23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

23-2 Industrial Communication Systems<br />

Original<br />

Original signal<br />

Digital signal<br />

Compressed and D/A<br />

A/D and decompressed<br />

Digital signal<br />

p(t)<br />

Cryptographic<br />

scheme e()<br />

k(t)<br />

Magnifyingglass<br />

v R (t)<br />

Intruder<br />

v R (t)<br />

~ p(t)<br />

Cryptographic<br />

scheme d()<br />

~ k(t)<br />

Composition Channel Decomposition Magnifyingglass<br />

Chaotic<br />

system<br />

Synchronization<br />

drive impulses<br />

Synchronization<br />

drive impulses<br />

Chaotic<br />

system<br />

Encrypter<br />

Decrypter<br />

FIGURE 23.1 System block diagram of the chaotic cryptosystem. (Reprinted from Li, Z.G. et al., IEEE<br />

Trans. Commun., 51(8), 1306, 2003. Copyright @ 2003 by The Institute of Electrical and Electronics Engineers.<br />

With Âpermission.)<br />

by chaos synchronization. But before 1990, chaos synchronization was very difficult and nearly impossible.<br />

The ground-breaking scheme, called Pecara and Carroll scheme [PC90], firstly offered a method<br />

to control and realize chaos synchronization. From then on, chaos synchronization and its application<br />

to secure <strong>communication</strong> have seen a flurry of research activities for decades.<br />

The main advantage of a chaotic secure <strong>communication</strong> system over conventional crypto<strong>systems</strong> is<br />

that chaotic secure <strong>communication</strong> schemas can often be realized using very simple circuits on a part<br />

of a chip [GHGS00] and they can be used in applications that do not require a high level of information<br />

security such as remote keyless entry system, video phone, and wireless telephone [GHGS00]. In this<br />

chapter, some typical control methods for chaos synchronization will be presented first, and then how<br />

they are applied to secure <strong>communication</strong> will be illustrated.<br />

23.2 Chaos Synchronization<br />

A number of methods have been proposed for the synchronization of chaotic <strong>systems</strong>, including the<br />

linear and nonlinear feedback control, fuzzy control, adaptive control, sliding mode control, and impulsive<br />

control. In this section, some typical synchronization control methods are introduced with the Chua’s<br />

circuit as an illustrated example.<br />

23.2.1 Feedback Control for Chaos Synchronization via Partial States<br />

One of the important aspects to evaluate the effectiveness of the secure <strong>communication</strong> schema is the<br />

transmission efficiency, i.e., the ratio of the data information to the entire transferred information. In<br />

order to achieve chaos synchronization, it is unavoidable to occupy the <strong>communication</strong> channel by synchronization<br />

control information of the driving system that needs to be transmitted to the receiver. In<br />

the full-order synchronization control schema in which synchronization is achieved by controlling all<br />

the system states, information on all the states of the driving system should be sent to the receiver, which<br />

leads to a poor transmission efficiency. In addition, the full-order synchronization control schema is not<br />

feasible for the case when some of the system states are not available or controllable. In order to overcome<br />

the problem for such a case and to improve the transmission efficiency, one may wish to transmit<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!