Skip to main content
Entropy logoLink to Entropy
. 2020 Dec 16;22(12):1420. doi: 10.3390/e22121420

Time Delay Complex Chen Chaotic System and Secure Communication Scheme for Wireless Body Area Networks

Fangfang Zhang 1,2,*, Sen Leng 1, Zhengfeng Li 1, Cuimei Jiang 3
PMCID: PMC7765471  PMID: 33339118

Abstract

Although many chaotic systems with time delays have been studied in recent years, most studies have only focused on the theoretical level, without special applications. Therefore, we present a basic introduction of a time delay complex Chen chaotic system, including the influence of parameter changes and time delay factors on the time delay system. On the basis of complex modified projection synchronization (CMPS), we detail the design of a new controller and communication scheme and apply this communication scheme to a wireless body area network (WBAN), in order to encrypt and decrypt body data collected by sensors. Finally, we perform a numerical simulation, demonstrating the effectiveness of the proposed communication scheme.

Keywords: complex Chen system, time delay, controller, secure communication scheme

1. Introduction

In 1977, Mackey and Glass [1], while studying first-order non-linear delay differential equations to describe physical control systems, first discovered that chaos exists in delay systems. Following this, researchers began to pay close attention to time delay chaotic systems, finding that those with a time delay can better describe real physical processes than systems without a time delay. On the basis of the stability of a class of linear-system theory, the synchronization of Chen systems with time-varying delay has been discussed. Research on time delay chaotic systems with real variables, as well as on time delay chaotic systems with complex variables, has made great progress. Since Fowler et al. [2] introduced the complex Lorenz system, research on the characteristics of complex chaotic systems and their synchronization has attracted much attention [3,4,5,6,7,8]. However, time delay is an inevitable factor in actual complex chaotic systems. Therefore, many scholars have studied complex chaotic systems with time delay [9,10,11].

Since Leon O. Chua realized chaotic synchronization by circuits [12], the application of chaotic systems in secure communication has become a hot issue in the field of information security. Similarly to random signals, chaotic signals have very complex trajectories, are difficult to predict, and have inherent concealment, which make them suitable as carriers for secure communication [13,14,15,16,17]. Generally speaking, the information is encrypted as streams with chaotic characteristics at the sending end. At the receiving end, the correct information is decrypted from the received signal. Chaotic secure communication requires the synchronization of chaotic systems at the sending and receiving ends. A chaotic system is completely determined by a non-linear system of equations, including its parameters and initial conditions. The most interesting fact is that a determinate system can produce a large number of complex, uncorrelated, and quasi-random chaotic sequences. Time delay is inevitable in nature, where time delay systems have more complicated dynamic characteristics than ordinary chaotic systems. Therefore, time delay complex chaotic systems have become a prominent topic in current chaotic secure communication research.

Countless scholars have conducted research on secure communication, in order to achieve high security levels. In order to achieve fast communication, Chee and Xu used the proportional characteristics of projection synchronization (PS) and extended binary to M-ary (M>2) systems. Mahmoud G.M. [18,19] studied the projection synchronization of complex hyperchaotic systems and proposed corresponding communication schemes. As the rapid communication of projection synchronization and the unpredictability of the scale factor can increase communication security, PS has been widely used. On the basis of the definition of real scale-factor projection synchronization and modified projection synchronization (MPS) [20,21], the definition of modified projection synchronization with a complex scale factor—in fact, complex modified projection synchronization (CMPS)—has been proposed by Zhang et al. [22] and Mahmoud [23], almost at the same time. If the real part of a complex scale factor is 1 and its imaginary part is 0, it is complete synchronization (CS); if the real part of the complex scale factor is −1 and the imaginary part is 0, it is the anti synchronization (AS); if the real part of the complex scale factor is a real number and the imaginary part is 0, it is the projection synchronization (PS) of the real scale factor; if only the imaginary part is 0, it is the modified projection synchronization (MPS) of the real scale factor; if the complex scale factor is j, it is complex complete synchronization (CCS). Therefore, CS, AS, PS, MPS, and CCS are all special cases of CMPS. As complex numbers have real and imaginary parts, a complex scale factor can be more arbitrary and unpredictable than a real scale factor, such that the calculation of complex numbers is more complicated than that of real numbers and, so, it is more difficult to obtain signal information from transmitted information. Moreover, CMPS establishes a connection between real and complex chaos, thus increasing the selection range of the chaos generator at the sending and receiving ends. Studying CMPS can increase the complexity of synchronization and, consequently, the diversity and security of communications.

