SlideShare a Scribd company logo
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
A Novel Design Architecture
Reduced
Professor, Department of Electrical Engineering
ABSTRACT
In this paper, a new concept about secure
communication system is introduced and a novel
secure communication design with reduced
linear receiver is developed to guarantee the global
exponential stability of the resulting error signals.
Besides, the guaranteed exponential convergence rate
of the proposed secure communication system can be
correctly calculated. Finally, some numerical
simulations are given to demonstrate the feasibility
and effectiveness of the obtained results.
Key Words: Chaotic system, secure c
system, reduced-order linear receiver
1. INTRODUCTION
As we know, because chaotic system
sensitive to initial value, the output behaves like a
random signal. Frequently, chaos in many dynamic
systems is an origin of the generation of oscillation
and an origin of instability. Several kinds of chaotic
systems have been widely applied in various
applications such as secure communication,
slave chaotic systems, image encryption
systems, chemical reactions, system identification
and ecological systems; see, for instance
the references therein.
In recent years, numerous secure communications
have been extensively explored; see, for example, [
12] and the references therein. Generally speaking
secure communication is composed of transm
receiver and reduced-order linear receiver
merits of low price and easy implementation.
Therefore, searching a lower-dimensional
order linear receiver for the secure chaotic
communication system constitutes an important area
for practical control design.
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 3 | Issue – 1 | Nov
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
A Novel Design Architecture of Secure Communication System
Reduced-Order Linear Receiver
Yeong-Jeu Sun
Electrical Engineering, I-Shou University, Kaohsiung
In this paper, a new concept about secure
communication system is introduced and a novel
secure communication design with reduced-order
linear receiver is developed to guarantee the global
exponential stability of the resulting error signals.
guaranteed exponential convergence rate
of the proposed secure communication system can be
correctly calculated. Finally, some numerical
simulations are given to demonstrate the feasibility
and effectiveness of the obtained results.
Chaotic system, secure communication
chaotic system is highly
the output behaves like a
, chaos in many dynamic
systems is an origin of the generation of oscillation
everal kinds of chaotic
have been widely applied in various
applications such as secure communication, master-
image encryption, biological
system identification,
instance, [1-3] and
, numerous secure communications
have been extensively explored; see, for example, [4-
erally speaking, a
secure communication is composed of transmitter and
order linear receiver has the
s of low price and easy implementation.
dimensional reduced-
secure chaotic
constitutes an important area
In this paper, we will propose a new
communication system and a
communication system with
receiver will be developed
resulting error signals can converge to zero in some
exponential convergence rate
guaranteed exponential convergence rate
proposed chaotic secure communication system
be accurately estimated. Finally,
simulations are proposed to exhibit
feasibility of the main results.
This paper is organized as follows. The problem
formulation and main results
2. Several numerical simulations are
3 to illustrate the main result. Finally,
remarks are drawn in Section
paper, n
ℜ denotes the n-dimensional Euclidean space,
xxx T
⋅=: denotes the Euclidean norm of the
vector x, and a denotes the
number a.
2. PROBLEM FORMULATION AND MAIN
RESULTS
In this paper, we develop the following
communication system with simple
linear receiver and its block diagram is shown in
Figure 1.
Transmitter:
( ) ( ) ( ),3211 txtxatx =&
( ) ( ) ( ),23122 txatxatx +=&
( ) ( ) ( ),21543 txtxaatx +=& (1c)
( ) ( ) ( ),2716 txatxaty +=
( ) ( ) ( ) .0,1 ≥∀+= ttmtxCt mmφ
Research and Development (IJTSRD)
www.ijtsrd.com
1 | Nov – Dec 2018
Dec 2018 Page: 1154
Secure Communication System with
Kaohsiung, Taiwan
we will propose a new idea about secure
a novel design of secure
communication system with reduced-order linear
to guarantee that the
onverge to zero in some
convergence rate. Meanwhile, the
guaranteed exponential convergence rate of the
proposed chaotic secure communication system can
Finally, some numerical
exhibit the capability and
This paper is organized as follows. The problem
are presented in Section
simulations are given in Section
to illustrate the main result. Finally, conclusion
in Section 4. Throughout this
dimensional Euclidean space,
the Euclidean norm of the column
he absolute value of a real
ROBLEM FORMULATION AND MAIN
the following new secure
communication system with simple reduced-order
and its block diagram is shown in
(1a)
(1b)
(1d)
(1e)
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Receiver:
( ) ( ) ( ),
1
6
2
6
7
1 ty
a
tz
a
a
tz +−= (2a)
( ) ( ) ( ),
6
2
23
6
72
2 ty
a
a
tza
a
aa
tz +







