首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We consider the problem of detection and estimation of chaotic signals in the presence of white Gaussian noise. Traditionally this has been a difficult problem since generalized likelihood ratio tests are difficult to implement due to the chaotic nature of the signals of interest. Based on Poincare's recurrence theorem we derive an algorithm for approximating a chaotic time series with unknown initial conditions. The algorithm approximates signals using elements carefully chosen from a dictionary constructed based on the chaotic signal's attractor. We derive a detection approach based on the signal estimation algorithm and show, with simulated data, that the new approach can outperform other methods for chaotic signal detection. Finally, we describe how the attractor based detection scheme can be used in a secure binary digital communications protocol.  相似文献   

2.
We present the multi-amplitude level minimum shift keying (M-ary MSK) modulation scheme for long haul optically amplified transmission systems. New configurations of optical M-ary MSK transmitters using two cascaded electro-optic phase modulators are proposed and its detailed operation principles are expressed. The optical receiver for optical multi-amplitude MSK modulation format requires both amplitude direct-detection and differential phase balanced-detection. Numerical results on spectral characteristics, dispersion tolerance and the relationship between amplitude and phase with launched average power for long-haul transmission of multi-level MSK modulation format are presented. The dispersion tolerance shows that the 2-amplitude MSK at 80 Gb/s is well compared with 40 Gb/s binary MSK modulation format.  相似文献   

3.
Secure communications are a prospective application of the technologies originating from quantum information physics. Antisqueezed light, which is not necessarily in a quantum state, is a candidate for secure optical communications because it is tolerant to loss and amplification. We transmitted antisqueezed light, generated with a reflection-type fiber interferometer, through 100 km dispersion-shifted fibers including two erbium-doped fiber amplifiers for the first time. The coding was pseudo-randomized phase-shift keying, and the combination of the pseudo-randomization and antisqueezed fluctuations increased the bit-error rate of eavesdroppers, suggesting that our system is a technological candidate for future secure optical communications.  相似文献   

4.
A scheme for implementing secure communication based on chaotic maps and strong tracking filter (STF) is presented, and a modified STF algorithm with message estimation is developed for the special requirement of chaotic secure communication. At the emitter, the message symbol is modulated by chaotic mapping and is output through a nonlinear function. At the receiver, the driving signal is received and the message symbol is recovered dynamically by the STF with estimation of message symbol. Simulation results of Holmes map demonstrate that when message symbols are binary codes, STF can effectively recover the codes of the message from the noisy chaotic signals. Compared with the extended Kalman filter (EKF), STF has a lower bit error rate.  相似文献   

5.
驱动函数切换调制实现超混沌数字保密通信   总被引:5,自引:0,他引:5       下载免费PDF全文
孙琳  姜德平 《物理学报》2006,55(7):3283-3288
在主动-被动分解同步的基础上,提出了一种利用不同超混沌系统的驱动函数切换调制实现数字保密通信的方案.根据二进制信号“0”和“1”的传输情况交替发射两个不同的驱动函数,这就增加了发射信号的复杂度,减少了信号的相关性.且通过进行多次非线性变换加密,进一步设置了新的密钥,使得基于预测法的攻击完全失效.理论分析和模拟结果均表明本方案在实现超混沌数字保密通信时的有效性. 关键词: 超混沌 主动-被动分解法 切换调制 保密通信  相似文献   

6.
《Physics letters. A》1998,245(6):495-510
In chaotic secure communications, message signals are scrambled by chaotic dynamical systems. The interaction between the message signals and the chaotic systems results in changes of different kinds of return maps. In this paper, we use return map based methods to unmask some chaotic secure communication systems; namely, chaotic shift keying (chaotic switching), chaotic parameter modulation and non-autonomous chaotic modulation. These methods are used without knowing the accurate knowledge of chaotic transmitters and without reconstructing the dynamics or identifying the parameters of chaotic transmitters. These methods also provide a criterion of deciding whether a chaotic secure communication scheme is secure or not. The effects of message signals on the changes of different return maps are studied. Fuzzy membership functions are used to characterize different kinds of changes of return maps. Fuzzy logic rules are used to extract message signals from the transmitted signal. The computer experimental results are provided. The results in this paper show that the security of chaotic secure communication not only depends on the complexity of the chaotic system but also depends on the way the message is scrambled. A more complex chaotic system is not necessary to provide a higher degree of security if the transmitted signal has simple and concentrated return maps. We also provide examples to show that a chaotic system with complicated return maps can achieve a higher degree of security to the attacks presented in this paper.  相似文献   

