LORENZ-BASED CHAOTIC SECURE COMMUNICATION SCHEMES

Similar documents
REVIEW OF CIRCUIT IMPLEMENTATION OF SYNCHRONIZED CHAOS WITH APPLICATION TO COMMUNICATION BY: ABHISHEK SINGH AND DIVYA GROVER

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Communicating using filtered synchronized chaotic signals. T. L. Carroll

Performance Analysis of Correlation-Based Communication Schemes Utilizing Chaos

EXPERIMENTAL STUDY OF IMPULSIVE SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC CIRCUITS

A Novel Spread Spectrum System using MC-DCSK

BEING wideband, chaotic signals are well suited for

Digital Chaotic Synchronized Communication System

TRANSMITING JPEG IMAGE OVER USING UPA AND CHOTIC COMMUNICATION

A New Secure Communication Model Based on Synchronization of Coupled Multidelay Feedback Systems

Kolumbán, Géza; Kennedy, Michael Peter

A Multiple-Access Technique for Differential Chaos-Shift Keying

IN THIS PAPER, we present a new, general design 1 for

DIGITAL communications based on chaotic circuits were

A NOVEL FREQUENCY-MODULATED DIFFERENTIAL CHAOS SHIFT KEYING MODULATION SCHEME BASED ON PHASE SEPARATION

Improving security of communication systems using CHAOS

Zipping Characterization of Chaotic Sequences Used in Spread Spectrum Communication Systems

A New Chaotic Secure Communication System

Communicating with noise: How chaos and noise combine to generate secure encryption keys

Journal of American Science 2015;11(7)

A chaotic lock-in amplifier

Synchronization Analysis of a New Autonomous Chaotic System with Its Application In Signal Masking

Chaos and Analog Signal Encryption

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /TCSI.2001.

SYNCHRONIZATION METHODS FOR COMMUNICATION WITH CHAOS OVER BAND-LIMITED CHANNELS

Secure communication by chaotic synchronization: Robustness under noisy conditions

Chaotic Communications With Correlator Receivers: Theory and Performance Limits

Project: IEEE P Working Group for Wireless Personal Area Networks N

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 51, NO. 2, FEBRUARY

TDMA SECURE COMMUNICATION SCHEME BASED ON SYNCHRONIZATION OF CHUA S CIRCUITS

A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS

Communication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback

Signal Encryption Using a Chaotic Circuit

MASKING OF MESSAGES USING THE DOUBLE SCROLL ATTRACTOR IN PRIVATE COMMUNICATIONS +

Performance Characterization of High-Bit-Rate Optical Chaotic Communication Systems in a Back-to-Back Configuration

Chaos-Based Encryption of ECG Signals: Experimental Results

CMOS cryptosystem using a Lorenz chaotic oscillator

Radar Waveform Generation and Optimization based on Rossler Chaotic System

Implementation of DSSS System using Chaotic Sequence using MATLAB and VHDL

Rich Variety of Bifurcation and Chaos in a Simple Non-Source Free Electronic Circuit with a Diode

TRANSMISSION OF DIGITAL CHAOTIC AND INFORMATION- BEARING SIGNALS IN OPTICAL COMMUNICATION SYSTEMS

Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique

Use of Matched Filter to reduce the noise in Radar Pulse Signal

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

C design and generation, with potential applications to

Analysis of Ternary and Binary High Resolution Codes Using MATLAB

Optimum PID Control of Multi-wing Attractors in A Family of Lorenz-like Chaotic Systems

Transmission of Binary Information with a Chaos Coded Communication System using QDPSK-Modulation*

Study of an Optical Chaotic Steganographic Free Space System

Intermittent Chaos in Switching Power Supplies Due to Unintended Coupling of Spurious Signals

Chaotic Circuits and Encryption

Multipath Combining in Chaotic Direct-Sequence Spread Spectrum Communications through Dual Estimation

PI Controller Applied in a Signal Security System Using Synchronous Chaos of Chua's Circuit

