The optical chaotic communication system using open-loop fiber transmission is studied under strong injection conditions. The optical chaotic communication system with open-loop configuration is studied using fiber tr...The optical chaotic communication system using open-loop fiber transmission is studied under strong injection conditions. The optical chaotic communication system with open-loop configuration is studied using fiber transmission under strong injection conditions. The performances of fiber links composed of two types of fiber segments in different dispersion compensation maps are compared by testing the quality of the recovered message with different bit rates and encrypted by chaotic modulation (CM) or chaotic shift keying (CSK). The result indicates that the performance of the pre-compensation map is always worst. Two types of symmetrical maps are identical whatever the encryption method and bit-rate of message are. For the transmitting and the recovering of message of lower bit rate (1 Gb/s), the post-compensation map is the best scheme. However, for the message of higher bit rate (2.5 Gb/s), the parameters in communication system need to be modified properly in order to adapt to the high-speed application. Meanwhile, two types of symmetrical maps are the best scheme. In addition, the CM method is superior to the CSK method for high-speed applications. It is in accordance with the result in a back-to-back configuration system.展开更多
A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition.The performance of the new decoding method is numerically investigated by comparing it ...A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition.The performance of the new decoding method is numerically investigated by comparing it with the common decoding method without decoder.For new decoding method,two cases are analyzed,including whether or not the output of the decoder is adjusted by its input to receiver.The results indicate the decoding quality can be improved by adjusting for the new decoding method.Meanwhile,the injection strength of decoder can be restricted in a certain range.The adjusted new decoding method with decoder can achieve better decoding quality than decoding method without decoder when the bit rate of message is under 5 Gb/s.However,a stronger injection for receiver is needed.Moreover,the new decoding method can broaden the range of injection strength acceptable for good decoding quality.Different message encryption techniques are tested,and the result is similar to that of the common decoding method,indicative of the fact that the message encoded by using Chaotic Modulation(CM) can be best recovered by the new decoding method owning to the essence of this encryption technique.展开更多
The Chaotic Baseband Wireless Communication System(CBWCS)is expected to eliminate the Inter-Symbol Interference(ISI)caused by multipath propagation by using the optimal decoding threshold that is the sum of the ISI ca...The Chaotic Baseband Wireless Communication System(CBWCS)is expected to eliminate the Inter-Symbol Interference(ISI)caused by multipath propagation by using the optimal decoding threshold that is the sum of the ISI caused by past decoded bits and the ISI caused by future transmitting bits.However,the current technique is only capable of removing partial effects of the ISI,because only past decoded bits are available for the suboptimal decoding threshold calculation.The unavailability of the future information needed for the optimal decoding threshold is an obstacle to further improve the Bit Error Rate(BER)performance.In contrast to the previous method using Echo State Network(ESN)to predict one future bit,the proposed method in this paper predicts the optimal decoding threshold directly using ESN.The proposed ESN-based threshold prediction method simplifies the symbol decoding operation by avoiding the iterative prediction of the output waveform points using ESN and accumulated error caused by the iterative operation.With this approach,the calculation complexity is reduced compared to the previous ESN-based approach.The proposed method achieves better BER performance compared to the previous method.The reason for this superior result is twofold.First,the proposed ESN is capable of using more future symbols information conveyed by the ESN input to obtain more accurate threshold rather than the previous method in which only one future symbol was available.Second,the proposed method here does not need to estimate the channel information using Least Squared(LS)method,which avoids the extra error caused by inaccurate channel information estimation.Simulation results and experiment based on a wireless open-access research platform under a practical wireless channel show the effectiveness and superiority of the proposed method.展开更多
This paper numerically investigates the effects of dispersion on optical fibre chaotic communication, and proposes a dispersion compensation scheme to improve the performance of optical fibre chaotic communication sys...This paper numerically investigates the effects of dispersion on optical fibre chaotic communication, and proposes a dispersion compensation scheme to improve the performance of optical fibre chaotic communication system. The obtained results show that the transmitter-receiver synchronization progressively degrades and the signal-to-noise ratio of the recovered message deteriorates as the fibre length increases due to the dispersion accumulation. Two segments of 2.5-km dispersion-compensating fibres are symmetrically placed at both ends of a segment of 245-km nonzero dispersionshifted fibre with low dispersion in one compensation period. The numerical results show that the signal-to-noise ratio of the extracted 1 GHz sinusoidal message is improved from -2.92 dB to 15.38 dB by this dispersion compensation for the transmission distance of 500 km.展开更多
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe...In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.展开更多
Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provid...Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.展开更多
The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system,...The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system, the memory effect of the two nearest digits can cause high rate of mistakes when the digits are decoded through the subtraction of receiver output from the transmittal. By introducing the deviations of two nearest maximum and minimum fluctuationsof the signal to decode the digit, the message can be decoded correctly. Also, this communication method does not critically depend on the quality of the chaotic synchronization of the two multi-mode lasers.展开更多
Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chao...Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chaotic carriers. After presenting our deterministic noise decontamination algorithm, conventional chaos shift keying (CSK) communication system is applied. The difference of Euclidean distance between noisy trajectory and decontaminated trajectory in phase space could be utilized to non-coherently detect the sent symbol simply and effectively. It is shown that this detection method can achieve the bit error rate performance comparable to other non-coherent systems.展开更多
The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple li...The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.展开更多
A novel chaotic optical time-domain reflectometry(OTDR)-based approach was proposed for monitoring long-haul fiber communication systems with multiple fiber segments. The self-phase modulation and group velocity dispe...A novel chaotic optical time-domain reflectometry(OTDR)-based approach was proposed for monitoring long-haul fiber communication systems with multiple fiber segments. The self-phase modulation and group velocity dispersion effects of the optical cable was considered in demonstrating the proof-of-concept experiment and simulation. In experiments, the correlation peaks are clearly obtained from the correlation trace between the reference and reflected(or scattered) light signals propagating in three optical-fiber segments. The technique affords a high spatial resolution of 2 m, and further long-haul fiber simulations indicate that the sensing distance can be more than 3300 km. Thus, the new proposed technique can be effectively applied for health monitoring of long-haul fiber communication systems.展开更多
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S...In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system.展开更多
In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption per...In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
As the competition for marine resources is increasingly fierce,the security of underwater acoustic communication has attracted a great deal of attention.The information and location of the communicating platform can b...As the competition for marine resources is increasingly fierce,the security of underwater acoustic communication has attracted a great deal of attention.The information and location of the communicating platform can be leaked during the traditional underwater acoustic communication technology.According to the unique advantages of chaos communication,we put forward a novel communication scheme using complex parameter modulation and the complex Lorenz system.Firstly,we design a feedback controller and parameter update laws in a complex-variable form with rigorous mathematical proofs(while many previous references on the real-variable form were only special cases in which the imaginary part was zero),which can be realized in practical engineering;then we design a new communication scheme employing parameter modulation.The main parameter spaces of the complex Lorenz system are discussed,then they are adopted in our communication scheme.We also find that there exist parametric attractors in the complex Lorenz system.We make numerical simulations in two channels for digital signals and the simulations verify our conclusions.展开更多
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ...The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.展开更多
In chaotic communication system, the useful signal is hidden in chaotic signal, so the general method does not work well. Due to the random feature of chaotic signal, a functional networkbased method is presented. In ...In chaotic communication system, the useful signal is hidden in chaotic signal, so the general method does not work well. Due to the random feature of chaotic signal, a functional networkbased method is presented. In this method, the neural functions are selected from some complete function set for the functional network to reconstruct the chaotic signal, so the useful signal hidden in chaotic background is extracted. In addition, its learning algorithm is presented here and the example proves its good preformance.展开更多
A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capab...A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.展开更多
A chaotic communication scheme with a fibre ring inserted in the optical ~eedback of the transmitter laser as an additional key is proposed under anticipating synchronization. The numerical results show that the key c...A chaotic communication scheme with a fibre ring inserted in the optical ~eedback of the transmitter laser as an additional key is proposed under anticipating synchronization. The numerical results show that the key can enhance the communication security effectively. It is theoretically safe for the communication scheme to transmit messages with a frequency beyond the relaxation oscllation frequency.展开更多
Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In ...Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear stateobserver is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision.When the approach is applied to secure communication, the results are satisfying.展开更多
A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parame...A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.展开更多
基金supported by the National Natural Science Foundation of China (Grant No. 60872123)the Joint Fund of the National Natural Science Foundation and the Guangdong Provincial Natural Science Foundation, China (Grant No. U0835001)the Guangdong Provincial Natural Science Foundation (Grant No. S2011010002144)
文摘The optical chaotic communication system using open-loop fiber transmission is studied under strong injection conditions. The optical chaotic communication system with open-loop configuration is studied using fiber transmission under strong injection conditions. The performances of fiber links composed of two types of fiber segments in different dispersion compensation maps are compared by testing the quality of the recovered message with different bit rates and encrypted by chaotic modulation (CM) or chaotic shift keying (CSK). The result indicates that the performance of the pre-compensation map is always worst. Two types of symmetrical maps are identical whatever the encryption method and bit-rate of message are. For the transmitting and the recovering of message of lower bit rate (1 Gb/s), the post-compensation map is the best scheme. However, for the message of higher bit rate (2.5 Gb/s), the parameters in communication system need to be modified properly in order to adapt to the high-speed application. Meanwhile, two types of symmetrical maps are the best scheme. In addition, the CM method is superior to the CSK method for high-speed applications. It is in accordance with the result in a back-to-back configuration system.
