23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

23-8 Industrial Communication Systems<br />

23.2.4 Practical Impulsive Synchronization of Chaotic Systems<br />

with Parametric Uncertainty and Mismatch<br />

The above schemes are applicable to situations that the parameters of chaotic <strong>systems</strong> are time invariant<br />

and these parameters should be identical for both chaotic <strong>systems</strong>, in order to ensure perfect synchronization.<br />

In practical situations, these requirements are difficult to be met because the designed<br />

chaotic <strong>systems</strong> cannot be perfectly implemented and the chaotic <strong>systems</strong> are inevitably exposed to an<br />

environment that may cause their parameters varying within a small range. Recently, a new scheme<br />

to design a secure <strong>communication</strong> system with parametric uncertainties and mismatches is proposed<br />

in [JWL08], based on the results in [WJL07].<br />

In the proposed scheme, designers are allowed to specify certain tolerance bounds for parametric<br />

uncertainties and mismatches. These bounds, together with a prespecified synchronization error<br />

bound, will be used to select impulsive intervals. With the designed system and impulsive intervals, the<br />

message recovering error is shown to be within a bound depending on the prespecified synchronization<br />

error bound, and transmitted signals can be decoded accurately even in the presence of uncertainties<br />

and mismatches. Readers are advised to refer to [JWL08] and [WJL07] for details.<br />

23.3 Secure Communication Using Chaos Synchronization<br />

Continuous chaotic synchronization is adopted in the first three generations of chaos-based secure<br />

<strong>communication</strong>s. Over the past decade, techniques using impulsive chaotic synchronization have<br />

been developed and this has started the fourth generation [COS93,WC93,YWC97,ZL97,T99]. Since<br />

in impulsive synchronization information on states of the driving system is transmitted only at the<br />

impulsive instants, the fourth generation has the following features: ensuring more effective transmission<br />

efficiency while enhancing security and being less sensitive to channel noise. For example,<br />

less than 94.Hz of bandwidth is needed to transmit synchronization control signals with a third-order<br />

chaotic transmitter in the fourth generation, but 30.kHz bandwidth required in the other three generations<br />

[T99].<br />

In this section, a digital secure <strong>communication</strong> system based on impulsive synchronization will be<br />

presented.<br />

23.3.1 Secure Communication Schema<br />

The secure <strong>communication</strong> block diagram is shown in Figure 23.1 [LLWS03]. The secure <strong>communication</strong><br />

schema uses a magnifying glass to enlarge the effect of parameter mismatch and an impulsive control<br />

strategy [LWSX01] for the synchronization of chaotic circuits. The proposed scheme is essentially a onetime<br />

pad [S96] with the random signals replaced by chaotic signals generated from a chaotic system. In<br />

this schema, Chua’s chaotic circuit is adopted to implement the chaotic system with three state variables.<br />

The schema has two major parts: encrypter and decrypter. The input can be of all types of signals that<br />

can be digitized by existing technology, like texture, audio, video, image, speech, and so on, which can<br />

be first compressed. If the input signal is analog, it is digitized by a corresponding technology. Since<br />

chaos is very sensitive to initial condition, the quantization error is required to be less than certain values<br />

to ensure the synchronization of the encrypter and the decrypter [HLYS00].<br />

The compressed and digitized signal acts as the plaintext p(t) in the encryption process. The ciphertext<br />

and the synchronization impulse are then modulated and transmitted to the decrypter via a network.<br />

After demodulating and decrypting, the received plaintext is decompressed and the original message<br />

is recovered.<br />

The encrypter consists of a chaotic system and a classical encryption function e(·). The decrypter<br />

is composed of an impulsive differential system, a corresponding decryption function d(·), and an<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!