首页 | 本学科首页   官方微博 | 高级检索  
     检索      


On the design of chaos-based secure communication systems
Institution:1. State Key Laboratory of Electrical Insulation and Power Equipment, Xi''an Jiaotong University, Xi''an;2. School of Electrical Engineering, Xi''an Jiaotong University, Xi''an, Shaanxi 710049, China;1. Department of applied mathematics and statistics, Institute of space Technology, Islamabad 44000, Pakistan;2. Department of Mathematics, Zhejiang Normal University, Jinhua, Zhejiang 321004, China;1. Department of Electrical Engineering, University of Zanjan, Zanjan, Iran;2. Department of Physics, Lanzhou University of Technology, Lanzhou 730050, China;1. Department of Mathematics, Jamia Millia Islamia, New Delhi, 110025, India;2. Department of Mathematics, Shivaji College, New Delhi, 110027, India;3. Department of Mathematics, University of Delhi, Delhi, 110007, India
Abstract:This paper discusses the topic of using chaotic models for constructing secure communication systems. It investigates three different case studies that use encryption/decryption functions with varying degrees of complexity and performance. The first case study explores synchronization of identical chaotic systems, which is considered the most crucial step when developing chaos-based secure communication systems. It proposes a fast mechanism for synchronizing the transmitter and the receiver that is based on the drive-response approach. The superiority and causality of this mechanism is demonstrated via contrasting its performance and practical implementation against that of the traditional method of Pecora and Carroll. The second case study explores the use of an improved cryptography method for improving the scrambling of the transmitted signals. The improvement is based on using both the transmitter states and parameters for performing the encryption. The security analysis of this method is analyzed, highlighting its advantages and limitation, via simulating intruder attacks to the communication channel. Finally, the third case study augments a parameter update law to the previous two designs such that the encryption method is more robust. It uses a decoupling technique for which the synchronization process is completely isolated from the parameter identification algorithm. The Lorenz system was used to exemplify all the suggested techniques, and the transmission of both analog and digital signals was explored, while investigating various techniques to optimize the performance of the proposed systems.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号