基金Supported by the National Natural Science Foundation of China(No. 60872123)the Joint Fund of the National Natural Science Foundationthe Guangdong Provincial Natural Science Foundation,China(No.U0835001)
文摘A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition.The performance of the new decoding method is numerically investigated by comparing it with the common decoding method without decoder.For new decoding method,two cases are analyzed,including whether or not the output of the decoder is adjusted by its input to receiver.The results indicate the decoding quality can be improved by adjusting for the new decoding method.Meanwhile,the injection strength of decoder can be restricted in a certain range.The adjusted new decoding method with decoder can achieve better decoding quality than decoding method without decoder when the bit rate of message is under 5 Gb/s.However,a stronger injection for receiver is needed.Moreover,the new decoding method can broaden the range of injection strength acceptable for good decoding quality.Different message encryption techniques are tested,and the result is similar to that of the common decoding method,indicative of the fact that the message encoded by using Chaotic Modulation(CM) can be best recovered by the new decoding method owning to the essence of this encryption technique.
文摘The Chaotic Baseband Wireless Communication System(CBWCS)is expected to eliminate the Inter-Symbol Interference(ISI)caused by multipath propagation by using the optimal decoding threshold that is the sum of the ISI caused by past decoded bits and the ISI caused by future transmitting bits.However,the current technique is only capable of removing partial effects of the ISI,because only past decoded bits are available for the suboptimal decoding threshold calculation.The unavailability of the future information needed for the optimal decoding threshold is an obstacle to further improve the Bit Error Rate(BER)performance.In contrast to the previous method using Echo State Network(ESN)to predict one future bit,the proposed method in this paper predicts the optimal decoding threshold directly using ESN.The proposed ESN-based threshold prediction method simplifies the symbol decoding operation by avoiding the iterative prediction of the output waveform points using ESN and accumulated error caused by the iterative operation.With this approach,the calculation complexity is reduced compared to the previous ESN-based approach.The proposed method achieves better BER performance compared to the previous method.The reason for this superior result is twofold.First,the proposed ESN is capable of using more future symbols information conveyed by the ESN input to obtain more accurate threshold rather than the previous method in which only one future symbol was available.Second,the proposed method here does not need to estimate the channel information using Least Squared(LS)method,which avoids the extra error caused by inaccurate channel information estimation.Simulation results and experiment based on a wireless open-access research platform under a practical wireless channel show the effectiveness and superiority of the proposed method.
基金supported by the National Natural Science Foundation of China (Grant Nos 60777041 and 60577019)the International Cooperation Project of Shanxi Province,China (Grant No 2007081019)
文摘This paper numerically investigates the effects of dispersion on optical fibre chaotic communication, and proposes a dispersion compensation scheme to improve the performance of optical fibre chaotic communication system. The obtained results show that the transmitter-receiver synchronization progressively degrades and the signal-to-noise ratio of the recovered message deteriorates as the fibre length increases due to the dispersion accumulation. Two segments of 2.5-km dispersion-compensating fibres are symmetrically placed at both ends of a segment of 245-km nonzero dispersionshifted fibre with low dispersion in one compensation period. The numerical results show that the signal-to-noise ratio of the extracted 1 GHz sinusoidal message is improved from -2.92 dB to 15.38 dB by this dispersion compensation for the transmission distance of 500 km.
基金Project supported in part by the National Natural Science Foundation of China (Grant Nos 10372054 and 60575038) and the Science Foundation of Southern Yangtze University of China (Grant No 000408).
文摘In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility.
基金This project is jointly supported by the National Natural Science Foundation of China (No.60074034, 70271068), the Research Fund for the Doctoral Program of Higher Education (N0.200200080004) and the Foundation for University Key Teacher by the Ministry
文摘Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme.