Recently, great improvements in integrated chips and wireless communications have promoted the development of wireless body area networks (WBANs). The security of data transmission in WBANs is more important and essential. Due to the low cost and high-security properties of chaotic signals, the implementation of chaos communication in WBANs is an effective and promising solution, which can improve communication security in WBANs. However, to the best of our knowledge, secure communication in WBANs based on the CMPS of complex chaos under noisy conditions has seldom been studied in the literature. The main contributions of this paper are as follows:

(1) A basic introduction of the time delay complex Chen system, including the influence of parameter changes and time delay factors on the time delay system, is presented.

(2) On the basis of complex modified projection synchronization (CMPS), a new controller and communication scheme are designed.

(3) This communication scheme is applied to a wireless body area network (WBAN) for encrypting and decrypting body data that are collected by sensors.

The rest of this article is organized as follows: In Section 2, the time delay characteristics of the complex Chen system are analyzed and its randomness, symmetry, and unpredictability are discussed. In Section 3, the innovation and advantages of the communication scheme for wireless body area networks are introduced. In Section 4, the CMPS controller design is described. In Section 5, the feasibility of the scheme is verified through MATLAB simulation. In Section 6, the security of the communication scheme for WBAN is analyzed. Section 7 summarizes this article.

2. Characteristics of Time Delay Complex Chen System

Consider the following time delay complex Chen system:

y˙1=a1(y2y1),y˙2=(a2a1)y1+a2y2y1y3(tτ),y˙3=a3y3(tτ)+(1/2)(y¯1y2+y1y¯2), (1)

where 0ττm is the time delay factor, y1=u1+ju2 and y2=u3+ju4 are the complex state variables, and y3=u5 is the real state variable. Overbar y¯1(y¯2) stands for the complex conjugate of y1(y2), and (a1,a2,a3)T is the real parameter vector.

Separating the real and imaginary parts of each variable in System (1), we obtain

u˙1=a1(u3u1),u˙2=a1(u4u2),u˙3=(a2a1)u1u1u5(tτ)+a2u3,u˙4=(a2a1)u2u2u5(tτ)+a2u4,u˙5=a3u5(tτ)+(u1u3+u2u4). (2)

2.1. Chaos Attractor

We adopted a1=35,a2=23,a3=1, and (1,2,3,4,1)T as the initial conditions. Their different chaotic attractor projections are shown as blue attractors in Figure 1 (τ=1 s) and Figure 2 (τ=1.5 s), where the red attractor is a complex Chen system with τ=0 s. The projection of the time delay complex Chen system is quite different than the original system. The attractor of the former occupies much more space than the latter. Time delay systems produce time-series data with extremely high randomness and unpredictability. The time delay complex Chen system with τ=1 s was chaotic, while the Chen system with τ=1.5 s exhibited a limit cycle. This indicates that, under the same parameters and initial values, different time delay factors cause hugely different outputs.

Figure 1.

Figure 1

Chaotic attractor projections for time delay complex Chen system (a1=35,a2=23,a3=1). Blue attractor, complex Chen system with τ=1 s; red attractor, complex Chen system with τ=0 s). (a) u2u5, (b) u1u4, (c) u1u3u5, and (d) u3u4u5.

Figure 2.

Figure 2

Chaotic attractor projections for time delay complex Chen system (a1=35,a2=23,a3=1). Blue attractor, complex Chen system with τ=1.5 s; red attractor, complex Chen system with τ=0 s. (a) u1, (b) u2, (c) u3, (d) u4.

2.2. Symmetry and Initial Value Sensitivity

System (2) was unchanged after introducing the following transformation: (u1,u2,u3,u4,u5)(u1,u2,u3,u4,u5); thus, the system exhibited symmetry about the u5 axis. This symmetry held for all parameters; namely, a1, a2, and a3.