−−=& (2b)
( ) ( ) ( ) ,0,2 ≥∀−= ttzCttm mmφ (2c)
where ( ) ( ) ( )[ ] 2
21: ℜ∈=
T
txtxtx is the partial
of transmitter, ( ) ℜ∈ty is the output of transmitter
( ) ( ) ( )[ ] 2
21: ℜ∈=
T
tztztz is the state vector
( ) 1
1
×
ℜ∈ q
tm is the information vector,
( ) 1
2
×
ℜ∈ q
tm is the signal recovered from
Nq∈ . It is noted that the chaotic Sprott B
the special case of the system (1) with
153321 =−=−=== aaaaa . In the sequel, we adopt the
same parameters of the chaotic Sprott B
076 >aa . Apparently, a good secure communication
system means that we can recover the message
in the receiver system; i.e., the error vector
( ) ( ) ( )tmtmte 12: −= can converge to zero in some sense.
Before presenting the main result, let us introduce a
definition which will be used in the main theorem
Definition 1: The system (1) with (2) is called secure
communication system with exponential convergence
type if there are positive numbers k and
( ) ( ) ( ) ( ) 0,exp: 12 ≥∀−≤−= ttktmtmte α .
In this case, the positive number α
exponential convergence rate.
Now we present the main results
communication system of (1) with (2).
Theorem 1: The system (1) with (2) is a secure
communication system with exponential convergence
type. Besides, the guaranteed
convergence rate is given by
6
7
1
a
a
+=α .
Proof. Define
( ) [ ] [ ] 2
221121 ℜ∈−−==
TT
zxzxwwtw .(3)
Thus, from (1)-(3), one has
( ) ( ) ( )tztxtw 222
&&& −=
( ) ( ) ( )
( )ty
a
a
tza
a
aa
txatxa
6
2
123
6
72
2312
−








−++=
in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
partial state vector
of transmitter,
is the state vector of receiver,
is the information vector, 2×
ℜ∈ q
mC , and
from ( )tm1 , with
haotic Sprott B system is
the special case of the system (1) with
. In the sequel, we adopt the
chaotic Sprott B system with
, a good secure communication
system means that we can recover the message ( )tm1
in the receiver system; i.e., the error vector
can converge to zero in some sense.
let us introduce a
which will be used in the main theorem.
The system (1) with (2) is called secure
communication system with exponential convergence
and α such that
is called the
s for secure
tem (1) with (2) is a secure
communication system with exponential convergence
exponential
( ) ( )
( ) ( )[ ]txatxa
a
a
a
a
aa
txatxa
2716
6
2
3
6
72
2312
+−




−++=
( )
( ) ( )[ ]tztxa
a
aa
a
aa
txa
a
aa
223
6
72
6
72
23
6
72
−







−−=




−+







+−=
( )
( )twa
a
aa
a
aa
txa
a
aa
23
6
72
6
72
23
6
72








−−=




−+







+−=
( ).1 2
6
7
tw
a
a






+−=
This implies that
( ) ( )
















+−⋅= t
a
a
wtw 1exp0
6
7
22 .
From (1)-(4), it is easy to see that
( ) ( ) ( )tztxtw 111 −=
( ) ( )
( ) ( )





+−−






−=
ty
a
tz
a
a
tx
a
a
ty
a
6
2
6
7
2
6
7
6
1
1
( ) ( )[ ]
( )tw
a
a
tztx
a
a
2
6
7
22
6
7
−=
−−=
( )
















+−⋅−= t
a
a
a
wa
1exp
0
6
7
6
27
Hence, from (3)-(5), it results
( ) ( ) ( )
( )022
6
2
7
2
6
2
2
2
1
w
a
aa
twtwtw
⋅
+
≤
+=
.0,1exp
6
7
≥∀
















+−⋅ tt
a
a
Thus, it can be readily obtained that
( ) ( ) ( )
( ) ( ) ( ) (
( )twC
xCttzCt
tmtmte
m
mmmm
⋅≤
+−−=
−=
φφ
12
( )
,0,1exp
0
6
7
22
6
2
7
2
6
≥∀














+−⋅
⋅⋅
+
≤
tt
a
a
Cw
a
aa
m
in view of (1), (2), and (6). This
in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 1155
( )tz23 



