Abstract
In this paper, a new voltage-controlled memristor is presented. The mathematical expression of this memristor has an absolute value term, so it is called an absolute voltage-controlled memristor. The proposed memristor is locally active, which is proved by its DC V–I (Voltage–Current) plot. A simple three-order Wien-bridge chaotic circuit without inductor is constructed on the basis of the presented memristor. The dynamical behaviors of the simple chaotic system are analyzed in this paper. The main properties of this system are coexisting attractors and multistability. Furthermore, an analog circuit of this chaotic system is realized by the Multisim software. The multistability of the proposed system can enlarge the key space in encryption, which makes the encryption effect better. Therefore, the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for digital encryption systems. Thus, the chaotic system is discretized and implemented by Digital Signal Processing (DSP) technology. The National Institute of Standards and Technology (NIST) test and Approximate Entropy analysis of the proposed chaotic system are conducted in this paper.
Keywords: chaos, memristor, Wien-bridge, coexisting attractors, DSP
1. Introduction
A memristor is a nonlinear two-terminal circuit element reflecting the relationship between charge and magnetic flux, which was first predicted by Chua in 1971 [1]. Reference [2] introduced the general definition of memristor and its three fingerprints. Then, in 2008, the realization of a nanoscale memristor was first reported by the Hewlett-Packard laboratory [3]. A locally active memristor was proposed by Chua, which can generate complex behaviors in nonlinear dynamical systems [4]. The DC V–I plot is a smooth curve passing through different voltages V and corresponding currents I on the V–I plane, which can be used to show that a memristor is locally active [5]. Because of its unique properties, a memristor can be used in many areas such as nonlinear chaotic circuits [6,7,8,9], artificial intelligence [10,11,12], electronic engineering [13,14,15], neural networks [16,17,18], and so on.
Recently, much attention has been paid to construct memristor-based chaotic circuits and analyze their dynamical behaviors. Reference [19] presented and analyzed a new chaotic circuit, which was composed of a meminductor emulator and an active memristor emulator. Reference [20] constructed a memristor-based hyperchaotic Wien-bridge oscillator and analyzed its dynamical behaviors. In Reference [21], an inductor-free chaotic circuit containing two memristors was proposed. A Wien-bridge chaotic oscillator based on an SBT memristor was designed in Reference [22]. Besides, some dynamical behaviors in chaotic systems were analyzed with the help of a phase diagram, Poincare section, bifurcation diagram, and Lyapunov exponent spectrum [23,24,25]. Specifically, coexisting attractors and multistability are common phenomena in a chaotic system, which indicates that a chaotic system with fixed parameters under different initial conditions can generate disparate attractors. In recent years, many studies have been conducted on coexisting attractors and multistability in chaotic systems. Reference [26] discovered coexisting singular attractors in a two-dimensional dynamical system. The two-dimensional dynamical system consisted of a bistable bi-local active memristor and an inductor. Reference [27] introduced a new four-wing chaotic system and analyzed its multistability. In Reference [28], the multistability phenomenon was detected and analyzed in an autonomous hyperchaotic oscillator. A sustained chaos state means that independent of the initial conditions, a system will finally turn to a chaotic state with constant Lyapunov exponents. The sustained chaos phenomenon was discovered in a new memristor-based chaotic system [29]. Reference [30] proposed a novel 4D chaotic system with constant Lyapunov exponents. In Reference [31], the constant Lyapunov exponent spectrum was found in a Wien-bridge chaotic oscillator based on a meminductor.
Furthermore, the chaotic system can be used for encryption and secure communication. In Reference [32], a new 3D system was used for signal encryption. A fractional-order hperchaotic system was applied to a color image encryption in Reference [33]. Reference [34] applied a four-dimensional hyperchaotic system to image encryption. Reference [35] designed a chaotic system with adaptive control synchronization and applied it to secure communication. Reference [36] introduced a new 3D autonomous chaotic oscillator and described its secure communication application. The chaotic system can be implemented by a digital circuit, which makes it better applicable to digital encryption. Therefore, the chaotic system can be further discretized and implemented by Digital Signal Processing (DSP) technology [37]. Besides, the chaotic system can be used as a pseudo-random sequence generator to provide key sequences for encryption systems. The randomness of the chaotic sequence can be tested by means of the National Institute of Standards and Technology (NIST) test suite [38].
In this paper, an absolute voltage-controlled memristor is presented. Then, a simple three-order Wien-bridge circuit is constructed based on the presented memristor. Because of the absence of an inductor, this Wien-bridge circuit is easily integrated. In addition, this chaotic system possesses dynamical behaviors, including multistability and sustained chaos state. The rest of this paper is composed of the following sections. In Section 2, the model of this absolute voltage-controlled memristor is presented and its characteristics are researched via a DC V–I plot. A simple three-order memristive Wien-bridge circuit and its typical chaotic attractors are demonstrated in Section 3. The rich dynamical behaviors of the presented system are analyzed in Section 4. In Section 5, an analog circuit of this chaotic system is realized by the Multisim software. The DSP implementation of this chaotic system is introduced in Section 6. NIST test and Approximate Entropy analysis of the proposed chaotic system are conducted in Section 7. Finally, some conclusions are drawn in Section 8.