When τ=2 s, we selected two close initial conditions—namely, (1,2,3,4,1)T and (1,2,3,4,1.001)T—and obtained the evolution of states, as shown in Figure 3. The time delay complex Chen system displayed sensitive dependence on the initial conditions.

Figure 3.

Figure 3

Initial sensitivity of time delay complex Chen system. Red curve represents initial state (1,2,3,4,1)T; blue curve represents initial state (1,2,3,4,1.001)T). (a) u1, (b) u2, (c) u3, (d) u4, and (e) u5.

2.3. Lyapunov Exponent and Bifurcation Diagram

The Lyapunov exponent can quantitatively reflect the chaotic performance of a system. Letting a1=35, a2=23, and a3=1, we obtained the Lyapunov exponent curve of the time delay complex Chen system, as shown in Figure 4. Table 1 shows some values of the Lyapunov exponent. Obviously, the characteristics of the time delay complex Chen system and the number of positive Lyapunov exponents are related to the time delay factor τ, which also indicates the randomness and unpredictability of the delay system.

Figure 4.

Figure 4

Lyapunov exponent curves of time delay complex Chen system: (a) LE1, (b) LE2, (c) LE3, (d) LE4, and (e) LE5.

Table 1.

Partial values of five Lyapunov indices of time delay complex Chen system.

Variable LE1 LE2 LE3 LE4 LE5 Symbol Types
τ=0.5 s 2.2260 −0.0857 −0.7402 −0.5030 −1.1583 (+,0,−,−,−) Chaos
τ=0.7 s 2.2837 0.7366 −0.0176 −0.5226 −1.4729 (+,+,0,−,−) Hyperchaos
τ=1.5 s 0.4680 0.4676 −0.0298 −0.8371 −0.8366 (0,0,0,−,−) Limit cycle

In order to more intuitively see the change of system characteristics with time delay factors, the bifurcation diagram of the system output u5 and τ was produced, as shown in Figure 5. When 0.5<τ1.3, the system was chaotic; when τ=1.5, the system gradually exhibited limit-cycle behavior. Therefore, by choosing different time delay parameters, τ, the time delay complex system produced different dynamic phenomena. The existence of time delay parameters increased the complexity of the Chen system and, thus, the security of confidential communication. The design of a secure communication scheme based on the CMPS of the time delay complex Chen system is described in the following section.

Figure 5.

Figure 5

Bifurcation diagram of time delay complex Chen system.

3. Communication Scheme Based on CMPS

3.1. Design of CMPS Controller

Consider the following n-dimensional complex chaotic non-linear system as a response system:

x˙=f(x)+v+ϵ1, (3)

where x=(x1,x2,,xn)T is the complex state vector, x=xr+jxi, and the superscripts r and i denote the real and imaginary parts of the complex state vector, respectively. Let x1=x1r+jx1i,x2=x2r+jx2i,,xn=xnr+jxni; then, xr=(x1r,x2r,,xnr)T,xi=(x1i,x2i,,xni)T. f(x) is an n×m complex matrix, with its elements being functions of complex state variables. f=(f1,f2,,fn)T is a non-linear complex function vector. The controller to be designed is v=vr+jvi, where vr=(v1r,v2r,,vnr)T and vi=(v1i,v2i,,vni)T. ϵ1=(ϵ11,ϵ12,,ϵ1n)T indicates external bounded interference, such that |ϵ1l|<ρ(l=1,2,,n), where ρ1 is a positive constant (|·| is the modulus of a complex number).

Consider the drive chaotic complex system y=(y1,y2,,yn)T satisfying

y˙=g(y)+ϵ2, (4)

where y=(y1,y2,,yn)T is the complex state vector, y=yr+jyi, with yr=(y1r,y2r,,ynr)T and yi=(y1i,y2i,,yni)T. g=(g1,g2,,gn)T is a non-linear complex function vector. ϵ2=(ϵ21,ϵ22,,ϵ2n)T is bounded external interference, such that |ϵ2l|<ρ2(l=1,2,,n), where ρ2 is a positive constant.

