Discovering Chaos-Based Communications by Recurrence Quantification and Quantified Return Map Analyses

被引:18
|
作者
Rybin, Vyacheslav [1 ]
Butusov, Denis [1 ]
Rodionova, Ekaterina [1 ]
Karimov, Timur [2 ]
Ostrovskii, Valerii [2 ]
Tutueva, Aleksandra [2 ]
机构
[1] St Petersburg Electrotech Univ LETI, Youth Res Inst, 5 Prof Popova St, St Petersburg 197376, Russia
[2] St Petersburg Electrotech Univ LETI, Dept Comp Aided Design, 5 Prof Popova St, St Petersburg 197376, Russia
来源
基金
俄罗斯科学基金会;
关键词
Return map analysis; recurrence quantification analysis; secure communications; chaos-based communications; chaotic shift keying; bifurcation parameter modulation; symmetry coefficient modulation; SECURE COMMUNICATION; SYNCHRONIZATION; BREAKING; ENCRYPTION; MODULATION;
D O I
10.1142/S021812742250136X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Many studies show the possibility of transmitting messages in a protected and covert manner using a noise-like chaotic waveform as a carrier. Among popular chaotic communication system (CCS) types, one may distinguish chaotic shift keying (CSK) and parameter modulation (PM) which are based on the manipulation of the transmitting chaotic oscillators. With the development of direct digital synthesis (DDS), it became possible to modulate chaotic signals by varying the properties of the numerical method used in digital chaos generators. The symmetry coefficient modulation (SCM) is such an approach potentially able to provide higher secrecy. However, the actual security of chaos-based communications is still a questionable and controversial feature. To quantitatively evaluate the CCS security level, a certain numerical metric reflecting the difficulty of breaking a communication channel is needed. Return maps are commonly used to attack chaotic communication systems, but the standard algorithm does not involve any kind of quantification. In this study, we propose a new method for estimating the differences between two return maps based on a two-dimensional (2D) histogram. Then, we investigate the resistance of chaotic shift keying, parameter modulation, and SCM communication schemes against three types of attacks: the proposed quantified return map analysis (QRMA), recurrence quantification analysis (RQA), which had not been previously reported for attacking chaos-based communications, and the classical approach based on spectral analysis. In our experiments we managed to recover the plain binary message from the waveform in the channel when transmitted using all three chaos-based messaging techniques; among them, SCM appeared to be the most secure communication scheme. The proposed QRMA turned out to be the most efficient technique for message recovery: the sensitivity of the QRMA appeared to be 2-5 times higher than that in the case of spectral analysis. The proposed QRMA method can be efficiently used for evaluating the difficulty of hacking chaos-based communication systems. Moreover, it is suitable for the evaluation of any other secure data transmission channel.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Generalised polynomial chaos-based uncertainty quantification for planning MRgLITT procedures
    Fahrenholtz, Samuel J.
    Stafford, R. Jason
    Maier, Florian
    Hazle, John D.
    Fuentes, David
    INTERNATIONAL JOURNAL OF HYPERTHERMIA, 2013, 29 (04) : 324 - 335
  • [22] Narrowband interference suppression in chaos-based communications based on set-membership estimation
    Fan Yong-Quan
    Zhang Jia-Shu
    ACTA PHYSICA SINICA, 2008, 57 (05) : 2714 - 2721
  • [23] Multiple-Access Optical Chaos-Based Communications Using Optoelectronic Systems
    Rontani, D.
    Locquet, A.
    Sciamanna, M.
    Citrin, D. S.
    Uchida, A.
    2010 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO) AND QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE (QELS), 2010,
  • [24] Chaos-Based Communications Using Open-Plus-Closed-Loop Control
    Miyano, Takaya
    Nishimura, Kazuhiro
    Yoshida, Yusuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 282 - 289
  • [25] Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
    Kifouche, Abdenour
    Azzaz, Mohamed Salah
    Hamouche, Redha
    Kocik, Remy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1247 - 1262
  • [26] Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
    Abdenour Kifouche
    Mohamed Salah Azzaz
    Redha Hamouche
    Remy Kocik
    International Journal of Information Security, 2022, 21 : 1247 - 1262
  • [27] A Novel Chaos-Based Image Encryption Scheme Using Coupled Map Lattices
    Wu, Xinhua
    2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2013, : 1020 - 1024
  • [28] Review of Polynomial Chaos-Based Methods for Uncertainty Quantification in Modern Integrated Circuits
    Kaintura, Arun
    Dhaene, Tom
    Spina, Domenico
    ELECTRONICS, 2018, 7 (03)
  • [29] A chaos-based pseudo-random number generator and its application in voice communications
    Tang, K. W.
    Tang, Wallace K. S.
    Man, K. F.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (03): : 923 - 933
  • [30] An improved multiple access scheme for chaos-based digital communications using adaptive receivers
    Tam, WM
    Lau, FCM
    Tse, CK
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 4, PROCEEDINGS, 2004, : 605 - 608