2. Mathematical Model and DC V–I Plot of the Proposed Memristor
2.1. Mathematical Model
According to the definition of memristor, an nth-order voltage-controlled memristor can be described by the following equation [1,39,40]:
(1) |
where i represents the current flowing through the memristor, v stands for the voltage across the memristor, z is the state variable of the memristor, and W(z) is the corresponding memductance.
In order to research the characteristics of a new memristor model and explore the dynamic behaviors of an oscillator system based on the memristor, a new voltage-controlled memristor was proposed as follows:
(2) |
where am, bn, c, and d are coefficients, and am-bn|z| is the memductance W(z). The mathematical expression of this memristor has an absolute value term, so it is called an absolute voltage-controlled memristor.
When a voltage signal v = vmsin(2πft) with amplitude vm and frequency f is applied to the memristor, the v–i pinched hysteresis loops of the proposed memristor with amplitude vm = 1 V and different frequencies f are depicted in Figure 1.
Figure 1.
The v–i pinched hysteresis loops of the proposed memristor with different frequencies f.
In Figure 1, it is obvious that the v–i pinched hysteresis loops of the proposed memristor pass through the origin. Besides, the v–i pinched hysteresis loops are symmetrical. The area of the v–i hysteresis loop decreases when the frequency f increases. The pinched hysteresis loop shrinks to a straight line when the frequency f is 55 Hz. Therefore, the proposed memristor satisfies the characteristic fingerprints of memristors [2].
2.2. DC V–I Plot of the Proposed Memristor
The DC V–I plot is a smooth curve passing through different voltages V and corresponding currents I on the V–I plane, which can be used to research the characteristics of a memristor [5]. When the state variable z is Z, the DC voltage is V, and the DC current is I, the Equation (2) can be rewritten as follows:
(3a) |
(3b) |
when the right-hand side of (3b) is zero, the equilibrium equation of the memristor can be written as follows:
(4) |
The relationship between the state variable z and the DC voltage V can also be written as follows:
(5) |
When am = 5, bn = 4, c = 0.4, d = 1, and Equation (5) is taken into Equation (3a), the DC current I can be written as follows:
(6) |
According to Equation (6), the DC V–I plot of the proposed memristor is shown in Figure 2.
Figure 2.
DC V–I plot of the proposed memristor.
It is obvious that there are negative slope regions in the DC V–I plot of the memristor. Hence, the proposed absolute memristor is locally active [41]. In a nonlinear dynamical system, the function of a locally active element is to maintain oscillations [41].
3. The Three-Order Memristive Wien-Bridge Chaotic Circuit
3.1. Circuit Model
As shown in Figure 3, a simple memristive Wien-bridge circuit based on the above absolute voltage-controlled memristor was constructed. The three-order chaotic circuit consisted of three dynamic elements, i.e., the capacitor C1, the capacitor C2, and the absolute voltage-controlled memristor W corresponding to the three state variables voltage v1, voltage v2, and current iw, respectively.
Figure 3.
The simple memristive Wien-bridge circuit.
According to Kirchhoff’s law and the constitutive relations of circuit elements, the state equations of the above Wien-bridge circuit are written as follows:
(7) |
where W(z) = am − bn|z|. Let x = v1, y = v2, R1 = R2, a = R2/C1R1R3, b = R2/C2R1R3, m = am/C1, and n = bn/C1, Equation (7) can be simplified to:
(8) |
3.2. Typical Chaotic Attractors
When the parameters of Equation (8) are set as in Table 1 and the initial conditions are (0, 0.1, 0), the system is in a chaotic state. In this condition, the Lyapunov exponents are calculated as LE1 = 0.4369, LE2 = 0, LE3 = −2.0762. The corresponding chaotic attractors on the x-y-z, x-y, y-z, x-z planes are depicted in Figure 4. The time domain waveform of the state variable x(t) is shown in Figure 5a. Figure 5b demonstrates the corresponding Poincare mapping on z = −1.3 section. The time domain waveform and Poincare mapping shown in Figure 5 indicate that the system was chaotic.
Table 1.
Parameter values of typical attractors.
Parameters | Values |
---|---|
a | 4.5 |
b | 5.5 |
c | 0.4 |
d | 1.0 |
m | 5.0 |
n | 4.0 |
Figure 4.
Phase portraits of the proposed chaotic system on (a) x-y-z plane, (b) x-y plane, (c) y-z plane, and (d) x-z plane.
Figure 5.
(a) The time domain waveform of the state variable x, (b) the corresponding Poincare mapping on z = −1.3 section.
4. Dynamical Behaviors of the Proposed Chaotic System
4.1. Dissipativity and Stability
The solutions of Equation (8) are invariant under the following transformation:
(9) |
this implies that the proposed chaotic system was symmetric at the origin.
If the system is dissipative, it can generate chaotic attractors. The dissipativity of this system can be described by the following expression:
(10) |
when the parameters a, b, c, d, m, and n are set as in Table 1 and |z| > 0.72, the ∇V of this system is negative. It means the system is dissipative.
Let in Equation (8): three equilibrium points of this system can be calculated as follows:
(11) |
The Jacobian matrix J of Equation (8) is expressed as follows:
(12) |
If m = 5.0 and n = 4.0, its characteristic equation at equilibrium point S0 can be simplified as follows:
(13) |
In terms of the Routh–Hurwitz stability criterion, if all coefficients of Equation (13) satisfy the following equation, the system is stable:
(14) |
As shown in Figure 6, the region of a ∈ [−20,10] and b ∈ [−20,10] can be divided into two parts. The blue part satisfies the above equation, so it represents a stable region. Conversely, the yellow part belongs to an unstable region.