For the response System (3) and drive System (4), if there is a complex constant matrix H=diag{h1,h2,,hn}=diag{h1r+jh1i,h2r+jh2i,,hnr+jhni} satisfying

limte(t)2=limtx(t)Hy(t)2=limt(xr(t)Hryr(t)+Hiyi(t))2+xi(t)Hryi(t)Hiyr(t)2)=0, (5)

where e(t) is an error vector, then the chaotic Systems (3) and (4) realize complex modified projection synchronization.

Therefore, on the basis of active control and [22,24,25], we designed the controller as

v=Hg(y)f(x)+Ke, (6)

where K=diag(k1,k2,,kn) is the real control intensity matrix. The specific proof process can be found in [22,24].

3.2. Communication Scheme for Wireless Body Area Network

In wireless body area networks, sensors are used to measure the temperature, blood pressure, heart rate, and other physiological information of users, first transmitting the measurement results to smart mobile devices (e.g., smartphones) and, then, sending them to a telematics terminal. After mutual authentication between the smart mobile device and the telematics terminal, the smart mobile device encrypts the collected sensor information (clear text) and the shared chaotic signal (produced from time delay complex Chen system with the same parameters and initial values) of the telematics terminal after authentication and sends them to storage devices for remote services. After the remote service storage device successfully receives the data, it synchronously decrypts the data, according to the complex modified proportional projection, such that the plain-text is obtained in the data buffer of the remote service storage device. The communication block diagram is based on CMPS, as shown in Figure 6.

Figure 6.

Figure 6

Communication scheme based on complex modified projection synchronization (CMPS) for a wireless body area network.

We use L1 and L2 to represent smart devices (transmitting end) and the telematics terminal (receiving end), respectively. The plain-text signals to be transmitted are body temperature h1r, high blood pressure value h1i, low blood pressure value h2r, heart rate h2i, and blood sugar h3, which are all complex scale factors in CMPS; the duration of every sample was 1 min. Then, the ciphertext transmission signal

s(t)=Hg(y)+Dε(t)=diag{h1r+jh1i,h2r+jh2i,h3}g(y)+diag{Dε(t)+jDε(t),Dε(t)+jDε(t),Dε(t)} (7)

is expanded into five channels; that is,

s1r(t)=h1rg1(y)rh1ig1(y)i+Dε(t),s1i(t)=h1rg1(y)i+h1ig1(y)r+Dε(t),s2r(t)=h2rg2(y)rh2ig2(y)i+Dε(t),s2i(t)=h2ig2(y)r+h2rg2(y)i+Dε(t),s3(t)=h3g3(y)+Dε(t), (8)

where Dε(t) simulates the noise generated by the communication channel and noise source. The controller v at the receiving end was designed as (6), which contains the transmission signal s(t) and v=s(t)f(x)+ke. As CMPS occurs, x(t) approaches H(t)y(t) (H(t)=diag{h1r+jh1i,h2r+jh2i,h3}). The information signal recovered at the receiving end is Hg(t)=diag{hg1,hg2,hg3}=diag{x1/y1,x2/y2,x3/y3}.

Compared with other examples of communication systems [26,27,28,29,30,31,32,33], the CMPS-based communication scheme has the following advantages:

(1) As shown in Equation (7), two layers masked by noise and chaotic signals are used here, where the chaotic signal is the derivative of the system state variable, not the state variable itself, which differs from traditional chaotic masking, thus increasing the difficulty of decoding.

(2) The method of recovering plain-text signals is essentially different. In traditional chaos masking, a transmission signal is used to subtract a synchronized chaotic signal, in order to recover a plain-text signal. The effect of channel noise is theoretically ignored and the bit error rate (BER) cannot be guaranteed to be zero. In our communication scheme, we use a CMPS controller to ensure that the signal at the receiving end is equal to the product of the plain-text and chaotic signals. Therefore, BER = 0 for the recovered signal in theory.

(3) Compared with CS, which is often used for chaotic communication, CMPS can be observed from partially or completely different dynamic systems. CS requires the sender and receiver to be identical, which is difficult in practical applications; especially for long-term device operation. With regard to CMPS, the channel transmitter and receiver can be the same or different, which avoids this problem at a basic level.