7.
Direct sequence spread spectrum (DSSS) has been widely used in underwater acoustic (UWA) communications. In DSSS communications, spreading sequence’s period and chip rate are important characteristic parameters. However, these characteristic parameters may be detected in hostile environments due to the periodic nature of spreading sequence and their well-known construction process. In this paper, a novel chaotic direct sequence spread spectrum (CD3S) method is proposed for secure UWA communications. In the CD3S communications, chaotic sequences acting as encryption keys are used to encrypt the phases of transmitted signals. Consequently, the application of chaotic sequences disguises these obvious characteristic parameters of spread spectrum (SS) signals. It is difficult for unauthorized users to detect or intercept CD3S signal without knowledge of corresponding chaotic sequences. Hence, CD3S signal has a lower probability of detection and interception. Moreover, CD3S can achieve similar bit error ratio (BER) performance compared with DSSS in actual UWA communications. Also, the receivers that are suitable for DSSS communication can also be applied to CD3S communication. Numerical simulations demonstrate its excellent performance and potential applications in confidential UWA communications.  相似文献   

8.
基于UKF的多用户混沌通信   总被引:1,自引:0,他引:1       下载免费PDF全文
胡志辉  冯久超 《物理学报》2011,60(7):70505-070505
为克服信道噪声、系统参数误配及多用户干扰对混沌通信系统的影响,本文组合不同的状态空间模型并结合盲提取算法,提出了一种双无先导卡尔曼滤波器 (dual unscented Kalman filter, DUKF),以实现多用户的混沌通信.仿真结果表明,在多输入多输出信道的多用户通信环境下,该算法有较快的收敛速度,并能有效地实现多用户的混沌通信. 关键词: 混沌通信 多输入多输出 双无先导卡尔曼滤波器 盲提取  相似文献   

9.
Two modulation schemes, M-ary phase shift keying (MPSK) and M-ary frequency shift keying (MFSK), are commonly used for coherent and incoherent digital communications, respectively. Despite wide applications in underwater acoustic (UWA) communications, they are not suitable for confidential applications for their well-known generating processes and signal features. In this paper, two corresponding chaotic modulation methods are proposed to improve their security, namely chaotic MPSK (CMPSK) and chaotic MFSK (CMFSK). By application of chaotic sequences into the modulation procedures, they can prevent the unauthorized receivers from extracting information from the intercepted signals even with high SNR. The confidential performance of chaotic modulations is evaluated by a designed automatic modulation classification (AMC) system. Simulation results indicate a success identification rate of more than 90% for the MPSK and MFSK signal at the SNR from −10 dB to 40 dB, but only an identification rate of nearly zero for the CMPSK and CMFSK signal. Therefore, chaotic modulations have lower available probability and can achieve higher confidential performance. Also, an experiment was conducted to verify the performance of chaotic modulations in actual UWA communications. The experimental results show that chaotic modulations can achieve similar bit error ratio (BER) compared with conventional digital modulations, which verifies potential applications of chaotic modulations in confidential UWA communications.  相似文献   

10.
《Physics letters. A》1996,223(5):369-377
A mechanism which shows recurrent synchronism in a pair of variables of nonlinear differential equations is applied in secure communications. It is shown that the use of recurrent synchronism provides certain new features relevant within the context of spread spectrum communications.  相似文献   

11.
This article introduces the global exponential multi switching combination synchronization (GEMSCS) for three different chaotic systems with known parameters in the master-slave system configuration. The proposed GEMSCS scheme establishes the global exponential stability of the synchronization error at the origin with different combinations of state variables of the two master chaotic systems with the state variables of a slave chaotic system in diverse manners. Consequently, it increases the complexity level of the information signal in secure communications. To study the GEMSCS, an efficient nonlinear control algorithm is designed. The Lyapunov direct theorem is used to accomplish the global exponential stability of the synchronization error at the origin. The stability conditions are derived analytically. To show the effectiveness and advantages of the proposed GEMSCS control approach, two numerical examples are presented. The computer based simulation results are compared with the reported works in the relevant literature. This article also extends the idea of GEMSCS to the secure communication using the chaotic masking technique. Using the GEMSCS strategy, the information signal is recovered at the receiving system with good accuracy and high speed while the parameters of the transmitter and receiver systems mismatch. At the end, some future research problems related to this work are suggested.  相似文献   