Figure 6.
The stable region colored in blue and the unstable region colored in yellow in the region of a ∈ [−20, 10] and b ∈ [−20, 10].
4.2. Bifurcation Diagrams and Lyapunov Exponent Spectra
The dynamical behaviors of the above chaotic system were further investigated with the help of bifurcation diagrams and Lyapunov exponent spectra.
When a varied from 1 to 6 and other parameters were set as in Table 1 with initial conditions of (0, 0.1, 0), the bifurcation diagram of the state variable x and the corresponding Lyapunov exponent spectra are as plotted in Figure 7a,b, respectively. As it is shown in Figure 7a, when a ∈ [1, 1.7], the system was convergent, and the corresponding Lyapunov exponents were all negative. Then, the system went into chaotic state nearby a = 1.8, with one of the Lyapunov exponents positive. When a ∈ [1.8, 2.2], the system was in chaotic state. Next, the system entered a period window nearby a = 2.3. The system was still in periodic state in the regions of a ∈ [2.3, 3.4]. In the regions of a ∈ [3.5, 5.2], the system was in chaotic state. Finally, nearby a = 5.2, the system entered periodic state.
Figure 7.
Bifurcation diagram and Lyapunov exponent spectra varying with a. (a) Bifurcation diagram, (b) Lyapunov exponent spectra.
More specifically, various phase portraits with different a are depicted in Figure 8. In Figure 8a, when a = 1.5, the red trajectory converges to the stable equilibrium point (0.7071, 0.7071, −1.2500). When a = 5.5, the blue trajectory is a limit cycle, implying the system is in periodic state. Different kinds of chaotic attractors are plotted in Figure 8b–d. Figure 8b,c depict two kinds of twin-scroll chaotic attractors. The single-scroll chaotic attractor is shown in Figure 8d.
Figure 8.
Various phase portraits with different a on the x-y plane. (a) a = 1.5 in red, a = 5.5 in blue, (b) a = 2.0, (c) a = 4.0, (d) a = 5.1.
4.3. Coexisting Attractors and Multistability
Coexisting attractors and multistability are common characteristics of a chaotic system. Generally, if a system possesses coexisting attractors, it has multistability. The existence of coexisting attractors indicates that a system with fixed parameter values and different initial conditions can generate disparate attractors. If a chaotic system has coexisting attractors, it can also show the phenomenon of coexisting bifurcation.
If a = 4.5, b = 4.85, c = 0.4, d = 1, m = 5, n = 4, and the initial conditions are set as (0, 0.1, 0) and (0, −0.1, 0), the coexisting attractors are as depicted in Figure 9, where the red trajectory starts from initial conditions of (0, 0.1, 0), and the blue trajectory starts from initial conditions of (0, −0.1, 0). Obviously, the coexisting attractors starting from (0, 0.1, 0) and (0, −0.1, 0) are symmetric with respect to y = 0 on the y-z plane. The above coexisting attractors are symmetric with respect to x = 0 on the x-z plane. Thus, the coexisting attractors at different initial conditions are symmetrical in this chaotic system.
Figure 9.
Coexisting attractors, indicated in red at initial conditions of (0, 0.1, 0) and indicated in blue at initial conditions of (0, −0.1, 0). (a) coexisting attractors on the y-z plane (b) coexisting attractors on the x-z plane.
When a = 4.5, c = 0.4, d = 1, m = 5, n = 4, and b is set as different values, a variety of coexisting attractors with initial conditions of (0, 0.1, 0) and (0, −0.1, 0) are obtained, as plotted in Figure 10, where the red orbit starts from the initial conditions of (0, 0.1, 0), and the blue one starts from the initial conditions of (0, −0.1, 0). Figure 10a,b depicts two kinds of a symmetric pair of single-scroll attractors. Figure 10c,d depicts two kinds of a symmetric pair of twin-scroll attractors. Two kinds of a symmetric pair of limit cycles are shown in Figure 10e,f.
Figure 10.
Various coexisting attractors with different values of b under initial conditions of (0, 0.1, 0) in red and (0, −0.1, 0) in blue. (a) b = 4.83, (b) b = 5.1, (c) b = 5.5, (d) b = 5.9, (e) b = 6.6, (f) b = 7.0.
When b varies from 4.5 to 7 and other parameters are set as in Table 1, the coexisting bifurcation diagram of the state variable x is shown in Figure 11a, where the orbit colored in red starts from the initial conditions of (0, 0.1, 0), and the blue one starts from the initial conditions of (0, −0.1, 0). Obviously, the coexisting bifurcation diagram varying with b is symmetric with respect to xmax = 0. The Lyapunov exponent spectra varying with b are depicted in Figure 11b and correspond to the coexisting bifurcation diagram plotted in Figure 11a. It can be concluded from Figure 11b that independent of the initial conditions being (0, 0.1, 0) or (0, −0.1, 0), this chaotic system has the same Lyapunov exponents.
Figure 11.