(4) The transmission signal involves complex operations, such as the multiplication of complex numbers and taking derivatives. The ciphertext signal transmitted by each channel is a combination of five pieces of plain-text information and chaotic signal derivatives. The smartphone samples the sensor every minute. Even if a certain channel is intercepted, it is extremely hard to crack the plain-text in one minute, thereby increasing attack resistance and information security.

(5) The dynamic characteristics of the time delay complex Chen system are more complicated than those of the time delay-free complex system, which can increase the secrecy of chaotic communication.

4. Controller Design

We adopted the following time delay complex Chen system as the drive system L1 at the sending end and response system L2 at the receiving end:

L1:y˙1=a1(y2y1),y˙2=(a2a1)y1+a2y2y1y3(tτ),y˙3=a3y3(tτ)+(1/2)(y¯1y2+y1y¯2), (9)
L2:x˙1=a1(x2x1)+v1+jv2,x˙2=(a2a1)x1+a2x2x1x3(tτ)+v3+jv4,x˙3=a3x3(tτ)+(1/2)(x¯1x2+y1x¯2)+v5, (10)

where y1=u1+ju2 and y2=u3+ju4 are the complex state variables of the drive system L1, x1=u1+ju2, and x2=u3+ju4 are the complex state variables of the response system L2, and the real variables are y3=u5 and x3=u5. The controller is v=diag{v1+jv2,v3+jv4,v5}. Here, τ=1 s and the system is chaotic, as shown as Figure 1.

The system parameters (a1=35,a2=23,a3=1, τ=1 s) and initial conditions (u(0)=(1,2,3,4,1)T, u(0)=(1,2,3,4,1)T) are certified by the sender and receiver. We employed controller (6), with k1=k2=k3=k4=k5=100. Therefore, the controller was designed as:

v1r=s1rf1r(x)+k1e1r=s1a1(u3(tτ)u1)k1(u1h1u1+h2u2)v1i=s1if1i(x)+k2e1i=s2a1(u4u2)k2(u2h1u2h2u1)v2r=s2rf2r(x)+k3e2r=s3(a2a1)u1a2u3(tτ)u1u5k3(u3(tτ)h3u3+h4u4)v2i=s2if2i(x)+k4e2i=s4(a2a1)u2a2u4u2u5k4(u4h3u4h3u4)v3=s3f3(x)+k5e5=s5+a3u3(tτ)(u1u3(tτ)+u2u4)k5(u5h5u5) (11)

First, we chose h1=h2=j,h3=1, which means that e1=(u1+u2)+j(u2u1)=0, e2=(u3(tτ)+u4)+j(u4u3)=0, and e3=u5+u5=0. In fact, x1,x2 and y1,y2 realize CCS, while x3 and y3 realize anti-synchronization. The attractor projections of this synchronization for the time delay complex Chen system are shown in Figure 7.

Figure 7.

Figure 7

Attractor projections of special synchronization for time delay complex Chen system. Red attractor, system L1; green attractor, system L2. (a) u2u5, (b) u1u4, (c) u1u3u5, and (d) u3u4u5.

5. Application and Simulation

In this section, we describe the simulation of the information transmission process for a real wireless body area network. We chose

  • h1r=35+5rand(1,1) as the temperature, within the range of [35, 40] (°C);

  • h1i=70+130rand(1,1) to stand for the high blood pressure value, within the range of [70, 200] (mmHg);

  • h2r=40+60rand(1,1) to stand for the low blood pressure value, within the range of [40, 100] (mmHg);

  • h2i=60+40rand(1,1) as the heart rate, within the range of [60, 100] (beats per minute, bpm); and

  • h3=3.9+6.1rand(1,1) as blood sugar, within the range of [3.9, 10] (mmol/L).

We obtained the CMPS error, as shown in Figure 8. The sender system collected data every minute, such that system errors were larger at the beginning of every minute, but quickly converged to zero. This indicates that CMPS takes place with complex scaling factors h1,h2,h3. In reality, the physiological condition of the human body does not suddenly change and, so, the CMPS controller is able to maintain synchronization in one sampling period. The information transmission process is depicted in Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13. The transmitted signal s(t) completely covered the information signal, while information signals h(t) were recovered with high precision. The above simulations demonstrate that the experimental results were in accordance with our theoretical analysis. The proposed communication system can quickly transmit information with high security.

