Report On Chaotic Communication

  • Uploaded by: rudrappa
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Report On Chaotic Communication as PDF for free.

More details

  • Words: 5,063
  • Pages: 48
CHAOTIC COMMUNICATION

KNS Institute of Technology (affiliated to vtu , approved by AICTE) Hegdenagar , Thirumenhalli Bangalore-560064

CERTIFICATE Academic session : Feb 2008 – Feb 2009 This is to certify that the seminar title “CHAOTIC COMMUNICATION ,THEIR APPLICATION AND THEIR ADVANTAGES OVER TRADITIONAL METHOD” as a part of VIII semester Electronics and Communication of Vishveshwaraiah Technological University ,has been successfully done by :

Mr. RUDRAPPA J SHETTI

1KN05EC084

Date: Signature of Staff Incharge

Signature of head of the Dept of E&C

A Seminar Report on DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

CHAOTIC COMMUNICATION , THEIR APPLICTION AND ADVANTAGES OVER TRADITIONAL METHOD OF COMMUNICATION Submitted in the partial fulfillment for the award degree of Bachelor of Engineering in Electronics and Communication

Submitted by: RUDRAPPA J SHETTI VISHVESHWARAIAH

1KN05EC084

TECHNOLOGICAL UNIVERSITY

KNS Institute of Technology Department of Electronics and Communication 2008-2009

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

ACKNOWLEDGEMENT I sincerely acknowledge KNS INSTIUTE OF TECHNOLOGY for providing me with the opportunity to improve my knowledge and presentation skills by giving this seminar.

I thank our Principal , Dr . S . K . Narayana ,for providing us the necessary infrastructure.

I thank our Head of Department of E&C, Prof Nanda Kumar , for his support and motivation .

I thank all the teaching and non teaching staff members of the EC department for providing the necessary help and co-operation.

Last but not the least I would like to thank all my friends for their constant support and valuable suggestion without which this would not have been the success .

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

SL NO. 1 2

3

4

5 6

7

CONTENTS INTRODUCTION DEFINATION OF CHAOS

CHAOTIC SYSTEM CHAOS CONTROL

CHAOTIC SIGNAL CHAOTIC SHIFT KEYING OFFER SECURE COMMUNICATION

ATTRACTOR

PAGE NO.

2 4 5

6

7 8

12

8

HISTROY OF CHAOTIC COMMUNICATION SYSTEM

14

9

COMPARISION

34

10

ADVANTAGE

11

APPLICATION

DEPARTMENT OF E&C

35 36

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

12

13

CONCLUSION

BIBLIOGRAPHY

DEPARTMENT OF E&C

37

38

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Abstract The discovery of randomness in apparently predictable physical systems have evolved into a new science, the science of chaos. Chaotic systems are unstable and aperiodic, making them naturally harder to identify and to predict. Recently, many researchers have been looking at ways to utilize the characteristics of chaos in communication systems and have actually achieved quite remarkable results. This field of communication is called Chaotic Communication . Chaotic communication signals are spread spectrum signals, which utilize large bandwidth and have low power spectrum density. In traditional communication systems , the analogue sample functions sent through the channel are weight sums of sinusoid waveforms and are linear. However, in chaotic communication systems, the samples are segments of chaotic waveforms and are nonlinear. This nonlinear, unstable and aperiodic characteristic of chaotic communication has numerous features that make it attractive for communication use. It has wideband characteristic, it is resistant against multipath fading and it offers a cheaper solution to traditional spread spectrum systems. In chaotic communications, the digital information to be transmitted is placed directly onto a wide-band chaotic signal . In this paper the concept of chaotic communication is explained together with its applications and advantages over traditional communication methods. The majority of the research carried out so far proves that chaotic communication system has quite a number of advantages over traditional communication system. DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

1.INTRODUCTION In communication, maintaining an ordered discipline has always been a constraint. In order to communicate effectively and efficiently, accurate information has to be sent or received in the correct manner. With computer processing power increasing in the last few decades, scientists have been able to perform complicated calculations in a relatively short period of time to facilitate this. This in turn has given rise to scientific interest in the irregular phenomena around us such as random changes in the weather, the spread of epidemics and the propagation of impulses along nerves. These irregular phenomena are related to the branch of mathematics known as chaotic dynamical systems, which deals with systems having a kind of order without periodicity or nonlinear systems in general. In linear systems, the variables involved appear only to the power of one. These variables are simple and directly related. In nonlinear systems, the variables involved are of powers other than one or even fractional. Such systems are harder to analyze. The chaotic phenomena having no inherent order would appear to have little to do with modern communication where sequence of zeros and ones are sent or received accurately and reliably. One would ask as to why then bother with chaotic communication when the conventional communication system is managing perfectly? The answer is, in recent experiments, digital messages were successfully sent at gigabit per second (Gbps) speeds over 115 km of commercial optical fibre system using chaotic communication with a Bit Error Rate (BER) of one in ten million. The BER was said to be limited by the equipment rather than the technique itself [1].