( )tza 23 



−
( )tza 23 



−
(4)
), it is easy to see that
. (5)
(6)
t can be readily obtained that
( )t
This completes the proof.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Remark 1: It should be emphasized that
receiver of (2) is linear and with lower dimens
than that of the transmitter. Consequently
proposed receiver of (2) has the superiorities
price and easy implementation by electronic circuit
3. NUMERICAL SIMULATIONS
Consider the novel secure communication system of
(1)-(2) with 176 == aa and [ ]11 −=mC . By Theorem 1,
the synchronization of signals ( )tm1 and
proposed secure communication (1)
achieved with guaranteed convergence
The real message ( )tm1 , the recovered message
and the error signal are depicted in Figure 2
respectively, which clearly indicates
message ( )tm1 is recovered after 3 seconds.
4. CONCLUSION
In this paper, a new concept about secure
communication system has been introduced and a
novel secure communication design with
order linear receiver has been developed to guarantee
the global exponential stability of the resulting error
signals. Meanwhile, the guaranteed exponential
convergence rate of the proposed secure
communication system can be correctly calculated.
Finally, some numerical simulations have been
offered to show the feasibility and effectiveness of the
obtained results.
ACKNOWLEDGEMENT
The author thanks the Ministry of Science and
Technology of Republic of China for supporting
work under grants MOST 106-2221
MOST 106-2813-C-214-025-E, and MOST
E-214-030. Besides, the author is grateful to
Professor Jer-Guang Hsieh for the useful
( ) ( )daSystem 11 −
channelchannel
( )tz
( )ty( )tx
Transmitter
( )tmφ+
+
( )tm2
+
−
( )tm1
mC
mC
Systems (2a)-(2b)
Figure 1: Secure-communication scheme
information vector and ( )tm2 is the recovered vector)
in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
It should be emphasized that the proposed
lower dimensions
Consequently, the
superiorities of low
by electronic circuit.
novel secure communication system of
. By Theorem 1,
and ( )tm2 for the
proposed secure communication (1)-(2) can be
rate of 2=α .
message ( )tm2 ,
ure 2-Figure 4,
that the real
seconds.
In this paper, a new concept about secure
communication system has been introduced and a
cation design with reduced-
has been developed to guarantee
the global exponential stability of the resulting error
signals. Meanwhile, the guaranteed exponential
convergence rate of the proposed secure
ectly calculated.
Finally, some numerical simulations have been
offered to show the feasibility and effectiveness of the
Ministry of Science and
of Republic of China for supporting this
2221-E-214-007,
, and MOST 107-2221-
grateful to Chair
for the useful comments.
Transmitter
Receiver
scheme ( ( )tm1 is the
is the recovered vector).
Figure 2: Real message of
transmitter of (1)
Figure 3: Recoverd message of
receiver of (2)
Figure 4: Error signal of
0 5 10 15 20 25
3.5
4
4.5
5
5.5
6
6.5
t (sec)
m1(t)
0 5 10 15 20 25
3.5
4
4.5
5
5.5
6
6.5
t (sec)
m2(t)
0 5
0
0.05
0.1
0.15
0.2
0.25
t (sec)
m2(t)-m1(t)
in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 1156
Real message of ( )tm1 described in the
transmitter of (1).
Recoverd message of ( )tm2 described in the
receiver of (2).
Error signal of ( ) ( )tmtm 12 − .
30 35 40 45 50
t (sec)
30 35 40 45 50
t (sec)
10 15
t (sec)
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
REFERENCES
1. Y.J. Xian, C . Xia, T.T. Guo, K.R.
Xu, “Dynamical analysis and FPGA
implementation of a large range chaotic system
with coexisting attractors,” Results in Physics
11, pp. 368-376, 2018.
2. L. Xiong, S. Zhang, Y. Zeng, and B. Liu
“Dynamics of a new composite four-
system,” Chinese Journal of Physics
2381-2394, 2018.
3. Y.Wang and H. Yu, “Fuzzy synchronization o
chaotic systems via intermittent control
Solitons & Fractals, vol. 106, pp. 154
4. A.A. Zaher, “Duffing oscillators for secure
communication,” Computers & Electrical
Engineering, vol. 71, pp. 77-92, 2018
5. S. Çiçek, U.E. Kocamaz, and Y. Uyaro
“Secure communication with a chaotic system
owning logic element,” AEU-International Journal
of Electronics and Communications
52-62, 2018.
6. J. Hua, L. Chai, D. Xiong, and W. Wang
novel method of realizing stochastic chao
secure communication by synchrosqueezed
wavelet transform,” Digital Signal Processing
vol. 82, pp. 194-202, 2018.
7. Z. Sun, L. Si, Z. Shang, and J. Lei
synchronization of chaotic PMSM systems for
in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
.R. Fu, and C.B.
Dynamical analysis and FPGA
implementation of a large range chaotic system
Results in Physics, vol.
L. Xiong, S. Zhang, Y. Zeng, and B. Liu,
-Scroll chaotic
Chinese Journal of Physics, vol. 56, pp.
Fuzzy synchronization of
chaotic systems via intermittent control,” Chaos,
54-160, 2018.
Duffing oscillators for secure
Computers & Electrical
8.
d Y. Uyaroğlu,
Secure communication with a chaotic system
International Journal
of Electronics and Communications, vol. 88, pp.
J. Hua, L. Chai, D. Xiong, and W. Wang, “A
novel method of realizing stochastic chaotic
secure communication by synchrosqueezed
Digital Signal Processing,
Z. Sun, L. Si, Z. Shang, and J. Lei, “Finite-time
synchronization of chaotic PMSM systems for
secure communication and parameters
identification,” Optik, vol.
8. P. Vijayakumar, V. Chang, L.J. Deborah, and B.R
Kshatriya, “Key management and key distribution
for secure group communication in mobile and
cloud network,” Future Generation Computer
Systems, vol. 84, pp. 123-1
9. N. Vafamand, S. Khorshidi, and A. Khayatian
“Secure communication for non
robust TS fuzzy observer
synchronization,” Chaos, Solitons & Fractals
112, pp. 116-124, 2018.
10. L. Wang and X. Liu, “
communication scheme for vehicular
heterogeneous networks
Communications, vol. 11, pp.
11. D. Chang, Z. Li, M. Wang, and Y. Zeng
digital programmable multi
and its application in FPGA
communication,” AEU-International Journal of
Electronics and Communications
29, 2018.
12. A. A. Saad, S. Ahmad, S. Azzam, and A.
Nedaa, “Securing robot communication using
packet encryption distribution
vol. 2018, pp. 8-14, 2018.
in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 1157
secure communication and parameters
, vol. 157, pp. 43-55, 2018.
P. Vijayakumar, V. Chang, L.J. Deborah, and B.R
Key management and key distribution
for secure group communication in mobile and
Future Generation Computer
125, 2018.
N. Vafamand, S. Khorshidi, and A. Khayatian,
Secure communication for non-ideal channel via
robust TS fuzzy observer-based hyperchaotic
Chaos, Solitons & Fractals, vol.
, “Secure cooperative
communication scheme for vehicular
heterogeneous networks,” Vehicular
, pp. 46-56, 2018.
D. Chang, Z. Li, M. Wang, and Y. Zeng, “A novel
digital programmable multi-scroll chaotic system
and its application in FPGA-based audio secure
International Journal of
Electronics and Communications, vol. 88, pp. 20-
A. Saad, S. Ahmad, S. Azzam, and A. A.
Securing robot communication using
packet encryption distribution,” Network Security,

