A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks

被引:0
|
作者
Lili Zhou
Fei Tan
机构
[1] Xiangtan University,College of Information Engineering
[2] Nanjing University of Science and Technology,School of Automation
来源
Nonlinear Dynamics | 2019年 / 96卷
关键词
Two-layered and multiple complex dynamical networks; Chaotic systems; Encryption scheme; Chaotic synchronization;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.
引用
收藏
页码:869 / 883
页数:14
相关论文
共 50 条
  • [31] Design of secure communication systems based on cryptograph and chaotic synchronization
    Liao, TL
    Chien, TI
    Tsai, SH
    PROCEEDINGS OF THE 6TH JOINT CONFERENCE ON INFORMATION SCIENCES, 2002, : 1411 - 1415
  • [32] An Encryption Scheme Based on Synchronization of Two-Layered Complex Dynamical Networks
    Liu, Hui
    Wan, Haibo
    Tse, Chi K.
    Lu, Jinhu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2016, 63 (11) : 2010 - 2021
  • [33] Secure Communication via Chaotic Synchronization Based on Reservoir Computing
    Liu, Jiayue
    Zhang, Jianguo
    Wang, Yuncai
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (01) : 285 - 299
  • [34] Secure Communication based on Chaotic Modulation and Adaptive Synchronization Technology
    Qu, Shaocheng
    Tian, Wenhui
    Gong, Meijing
    Xiao, Shenzhong
    Sha, Li
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2009, 12 (05): : 1013 - 1020
  • [35] An improved secure communication scheme based passive synchronization of hyperchaotic complex nonlinear system
    Wu, Xiangjun
    Zhu, Changjiang
    Kan, Haibin
    APPLIED MATHEMATICS AND COMPUTATION, 2015, 252 : 201 - 214
  • [36] Complex function projective synchronization of complex chaotic system and its applications in secure communication
    Shutang Liu
    Fangfang Zhang
    Nonlinear Dynamics, 2014, 76 : 1087 - 1097
  • [37] Complex function projective synchronization of complex chaotic system and its applications in secure communication
    Liu, Shutang
    Zhang, Fangfang
    NONLINEAR DYNAMICS, 2014, 76 (02) : 1087 - 1097
  • [38] Secure communication scheme analysis via complex networks
    Ding, Yong
    Xiong, Ning
    He, En
    Li, Kezan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (24):
  • [39] A new chaotic secure communication scheme
    Hua, CC
    Yang, B
    Ouyang, GX
    Guan, XP
    PHYSICS LETTERS A, 2005, 342 (04) : 305 - 308
  • [40] Breaking a chaotic secure communication scheme
    JinFeng, Hu
    JingBo, Guo
    CHAOS, 2008, 18 (01)