Figure 8.

Figure 8

CMPS error for time delay complex Chen system: (a) e1r(t), (b) e1i(t), (c) e2r(t), (d) e2i(t), and (e) e3(t).

Figure 9.

Figure 9

Temperature information transmission process.

Figure 10.

Figure 10

High blood pressure signal transmission process.

Figure 11.

Figure 11

Low blood pressure signal transmission process.

Figure 12.

Figure 12

Heart rate signal transmission process.

Figure 13.

Figure 13

Blood sugar signal transmission process.

6. Security Analysis

In this section, we analyze the security of the proposed CMPS communication scheme for WBAN.

6.1. Key Space Analysis

For the convenience of analysis, noise is not considered in the communication scheme. If a third party intercepts the signals of transmission channel such as s(t), as s1r(t)=h1rg1(y)rh1ig1(y)i or s1i(t)=h1rg1(y)i+h1ig1(y)r, the message signal H cannot be decrypted without the private keys such as the function g(y). In particular, when the amplitude of H is much smaller than that of g(y), s(t)g(y). It is impossible to decrypt the message signal H using only the signals of transmission channel. Therefore, for private keys g(y) include parameters, initial conditions and time lag τ, the key space of our algorithm is infinite.

6.2. Key Sensitivity Analysis

In the proposed scheme, the most important private key is the system parameters and initial conditions. To analyze the sensitivity, the message signal H was transmitted with two close initial conditions u1(0)=(1,0,0,0,0)T in the senor node and u2(0)=(1,0,0,0,0.1)T at the sink node. The CMPS process is presented in Figure 14. The results demonstrate that the proposed algorithm has good sensitivity to the private key.

Figure 14.

Figure 14

The CMPS process with u1(0)=(1,0,0,0,0)T and u2(0)=(1,0,0,0,0.1)T.

7. Conclusions

We first analyzed the characteristics of time delay complex Chen systems, outlining their randomness and unpredictability. Then, we proposed an innovative communication scheme based on CMPS for wireless body area networks and discussed its advantages. As the complex scale factor is more complicated than the real scale factor and the calculation of complex numbers is more complicated, the scheme can greatly increase the security of communication systems. Finally, we verified the effectiveness of the proposed communication system by conducting simulation experiments. The system could quickly and securely transmit information with strong robustness against noise. From the beginning, when Lorenz discovered and proposed chaos theory based on weather changes in nature, to the current chaos theory being applied in many fields, chaos theory has been constantly enriched and developed. The application of chaos communication theory in the field of WBANs is an important branch. The proposed chaotic communication scheme based on CMPS for WBANs only has its feasibility verified at the theoretical stage. It will be realized in the future, thus enhancing WBAN development.

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable suggestions and questions.

Abbreviations

The following abbreviations are used in this manuscript:

CMPS complex modified projection synchronization
WBAN wireless body area network
PS projection synchronization
MPS modified projection synchronization
CS complete synchronization
AS anti synchronization
CCS complex complete synchronization
BER bit error rate

Author Contributions

Conceptualization, F.Z.; methodology, F.Z.; software, S.L.; validation, Z.L.; formal analysis, F.Z. and S.L.; investigation, Z.L.; writing–original draft preparation, S.L.; resources, Z.L.; data curation, S.L. and Z.L.; visualization, F.Z.; writing–review and editing, F.Z.; supervision, C.J.; project administration, C.J.; funding acquisition, F.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the International Collaborative Research Project of Qilu University of Technology (QLUTGJHZ2018020), the Young Doctorate Cooperation Fund Project of Qilu University of Technology (Shandong Academy of Sciences; 2018BSHZ001), the National Natural Science Foundation of China (61773010), Major Scientific and Technological Innovation Projects of Shandong Province (2019JZZY010731), the Key Research and Development Program of Shandong Province (2019GGX104037), and the Research Leader Studio Project of Jinan City (2019GXRC062).