Numerical Simulation of Chaotic Laser Secure Communication. Qiang Ke

Spread Spectrum Techniques

Chaos-Based Underwater Communication With Arbitrary Transducers and Bandwidth

Performance Improvement of Wireless Communications Using Frequency Hopping Spread Spectrum

Performance Analysis Of Multi Carrier CDMA System

PERFORMANCE ANALYSIS OF CHAOTIC CHIRP SPREAD SPECTRUM SYSTEM IN MULTIPATH ENVIRONMENT

Methods for Reducing the Activity Switching Factor

Chaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time Systems

UNIVERSITY OF CALGARY. Performance Evaluation of Blind Channel Equalization. Techniques for Chaotic Communication. C N Sivaramakrishnan Iyer A THESIS

Design of a Digital Transmission System Using ASAK for the Transmission and Reception of Text Messages Using LABVIEW

Research on DQPSK Carrier Synchronization based on FPGA

A Chaotic Direct-Sequence Spread-Spectrum System for Underwater Communication

Anti-Jamming Performance of Chaotic Digital Communication Systems

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

AMPLITUDE MODULATION

SOFTWARE DEFINED RADIO IMPLEMENTATION IN 3GPP SYSTEMS

arxiv: v1 [nlin.cd] 29 Oct 2007

TIME encoding of a band-limited function,,

Some Applications of Chaos in Power Converters

Jitter in Digital Communication Systems, Part 1

PERFORMANCE ENHANCEMENT OF MC-DS/CDMA SYSTEM USING CHAOTIC SPREADING SEQUENCE

Multiple Access for UWB Impulse Radio With Pseudochaotic Time Hopping

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

FPGA implementation of DWT for Audio Watermarking Application

German Jordanian University Department of Communication Engineering Digital Communication Systems Lab CME 313-Lab

YEDITEPE UNIVERSITY ENGINEERING FACULTY COMMUNICATION SYSTEMS LABORATORY EE 354 COMMUNICATION SYSTEMS

Chapter 2 Direct-Sequence Systems

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast

Chapter-1: Introduction

UNIT-1. Basic signal processing operations in digital communication

The Role of Synchronization in Digital Communications Using Chaos Part I: Fundamentals of Digital Communications

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Study on the UWB Rader Synchronization Technology

Synchronization in Chaotic Vertical-Cavity Surface-Emitting Semiconductor Lasers

Secure digital communication using discrete-time chaos synchronization

Multi-User Multi-Carrier Differential Chaos Shift Keying Communication System

two computers. 2- Providing a channel between them for transmitting and receiving the signals through it.

Simultaneous amplitude and frequency noise analysis in Chua s circuit

A new high frequency realization of Chua s chaotic circuit using current feedback operational amplifiers (CFOA s)

Hardware/Software Co-Simulation of BPSK Modulator and Demodulator using Xilinx System Generator

2. TELECOMMUNICATIONS BASICS

Laboratory 5: Spread Spectrum Communications

(Refer Slide Time: 3:11)

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

Wireless Chaos-Based Communication Systems: A Comprehensive Survey

Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

Transcription:

LORENZ-BASED CHAOTIC SECURE COMMUNICATION SCHEMES I.A. Kamil and O.A. Fakolujo Department of Electrical and Electronic Engineering University of Ibadan, Nigeria ismaila.kamil@ui.edu.ng ABSTRACT Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. Keyword: Secure communication, Chaos, Lorenz system, Modulation. INTRODUCTION Recent years have witnessed appreciable growth in personal communications most especially in the area of mobile communication and the internet [,]. Data encryption and security are essential ingredients of personal communication that are recently receiving attention because of the need to ensure that the information being sent is not intercepted by an unwanted listener. Besides, these are very essential for protecting the content integrity of a as well as its copyright []. A secure communication system as it is generally called, transforms the information signal in such a way that only an authorized receiver who has a prior knowledge of the transformation parameters can receive the information. The security of this information is a measure of the difficulty encountered by an unauthorized interceptor who attempts to decode it. There have been a good number of approaches to secure communications reported in the literature, but most of the commonly employed conventional encryption and security schemes are complex in hardware [3,4]. A secure communication is not only a system where privacy is ensured, it must also ensure the integrity of the transmitted i.e. the exact information meant for the receiver is received. Chaos based secure communication has been of much interest in the recent time since it offers potential advantage over conventional methods due to its simplicity [3] and high unpredictability which means higher security. Besides, analog implementation is possible []. Many secure communication schemes have been reported in literature but only a few of them have actually witnessed practical implementation. This paper attempts to model and simulate four of these schemes using Simulink in Matlab. The choice of Simulink was to bring the schemes as close to practical implementation as possible since each Simulink block can easily be replaced by a practical unit. The four schemes considered were Chaotic Masking, Chaos On-Off Keying, Chaos Shift Keying and Differential Shift Keying. Volume 7 Number Page 48 www.ubicc.org

