Statement of Research

advertisement
Statement of Research
Topic: Chaos-Based Secure Communication
THANG MANH HOANG
A. Overview
Over the last few decades, communication systems have been developed rapidly to
meet the increasing human needs. Those are not only in the variety of services, but also
in quality of services. Hence, the conventional fundamentals of communication
techniques have been faced with strict challenges such as the increase in transmission
rate and in privacy. For a band wide requirement, optical systems offer a transmission
about terabits per seconds in the distance of hundreds of kilometers, and wireless
systems can support the services required the rate of hundreds megabits per second. It
can be regarded that the most of available services can be run reliably. However, such
transmission rates have not reached natural ones yet, and will be exhausted by some
future services such as multimedia and others. Moreover, conventional modulation
techniques are mostly based on periodic signals. As a result, the system security can not
be deployed on the physical layer due that periodic signals are easily detected by
eavesdroppers. For that reason, mathematic algorithms such as RAS, DES and so on
are developed to maintain the systems secure. With the hope of improving bit rate as
well as security, applications of nonlinear dynamics in communication have received
much interest and become an active area of research.
Recent years, researchers working on the nonlinear field have developed some novel
modulation methods [1]-[5] which utilize non-periodic signals. More specifically, a group
of logical bits can be represented by a piece of a non-periodic signal or by a sequence of
real values which are generated by dynamical systems [6]. The advantage offering by
such methods is that non-periodic signals are produced easily by some nonlinear
circuits. In addition, security of communication systems [7] can be assured if
highly-dimensional chaotic systems as well as appropriate modulation schemes are
employed.
My research concentrates on (i) investigation on synchronous regimes of dynamical
systems which present potential applications in communications, (ii) application of
synchronization of chaotic systems in communications including chaotic modulation
techniques and security, and (iii) implement chaotic communication systems on VLSI.
B. Background
Since Pecora and Caroll introduced the model of synchronization of dynamical
systems [8], there has been several synchronization models proposed and pursued
[9]-[13]. Roughly speaking, one chaotic system (plays a role of master) sends a driving
signal to other system(s) (plays a role of slave(s)) to establish the synchronous regime.
As a result, their chaotic trajectories remain in step with each other during temporal
evolution. In practical, models of synchronization of dynamical systems has been
utilized in many fields, i.e. lasers [14][15], biological [16][17], control [18], etc. Recently,
one of applications of synchronization has been investigated actively is in
communications [6][19][20]. More specifically, synchronization of chaotic systems is
applied to design chaotic secure communication systems and to propose new
transmission methods.
For the application of synchronization of dynamical systems in transmission, there
are several models proposed to modulate the information signal on chaotic signal, i.e.
multiplicative [1] and parametric [2][3] modulations, additive masking [2], chaos shift
keying (CSK) [4], synchronization-manifold shift keying [5]. For a short period of
development, chaotic communications has shown a potential alternative for
conventional one. However, one of disadvantages of chaotic communication is the
robustness. A chaotic signal is easy to be distorted by noise when it is sent via a noise
channel. As a result, BER of proposed models is slightly low in compared with that of
conventional ones. Recently, some new improvement in BER has been reported [21]
with orthogonal-CSK. For the security application of synchronization of dynamical
systems, there are many models proposed [22] in different ways but they has been
broken thereafter. Anyway, a secure system must be based on existing modulation
methods, and some schemes are used to hide the information in chaotic signals. So far,
there are two categories of methods used to unmask message signal in chaotic secure
communication systems, i.e. characteristic-based [23]-[26] and identification-based
[27][28]. Characteristic-based methods are analyzed different features of transmitted
signals to extract message signal without knowing the detail of chaotic system at the
transmitter. In contrast to Characteristic-based methods, identification-based ones
require knowing the structure of chaotic dynamics of master system at the transmitter.
Full detail about structure of master can be found by some reconstruct methods by
observing transmitted signals. Therefore, security of chaotic communication is
considered by two main points in a secure communication system. First of all, chaotic
system playing as master at the transmitter should exhibit complex dynamics (high
dimension).
Typically,
one
of
choices
is
delay
systems
which
create
very
highly-dimensional dynamics [29]. For second point, it is that the transmitter should
produce and send a complex signal. Complexly transmitted signal sent on the channel
make eavesdroppers difficult in reconstructing processes. In practical, observer-based
synchronization schemes [30] allow to produce complex signals for modulation process.