Conflicts of Interest

The authors declare that they have no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Mackey M.C., Glass L. Oscillation and chaos in physiological control systems. Int. J. Bifurc. Chaos. 1977;197:287–289. doi: 10.1126/science.267326. [DOI] [PubMed] [Google Scholar]
  • 2.Fowler A.C., Gibbon J.D., McGuinness M.J. The complex Lorenz equations. Phys. D. 1982;4:139–163. doi: 10.1016/0167-2789(82)90057-4. [DOI] [Google Scholar]
  • 3.Zhao X., Liu J., Liu H., Zhang F. Dynamic analysis of a one-parameter chaotic system in complex field. IEEE Access. 2020;8:28774–28781. doi: 10.1109/ACCESS.2020.2968226. [DOI] [Google Scholar]
  • 4.Liu H., Zhang Y., Kadir A., Xu Y. mage encryption using complex hyper chaotic system by injecting impulse into parameters. Appl. Math. Comput. 2019;1:83–93. [Google Scholar]
  • 5.Zhang R., Liu Y., Yang S. Adaptive synchronization of fractional-order complex chaotic system with unknown complex parameters. Entropy. 2019;21:207. doi: 10.3390/e21020207. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Zhao X., Liu J., Liu H., Zhang F. A theoretical implementation for a Proposed Hyper-Complex Chaotic System. J. Intell. Fuzzy Syst. 2020;38:2585–2590. [Google Scholar]
  • 7.Yang F., Mou J., Ma C., Cao Y. Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt. Lasers Eng. 2020;129:106031. doi: 10.1016/j.optlaseng.2020.106031. [DOI] [Google Scholar]
  • 8.Sahin E., Ayas M.S. Fractional High-Order Differential Estimator and Feedback Controller Design for a Single-Input–Single-Output Affine Chaotic System. J. Comput. Nonlinear Dyn. 2020;15:011006. doi: 10.1115/1.4045404. [DOI] [Google Scholar]
  • 9.Zhang F., Liu S., Yu W. Characteristics of complex Lorenz chaotic System with Delay and its self-delay synchronization. Acta Phys. Sin. 2013;62:505–762. [Google Scholar]
  • 10.Zhang F. Complete synchronization of coupled multiple-time delay complex chaotic system with applications to secure communication. Acta Phys. Pol. B. 2015;46:1473–1486. doi: 10.5506/APhysPolB.46.1473. [DOI] [Google Scholar]
  • 11.Sun B., Li M., Zhang F., Wang H., Liu J. The characteristics and self-time delay synchronization of two-time delay complex Lorenz system. J. Frankl. Inst. 2015;356:334–350. doi: 10.1016/j.jfranklin.2018.09.031. [DOI] [Google Scholar]
  • 12.Matsumoto T. A chaotic attractor from Chua’s circuit. IEEE Trans. Circuits Syst. 1984;31:1055–1058. doi: 10.1109/TCS.1984.1085459. [DOI] [Google Scholar]
  • 13.Terry J., Van Wiggeren G.D. Chaotic communication using generalized synchronization. Chaos Solitons Fractals. 2001;12:145–152. doi: 10.1016/S0960-0779(00)00038-2. [DOI] [Google Scholar]
  • 14.Kiani-B A., Fallahi K., Pariz N., Leung H. A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter. Commun. Nonlinear Sci. Numer. Simul. 2009;14:863–879. doi: 10.1016/j.cnsns.2007.11.011. [DOI] [Google Scholar]
  • 15.Trejo-Guerra R., Tlelo-Cuautle E., Cruz-Herández C., Sánchez-López C. Chaotic communication system using Chua’s oscillators realized with CCII+ s. Int. J. Bifurc. Chaos. 2009;19:4217–4226. doi: 10.1142/S0218127409025304. [DOI] [Google Scholar]
  • 16.Cheng C., Lin Y., Wu S. Design of adaptive sliding mode tracking controllers for chaotic synchronization and application to secure communications. J. Frankl. Inst. 2012;349:2626–2649. doi: 10.1016/j.jfranklin.2012.06.006. [DOI] [Google Scholar]
  • 17.Pisarchik A., Jaimes-Reátegui R., Sevilla-Escoboza J.R., Ruiz-Oliveras F.R., García-López J.H. Two-channel opto-electronic chaotic communication system. J. Frankl. Inst. 2012;349:3194–3202. doi: 10.1016/j.jfranklin.2012.10.005. [DOI] [Google Scholar]