. THEORY.. Background Chaos communication is rather a new field in the communication research. It evolved from the study of dynamical systems, not only in mathematics, but also in physics or electrical engineering somewhere at the beginning of 99 [6]. Prior to this period, the evolution of chaos has caused much euphoria among the mathematicians and physicists, while the engineering community has observed the development with skepticism. Chaotic signals are irregular, aperiodic, uncorrelated, broadband, and impossible to predict over long times. These properties coincide with the requirements for signals applied in conventional communication systems, in particular spreadspectrum communications, multi-user communications, and secure communication... Chaotic System The system employed in this work is the Lorenz system One of the earliest indications of behaviour was developed by Edward N. Lorenz in the 6 s [7]. [8] stated that the Lorenz system was published as a model of two-dimensional convection in a horizontal layer of fluid heated from below. The original equations for this 3 rd order nonlinear system are [9-]: = + = () = + where x, y and z are the variables and σ, r and b are dimensionless parameters usually assumed positive. Varying the values of the parameters leads to series of bifurcation and eventually chaos. Typical parameter values are σ=, b=8/3 and r= [9]..3. Chaos Modulation Schemes Four modulation schemes considered in this paper are Chaotic Masking (CM), Chaos On-Off Keying (COOK), Chaos Shift Keying (CSK) and Differential Chaos Shift Keying (DCSK)..3. Chaotic Masking In masking, two identical are used: one at the transmitter end and the other at the receiver. As shown in Fig., the signal m(t) is added to the mask signal c(t) giving the transmitted signal s(t). The system at the receiver end produces another copy of the mask signal ( ) which is subtracted from the transmitted signal r(t) to obtain the recovered signal ( ). Assuming a noise free and perfect synchronization between the two systems, s(t)=r(t), c(t)= ( ) and m(t)= ( ). For higher security of the signal, Yang reported that the signal is typically made about db to 3dB weaker than the signal [3]..3. Chaos Shift Keying In this modulation scheme, the signal, which is a digital signal, is used to switch the transmitted signal between two statistically similar attractors ( ) and ( ) which are respectively used to encode bit and bit of the signal. The two attractors are generated by two systems with the same structure but different parameters [3, 4]. At the receiver end, the received signal is correlated with a synchronized reproduction of any of the two signals used in the transmitter. The signal is recovered by low-pass filtering and threshholding the synchronization error. The block diagram representation of the scheme is shown in Fig...3.3 Chaos On-Off Keying Chaos On-Off Keying is similar to CSK in all respects except that only one signal is used in transmission of signal. When the signal is bit, the signal is transmitted, but when the signal is bit no signal is transmitted. The same procedure is used in demodulating the received signal as in CSK as shown in Fig. 3. c(t) s(t) r(t) m(t) messag e ( ) recovered Figure : Chaotic Masking synchronization ( ) Volume 7 Number Page 49 www.ubicc.org