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

In chaotic communication, the nonlinear characteristic of communication devices are utilized instead of being avoided, this eliminates the complicated measures to maintain linearity. As a result, chaotic communication systems can function over a larger dynamical range, with fewer complex components and operate at higher power levels than traditional communication systems.

2.The definition of chaos There is no universally agreed definition of chaos. However, most people would accept the following working definition: Chaos is aperiodic time-asymptotic behaviour in a deterministic system which exhibits sensitive dependence on initial conditions. This definition contains three main elements: 1. Aperiodic time-asymptotic behaviour--this implies the existence of phase-space

trajectories which do not settle down to fixed points or periodic orbits. For practical reasons, we insist that these trajectories are not too rare. We also require the trajectories to be bounded: i.e., they should not go off to infinity. 2. Deterministic--this implies that the equations of motion of the system possess no

random inputs. In other words, the irregular behaviour of the system arises from non-linear dynamics and not from noisy driving forces. 3. Sensitive dependence on initial conditions--this implies that nearby trajectories in

phase-space separate exponentially fast in time: i.e., the system has a positive Liapunov exponent.

3.CHAOTIC SYSTEMS DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

All systems can be basically divided into three types: ➢

Deterministic systems

These are systems for which for a given set of conditions the result can be predicted and the output does not vary much with change in initial conditions

➢ Stochastic systems These systems, which are not as reliable as deterministic systems. Their output can be predicted only for a certain range of values

➢ Chaotic systems Chaotic systems are the most unpredictable of the three systems. Moreover they are very sensitive to initial conditions and a small change in initial conditions can bring about a great change in its output

4.CHAOS CONTROL

Chaos control refers to the situation where chaotic dynamics is weakened or eliminated by appropriate controls; while anti-control of chaos means that chaos is created, maintained, or enhanced when it is healthy and useful. Both control and anti-control of chaos can be accomplished via some conventional and DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

nonconventional methods such as microscopic parameter perturbation, bifurcation monitoring, entropy reduction, state pinning, phase delay, and various feedback and adaptive controls. It has been shown that the sensitivity of chaotic systems to small perturbations can be used to direct system trajectories to a desired target quickly with very low and ideally minimum control energy Chaos may be used to enhance the artificial intelligence of neural networks, as well as increase coding- decoding efficiency in signal and image communications.

5.CHAOTIC SIGNALS •

Chaotic signals has broadband spectrum , hence the presence of information does not necessarily change the properties of the signal .



Power output remains constant regardless of information content.



It is resistant against multipath fading and offers cheaper solution to traditional spread spectrum systems.



Chaotic signals are aperiodic therefore limited predictability.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION



Chaotic signals are complex in structure and impossible to predict over long time.

• •

chaotic signals appear noise like Hence chaotic signal can be used for providing security at physical level.

6.Chaotic-shift keying offers secure communication OPTICAL ENCRYPTION

Researchers have been making progress toward practical optical encryption systems that exploit laser dynamics. In two recent papers, researchers in France and Japan have shown how feedback-loop-based systems can be best used, and have introduced a new kind of modulation scheme. The separate results demonstrate both the security and ease of decoding of one class of the emerging chaotic-shift keying (CSK) systems, and the applicability of the other to a wide range of systems. Chaotic-shift keying uses fluctuations in wavelength to encode and hide a communications signal. In an optoelectronic implementation, a laser is DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

configured so that its output fluctuates chaotically—that is, in a deterministic way that nevertheless looks random. To change from one bit value to another (1 to 0 or vice versa) the chaotic mechanism is altered slightly. Because the output is still chaotic, an eavesdropper should not see any change in the transmission. However, the receiver detects that the chaos is sometimes synchronized, sometimes not, allowing the signal to be extracted.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION FIGURE 1. In a chaotic-shift keying scheme, the output of a tunable distributed Bragg reflector laser is fed back via a nonlinear spectral filter and time delay, causing a chaotic shift in wavelength. The chaos is modulated by the input signal, which varies the delay between time intervals T0 (511.5 µs) and T1 (543.2 µs). This modulation is then picked up by a receiver matched to T0, and the error signal (where the signal and receiver are unsynchronized) shows the location of the nonmatching bits(ones)

