10.01.2016 Views

International Teacher Education Conference 2014 1

itec2014

itec2014

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>International</strong> <strong>Teacher</strong> <strong>Education</strong> <strong>Conference</strong> <strong>2014</strong><br />

As indicated, selection of amplitude of It(Transmitted Data) is a pre-requirement of secure Communication with<br />

Chaotic Masking as “It” is going to be masked into X(Chaotic Masking Wave) therefore amplitude of “It”<br />

should preferably be less than amplitude of “X”.<br />

In case the amplitude of “It” is greater than amplitude of “X” S(Transmitted/Masked Data) is mostly consist of<br />

“It” values as shown at Figure 20 therefore unfortunately It could be easily seen by 3.rd parties, Where security<br />

of communication can be increased by selecting smaller amplitude values as an example shown at Figure 19.<br />

15<br />

10<br />

It<br />

St<br />

S,It(Amplitude 5 V)<br />

5<br />

0<br />

-5<br />

-10<br />

-15<br />

0 50 Time(ms) 100 150<br />

Figure 19. Time Series of S (Transmitted/Masked Data Wave), I t (Transmitted Data). Where It = 5 Volt<br />

20<br />

15<br />

It<br />

St<br />

10<br />

S,It(Amplitude 15V)<br />

5<br />

0<br />

-5<br />

-10<br />

-15<br />

-20<br />

-25<br />

0 50 100 150<br />

Time(ms)<br />

Figure 20. Time Series of S (Transmitted/Masked Data Wave), It(Transmitted Data).<br />

Where It = 15 Volt<br />

4. Conclusions<br />

In this work, we studied secure communication by synchronization and chaotic masking of Rucklidge attractors,<br />

as first step we investigated the nonlinear equations of Rucklidge and its dynamical behavior by using Matlab<br />

967

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!