Discovering Chaos-Based Communications by Recurrence Quantification and Quantified Return Map Analyses

被引:18
|
作者
Rybin, Vyacheslav [1 ]
Butusov, Denis [1 ]
Rodionova, Ekaterina [1 ]
Karimov, Timur [2 ]
Ostrovskii, Valerii [2 ]
Tutueva, Aleksandra [2 ]
机构
[1] St Petersburg Electrotech Univ LETI, Youth Res Inst, 5 Prof Popova St, St Petersburg 197376, Russia
[2] St Petersburg Electrotech Univ LETI, Dept Comp Aided Design, 5 Prof Popova St, St Petersburg 197376, Russia
来源
基金
俄罗斯科学基金会;
关键词
Return map analysis; recurrence quantification analysis; secure communications; chaos-based communications; chaotic shift keying; bifurcation parameter modulation; symmetry coefficient modulation; SECURE COMMUNICATION; SYNCHRONIZATION; BREAKING; ENCRYPTION; MODULATION;
D O I
10.1142/S021812742250136X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Many studies show the possibility of transmitting messages in a protected and covert manner using a noise-like chaotic waveform as a carrier. Among popular chaotic communication system (CCS) types, one may distinguish chaotic shift keying (CSK) and parameter modulation (PM) which are based on the manipulation of the transmitting chaotic oscillators. With the development of direct digital synthesis (DDS), it became possible to modulate chaotic signals by varying the properties of the numerical method used in digital chaos generators. The symmetry coefficient modulation (SCM) is such an approach potentially able to provide higher secrecy. However, the actual security of chaos-based communications is still a questionable and controversial feature. To quantitatively evaluate the CCS security level, a certain numerical metric reflecting the difficulty of breaking a communication channel is needed. Return maps are commonly used to attack chaotic communication systems, but the standard algorithm does not involve any kind of quantification. In this study, we propose a new method for estimating the differences between two return maps based on a two-dimensional (2D) histogram. Then, we investigate the resistance of chaotic shift keying, parameter modulation, and SCM communication schemes against three types of attacks: the proposed quantified return map analysis (QRMA), recurrence quantification analysis (RQA), which had not been previously reported for attacking chaos-based communications, and the classical approach based on spectral analysis. In our experiments we managed to recover the plain binary message from the waveform in the channel when transmitted using all three chaos-based messaging techniques; among them, SCM appeared to be the most secure communication scheme. The proposed QRMA turned out to be the most efficient technique for message recovery: the sensitivity of the QRMA appeared to be 2-5 times higher than that in the case of spectral analysis. The proposed QRMA method can be efficiently used for evaluating the difficulty of hacking chaos-based communication systems. Moreover, it is suitable for the evaluation of any other secure data transmission channel.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] CHAOS-BASED SECURE COMMUNICATIONS
    Xiaofeng Liao
    Shutang Liu
    Chengqing Li
    Yulong Zou
    中国通信, 2020, 17 (05) : 3 - 4
  • [2] CHAOS-BASED SECURE COMMUNICATIONS
    Liao, Xiaofeng
    Liu, Shutang
    Li, Chengqing
    Zou, Yulong
    CHINA COMMUNICATIONS, 2020, 17 (05) : III - IV
  • [3] Introduction to chaos-based communications and signal processing
    Silva, CP
    Young, AM
    2000 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 1, 2000, : 279 - 299
  • [4] Chaos-based Applications in Secure Optical Communications
    Argyris, A.
    Bogris, A.
    Syvridis, D.
    CHINA COMMUNICATIONS, 2007, 4 (03) : 69 - 78
  • [5] Chaos-based Applications in Secure Optical Communications
    A.Argyris
    A.Bogris
    D.Syvridis
    中国通信, 2007, 4 (03) : 69 - 78
  • [6] Chaos-based mid-infrared communications
    Grillot, Frederic
    Spitz, Olivier
    PHYSICS AND SIMULATION OF OPTOELECTRONIC DEVICES XXX, 2022, 11995
  • [7] Chaos-based secure communications in a large community
    Wang, SH
    Kuang, JY
    Li, JH
    Luo, YL
    Lu, HP
    Hu, G
    PHYSICAL REVIEW E, 2002, 66 (06): : 4
  • [8] Security of chaos-based secure communications in a large community
    Wang Kai
    Pei Wen-Jiang
    Zhou Jian-Tao
    Zhang Yi-Feng
    Zhou Si-Yuan
    ACTA PHYSICA SINICA, 2011, 60 (07)
  • [9] Chaos-Based Secure Communications in Biomedical Information Application
    Liao, Teh-Lu
    Chen, Hsin-Chieh
    Peng, Chiau-Yuan
    Hou, Yi-You
    ELECTRONICS, 2021, 10 (03) : 1 - 19
  • [10] Chaos-Based Anytime-Reliable Coded Communications
    Tarable, Alberto
    Escribano, Francisco J.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2214 - 2224