system ( ) ( ) ( ) signal ( ) synchronization LPF and thresholding ( ) recovered Figure 3: Chaos Shift Keying synchronization LPF and thresholding recovered Figure : Chaos On-Off Keying sample functions are correlated in the receiver and the decision is made by thresholding []. 3. SIMULATION 3.. Lorenz system Cuomo et al observed that a direct implementation of Eq.() with an electronic circuit is difficult because the state variables in Eq.() occupy a wide dynamic range with values that exceed reasonable power supply limits [6]. However, this difficulty can be eliminated by a simple transformation of variables; specifically, for the coefficients σ, r, and b used, an appropriate transformation is u=x/, v=y/, and w=z/. With this scaling, the Lorenz equations are transformed to: = ( ) = () = The above equation was implemented using Simulink with the parameter values taken as σ=6, r=4.6, and b=4.the time series for the three state variables is shown in Fig.. 3.. Self Synchronization of Lorenz system The receiver is made up of two stable subsystems decomposed from the original system using Pecora & Carrol Scheme [6-9]. In the second approach using v as the drive signal, the first subsystem, (u ), is given by: = ( ) (3) The second response subsystem, (, ), is given by: = = (4).3.4 Differential Chaos Shift Keying In Differential Chaos Shift Keying, no synchronization is required as in the other three schemes earlier described. The same signal used at the transmitter (called reference signal) is transmitted and used to demodulate the signal at the receiver end. This is illustrated in Fig. 4. In this scheme, every bit is transmitted two sample functions. The first sample function serves as the reference while the second one carries the information. Thus, bit is sent by transmitting the reference signal twice in succession and bit is sent by transmitting the reference signal followed by an inverted copy of the reference signal. The two system - Delay Clock, Tb Delay LPF and thresholding Clock, Tb Figure 4: Differential Chaos Shift Keying Recovered signal Volume 7 Number Page www.ubicc.org

The complete response system is therefore given by: = ( ) = () = Since the two subsystems are stable, as t. Thus synchronization is achieved. The transmitter and the receiver systems were modeled with Simulink. For the transmitter, the initial conditions were u()=, v()= and w()= y and for the receiver, the initial conditions were ()=, ()= and ()=. A parameter variation of. was also introduced between the transmitter and receiver systems. The time series and orbit difference for the two systems are as shown in Fig. 6. 3.3. Chaos Modulation Schemes The four schemes earlier described were modeled and simulated with Simulink using self-synchronized Lorenz system. The simulation results are shown in Figs. 7 to. u v w - - 4 Figure : Lorenz system time series u v w y x -4 x -4 x -4 v' v v/v' -... 3 3. 4 4. x -4 (v'-v) -... 3 3. 4 4. x -4 Figure 6: Self synchronization of two Lorenz systems using v as drive signal with different initial conditions and parameter values, series of v and v Synchronization Error. Volume 7 Number Page www.ubicc.org

- - -. (d) -.. (e). -. Figure 7: Chaotic Masking using Lorenz systems signal transmitted signal recovered signal with synchronization error (d) transmitted signal (e) recovered signal - -.. (d). -.. (e). -. Figure 8: Chaos Shift Keying using Lorenz systems transmitted signal correlated signal thresholded and filtered signal (d) transmitted signal (e) recovered signal Volume 7 Number Page www.ubicc.org

- -. (d). -.. (e). -. Figure 9: Chaos On-Off Keying using Lorenz systems transmitted signal correlated signal thresholded and filtered signal (d) transmitted signal (e) recovered signal -...3.4..6.7.8.9. -...3.4..6.7.8.9. -...3.4..6.7.8.9. (d) -...3.4..6.7.8.9. (e) -...3.4..6.7.8.9. (f).. -....3.4..6.7.8.9. (g).. -....3.4..6.7.8.9. Figure : Differential Chaos Shift Keying using Lorenz systems signal transmitted signal correlated signal (d) thresholded signal (e) filtered signal (f) transmitted signal (g) recovered signal Volume 7 Number Page 3 www.ubicc.org