  • 18.Chee C., Xu D. Chaos-based M-ary digital communication technique using controlled projective synchronisation. IEE Proc. Circuits Devices Syst. 2006;153:357–360. doi: 10.1049/ip-cds:20050139. [DOI] [Google Scholar]
  • 19.Mahmoud G.M., Mahmoud E.E., Arafa A.A. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications. Phys. Scr. 2006;87:055002. doi: 10.1088/0031-8949/87/05/055002. [DOI] [Google Scholar]
  • 20.Mainieri R., Rehacek J. Projective Synchronization in Three-Dimensional Chaotic Systems. Phys. Rev. Lett. 1999;82:3042. doi: 10.1103/PhysRevLett.82.3042. [DOI] [Google Scholar]
  • 21.Guo L., Xu Z., Hu M. Projective synchronization in drive—Response networks via impulsive control. Chin. Phys. Lett. 2008;25:2816. [Google Scholar]
  • 22.Zhang F., Liu S., Yu W. Modified projective synchronization with complex scaling factors of uncertain real chaos and complex chaos. Chin. Phys. B. 2013;22:120505. doi: 10.1088/1674-1056/22/12/120505. [DOI] [Google Scholar]
  • 23.Mahmoud G.M., Mahmoud E.E. Complex modified projective synchronization of two chaotic complex nonlinear systems. Nonlinear Dyn. 2013;73:2231–2240. doi: 10.1007/s11071-013-0937-1. [DOI] [Google Scholar]
  • 24.Zhang F., Liu S. Full state hybrid projective synchronization and parameters identification for uncertain chaotic (hyperchaotic) complex systems. J. Comput. Nonlinear Dyn. 2014;9:021009. doi: 10.1115/1.4025475. [DOI] [Google Scholar]
  • 25.Liu S., Zhang F. Complex function projective synchronization of complex chaotic system and its applications in secure communication. Nonlinear Dyn. 2014;76:1087–1097. doi: 10.1007/s11071-013-1192-1. [DOI] [Google Scholar]
  • 26.Liu H., Wang X., Zhu Q. Asynchronization anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching. Phys. Lett. A. 2011;375:2828–2835. doi: 10.1016/j.physleta.2011.06.029. [DOI] [Google Scholar]
  • 27.Azzaz M.S., Tanougast C., Sadoudi S. Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Commun. Nonlinear Sci. 2013;18:2035–2047. doi: 10.1016/j.cnsns.2012.12.018. [DOI] [Google Scholar]
  • 28.Zhang J., Zhang L., An X. Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications. EURASIP J. Wirel. Commun. Netw. 2016;2016:1–15. doi: 10.1186/s13638-016-0630-4. [DOI] [Google Scholar]
  • 29.Li R., Wu H. Secure communication on fractional-order chaotic systems via adaptive sliding mode control with teaching–learning–feedback-based optimization. Nonlinear Dyn. 2019;95:1221–1243. doi: 10.1007/s11071-018-4625-z. [DOI] [Google Scholar]
  • 30.Nwachioma C., Pérez-Cruz J.H. New Chaotic Oscillator—Properties, Analog Implementation, and Secure Communication Application. IEEE Access. 2019;17:7510–7521. doi: 10.1109/ACCESS.2018.2889964. [DOI] [Google Scholar]
  • 31.Sathiyamurthi P., Ramakrishnan S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed. Tools Appl. 2020;79:17817–17835. doi: 10.1007/s11042-020-08729-5. [DOI] [Google Scholar]
  • 32.Elsafty A.H., Tolba M.F., Said L.A. Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU-Int. J. Electron. Commun. 2020;125:153347. doi: 10.1016/j.aeue.2020.153347. [DOI] [Google Scholar]
  • 33.Moskalenko O.I., Koronovskii A.A., Hramov A.E. Generalized synchronization of chaos for secure communication: Remarkable stability to noise. Phys. Lett. A. 2010;374:2925–2931. doi: 10.1016/j.physleta.2010.05.024. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES