it also has a greater level of effectiveness.This article discusses the comprehensive security assessment.Fourth, the agreement's practicality is assessed, and contemporary CVTPM, TPM-FPGA, and VVTPM methods are compared.Finally, experiments are used to assess the values for τ 1, τ2, τ3, N and λ, which emphasize protection against an attacking network.This indicates that two approved TLTPMs would most likely share a secret key in a channel.Finally, the findings show that the proposed approach is a successful key swap over mechanism for IoT devices including both terms of effectiveness and protection.To increase the security of IoT devices in the future, a more comprehensive security review will be performed.Two main aspects would need to be changed in the future.
One is to further minimize neuronal coordinating latency, and the other is to execute a fresh neuronal synchronization instead of a long one.A far more extensive investigation of the network's protection is expected in the future.

1 ,
p r , b r = b l r +qb p r , a h = a l h +qa p h , b h = b l h +qb p h and P 1 = P l 1 +q P p P 2 = P l 2 +q P p 2 are complex capacities, which is to be decided.

pa
, s b = s m b + qs p b , denotes the capacity for complex errors.

Ṅ
(tim) is a positively distinctive potential in the segment of zero organization of errors representation (Eq.29), and its derivative is adversely different.As a result, Lyapunov's immediate strategy indicates that the framework's balance purposes s m a = a m h the system (Eq.29) is asymptotically stable and s a → 0, s b → 0 as tim → ∞

ph
− b l h .Because, after completing CAC with the controller system(35) a l r + a p h = 0, b l h − b p r = 0.The failure trajectory between the original data signal and the decrypted one is depicted in Fig.5.It is not complicated to see from Fig.5that the data signal l (tim) is exactly retrieved after a small residual.

Fig. 12 a
Fig. 12 a l vs. g vs. b l

Fig. 15 a
Fig. 15 a p vs. b p vs. b l . The TLTPM, which uses the Random Walk learning algorithm, has a much faster coordinating period than the VVTPM.The structure in Figs.22 and 23 are hyperchaotic, and the cyclic attractor in Figs. 24, 25 with identical parameters in initial conditions in the preceding part with v = 2 + 3q.

Fig. 22 g
Fig. 22 g vs. b l vs. a l

Fig. 23 b
Fig. 23 b l vs. g vs. b p

Fig. 24 bFig
Fig. 24 b l vs. g vs. a p

Fig
Fig. e l a vs. tim

Fig. 34
Fig. 34 b l r (tim) , b p h (tim) vs. a p r (tim) , a l h (tim) vs. (a l r (tim), a p h (tim))

Table 1
Strengths and constraints of cutting-edge techniques

Table 5
TLTPM and CVTPM syncing times are compared

Table 6
compares the TLTPM and VVTPM time synchronization approaches using the Random Walk method

Table 6
TLTPM and VVTPM syncing times are compared λ Value TLTPM Sync.time in random walk (in cycle) VVTPM Sync.time in random walk (in cycle) Jeong et al. [12]

Table 7
TLTPM and TPM-FPGA sync times are compared