More Related Content

PDF
Image encryption technique incorporating wavelet transform and hash integrity
PDF
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
PDF
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
PDF
Journal_IJABME
PDF
21642583%2E2014%2E985803
PPTX
Image Encryption and Compression
PDF
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
PDF
50120130406039
Image encryption technique incorporating wavelet transform and hash integrity
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Journal_IJABME
21642583%2E2014%2E985803
Image Encryption and Compression
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
50120130406039

What's hot (19)

PDF
MetiTarski's menagerie of cooperating systems
PDF
Neural Networks: Model Building Through Linear Regression
PDF
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
DOC
Implementation of bpsc stegnography ( synopsis)
PDF
Fractals in Small-World Networks With Time Delay
PDF
Ew4301904907
PPTX
Image encryption using aes key expansion
PDF
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
PDF
REU Group 2 - Paper
PDF
Elgamal signature for content distribution with network coding
PDF
A hybrid security and compressive sensing based sensor data gathering scheme
PDF
Hash Visualization a New Technique to improve Real World CyberSecurity
PDF
A methodology for the study of fiber optic cables
PPTX
(141205) Masters_Thesis_Defense_Sundong_Kim
PDF
Analysis of single server queueing system with batch service
PDF
50620130101002
PDF
Neural Networks: Least Mean Square (LSM) Algorithm
PDF
Design and implementation of network security using genetic algorithm
MetiTarski's menagerie of cooperating systems
Neural Networks: Model Building Through Linear Regression
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
Implementation of bpsc stegnography ( synopsis)
Fractals in Small-World Networks With Time Delay
Ew4301904907
Image encryption using aes key expansion
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
REU Group 2 - Paper
Elgamal signature for content distribution with network coding
A hybrid security and compressive sensing based sensor data gathering scheme
Hash Visualization a New Technique to improve Real World CyberSecurity
A methodology for the study of fiber optic cables
(141205) Masters_Thesis_Defense_Sundong_Kim
Analysis of single server queueing system with batch service
50620130101002
Neural Networks: Least Mean Square (LSM) Algorithm
Design and implementation of network security using genetic algorithm
Ad

