n ovel c ascaded c haotic m asking for s ecure c ommunications rupak kharel, krishna busawon &...

Post on 17-Jan-2016

220 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

NOVEL CASCADED CHAOTIC MASKING FOR SECURECOMMUNICATIONSRupak Kharel, Krishna Busawon & Zabi Ghassemloy

Northumbria Communication Research Lab

Northumbria University

OUTLINE

Chaos – Introduction Application to communication Different techniques for chaotic

communication Problem statement Cascaded chaotic masking technique Results Final Comments

2

CHAOS – INTRODUCTION Deterministic system

means that the system has no random or noisy inputs or parameters. The irregular behaviour arises from the system’s nonlinearity rather than from the noisy driving forces.

Aperiodic long term behaviour means that there should be trajectories which

do not settle down to fixed points, periodic orbits or quasiperiodic orbits as t →∞.

Sensitive dependence on initial conditions means that nearby trajectories separate

exponentially fast, which means the system has positive Liapunov exponent.

3

CHAOS – EXAMPLE; LORENZ EQUATIONS

4

Are dynamical system exhibiting chaotic property

Three dimensional system given as:

States are evolving in a complex non repetitive pattern over time.

CHAOS – APPLICATIONS IN COMMUNICATION

Chaotic signal has a broadband spectrum, hence the presence of information does not necessarily change the properties of transmitted signal.

Power output remains constant regardless of the information content.

It is resistant against multi-path fading and offers cheaper solution to traditional spread spectrum systems.

Chaotic signal are aperiodic therefore limited predictability.

Hence, chaotic signal can be used for providing security at physical level.

5

CHAOTIC SYNCHRONIZATION (HOW???) Chaotic systems are very sensitive:

Slightly different initial conditions and initial parameters lead to totally different trajectories.

slight errors between transmitter and receiver can be expected to grow exponentially.

Q1: How can one achieve synchronization?Q2: Can this sensitive chaotic system be used

in communication? Pecora & Carroll1 showed that it is possible to

synchronize two chaotic system if they are coupled with common signals.

Cuomo & Oppenheim2 practically utilized chaotic synchronization for transmitting message signal.

1) L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Phys. Rev. Lett., 64,

pp. 821-824, 1990 2) K. M. Cuomo and A. V. Oppenheim, “Circuit implementation of synchronized chaos with

applications to communications,” Phy. Rev. Lett., 71, pp. 65-68, 1993.

6

CHAOTIC COMMUNICATION –TECHNIQUES

Chaotic Masking Technique

Chaotic Parameter Modulation Technique

Message Inclusion Technique

Chaotic Shift Keying (CSK)

Almost all other methods falls into one or more of these categories.

7

CHAOTIC MASKING TECHNIQUE

8

Message signal (m) is buried in the broad chaos spectrum by adding m to a chaotic mask y.

At receiver, the chaotic mask that is estimated from chaotic synchronization, is removed from received signal to obtain m.

PARAMETER MODULATION TECHNIQUE

9

Some parameters of chaotic system are varied by adding the message signal.

At receiver an adaptive controller is used to tune the chaotic system parameters to ensure zero synchronization error .

MESSAGE INCLUSION TECHNIQUE

10

Rather than changing the chaotic parameter, the message is included in one of the states of the chaotic oscillator. By doing this, we are directly changing the chaotic attractor at phase space.

A transmitted signal will be different than the state where the message will be included.

Encryption rule can also be applied.

CHAOTIC SHIFT KEYING (CSK)

11

Used for transmitting digital message signal. Two statistically similar chaotic attractor are

respectively used to encode bit ‘1’ or ‘0’.

These two attractors are generated by two chaotic systems having the same structure but slightly different parameters.

At receiver, the received signal is used to drive a chaotic system similar to one of the transmitters.

The message is recovered by thresholding the synchronization error signal.

CHAOS – TECHNIQUES PROBLEMS Masking, parametric modulation technique

and CSK has been proved to be insecure1,2,3. Breaking methods were based on forecasting

and predicting the carrier values, which when subtracted revealed the spectrum of message.

Inclusion method is secure, however presents a problem of inversion.

Hence, the need to improve the security of the above techniques.

1) K. M. Short, "Steps toward unmasking secure communications," International Journal of Bifurcation and Chaos, vol. 4, pp. 959-977, 1994.

2) G. Alvarez, F. Montoya, M. Romera, and G. Pastor, "Breaking parameter modulated chaotic secure communication systems," Chaos Solitons & Fractals, vol. 21, pp. 783-787, 2004.

3) T. Yang, L. B. Yang, and C. M. Yang, "Application of neural networks to unmasking chaotic secure communication," Physica D, vol. 124, pp. 248-257, 1998.

12

CHAOS – PROBABLE SOLUTION Cascaded Masking Technique (CMT).

Two chaotic signals (generated by two oscillators) are added together at roughly equal power to generate a carrier of sufficient complexity.

Forecasting and predicting carrier behaviour is hence not possible.

Simpler masking technique thus can be extended as cascaded structure for more secure links.

13

CASCADED MASKING TECHNIQUE (CMT)

14

Chaotic receiver ‘B’ synchronizes with oscillator ‘B’ to estimate and recover ym to drive chaotic receiver ‘A’ to synchronize with oscillator ‘A’.

CMT – APPLICATION USING LORENZ SYSTEM

15

Transmitter A

Transmitter B

Receiver B

Receiver A

Note: A scaled Lorenz equation is used as done by Cuomo & Oppenheim for favourable electronic implementation, otherwise wide dynamic range of the solution will exceed typical power supply limit.

CMT – RESULTS

16Fig. 1: Output ym after first level of masking Fig. 2: Output ym after first level of masking (transmitted signal)

Parameters adopted and assumption made• σ, r, b = 16,45.6 and 4• m(t) = 0.1 sin(2πt)• All the gains are set to zero• Arbitrary Initial conditions• Ideal channel and no noise

CMT – RESULTS (CONTD…)

Input and output waveforms

17

LIMITATIONS & FUTURE WORK

Taking into consideration non-ideal channel with noise.

The synchronization robustness of receiver B is critical for the proper synchronization of receiver A and proper message extraction.

Expanding the system to work with other chaotic oscillator such Chua’s circuit, Duffing oscillator, Colpitts oscillator, etc.

Hardware implementation.

18

CONCLUSION

A novel cascaded masking technique to increase the security of the chaotic communication system was presented.

Theoretical analysis was given. Simulation results presented demonstrated successful recovery of the message signal.

Limitation and future works were also outlined.

19

ACKNOWLEDGEMENTS

I would like to thank Northumbria University for providing me with

PhD studentship to carry out the research. My supervisors Dr. Krishna Busawon and Prof.

Zabi Ghassemlooy. My collegues in NCRLab.

20

THANK YOU. (ANY QUESTIONS !!!)

21

top related