In collaboration between researchers at Georgia Tech Lorraine (Metz, France) and the Laboratoire d'Optique at the Université de FrancheCompté (Besançon, France), researchers have demonstrated that this system can achieve high-fidelity, high-security recordings. In their system, the researchers use a feedback loop with a nonlinear spectral filter to provide the mechanism for chaotic emission from distributed Bragg reflector lasers (see Fig. 1).1

THREE OPTIONS The French team wanted to quantify the advantages of changing different parameters to shift from bit to bit. Initially they considered three options: the mean wavelength (around which the chaos was fluctuating), the bifurcation parameter related to the dynamics of the photodetector and laser diode, and the time delay implemented in the feedback loop.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

FIGURE 2. By representing ones and zeros as different time delays in the laser feedback circuit (top), the data remained securely hidden in the chaotic signal (center), and yet could be recovered without additional signal processing (bottom). (Photo courtesy of Georgia Tech Lorraine)

The least sophisticated option is known as masking: essentially a small wavelength modulation signal is hidden in a large chaotic one. This makes it both difficult to decode and somewhat insecure, since the modulation could be detected by an eavesdropper. Tweaking the bifurcation parameter was also inadequate for the encryption application: for more than 50% of bits to be correctly recognized, the mismatch between the bifurcation parameter had to be less than 0.03. For better than 98% masking (high security), the mismatch had to be more than 0.035.

Changing the time delay in the feedback loop, however, was successful. The researchers showed that the bit seq-uence was well-hidden and easily received (see Fig. 2), and the signal could not be decrypted by looking at the signal spectrum or through autocorrelation. ALTERNATIVE

METHOD

In another project, a collaboration between engineers at Takushoku DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

and Keio Universities (both of Tokyo, Japan), researchers chose to use an acousto-optic modulator (AOM) to degrade CSK synchronization for the nonmatched states.2 This approach does not depend on the type of chaotically emitting laser used, so it could be used with semiconductor lasers that have very fast oscillations. For this scheme to work at high speeds, however, the transient time for synchronization—currently 10 times the AOM frequency—will have to be shortened.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION •

7.CHAOTIC ATTRACTOR

The Lorentz attractor: the best-known chaotic attractor Also known as a strange attractor, a type of attractor (i.e., an attracting set of states) in a complex dynamical system's phase space that shows sensitivity to initial conditions. Because of this property, once the system is on the attractor nearby states diverge from each other exponentially fast. Consequently, small amounts of noise are amplified. Once sufficiently amplified the noise determines the system's large-scale behavior and the system is then unpredictable. Chaotic attractors themselves are markedly patterned, often having elegant, fixed geometric structures, despite the fact that the trajectories moving within them appear unpredictable. The chaotic attractor's geometric shape is the order underlying the apparent chaos. It functions in much the same way as someone kneading dough. The local separation of trajectories corresponds to stretching the DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

dough and the global attraction property corresponds to folding the stretched dough back onto itself. One result of the stretch-and-fold aspect of chaotic attractors is that they are fractals; that is, some cross-section of them reveals similar structure on all scales.

TYPES OF ATTRACTOR 1. FIXED POINT ATTRACTOR

An attractor that is represented by a particular point in phase space ,sometime called an equilibrium point .As a point it corresponds to a very limited range of possible behaviors of the system.

2. LIMITED CYCLE ATTRACTOR A LIMIT CYCLE IS A PERIODIC ORBIT OF THE SYSTEM IS ISOLATED .

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

8.History of chaotic secure communication

Chaos is a very universal and robust phenomenon in many nonlinear systems. Although the area mathematician Pincar´e had noted that some mechanical systems could behave chaotically [21], chaos did not attract wide attention until Lorenz published his paper in 1963[22]. In engineering community, chaos had been mixed with noise for a long time. In 1980’s, the electrical engineers first time “officially” announced the existence of chaos in electrical systems. Since the noise-like behaviors of chaotic electronic circuits, electrical engineers felt uncomfortable to deal with them. It was physicists first showed in 1990 that chaos could be controlled [2].

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Then the synchronization between two identical chaotic systems was reported in1990 [23]. In 1992, the electrical engineering community realized that chaos could used in secure communication systems [24, 25, 26 ] because chaos is extremely sensitive to initial conditions and parameters. The concept of chaotic hardware key for secure communication systems was then gradually realized by engineers and scientists .Since the great potential of applying chaos to secure communication systems, many groups over the world involved in the researches in this field. So far, chaotic communication systems have been updated to the fourth generation. In this paper, theory and structure of the fourth generation is presented. It is useful to provide the reader who is not involved in chaotic secure

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

First generation The first generation was developed in 1993 known as additive chaos masking [25] shown in Fig. 1(a) and chaotic shift keying [26] shown in Fig. 1(b). The additive chaos masking scheme shown in Fig.1(a) consists of two identical chaotic systems in both the transmitter and the receiver. The chaotic mask denoted by c(t) is one of the state variables of the chaotic system2 in the transmitter. The message signal m(t), which is typically 20 dB to 30dB weaker than c(t) is added into the chaotic mask signal and gives the transmitted signal s(t). Since the chaotic signal c(t) is very complex and m(t) is much smaller than c(t), one may hope that the message signal m(t) can not be separated from s(t) without knowing the exact c(t).To give the reader a hands-on experience on chaotic secure communication systems, an example of additive chaotic masking scheme is given as follow. From Fig. 1(a) we can see that a chaotic synchronization block is needed in the receiver. Chaotic synchronization is a generalization of “carrier synchronization” in the normal communication systems but it is very different from the latter. We use Chua’s oscillators to demonstrate the chaotic synchronization. A Chua’s Oscillator is shown in Fig. 2(a)

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

This scheme was proved that it could not be used under practical conditions because of the following drawbacks. Since the message signal is typically 20dB to 30dB weaker than the “chaotic mask”, this method is very sensitive to channel noise and parameter mismatch between the chaotic systems in the transmitter and the receiver. Furthermore, this scheme has a very low degree of security[8].

Chaotic shift keying shown in Fig. 1(b) also known as chaotic switching was designed to transmit digital message signal. In this scheme, the message signal, which is a digital signal, is used to switch the transmitted signal between two statistically similar chaotic attractors, which are respectively used to encode bit 0 and bit 1 of the message signal. These two attractors are generated by two chaotic systems with the same structure and different parameters. At the receiver end, the received signal is used to drive achaotic system, which is identical to any of the two chaotic filtering and then thresholding the synchronization error signal e(t), which is depicted in Fig. 1(b).

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

This scheme is very robust to noise and parameter mismatch. However, it has a low degree of security[7] if the chaotic attractors are too far away in the bifurcation space. However, since this is the first scheme of chaotic digital communication systems, there still exist many possibilities of improving it.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Second generation: The second generation was proposed during 1993 to 1995 known as chaotic modulation. This generation used two different ways to modulate message signals into chaotic carriers. The first method called chaotic parameter modulation [27] shown in Fig. 7(a) used message signals to change parameters of the chaotic transmitter. The second method called chaotic non-autonomous modulation [28] shown in Fig. 7(b) used the message signal to change the phase space of the chaotic transmitter.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

In Fig. 7(a) the message signal m(t) is used to modulate some parameters of the chaotic system in the transmitter such that its trajectories keep changing in different chaotic attractors. Since the bifurcation space of a chaotic system is very complex, it is very difficult to figure out the way of the changes of the parameters even through the intruder knows some partial knowledge of the structure of the chaotic system in the transmitter. At the receiver end an adaptive controller is used to adaptively tune the parameters of the chaotic system such that the synchronization error approach zero. By doing this, the output of the adaptive controller can recover the message signal. The simulation results are shown in Fig. 8. In this simulation, three message signals are used to tune three different parameters of the chaotic system in the transmitter. Since the chaotic system keeps changing its attractors, the waveform of the transmitted signal as shown in Fig. 8(a) is much more complex than a normal chaotic signal. In Figs.8(b) to (d) we show the three original message signals and the three recovered message signals. Observe that after a transient process of synchronization, the message signals are recovered with some cross talks and small delays. Instead of changing the parameters of the chaotic transmitter, the chaotic non-autonomous modulation shown in Fig. 7(b) used the message signal to perturb chaotic attractor directly in the phase space. Unlike in chaotic parameter modulation where the transmitter is switched among different trajectories in different chaotic attractors, the transmitter in chaotic non autonomous modulation is switched among different trajectories of the same chaotic attractor. Theoretically, chaotic nonautonomous modulation is an error free scheme. The second generation improved the degree of security to some degree but was still found unsatisfactory.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Third generation: The third generation shown in Fig. 9 was proposed in 1997[9] for the purpose of improving the degree of security to a much higher level than the first two generations. We call this generation as chaotic cryptosystem. In this generation, the combination of the classical cryptographic technique and chaotic synchronization is used to enhance the degree of security. So far, this generation has the highest security in all the chaotic secure communication systems had been proposed and has not yet been broken. In the chaotic cryptosystem the plain text signal p(t) is encrypted by a encryption rule with a key signal, k(t), which is generated by the chaotic system in the transmitter. The scrambled signal is used further to drive the chaotic system such that the chaotic dynamics is changed chaotic system in the transmitter is transmitted to through public channel which can be accessed by the intruder. Since the intruder can not get access to the chaotic hardware key, it is very difficult to find p(t) out from s(t). At the receiver, the received signal r(t) = s(t)+n(t), where n(t) is the channel noise, is used to synchronize both of the chaotic systems in transmitter and the receiver. After the DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

chaotic synchronization had been achieved, the signal k(t) and y(t) can be recovered at the receiver with some noises as denoted by ˜k(t) and ˜y(t). By feeding ˜k(t) and ˜y(t) into the decryption rule at the receiver, the plain text signal can be recovered with some noises as ˜p(t). The simulation result is shown in Fig. 10. Figure 10(a) shows the transmitted signal s(t), from which one can not observe the embedded plain signal. Figure 10(b) shows the recovered and decrypted result at the receiver. Observe that after the transient process of synchronization, the plain text signal is recovered. To show the high security of this scheme, the unmasking method provided in [18] is used to decode the plain text signal. Figure 10(c) shows the unmasked signal ˜y(t) by the intruder, from which it is impossible to retrieve the plain text signal as shown in Fig. 10(d).

Fourth generation: DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Since the publication of several chaotic cryptanalysis results in low dimensional chaos-based secure communication systems[7, 8, 16, 18], there were concerns that such communication schemes may not be secure enough. To overcome this objection, one approach is to exploit hyperchaos-based7 secure communication systems, but such systems may introduce more difficulties to synchronization. On the other hand, we can enhance the security of low-dimensional chaos based secure communication schemes by combining conventional cryptographic schemes with a chaotic system[9]. To overcome the low security objections against low-dimensional continuous chaos-based schemes, we may use the following two methods. The first method is to make the transmitted signal more complex. The second method is to reduce the redundancy in

the transmitted signal. In [9] we have

presented a method to combine a conventional cryptographic scheme with lowdimensional chaos to obtain a very complex transmitted signal. The impulsive synchronization presented in this paper offers a very promising approach of reducing the redundancy in transmitted signals.

A simple system in baseband. In this section, we combine the results in [9] and impulsive synchronization to give a new chaotic secure communication scheme. The block diagram of this scheme is shown in Fig. 19. From Fig. 19 we can see that this chaotic secure communication system consists of a transmitter and a receiver. In both the transmitter and the receiver, there exist two identical chaotic systems. Also, two identical conventional cryptographic schemes are embedded in both the transmitter and the receiver. Let us now consider the details of each block in Fig. 19. The transmitted signal consists of a sequence

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

of time frames. Every frame has a length of T seconds and consists of two regions.

In Fig. 20 we show the concept of a time frame and its components. The first region of the time frame is a synchronization region consisting of synchronization impulses. The synchronization impulses are used to impulsively synchronize the chaotic systems in both transmitter and receiver. The second region is the scrambled signal region where the scrambled signal is contained. To ensure synchronization, we have T < ¢max. Within every time frame, the synchronization region has a length of Q and the remaining time interval T ¡ Q is the scrambled signal region. The composition block in Fig. 19 is used to combine the synchronization impulses and the scrambled signal into the time frame structure shown in Fig. 20.

The simplest combination method is to substitute the beginning Q seconds of every time frame with synchronization impulses. Since Q is usually very small compared with T, the processing time for packing a message signal is negligible. The decomposition block is used to separate the synchronization region and the scrambled signal region within each frame at the receiver end. Then the separated synchronization impulses are used to make the chaotic system in the receiver to synchronize with that in the transmitter. The stability of this impulsive synchronization is guaranteed by our results in Section 4. In the transmitter and the receiver, we use the same cryptographic scheme block for purposes of bi-directional communication. In a bi directional communication scheme, every cellular phone should function both as a receiver and a transmitter. Here, the key signal is generated by the chaotic system .The

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

cryptographic

scheme

is

as

follows

[9]:

Fig: Time frame

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

9.Conventional Sinusoidal-based Communication vs. Chaosbased Communication Conventional ➢ History:

over 100 years old;

Chaotic less than 10 years old;

matured technology ➢ Industrial

base ➢ Transmission

bandwidth

Heart of world wide

Emerging technology None existing

inform. Tech. Transmit either

Transmit at wide BW

at information BW or at wide BW (Spread Spectrum)

➢ Relation between Distinct separation

theory & Tech.

Many CC sys. schemes

between info. the./ comm. sys./comm.

are described by chaotic circuits

circuits-hardware implementation ➢ Modulation

Formats:

non-BW expansion Anti-podal signals; BPSK; BFSK

BW expansion Chaotic masking; Parametric modulation Dynamic feedback

➢ Synchronization Theory of Sync. For AFC and PLL are well Conventional

DEPARTMENT OF E&C

Chaotic sync. is still an active research Chaotic

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

developed; implementational theory is only loss of fraction of

performance due

a dB; No sync. Needed for

implementation is

BSK ➢ Encryption: ➢ Bit Prob. Error:

more significant No

Exist analytic error Expr.

➢ Complexity:

area; loss from

simple

yes No known analytic error Expr. complex

10.Advantages over Traditional Methods

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

1. At high speed it is easier to generate strong , high power chaotic signals than periodic signals. 2.

Chaotic

signals

are

not

sensitive

to

initial

conditions

and

have

noise like time series 3. Chaotic transmission has less risks of interception and are hard to detect by eavesdropper. 4. In chaotic communication, then on linear characteristic of are utilized instead of being avoided,

communication devices

this eliminates the complicated measures to

maintain linearity. 5. Chaotic communication systems can function over a larger fewer complex components and operate at

dynamical range, with

higher power levels than traditional

communication systems . 6. The optimal asynchronous CDMA codes using chaotic spread-spectrum

sequences

can support 15% more users than the standard GOLD codes for the same bit error rate (BER) performance. 7. It has auto cross correlation properties, low multipath interference and selfsynchronization property. 8. Power output remains constant regardless of the information content. 9. It is resistant against multi-path fading and offers cheaper solution to traditional spread spectrum systems.

10. Chaotic signal are aperiodic therefore limited predictability.

11.Application of chaos in digital communication

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Digital information

S

received information

source encoder

source decoder

encryptor channel encoder

decryptor CHAOS CHAOS

channel decoder demodulator

modulator Communication channel

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

Applications of chaotic communication ✔ Used in secure communication. ✔ Used in Ultra Wide Band radio. ✔ Used in radar and sonar. ✔ Used in oscillator ✔ Used in modulation technique ✔ Used in spread spectrum ✔ Used for secure communication

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

12.CONCLUSION A very brief overview on Chaotic Communication has been described, explaining the system setup of synchronised chaotic communication

and

direct

chaotic

communication

with

comparison to traditional communication system setup. A few of the main chaotic modulating schemes have been described, however, it was not possible to explain some of them in depth due to space limitations. The majority of the research carried out so far proves that chaotic communication system has quite a number of advantages over traditional communication Every technology has its own advantages and disadvantages.We also

had

an

over

view

of

history

of

chaotic

secure

communications. We studied about attractors, chaotic systems and

signal.

communication

Comparison and

their

of

conventional

applications.

over

Therefore,

chaotic chaotic

communication has to be used sensibly , it should lead to human integrity and benefit to the mankind.

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

BIBLIOGRAPHY [1] J. Mullins, “Chaotic Communication”, (http://www.spectrum.ieee.org/jan06/2574

[Accessed

29/11/2007]. [2] G. Kolumban, M.P. Kennedy, and L. O. Chua, “The role of synchronization in digital communication using chaos – Part II: Chaotic Modulation and Chaotic Synchronization”, IEEE Trans. Circuits Syst. I [3] G. Kolumban, M.P. Kennedy, and L. O. Chua, “The role of synchronization in digital communication using chaos – Part I: Fundamentals of digital communication”, IEEE Trans. Circuits Syst. I [4] Digital communication

using chaos and Non-linear dynamic

book E.Larson,Liu-ming,Liu lew.s

Website referred DEPARTMENT OF E&C

1 KNSIT,BANGALORE

CHAOTIC COMMUNICATION

www.dbebooks.com www.google.com www.tech-faq.com http//en.wikipedia.org/wiki/

DEPARTMENT OF E&C

1 KNSIT,BANGALORE

Related Documents


More Documents from ""

Chaos Communication
May 2020 14
K2
May 2020 25
Chaotic Communication
May 2020 13