Similar to A Novel Design Architecture of Secure Communication System with Reduced-Order Linear Receiver (20)

PDF
New Design Architecture of Chaotic Secure Communication System Combined with ...
PDF
Improvement of chaotic secure communication scheme based on steganographic me...
PDF
A Secure Chaotic Communication System
PDF
A high security and noise immunity of speech based on double chaotic masking
PDF
Exact secure outage probability performance of uplinkdownlink multiple access...
PPT
P1111132678
PDF
Intelligent soft computing based
PDF
1. 20934.pdf
PDF
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
PDF
Mid term
PDF
A New Chaotic Map for Secure Transmission
PDF
Tractable computation in outage performance analysis of relay selection NOMA
PDF
Mid term solution
PDF
Secure outage probability of cognitive radio network relying non-orthogonal m...
PDF
Secure Communication and Implementation for a Chaotic Autonomous System
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
PDF
Security aware relaying scheme for cooperative networks with untrusted relay ...
PDF
PDF
A Mathematical Theory of Communication
PDF
Signals and systems: part i solutions
New Design Architecture of Chaotic Secure Communication System Combined with ...
Improvement of chaotic secure communication scheme based on steganographic me...
A Secure Chaotic Communication System
A high security and noise immunity of speech based on double chaotic masking
Exact secure outage probability performance of uplinkdownlink multiple access...
P1111132678
Intelligent soft computing based
1. 20934.pdf
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Mid term
A New Chaotic Map for Secure Transmission
Tractable computation in outage performance analysis of relay selection NOMA
Mid term solution
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure Communication and Implementation for a Chaotic Autonomous System
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
A Mathematical Theory of Communication
Signals and systems: part i solutions
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPT
Project quality management in manufacturing
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
573137875-Attendance-Management-System-original
PPTX
web development for engineering and engineering
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PPT on Performance Review to get promotions
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPT
Mechanical Engineering MATERIALS Selection
Model Code of Practice - Construction Work - 21102022 .pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Project quality management in manufacturing
R24 SURVEYING LAB MANUAL for civil enggi
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
OOP with Java - Java Introduction (Basics)
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
573137875-Attendance-Management-System-original
web development for engineering and engineering
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Fundamentals of safety and accident prevention -final (1).pptx
bas. eng. economics group 4 presentation 1.pptx
PPT on Performance Review to get promotions
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
III.4.1.2_The_Space_Environment.p pdffdf
Mechanical Engineering MATERIALS Selection

A Novel Design Architecture of Secure Communication System with Reduced-Order Linear Receiver