4. DISCUSSIONS The results obtained in Fig 6 showed that a difference in initial conditions and slight parameter variation that would otherwise cause the two systems to produce divergent time series, had no effect when the two were synchronized using self synchronization approach. Figs. 7, 8, 9 and confirmed the effectiveness of the four modulation schemes as the signals were recovered at the receiver. The transmitted signal waveforms confirmed the security of the chaos modulation schemes. It could be observed that DCSK provided the highest security followed by masking. COOK provided the lowest level of security. The data transmission rate of DCSK was however twice those of others.. CONCLUSSION We have discussed in this paper the use of Simulink to demonstrate various secure communication schemes. We have assumed an ideal noiseless communication in this study. Further work is on going to demonstrate same for a practical noisy. 6. REFERENCES [] M. P. Kennedy, R. Rovatti, and G. Setti, Chaotic Electronics In Telecommunications. Boca Raton: CRC Press LLC,. [] W. Bender, N. Gruhi, A. Morimoto, and H. Lu, "Techniques in Data Hiding " IBM Systems Journal, vol. Vol. 3, pp. pp 33-336, 996. [3] M. Itoh, "Spread Spectrum Communication Via Chaos " Int. Jour. of Bifurc. & Chaos, vol. Vol. 9, pp. pp. -3, 999. [4] A. R. Volkovskii, L. S. Tsimring, N. F. Rulkov, and I. Langmore, "Spread Spectrum Communication System with Chaotic Frequency Modulation," Chaos, vol. Vol., pp. pp. -6,. [] L. S. Tsimring and R. Tenny, "Security Issues in Chaos-based Communication and Encryption,," Proc. of Winter School on Chaotic Communication, Institute for Nonlinear Science, UCSD, 3. [6] A. Abel and W. Schwarz, "Chaos Communications Principles, Schemes and Systems," Proc. IEEE, vol. vol. 9, no., pp. p.69-79,. [7] E. N. Lorenz, "Deterministic non-periodic flow," Journal of Atmo. Sci., vol. Vol., pp. pp. 3-4, 963. [8] P. G. Drazin, Nonlinear Systems Cambridge University Press., 99. [9] Y. Gauthier, "Application of the Lorenz Chaotic System to Secure Communication and Encryption," Carleton University., 998. [] http://en.wikipedia.org/wiki/lorenz_attractor, "Lorenz Attractor," Wikipedia, the free encyclopedia, 8. [] C. Sparrow, "The Lorenz Equations," Chaos, ed. A.V. Holden, Princeton Univ. Press, 986. [] E. Sánchez and M. A. Maltiás, "Transition to Chaotic Rotating Waves in Arrays of Coupled Lorenz Oscillators," Int. Jour. of Bifurc. & Chaos, vol. Vol. 9, pp. pp. 33-343, 999. [3] T. Yang, "A Survey of Chaotic Secure Communication Systems," Int. Jour. of Comp. Cognition, vol. Vol., pp. pp 8-3, 4. [4] H. Yu and H. Leung, "A Comparative Study of Different Chaos Based Spread Spectrum Communication Systems," Proc. IEEE Int. Symp. Cct. & Syst. (ISCAS ), vol. Vol., pp. pp. 3-6,. [] G. Kolumban, M. P. Kennedy, and L. O. Chua, "The Role of Synchronization in Digital Communications Using Chaos Part II: Chaotic Modulation and Chaotic Synchronization," IEEE Trans. Circuits & Syst. I: Fund. Theory & Appli., vol. Vol. 4, pp. pp. 9-4, 998. [6] K. M. Cuomo, A. V. Oppenheim, and S. H. Strogatz, "Synchronization of Lorenz-Based Chaotic Circuits with Applications to Communications," IEEE Trans. Circuits & Syst. II - Analog & Digital Signal Processing, vol. Vol. 4, pp. pp. 66-633, 993. [7] S. Boccaletti, A. Farini, and F. T. Arecchi, "Adaptive Synchronization of Chaos for Secure Communication." Phy. Rev. E, vol. Vol, pp. pp. 4979-498, 997. [8] T. L. Carroll, "Communicating with Use of Filtered, Synchronized, Chaotic Signals," IEEE Trans. Cct. & Sys. I- Fund. Theo. & Appl., vol. Vol. 4, pp. pp. -, 99. [9] L. M. Pecora and T. L. Carroll, "Synchronization in Chaotic Systems," Phy. Rev. Lett., vol. Vol 64, pp. pp. 8-84, 99. Volume 7 Number Page 4 www.ubicc.org