23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

23-10 Industrial Communication Systems<br />

Remark 23.1: One can replace the amplifier function in (23.11) by k′(t) = Kg(x 1 , x 2 , x 3 ), where g is a<br />

predefined function. Since the function g is a function of the state variables of the chaotic system, the<br />

sensitivities to the parameter mismatches will be different for different g.<br />

The scrambled signal v R is given by<br />

vR( t) = E( p( t)) = p( t) ⊕ k( t),<br />

(23.13)<br />

where<br />

p(t) is the plaintext<br />

k(t) is given in (23.12)<br />

E(p(t)) is the ciphertext<br />

⊕ denotes XOR operation<br />

23.3.3 the Decrypter<br />

Both Chua’s circuit and the impulsive controller in the decrypter are given by<br />

⎧x̃̇ 1 = kα( x̃ 2 − x̃ 1 − f ( x̃<br />

1)),<br />

⎪<br />

⎨x̃̇ 2 = k( x̃ 1 − x̃ 2 + x̃<br />

3),<br />

⎪<br />

⎪x̃̇<br />

2 = k( −βx̃<br />

2 − γx̃<br />

⎩<br />

3),<br />

t ≠ τ ; l = 1, 2, …,<br />

(23.14)<br />

l<br />

and<br />

−<br />

−<br />

⎡x̃<br />

̃<br />

1( τl)<br />

⎤ ⎡x1( τl<br />

) ⎤ ⎡Q( x1( τl)) − x̃<br />

1( τl<br />

) ⎤<br />

⎢ ⎥ ⎢ ⎥ ⎢<br />

⎥<br />

⎢x̃<br />

2( τl)<br />

⎥ = ⎢ −<br />

x̃<br />

2( τl<br />

) ⎥<br />

−<br />

− B ⎢Q( x2( τl)) − x̃<br />

2( τl<br />

) ⎥, l = 1, 2 , …,<br />

(23.15)<br />

⎢ ⎥ ⎢ ⎥ ⎢<br />

⎥<br />

⎢<br />

⎣x<br />

̃3( τl)<br />

⎥ ⎢ − ⎥ ⎢<br />

− ⎥<br />

⎦ x̃<br />

⎣⎢<br />

3( τl<br />

)<br />

⎦⎥<br />

⎣⎢<br />

Q( x3(<br />

τl)) − x̃<br />

3( τl<br />

)<br />

⎦⎥<br />

where<br />

B is a 3 × 3 matrix to be designed to satisfy certain inequality for synchronization<br />

Q(·) is a predefined quantizer<br />

τ l − are the time instant immediately prior to the time instant τ l<br />

Let T l = (τ l − τ l − 1 ), (τ 0 = 0, l = 1, 2, …), denote impulsive time intervals.<br />

In the decrypter, the plaintext is recovered via<br />

( )<br />

̃ /<br />

k( t) = ⎢K( x̃ ( t) + x̃ ( t) + x̃<br />

( t)) ⎥<br />

⎣<br />

1 2 2 2 3 2 1 2 ⎦ + λ mod( 256 ),<br />

(23.16)<br />

̃p ( t) = Ẽ ( p( t)) = v ( t) ⊕ k̃<br />

( t),<br />

(23.17)<br />

R<br />

where<br />

Ẽ (p(t)) is the recovered encrypted signal<br />

k˜ (t) is recovered in the receiver circuit and should approximate k(t)<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!