Coexisting bifurcation diagram and the corresponding Lyapunov exponent spectra varying with b. (a) Coexisting bifurcation diagram of the variable x at the initial conditions of (0, 0.1, 0) in red and at the initial conditions of (0, −0.1, 0) in blue, (b) corresponding Lyapunov exponent spectra.
4.4. Sustained Chaos State
As mentioned above, the proposed chaotic system showed multistability, which means that under different initial conditions, it can always evolve into a chaotic state. Therefore, the proposed chaotic system is very interesting. Independent of the initial conditions, the system will evolve into a chaotic state. This indicates that the proposed system maintains a sustained chaos state and constant Lyapunov exponents as the initial conditions vary.
If the system parameters are as in Table 1 with initial conditions of (x(0), 0.1, 0) in which x(0) is the bifurcation parameter, the bifurcation diagram of the state variable x and the corresponding Lyapunov exponent spectra are as shown in Figure 12a and Figure 13a, respectively. It is obvious that the Lyapunov exponents of the proposed system almost remain constant under the initial conditions of (x(0) ∈ (−1 × 104, 1 × 104), 0.1, 0). If the initial value y(0) is regarded as the bifurcation parameter and x(0) = z(0) = 0, the bifurcation diagram of the state variable y and the corresponding Lyapunov exponent spectra are as shown in Figure 12b and Figure 13b, respectively. The corresponding Lyapunov exponents are approximately the same under the initial conditions of (0, y(0) ∈ (−1×104, 1×104), 0). Similarly, the Lyapunov exponents are constant under the initial conditions of (0, 0.1, z(0) ∈ (−1×104, 1 × 104)). The bifurcation diagram of the state variable z and the corresponding Lyapunov exponent spectra with initial conditions of (0, 0.1, z(0) ∈ (−1×104, 1×104)) are shown in Figure 12c and Figure 13c, respectively.
Figure 12.
Bifurcation diagram of the state variable x varying with different initial values. (a) Variation with initial value x(0), (b) variation with initial value y(0), (c) variation with initial value z(0).
Figure 13.
Corresponding Lyapunov exponent spectra varying with different initial values. (a) Variation with initial value x(0), (b) variation with initial value y(0), (c) variation with initial value z(0).
5. Circuit Simulation by the Multisim Software
The circuit simulation of this chaotic system could be realized by the Multisim software [42]. For time scaling factors τ = 100t and circuit parameters as in Table 1, Equation (8) can be written as follows:
(15) |
The analog circuit is shown in Figure 14, from which the state equations can be obtained as follows:
(16) |
Figure 14.
The analog circuit of the memristive Wien-bridge chaotic oscillator.
Supposing that the coefficients in Equation (15) are equal to the corresponding ones in Equation (16), the above equations can be written as follows:
(17) |
In Figure 14, the specific capacitance and resistance parameters were set as C1 = 11 nF, C2 = 9 nF, R1 = R2 = 10 kΩ, R5 = 4 kΩ, R6 = 10 kΩ, R7 = R8 = 1 kΩ, R9 = 5 kΩ, R10 = 4 kΩ, R11 = R12 = R13 = R14 = R15 = 10 kΩ. Other capacitance and resistance parameters could be calculated as: C3 ≈ 2.5 μF, R3 ≈ 202 kΩ, R4 ≈ 182 kΩ. In this analog circuit, the type of operational amplifiers U1–U7 was OP07CP, and the type of multipliers A1–A2 was AD633. XSC1, XSC2, and XSC3 were oscilloscopes. D1 and D2 were diodes.
The simulation results obtained from oscilloscopes by the Multisim software are shown in Figure 15. Figure 15a–c are phase portraits of the attractors. Figure 15d–f are phase portraits of coexisting attractors, where the red orbit starts from the initial conditions of (0, 0.1, 0), and the blue orbit starts from (0, −0.1, 0). It is obvious that the simulation results matched well with the numerical simulation results.
Figure 15.
Simulation results obtained from the Multisim software. (a) Attractor on the x-y plane, (b) attractor on the y-z plane, (c) attractor on the x-z plane, (d) coexisting attractors the on x-y plane, (e) coexisting attractors on the y-z plane, (f) coexisting attractors on the x-z plane.
6. Implementation of the Chaotic System by DSP Technology
The chaotic system can be used for digital encryption. The main characteristic of the proposed chaotic system is multistability. The multistability of the proposed system can enlarge the key space in encryption, which improves the encryption effect. Therefore, the proposed chaotic system can be used for digital encryption. In analog chaotic circuits, the existence of random signal perturbation will lead to output instability. So, the analog chaotic circuits cannot be directly applied to digital encryption. Therefore, in order to make the proposed chaotic system better suitable for digital encryption applications, it was further discretized and implemented by DSP technology [37].
During digital implementation, the dynamical degradation effect will eliminate the chaotic behavior in a finite space and prevent practical applications for chaos phenomena [43,44]. There are five approaches to prevent dynamical degradation: (1) higher finite precision [45]; (2) cascading multiple digital chaotic systems [46]; (3) perturbance-based method [47,48,49,50]; (4) switching multiple digital chaotic systems [51,52]; (5) error compensation methods [53]. In this paper, the first method was adopted to prevent dynamical degradation. The integration step in the discretization process is crucial.