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com A Novel Design Architecture Reduced Professor, Department of Electrical Engineering ABSTRACT In this paper, a new concept about secure communication system is introduced and a novel secure communication design with reduced linear receiver is developed to guarantee the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are given to demonstrate the feasibility and effectiveness of the obtained results. Key Words: Chaotic system, secure c system, reduced-order linear receiver 1. INTRODUCTION As we know, because chaotic system sensitive to initial value, the output behaves like a random signal. Frequently, chaos in many dynamic systems is an origin of the generation of oscillation and an origin of instability. Several kinds of chaotic systems have been widely applied in various applications such as secure communication, slave chaotic systems, image encryption systems, chemical reactions, system identification and ecological systems; see, for instance the references therein. In recent years, numerous secure communications have been extensively explored; see, for example, [ 12] and the references therein. Generally speaking secure communication is composed of transm receiver and reduced-order linear receiver merits of low price and easy implementation. Therefore, searching a lower-dimensional order linear receiver for the secure chaotic communication system constitutes an important area for practical control design. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 3 | Issue – 1 | Nov www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 A Novel Design Architecture of Secure Communication System Reduced-Order Linear Receiver Yeong-Jeu Sun Electrical Engineering, I-Shou University, Kaohsiung In this paper, a new concept about secure communication system is introduced and a novel secure communication design with reduced-order linear receiver is developed to guarantee the global exponential stability of the resulting error signals. guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are given to demonstrate the feasibility and effectiveness of the obtained results. Chaotic system, secure communication chaotic system is highly the output behaves like a , chaos in many dynamic systems is an origin of the generation of oscillation everal kinds of chaotic have been widely applied in various applications such as secure communication, master- image encryption, biological system identification, instance, [1-3] and , numerous secure communications have been extensively explored; see, for example, [4- erally speaking, a secure communication is composed of transmitter and order linear receiver has the s of low price and easy implementation. dimensional reduced- secure chaotic constitutes an important area In this paper, we will propose a new communication system and a communication system with receiver will be developed resulting error signals can converge to zero in some exponential convergence rate guaranteed exponential convergence rate proposed chaotic secure communication system be accurately estimated. Finally, simulations are proposed to exhibit feasibility of the main results. This paper is organized as follows. The problem formulation and main results 2. Several numerical simulations are 3 to illustrate the main result. Finally, remarks are drawn in Section paper, n ℜ denotes the n-dimensional Euclidean space, xxx T ⋅=: denotes the Euclidean norm of the vector x, and a denotes the number a. 2. PROBLEM FORMULATION AND MAIN RESULTS In this paper, we develop the following communication system with simple linear receiver and its block diagram is shown in Figure 1. Transmitter: ( ) ( ) ( ),3211 txtxatx =& ( ) ( ) ( ),23122 txatxatx +=& ( ) ( ) ( ),21543 txtxaatx +=& (1c) ( ) ( ) ( ),2716 txatxaty += ( ) ( ) ( ) .0,1 ≥∀+= ttmtxCt mmφ Research and Development (IJTSRD) www.ijtsrd.com 1 | Nov – Dec 2018 Dec 2018 Page: 1154 Secure Communication System with Kaohsiung, Taiwan we will propose a new idea about secure a novel design of secure communication system with reduced-order linear to guarantee that the onverge to zero in some convergence rate. Meanwhile, the guaranteed exponential convergence rate of the proposed chaotic secure communication system can Finally, some numerical exhibit the capability and This paper is organized as follows. The problem are presented in Section simulations are given in Section to illustrate the main result. Finally, conclusion in Section 4. Throughout this dimensional Euclidean space, the Euclidean norm of the column he absolute value of a real ROBLEM FORMULATION AND MAIN the following new secure communication system with simple reduced-order and its block diagram is shown in (1a) (1b) (1d) (1e)