In conclusion, chaos synchronization has been applied in communication, but in fact
there are numerous issues which have not been addressed yet, i.e. improving for the
performance of proposed systems and making them suitable for various transmission
environments of radar, ultra wide band, and CDMA systems, etc.
Reference
[1] G. Kolumban, M. P. Kennedy and L. O. Chua: IEEE Trans. CAS I 45 (1998), pp. 1129.
[2] K. M. Cuomo and A. V. Oppenheim: Phys. Rev. Lett. 71 (1993), pp. 65.
[3] U. Parlitz, L. O. Chua, L. Kocarev, K. S. Halle and A. Shang: Int. J. Bifurcation and
Chaos 2 (1992), pp. 973.
[4] H. Dedieu, M. P. Kennedy and M. Hasler: IEEE Trans. CAS II 40 (1993), pp. 634.
[5] T. M. Hoang and M. Nakagawa, “New Encoding Model for Chaos-Based Secure
Communication”, J. Phys. Soc. Jpn. vol.75, (2006), pp. 034801.
[6] F. C. M. Lau, C. K. Tse: Chaos-Based Digital Communication Systems,
(Springer-Verlag, Berlin Heidelberg, 2003)
[7] S. Li, G. A’lvarez, G. Chen, and X. Mou, “Breaking a Chaos-noise-based Secure
Communication Scheme”, Chaos, vol. 15 (2005), pp. 013703
[8] L. M. Pecora and T. L. Carroll: Phys. Rev. Lett. 64 (1990) 821
[9] N. F. Rulkov, M.M. Sushchik and L.S. Tsimring: Phys. Rev. E 51 (1995) 980
[10] R. Mainieri and J. Rehacek: Phys. Rev. Lett. 82 (1999), 3042
[11] M. G. Rosenblum, A. S. Pikovsky and J. Kurths: Phys. Rev. Lett 76 (1996), 1804
[12] M. G. Rosenblum, A. S. Pikovsky and J. Kurths: Phys. Rev. Lett. 78 (1997) 4193
[13] H. U. Voss: Phys. Rev. E 61 (2000) 5115
[14] L. Fabiny, P. Colet, R. Roy and D. Lenstra: Phys. Rev. A 47 (1993) 4287
[15] R. Roy and K. S. Thornburg: Phys. Rev. Lett. 72 (1994) 2009
[16] R. C. Elson, A. I. Selverston, R. Huerta, N. F. Rulkov, M. I. Rabinovich and H. D. I.
Abarbanel: Phys. Rev. Lett. 81 (1998) 5692
[17] S. K. Han, C. Kurrer and Y. Kuramoto: Phys. Rev. Lett. 75 (1995) 3190
[18] H.G.Schuster: Handbook of Chaos Control (Wiley-VCH, Weinheim, 1999)
[19] T. Yang: Chaotic Communication Systems, (Nova Science, 2002)
[20] M. P. Kennedy, R. Rovatti, G. Setti: Chaotic Electronics in Telecommunications,
(CRC Press, 2000)
[21] P. Chargé and D. Fournier-Prunaret, Proceedings of NOLTA 2006, Bologna-Italy,
pp. 811-814
[22] T. Yang: Int. J. Computational Cognition 2 (2004) 81
[23] G. Perez and H. A. Cerdeira: Phys. Rev. Lett. 74 (1995) 1970.
[24] T. Yang, L.-B. Yang and C.-M. Yang: IEEE Trans. Circuits Syst. I 45 (1998) 1062.
[25] T. Yang, L.-B. Yang and C.-M. Yang: Phys. Lett. A 247 (1998) 105.
[26] T. Yang: Int. J. Circuit Theory Appl. 23 (1995) 611.
[27] V. I. Ponomarenko and M. D. Prokhorov: Phys. Rev. E 66 (2002) 026215.
[28] C. Zhou and C.-H. Lai: Phys. Rev. E 60 (1999) 320.
[29] J. D. Farmer: Physica D 4 (1982) 366.
[30] G. Grassi and S. Mascolo, IEEE Trans. CAS II, vol. 46 (1999), 478
Download