There are three algorithms for discretization and digitalization of continuous chaotic systems. They are the simple Euler algorithm, the improved Euler algorithm, and the Runge–Kutta algorithm. The simple Euler algorithm has faster computation speed than the other two algorithms. When the Euler algorithm is implemented with DSP, it requires less resources and is easy to implement. Thus, the Euler algorithm was adopted to discretize the chaotic system. The theoretical basis of the Euler algorithm is shown as follows:
(18) |
Equation (8) can be discretized to the following equations according to the Euler algorithm:
(19) |
where the parameters a, b, c, d, m, and n are as in Table 1. The integration step Δt = 0.01 and the initial conditions were set as x(0) = 0, y(0) = 0.1, z(0) = 0.
The digital signal was obtained by solving Equation (19) in a digital signal processor. The chaotic pseudo-noise (PN) sequence extracted from the variable x is shown in Figure 16a. In order to observe the analog signal in an oscilloscope, the digital signal was input into an 8-bit D/A convertor. The output phase portraits of the chaotic attractor are shown in Figure 16b–d. The phase portraits of coexisting attractors are shown in Figure 16e,f, where the trajectory on the left starts from the initial conditions of (0, −0.1, 0), and the right trajectory starts from the initial conditions of (0, 0.1, 0). The experimental equipment is shown in Figure 17. In the experimental equipment, the type of evaluation board was ICETEK-VC5509-AE, and the core processing chip was TMS320C5509.
Figure 16.
Experimental results obtained by Digital Signal Processing (DSP) technology. (a) Chaotic pseudo-noise (PN) sequence extracted from the variable x, (b) chaotic attractor on the x-y plane, (c) chaotic attractor on the y-z plane, (d) chaotic attractors on the x-z plane, (e) coexisting attractors on the y-z plane, (f) coexisting attractors on the x-z plane.
Figure 17.
Experimental equipment.
7. NIST Test Results and Approximate Entropy Analysis of the Proposed Chaotic System
7.1. NIST Test Results
The chaotic system can be used as a pseudo-random sequence generator to provide key sequences for an encryption system. The random characteristics of the chaotic sequences directly affect the security of an encryption system. The randomness of the binary sequences extracted from the above chaotic system were tested by means of the NIST test suite [38]. The NIST test suite is a tool for testing the randomness of pseudo-random sequences.
In this NIST test, a binary sequence was generated from the solution sequence z of Equation (19). A binary sequence can be generated as follows: If the sixth place after the decimal point of a solution z is an even number, the generated binary number is 0, otherwise the generated binary number is 1. So, the solution sequence z can generate a binary sequence. In this NIST, the significance level α was set to 0.01. The binary sequence was divided into 1000 groups according to the significance level α [38], and each group contained 1,000,000 bits. The final test results are shown in Table 2.
Table 2.
Final analysis report.
Statistical Test Terms | p-ValueT | Proportion |
---|---|---|
Frequency | 0.624627 | 0.9960 |
Block Frequency | 0.668321 | 0.9940 |
Cumulative Sums | 0.326749 | 0.9960 |
Runs | 0.399442 | 0.9900 |
Longest Run | 0.877083 | 0.9880 |
Rank | 0.044797 | 0.9900 |
FFT | 0.887645 | 0.9860 |
Non-Overlapping Template | 0.993493 | 0.9880 |
Overlapping Template | 0.476911 | 0.9930 |
Universal | 0.854708 | 0.9870 |
Approximate Entropy | 0.272977 | 0.9890 |
Random Excursions | 0.649066 | 0.9935 |
Random Excursions Variant | 0.995975 | 0.9951 |
Serial | 0.007805 | 0.9820 |
Linear Complexity | 0.755819 | 0.9920 |
In Table 2, two parameters evaluated in 15 tests are reported. One is the p-valueT, which reflects the distribution of p-values (possible values). It is used to check for uniformity of the sequences [38]. If p-valueT ≥ 0.0001, the distribution of sequences is uniform [38]. It is obvious that the p-valueT of all types of test satisfied the above condition. The other parameter is the proportion, which represents the proportion of sequences that pass a statistical test [38]. The range of acceptable proportions is determined by the confidence interval. The range of acceptable proportions is computed as follows:
(20) |
where , α is the significance level, N is the total number of groups. In this test, α = 0.01, N = 1000, and the range of acceptable proportions was (0.9805608, 0.9994392). If the value of proportion is in the range of 0.9805608–0.9994392, the sequences pass this type of test [38]. It is obvious that all proportions were in the range of 0.9805608–0.9994392, which means that the sequences passed all types of test and the randomness of the proposed chaotic system was up to the standards of NIST [38]. Thus, when the integration step Δt was set as 0.01 in Equation (19), the chaotic behavior was not eliminated. Therefore, the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for encryption systems.
7.2. Approximate Entropy Analysis
The purpose of the Approximate Entropy test is to measure the complexity and randomness of sequences [38]. In this NIST test, the chaotic sequences were divided into 1000 groups, and each group contained 1,000,000 bits. The Approximate Entropy test method is used to test the randomness of sequences in the following way:
(1) Construct a new sequence on the basis of each group of the original sequence. The method to construct the new sequence consists of appending m−1 bits (m is the block length) from the beginning of each group of the original sequence to the end of the original sequence.
(2) Count the frequency of all 2m m-bit sub-sequences in the new sequence. Record the frequency of each m-bit sub-sequence as #i (i represents different m-bit sub-sequences).
(3) Compute as follows:
(21) |
where m represents the block length, i represents different m-bit strings, and n represents the length of each group of the new sequence.
(4) Compute φ(m) as follows:
(22) |
(5) Compute φ(m+1). Repeat steps (1)–(4) by replacing m with m + 1.
(6) Compute the test statistic χ2
(23) |
where ApEn(m) = φ(m) − φ(m+1).
(7) Compute the p-value as follows:
(24) |
where igamc is the incomplete gamma function. It can be calculated as follows:
(25) |
(26) |
Since the chaotic sequences were divided into 1000 groups in this test, the number of p-values to compute was 1000.
(8) Compute p-valueT as follows:
(27) |
(28) |
where the intervals between 0 and 1 are divided into 10 sub-intervals; j represents one of the 10 sub-intervals, Fi is the number of p-values in the sub-interval j, N is the total number of groups. In this test, N = 10,000. The Approximate Entropy test result is shown in Table 2. It is obvious that the Approximate Entropy test results were up to the standards of the NIST [38].
8. Conclusions
In this paper, an absolute voltage-controlled memristor model is proposed. The DC V–I plot analysis indicated that the proposed memristor was locally active. A simple Wien-bridge chaotic circuit based on the absolute memristor was designed. Because of the absence of an inductor, the above chaotic circuit was easily integrated. The presented chaotic circuit possesses rich dynamical behaviors, such as multistability and sustained chaos state. The simulation results of the chaotic circuit obtained by the Multisim software matched well with the numerical simulation results obtained by the Matlab software. The results of the DSP experiment and the NIST test indicated that the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for encryption systems. Therefore, the proposed chaotic system can be efficiently applied for digital information encryption.
Acknowledgments
This research was supported by the Shandong Provincial Natural Science Foundation of China (Grant No. ZR2019BF007), the Taishan Scholar Project of Shandong Province of China.
Author Contributions
Methodology, Y.S.; Project administration, Y.L.; Validation, Y.L. and F.Y.; Investigation, F.Y. and Y.S.; Writing—original draft preparation, Y.S. and F.Y. Writing—review and editing, Y.S.
Funding
This research was funded by Major Research Program of National Natural Science Foundation of China (91848206) and the National Natural Science Foundation of China (61801271).
Conflicts of Interest
The authors declare no conflict of interest.
References
- 1.Chua L.O. Memristor-the missing circuit element. IEEE Trans. Circuit Theory. 1971;18:507–519. doi: 10.1109/TCT.1971.1083337. [DOI] [Google Scholar]
- 2.Adhikari S.P., Sah M.P., Kim H., Chua L.O. Three fingerprints of memristor. IEEE Trans. Circuits Syst. I Regul. Pap. 2013;60:3008–3021. doi: 10.1109/TCSI.2013.2256171. [DOI] [Google Scholar]
- 3.Strukov D.B., Snider G.S., Stewart D.R., Williams R.S. The missing memristor found. Nature. 2008;453:80–83. doi: 10.1038/nature06932. [DOI] [PubMed] [Google Scholar]
- 4.Chua L.O. Local activity is the origin of complexity. Int. J. Bifurc. Chaos. 2005;15:3435–3456. doi: 10.1142/S0218127405014337. [DOI] [Google Scholar]
- 5.Chua L.O. Everything you wish to know about memristors but are afraid to ask. Radioengin. 2015;24:319–368. doi: 10.13164/re.2015.0319. [DOI] [Google Scholar]
- 6.Wang L., Zhang S., Zeng Y., Li Z. Generating hidden extreme multistability in memristive chaotic oscillator via micro-perturbation. Electron. Lett. 2018;54:808–810. doi: 10.1049/el.2018.1338. [DOI] [Google Scholar]
- 7.Jin P., Wang G., Iu H.C., Fernando T. A locally-active memristor and its application in chaotic circuit. IEEE Trans. Circuits Syst. II Express Briefs. 2017;65:246–250. doi: 10.1109/TCSII.2017.2735448. [DOI] [Google Scholar]
- 8.Li C., Joo-Chen Thio W., Ho-Ching Iu H., Lu T. A memristive chaotic oscillator with increasing amplitude and frequency. IEEE Access. 2018;6:12945–12950. doi: 10.1109/ACCESS.2017.2788408. [DOI] [Google Scholar]
- 9.Chang H., Wang Z., Li Y., Chen G. Dynamic analysis of a bistable bi-local active memristor and its associated oscillator system. Int. J. Bifurc. Chaos. 2018;28:1850105. doi: 10.1142/S0218127418501055. [DOI] [Google Scholar]
- 10.Liu S., Wang Y., Fardad M., Varshney P.K. A memristor-based optimization framework for artificial intelligence applications. IEEE Circuits Syst. Mag. 2018;18:29–44. doi: 10.1109/MCAS.2017.2785421. [DOI] [Google Scholar]
- 11.Zhang X., Wang W., Liu Q., Zhao X., Wei J., Cao R., Yao Z., Zhu X., Zhang F., Lv H., et al. An artificial neuron based on a threshold switching memristor. IEEE Electron Device Lett. 2018;39:308–311. doi: 10.1109/LED.2017.2782752. [DOI] [Google Scholar]
- 12.Yoon J.H., Wang Z., Kim K.M., Wu H., Ravichandran V., Xia Q., Hwang C.S., Yang J.J. An artificial nociceptor based on a diffusive memristor. Nat. Commun. 2018;9:417. doi: 10.1038/s41467-017-02572-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Xie L., Du Nguyen H.A., Taouil M., Hamdioui S., Bertels K. A mapping methodology of boolean logic circuits on memristor crossbar. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2018;37:311–323. doi: 10.1109/TCAD.2017.2695880. [DOI] [Google Scholar]
- 14.Wang X., Wu Q., Chen Q., Zeng Z. A novel design for memristor-based multiplexer via not-material implication. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2018;37:1436–1444. doi: 10.1109/TCAD.2017.2753204. [DOI] [Google Scholar]
- 15.Sakib M.N., Hassan R., Biswas S.N., Das S.R. Memristor-based high-speed memory cell with stable successive read operation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2018;37:1037–1049. doi: 10.1109/TCAD.2017.2729464. [DOI] [Google Scholar]
- 16.Fan Y., Huang X., Wang Z., Li Y. Nonlinear dynamics and chaos in a simplified memristor-based fractional-order neural network with discontinuous memductance function. Nonlinear Dyn. 2018;93:611–627. doi: 10.1007/s11071-018-4213-2. [DOI] [Google Scholar]
- 17.Zhang Y., Wang X., Friedman E.G. Memristor-based circuit design for multilayer neural networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2018;65:677–686. doi: 10.1109/TCSI.2017.2729787. [DOI] [Google Scholar]
- 18.Di Marco M., Forti M., Pancioni L. New conditions for global asymptotic stability of memristor neural networks. IEEE Trans. Neural Netw. Learn. Syst. 2018;29:1822–1834. doi: 10.1109/TNNLS.2017.2688404. [DOI] [PubMed] [Google Scholar]
- 19.Yuan F., Deng Y., Li Y., Wang G. The amplitude, frequency and parameter space boosting in a memristor–meminductor-based circuit. Nonlinear Dyn. 2019;96:389–405. doi: 10.1007/s11071-019-04795-z. [DOI] [Google Scholar]
- 20.Ye X., Mou J., Luo C., Wang Z. Dynamics analysis of Wien-bridge hyperchaotic memristive circuit system. Nonlinear Dyn. 2018;92:923–933. doi: 10.1007/s11071-018-4100-x. [DOI] [Google Scholar]
- 21.Tan Q., Zeng Y., Li Z. A simple inductor-free memristive circuit with three line equilibria. Nonlinear Dyn. 2018;94:1585–1602. doi: 10.1007/s11071-018-4443-3. [DOI] [Google Scholar]
- 22.Guo M., Gao Z., Xue Y., Dou G., Li Y. Dynamics of a physical SBT memristor-based Wien-bridge circuit. Nonlinear Dyn. 2018;93:1681–1693. doi: 10.1007/s11071-018-4284-0. [DOI] [Google Scholar]
- 23.Lai Q., Akgul A., Li C., Xu G., Çavuşoğlu Ü. A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design. Entropy. 2018;20:12. doi: 10.3390/e20010012. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Singh J.P., Pham V.T., Hayat T., Jafari S., Alsaadi F.E., Roy B.K. A new four-dimensional hyperjerk system with stable equilibrium point, circuit implementation, and its synchronization by using an adaptive integrator backstepping control. Chin. Phys. B. 2018;27:100501. doi: 10.1088/1674-1056/27/10/100501. [DOI] [Google Scholar]
- 25.Yuan F., Li Y., Wang G., Dou G., Chen G. Complex dynamics in a memcapacitor-based circuit. Entropy. 2019;21:188. doi: 10.3390/e21020188. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 26.Chang H., Song Q., Li Y., Wang Z., Chen G. Unstable limit cycles and singular attractors in a two-dimensional memristor-based dynamic system. Entropy. 2019;21:415. doi: 10.3390/e21040415. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Signing V.R.F., Kengne J., Kana L.K. Dynamic analysis and multistability of a novel four-wing chaotic system with smooth piecewise quadratic nonlinearity. Chaos Solitons Fractals. 2018;113:263–274. doi: 10.1016/j.chaos.2018.06.008. [DOI] [Google Scholar]
- 28.Fonzin T.F., Kengne J., Pelap F.B. Dynamical analysis and multistability in autonomous hyperchaotic oscillator with experimental verification. Nonlinear Dyn. 2018;93:653–669. doi: 10.1007/s11071-018-4216-z. [DOI] [Google Scholar]
- 29.Wang G., Yuan F., Chen G., Zhang Y. Coexisting multiple attractors and riddled basins of a memristive system. Chaos. 2018;28:013125. doi: 10.1063/1.5004001. [DOI] [PubMed] [Google Scholar]
- 30.Zhang S., Zeng Y., Li Z., Wang M., Xiong L. Generating one to four-wing hidden attractors in a novel 4D no-equilibrium chaotic system with extreme multistability. Chaos. 2018;28:013113. doi: 10.1063/1.5006214. [DOI] [PubMed] [Google Scholar]
- 31.Xu B., Wang G. Meminductive Wein-bridge chaotic oscillator. Acta Phys. Sin. 2017;66:020502. [Google Scholar]