12.
王开  裴文江  周建涛  张毅峰  周思源 《物理学报》2011,60(7):70503-070503
本文安全分析文献 所提的一类自同步的时空混沌流密码系统.发现该高维的加解密系统在常数的驱动下将收敛到一维,使得动力学系统的复杂性大为降低.在某些特定输入区域内容,保密系统对输入状态的微小扰动不敏感.可以建立密钥和特殊输入状态间一个简单的线性关系,并依次从密钥流中恢复出密钥.基于此,提出一套选择密文攻击方法,利用系统参数和扰动前后密钥流的差异之间的依赖关系通过寻优算法破解密钥,从而攻击了上述文献所提出的基于混沌自同步的安全通信算法. 关键词: 混沌密码 耦合映像格子 安全分析  相似文献   

13.
An analysis is made of a method of reconstructing signals which parametrically modulate a chaotic generator using a one-dimensional realization of its oscillation process. Test examples are used to demonstrate the efficiency of this method for simultaneous independent transmission of several information signals over a single communication channel. Zh. Tekh. Fiz. 68, 1–8 (December 1998)  相似文献   

14.
给出了一种可高质量传送数字信号的保密通信系统,该系统利用耦合同步洛伦兹混沌电路系统进行数字信号的混沌遮掩传送.模拟实验表明,传送信息保密性好,在接收端用同步的混沌信号将信息信号检出并整形后可无失真的恢复所传送的数字信号.  相似文献   

15.
This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.  相似文献   

16.
约瑟夫森结的混沌行为在研究和应用方面都具有重要的价值。电阻-电容-电感并联约瑟夫森结在直流电流的驱动下会出现混沌行为,采用数值计算的方法,对混沌行为进行了研究。通过电压波形、频谱、对初始条件的敏感依赖以及奇怪吸引子,证实了混沌的存在,在此基础上首次提出了基于约瑟夫森结混沌行为的保密通信方案。  相似文献   

17.
S. Thongmee 《Optik》2010,121(3):281-285
We propose a new design of the secure packet switching device using the nonlinear behaviors of soliton in a micro ring resonator, where the nonlinear penalty of light traveling in the device becomes beneficial. The chaotic signals are generated by a Kerr effects nonlinear type of the input soliton pulse in a micro ring resonator, where the control input power can be used to specify the output filtering signals. Some device parameters are chosen and simulated using the proposed model. The potential of using such a device for communication security is performed and discussed. For instance, the packet switching of the chaotic encoding data increases from the chaotic signal encoding of 100 bits−1. Results obtained have shown the potential of using such a proposed device for the tunable bandpass and band-stop filters, in which packet switching data can be performed and secured.  相似文献   

18.
This paper studies the adaptive synchronization of a switching system with unknown parameters which switches between the R?ssler system and a unified chaotic system. Using the Lyapunov stability theory and adaptive control method, the receiver system will achieve synchronization with the drive system and the unknown parameters would be estimated by the receiver. Then the proposed switching system is used for secure communications based on the communication schemes including chaotic masking, chaotic modulation, and chaotic shift key strategies. Since the system switches between two chaotic systems and the parameters are almost unknown, it is more difficult for the intruder to extract the useful message from the transmission channel. In addition, two new schemes in which the chaotic signal used to mask (or modulate) the transmitted signal switches between two components of a chaotic system are also presented. Finally, some simulation results are given to show the effectiveness of the proposed communication schemes.  相似文献   

19.
We report results on the numerical investigations of the dynamical behavior of a single mode semiconductor laser under the influence of double cavity optical feedback. We find that the system displays, under certain conditions, chaotic behaviors appropriate for chaos based communications. The synchronization of two unidirectional coupled (master-slave) systems is also studied. The influence of some parameters on the resynchronization and autocorrelation times is investigated. We find that the resynchronization time for the proposed scheme can be two orders of magnitude shorter when compared with that of the single-cavity feedback case. Very good conditions for message encoding by using the on/off phase shift keying encryption method are identified and examples of message encoding/decoding are presented.  相似文献   

20.
We propose a Polarization Shift Keying (POLSK) phase diversity homo-dyne system with multiplying detection in coherent optical communications. The proposed system uses only one of three Stokes parameters, which is the phase difference between two orthogonal polarizations. Although such systems using only one Stokes parameter are very sensitive to polarization fluctuation, the proposed system becomes insensitive to the linear polarization fluctuation by using the multiplying detection with a combination of in-phase and quadrature optical signal components on two orthogonal polarizations. Furthermore, insensitivity to phase noise and offset frequency and attractiveness due to homodyne type in high-speed transmissions are maintained. The most attractive feature of the proposed system is that neither a polarization controller nor electronic feedback loop for matching the state of polarization (SOP) between transmitted and local oscillator (LO) optical signals is needed. We theoretically analyze the receiver sensitivity and the power penalties of the proposed system for the cases of the elliptical SOP of received optical signals and the imbalance optical 90° hybrid.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号