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Receiver: ( ) ( ) ( ), 1 6 2 6 7 1 ty a tz a a tz +−= (2a) ( ) ( ) ( ), 6 2 23 6 72 2 ty a a tza a aa tz +        −−=& (2b) ( ) ( ) ( ) ,0,2 ≥∀−= ttzCttm mmφ (2c) where ( ) ( ) ( )[ ] 2 21: ℜ∈= T txtxtx is the partial of transmitter, ( ) ℜ∈ty is the output of transmitter ( ) ( ) ( )[ ] 2 21: ℜ∈= T tztztz is the state vector ( ) 1 1 × ℜ∈ q tm is the information vector, ( ) 1 2 × ℜ∈ q tm is the signal recovered from Nq∈ . It is noted that the chaotic Sprott B the special case of the system (1) with 153321 =−=−=== aaaaa . In the sequel, we adopt the same parameters of the chaotic Sprott B 076 >aa . Apparently, a good secure communication system means that we can recover the message in the receiver system; i.e., the error vector ( ) ( ) ( )tmtmte 12: −= can converge to zero in some sense. Before presenting the main result, let us introduce a definition which will be used in the main theorem Definition 1: The system (1) with (2) is called secure communication system with exponential convergence type if there are positive numbers k and ( ) ( ) ( ) ( ) 0,exp: 12 ≥∀−≤−= ttktmtmte α . In this case, the positive number α exponential convergence rate. Now we present the main results communication system of (1) with (2). Theorem 1: The system (1) with (2) is a secure communication system with exponential convergence type. Besides, the guaranteed convergence rate is given by 6 7 1 a a +=α . Proof. Define ( ) [ ] [ ] 2 221121 ℜ∈−−== TT zxzxwwtw .(3) Thus, from (1)-(3), one has ( ) ( ) ( )tztxtw 222 &&& −= ( ) ( ) ( ) ( )ty a a tza a aa txatxa 6 2 123 6 72 2312 −         −++= in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 partial state vector of transmitter, is the state vector of receiver, is the information vector, 2× ℜ∈ q mC , and from ( )tm1 , with haotic Sprott B system is the special case of the system (1) with . In the sequel, we adopt the chaotic Sprott B system with , a good secure communication system means that we can recover the message ( )tm1 in the receiver system; i.e., the error vector can converge to zero in some sense. let us introduce a which will be used in the main theorem. The system (1) with (2) is called secure communication system with exponential convergence and α such that is called the s for secure tem (1) with (2) is a secure communication system with exponential convergence exponential ( ) ( ) ( ) ( )[ ]txatxa a a a a aa txatxa 2716 6 2 3 6 72 2312 +−     −++= ( ) ( ) ( )[ ]tztxa a aa a aa txa a aa 223 6 72 6 72 23 6 72 −        −−=     −+        +−= ( ) ( )twa a aa a aa txa a aa 23 6 72 6 72 23 6 72         −−=     −+        +−= ( ).1 2 6 7 tw a a       +−= This implies that ( ) ( )                 +−⋅= t a a wtw 1exp0 6 7 22 . From (1)-(4), it is easy to see that ( ) ( ) ( )tztxtw 111 −= ( ) ( ) ( ) ( )      +−−       −= ty a tz a a tx a a ty a 6 2 6 7 2 6 7 6 1 1 ( ) ( )[ ] ( )tw a a tztx a a 2 6 7 22 6 7 −= −−= ( )                 +−⋅−= t a a a wa 1exp 0 6 7 6 27 Hence, from (3)-(5), it results ( ) ( ) ( ) ( )022 6 2 7 2 6 2 2 2 1 w a aa twtwtw ⋅ + ≤ += .0,1exp 6 7 ≥∀                 +−⋅ tt a a Thus, it can be readily obtained that ( ) ( ) ( ) ( ) ( ) ( ) ( ( )twC xCttzCt tmtmte m mmmm ⋅≤ +−−= −= φφ 12 ( ) ,0,1exp 0 6 7 22 6 2 7 2 6 ≥∀               +−⋅ ⋅⋅ + ≤ tt a a Cw a aa m in view of (1), (2), and (6). This in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 1155 ( )tz23     ( )tza 23     − ( )tza 23     − (4) ), it is easy to see that . (5) (6) t can be readily obtained that ( )t This completes the proof.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Remark 1: It should be emphasized that receiver of (2) is linear and with lower dimens than that of the transmitter. Consequently proposed receiver of (2) has the superiorities price and easy implementation by electronic circuit 3. NUMERICAL SIMULATIONS Consider the novel secure communication system of (1)-(2) with 176 == aa and [ ]11 −=mC . By Theorem 1, the synchronization of signals ( )tm1 and proposed secure communication (1) achieved with guaranteed convergence The real message ( )tm1 , the recovered message and the error signal are depicted in Figure 2 respectively, which clearly indicates message ( )tm1 is recovered after 3 seconds. 4. CONCLUSION In this paper, a new concept about secure communication system has been introduced and a novel secure communication design with order linear receiver has been developed to guarantee the global exponential stability of the resulting error signals. Meanwhile, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations have been offered to show the feasibility and effectiveness of the obtained results. ACKNOWLEDGEMENT The author thanks the Ministry of Science and Technology of Republic of China for supporting work under grants MOST 106-2221 MOST 106-2813-C-214-025-E, and MOST E-214-030. Besides, the author is grateful to Professor Jer-Guang Hsieh for the useful ( ) ( )daSystem 11 − channelchannel ( )tz ( )ty( )tx Transmitter ( )tmφ+ + ( )tm2 + − ( )tm1 mC mC Systems (2a)-(2b) Figure 1: Secure-communication scheme information vector and ( )tm2 is the recovered vector) in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 It should be emphasized that the proposed lower dimensions Consequently, the superiorities of low by electronic circuit. novel secure communication system of . By Theorem 1, and ( )tm2 for the proposed secure communication (1)-(2) can be rate of 2=α . message ( )tm2 , ure 2-Figure 4, that the real seconds. In this paper, a new concept about secure communication system has been introduced and a cation design with reduced- has been developed to guarantee the global exponential stability of the resulting error signals. Meanwhile, the guaranteed exponential convergence rate of the proposed secure ectly calculated. Finally, some numerical simulations have been offered to show the feasibility and effectiveness of the Ministry of Science and of Republic of China for supporting this 2221-E-214-007, , and MOST 107-2221- grateful to Chair for the useful comments. Transmitter Receiver scheme ( ( )tm1 is the is the recovered vector). Figure 2: Real message of transmitter of (1) Figure 3: Recoverd message of receiver of (2) Figure 4: Error signal of 0 5 10 15 20 25 3.5 4 4.5 5 5.5 6 6.5 t (sec) m1(t) 0 5 10 15 20 25 3.5 4 4.5 5 5.5 6 6.5 t (sec) m2(t) 0 5 0 0.05 0.1 0.15 0.2 0.25 t (sec) m2(t)-m1(t) in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 1156 Real message of ( )tm1 described in the transmitter of (1). Recoverd message of ( )tm2 described in the receiver of (2). Error signal of ( ) ( )tmtm 12 − . 30 35 40 45 50 t (sec) 30 35 40 45 50 t (sec) 10 15 t (sec)
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com REFERENCES 1. Y.J. Xian, C . Xia, T.T. Guo, K.R. Xu, “Dynamical analysis and FPGA implementation of a large range chaotic system with coexisting attractors,” Results in Physics 11, pp. 368-376, 2018. 2. L. Xiong, S. Zhang, Y. Zeng, and B. Liu “Dynamics of a new composite four- system,” Chinese Journal of Physics 2381-2394, 2018. 3. Y.Wang and H. Yu, “Fuzzy synchronization o chaotic systems via intermittent control Solitons & Fractals, vol. 106, pp. 154 4. A.A. Zaher, “Duffing oscillators for secure communication,” Computers & Electrical Engineering, vol. 71, pp. 77-92, 2018 5. S. Çiçek, U.E. Kocamaz, and Y. Uyaro “Secure communication with a chaotic system owning logic element,” AEU-International Journal of Electronics and Communications 52-62, 2018. 6. J. Hua, L. Chai, D. Xiong, and W. Wang novel method of realizing stochastic chao secure communication by synchrosqueezed wavelet transform,” Digital Signal Processing vol. 82, pp. 194-202, 2018. 7. Z. Sun, L. Si, Z. Shang, and J. Lei synchronization of chaotic PMSM systems for in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 .R. Fu, and C.B. Dynamical analysis and FPGA implementation of a large range chaotic system Results in Physics, vol. L. Xiong, S. Zhang, Y. Zeng, and B. Liu, -Scroll chaotic Chinese Journal of Physics, vol. 56, pp. Fuzzy synchronization of chaotic systems via intermittent control,” Chaos, 54-160, 2018. Duffing oscillators for secure Computers & Electrical 8. d Y. Uyaroğlu, Secure communication with a chaotic system International Journal of Electronics and Communications, vol. 88, pp. J. Hua, L. Chai, D. Xiong, and W. Wang, “A novel method of realizing stochastic chaotic secure communication by synchrosqueezed Digital Signal Processing, Z. Sun, L. Si, Z. Shang, and J. Lei, “Finite-time synchronization of chaotic PMSM systems for secure communication and parameters identification,” Optik, vol. 8. P. Vijayakumar, V. Chang, L.J. Deborah, and B.R Kshatriya, “Key management and key distribution for secure group communication in mobile and cloud network,” Future Generation Computer Systems, vol. 84, pp. 123-1 9. N. Vafamand, S. Khorshidi, and A. Khayatian “Secure communication for non robust TS fuzzy observer synchronization,” Chaos, Solitons & Fractals 112, pp. 116-124, 2018. 10. L. Wang and X. Liu, “ communication scheme for vehicular heterogeneous networks Communications, vol. 11, pp. 11. D. Chang, Z. Li, M. Wang, and Y. Zeng digital programmable multi and its application in FPGA communication,” AEU-International Journal of Electronics and Communications 29, 2018. 12. A. A. Saad, S. Ahmad, S. Azzam, and A. Nedaa, “Securing robot communication using packet encryption distribution vol. 2018, pp. 8-14, 2018. in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 1157 secure communication and parameters , vol. 157, pp. 43-55, 2018. P. Vijayakumar, V. Chang, L.J. Deborah, and B.R Key management and key distribution for secure group communication in mobile and Future Generation Computer 125, 2018. N. Vafamand, S. Khorshidi, and A. Khayatian, Secure communication for non-ideal channel via robust TS fuzzy observer-based hyperchaotic Chaos, Solitons & Fractals, vol. , “Secure cooperative communication scheme for vehicular heterogeneous networks,” Vehicular , pp. 46-56, 2018. D. Chang, Z. Li, M. Wang, and Y. Zeng, “A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure International Journal of Electronics and Communications, vol. 88, pp. 20- A. Saad, S. Ahmad, S. Azzam, and A. A. Securing robot communication using packet encryption distribution,” Network Security,