- 32.Xu G., Shekofteh Y., Akgul A., Li C., Panahi S. A new chaotic system with a self-excited attractor: Entropy measurement, signal encryption, and parameter estimation. Entropy. 2018;20:86. doi: 10.3390/e20020086. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 33.Huang X., Sun T., Li Y., Liang J. A color image encryption algorithm based on a fractional-order hyperchaotic system. Entropy. 2015;17:28–38. doi: 10.3390/e17010028. [DOI] [Google Scholar]
- 34.Fan C., Ding Q. A novel image encryption scheme based on self-synchronous chaotic stream cipher and wavelet transform. Entropy. 2018;20:445. doi: 10.3390/e20060445. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 35.Wang T., Wang D., Wu K. Chaotic adaptive synchronization control and application in chaotic secure communication for industrial internet of things. IEEE Access. 2018;6:8584–8590. doi: 10.1109/ACCESS.2018.2797979. [DOI] [Google Scholar]
- 36.Nwachioma C., Perez-Cruz J.H., Jimenez A., Ezuma M., Rivera-Blas R. A new chaotic oscillator-properties, analog implementation, and secure communication application. IEEE Access. 2019;7:7510–7521. doi: 10.1109/ACCESS.2018.2889964. [DOI] [Google Scholar]
- 37.He S., Sun K., Wang H. Complexity analysis and DSP implementation of the fractional-order Lorenz hyperchaotic system. Entropy. 2015;17:8299–8311. doi: 10.3390/e17127882. [DOI] [Google Scholar]
- 38.Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., Levenson M., Vangel M., Banks D., Heckert A., et al. NIST Special Publication. Booz-Allen and Hamilton Inc.; McLean, VA, USA: 2010. A statistical test suite for random and pseudorandom number generators for cryptographic applications. [Google Scholar]
- 39.Chua L.O., Kang S.M. Memristive devices and systems. Proc. IEEE. 1976;64:209–223. doi: 10.1109/PROC.1976.10092. [DOI] [Google Scholar]
- 40.Ventra M.D., Pershin Y.V., Chua L.O. Circuit elements with memory: Memristors, memcapacitors, and meminductors. Proc. IEEE. 2009;97:1717–1724. doi: 10.1109/JPROC.2009.2021077. [DOI] [Google Scholar]
- 41.Chua L.O. Resistance switching memories are memristors. Appl. Phys. A. 2011;102:765–783. doi: 10.1007/s00339-011-6264-9. [DOI] [Google Scholar]
- 42.Sui Y., He Y., Yu W., Li Y. Design and circuit implementation of a five-dimensional hyperchaotic system with linear parameter. Int. J. Circuit Theory Appl. 2018;46:1503–1515. doi: 10.1002/cta.2501. [DOI] [Google Scholar]
- 43.Deng Y., Hu H., Xiong W. Analysis and design of digital chaotic systems with desirable performance via feedback control. IEEE Trans. Syst. Man Cybern. Syst. 2015;45:1187–1200. doi: 10.1109/TSMC.2015.2398836. [DOI] [Google Scholar]
- 44.Zambrano-Serrano E., Muñoz-Pacheco J.M., Campos-Cantón E. Chaos generation in fractional-order switched systems and its digital implementation. Int. J. Electron. Commun. (AEÜ) 2017;79:43–52. doi: 10.1016/j.aeue.2017.05.032. [DOI] [Google Scholar]
- 45.Wheeler D.D., Matthews R. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia. 1991;15:140–151. doi: 10.1080/0161-119191865821. [DOI] [Google Scholar]
- 46.Heidari-Bateni G., McGillem C.D. A chaotic direct-sequence spread-spectrum communication system. IEEE Trans. Commun. 1994;42:1524–1527. doi: 10.1109/TCOMM.1994.582834. [DOI] [Google Scholar]
- 47.Cernák J. Digital generators of chaos. Phys. Lett. A. 1996;214:151–160. doi: 10.1016/0375-9601(96)00179-X. [DOI] [Google Scholar]
- 48.Sang T., Wang R., Yan Y. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron. Lett. 1998;34:873–874. doi: 10.1049/el:19980680. [DOI] [Google Scholar]
- 49.Li S., Mou X., Cai Y. Improving security of a chaotic encryption approach. Phys. Lett. A. 2001;290:127–133. doi: 10.1016/S0375-9601(01)00612-0. [DOI] [Google Scholar]
- 50.Li C., Chen Y., Chang T., Deng L., To K. Period extension and randomness enhancement using high-throughput reseeding-mixing PRNG. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2012;20:385–389. doi: 10.1109/TVLSI.2010.2103332. [DOI] [Google Scholar]
- 51.Nagaraj N., Shastry M.C., Vaidya P.G. Increasing average period lengths by switching of robust chaos maps in fifinite precision. Eur. Phys. J. Spec. Top. 2008;165:73–83. doi: 10.1140/epjst/e2008-00850-4. [DOI] [Google Scholar]
- 52.Wang Y., Wong K., Liao X., Xiang T., Chen G. A chaos-based image encryption algorithm with variable control parameters. Chaos Soliton Fract. 2009;41:1773–1783. doi: 10.1016/j.chaos.2008.07.031. [DOI] [Google Scholar]
- 53.Hu H., Xu Y., Zhu Z. A method of improving the properties of digital chaotic system. Chaos Soliton Fract. 2008;38:439–446. doi: 10.1016/j.chaos.2006.11.027. [DOI] [Google Scholar]