基金The project supported by Natural Science Foundation of Jiangsu Province of China under Grant No.BK2001138
文摘The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system, the memory effect of the two nearest digits can cause high rate of mistakes when the digits are decoded through the subtraction of receiver output from the transmittal. By introducing the deviations of two nearest maximum and minimum fluctuationsof the signal to decode the digit, the message can be decoded correctly. Also, this communication method does not critically depend on the quality of the chaotic synchronization of the two multi-mode lasers.
文摘Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chaotic carriers. After presenting our deterministic noise decontamination algorithm, conventional chaos shift keying (CSK) communication system is applied. The difference of Euclidean distance between noisy trajectory and decontaminated trajectory in phase space could be utilized to non-coherently detect the sent symbol simply and effectively. It is shown that this detection method can achieve the bit error rate performance comparable to other non-coherent systems.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60904046, 60972164, 60974071, and 60804006)the Special Fund for Basic Scientific Research of Central Colleges, Northeastern University, China (Grant No. 090604005)+2 种基金the Science and Technology Program of Shenyang (Grant No. F11-264-1-70)the Program for Liaoning Excellent Talents in University (Grant No. LJQ2011137)the Program for Liaoning Innovative Research Team in University (Grant No. LT2011019)
文摘The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.
基金the Project Funding National Natural Science Foundation of China (NSFC) (61527819)University Natural Science Research Project of Jiangsu Province (19KJB510005)High-Level Training Fund project of Nanjing Xiaozhuang University (2019NXY18)
文摘A novel chaotic optical time-domain reflectometry(OTDR)-based approach was proposed for monitoring long-haul fiber communication systems with multiple fiber segments. The self-phase modulation and group velocity dispersion effects of the optical cable was considered in demonstrating the proof-of-concept experiment and simulation. In experiments, the correlation peaks are clearly obtained from the correlation trace between the reference and reflected(or scattered) light signals propagating in three optical-fiber segments. The technique affords a high spatial resolution of 2 m, and further long-haul fiber simulations indicate that the sensing distance can be more than 3300 km. Thus, the new proposed technique can be effectively applied for health monitoring of long-haul fiber communication systems.
文摘In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system.
文摘In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.U1806202,61773010,and 61903207)the International Collaborative Research Project of Qilu University of Technology(Grant No.QLUTGJHZ2018020)Major Scientific and Technological Innovation Projects of Shandong Province,China(Grant Nos.2019JZZY010731 and 2020CXGC010901).
文摘As the competition for marine resources is increasingly fierce,the security of underwater acoustic communication has attracted a great deal of attention.The information and location of the communicating platform can be leaked during the traditional underwater acoustic communication technology.According to the unique advantages of chaos communication,we put forward a novel communication scheme using complex parameter modulation and the complex Lorenz system.Firstly,we design a feedback controller and parameter update laws in a complex-variable form with rigorous mathematical proofs(while many previous references on the real-variable form were only special cases in which the imaginary part was zero),which can be realized in practical engineering;then we design a new communication scheme employing parameter modulation.The main parameter spaces of the complex Lorenz system are discussed,then they are adopted in our communication scheme.We also find that there exist parametric attractors in the complex Lorenz system.We make numerical simulations in two channels for digital signals and the simulations verify our conclusions.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No BK2001138).
文摘The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.
文摘In chaotic communication system, the useful signal is hidden in chaotic signal, so the general method does not work well. Due to the random feature of chaotic signal, a functional networkbased method is presented. In this method, the neural functions are selected from some complete function set for the functional network to reconstruct the chaotic signal, so the useful signal hidden in chaotic background is extracted. In addition, its learning algorithm is presented here and the example proves its good preformance.
基金This project was supported by the National Natural Science Foundation of China (No. 60072028).
文摘A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.
基金Project supported by the Key Program of National Natural Science Foundation of China (Grant No.60927007)the National Natural Science Foundation of China (Grant No.60908014)the Shanxi Provincial Science Foundation for Youths,China (Grant No.2010021003-4)
文摘A chaotic communication scheme with a fibre ring inserted in the optical ~eedback of the transmitter laser as an additional key is proposed under anticipating synchronization. The numerical results show that the key can enhance the communication security effectively. It is theoretically safe for the communication scheme to transmit messages with a frequency beyond the relaxation oscllation frequency.
文摘Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear stateobserver is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision.When the approach is applied to secure communication, the results are satisfying.
文摘A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.