Académique Documents
Professionnel Documents
Culture Documents
CERTIFICATE
Academic session : Feb 2008 – Feb 2009
This is to certify that the seminar title “CHAOTIC COMMUNICATION
,THEIR APPLICATION AND THEIR ADVANTAGES OVER
TRADITIONAL METHOD” as a part of VIII semester Electronics and
Communication of Vishveshwaraiah Technological University ,has
been successfully done by :
Date:
Submitted by:
RUDRAPPA J SHETTI 1KN05EC084
VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
ACKNOWLEDGEMENT
Last but not the least I would like to thank all my friends
for their constant support and valuable suggestion
without which this would not have been the success .
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
INTRODUCTION
1 2
DEFINATION OF CHAOS
2 4
5
3 CHAOTIC SYSTEM
CHAOS CONTROL
4 6
CHAOTIC SIGNAL
5 7
ATTRACTOR 12
7
9 COMPARISION 34
10 ADVANTAGE 35
11 APPLICATION 36
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
12 CONCLUSION 37
13 BIBLIOGRAPHY 38
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
Abstract
1.INTRODUCTION
In communication, maintaining an ordered discipline has always been a
constraint. In order to communicate effectively and efficiently, accurate information has
to be sent or received in the correct manner. With computer processing power
increasing in the last few decades, scientists have been able to perform complicated
calculations in a relatively short period of time to facilitate this.
This in turn has given rise to scientific interest in the irregular phenomena
around us such as random changes in the weather, the spread of epidemics and the
propagation of impulses along nerves. These irregular phenomena are related to the
branch of mathematics known as chaotic dynamical systems, which deals with systems
having a kind of order without periodicity or nonlinear systems in general.
In linear systems, the variables involved appear only to the power of one.
These variables are simple and directly related. In nonlinear systems, the variables
involved are of powers other than one or even fractional. Such systems are harder to
analyze. The chaotic phenomena having no inherent order would
appear to have little to do with modern communication where sequence of zeros and
ones are sent or received accurately and reliably.
One would ask as to why then bother with chaotic communication when the
conventional communication system is managing perfectly? The answer is, in recent
experiments, digital messages were successfully sent at gigabit per second (Gbps)
speeds over 115 km of commercial optical fibre system using chaotic communication
with a Bit Error Rate (BER) of one in ten million. The BER was said to be limited by the
equipment rather than the technique itself [1].
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
There is no universally agreed definition of chaos. However, most people would accept
the following working definition:
3.CHAOTIC SYSTEMS
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
➢ Deterministic systems
These are systems for which for a given set of conditions the result can be predicted
and the output does not vary much with change in initial conditions
➢ Stochastic systems
These systems, which are not as reliable as deterministic systems.
Their output can be predicted only for a certain range of values
➢ Chaotic systems
Chaotic systems are the most unpredictable of the three systems.
Moreover they are very sensitive to initial conditions and a small
change in initial conditions can bring about a great change in its output
4.CHAOS CONTROL
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
5.CHAOTIC SIGNALS
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
• Chaotic signals are complex in structure and impossible to predict over long
time.
• chaotic signals appear noise like
• Hence chaotic signal can be used for providing security at physical level.
OPTICAL ENCRYPTION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
FIGURE 1. In a chaotic-shift keying scheme, the output of a tunable distributed Bragg reflector laser is fed back
via a nonlinear spectral filter and time delay, causing a chaotic shift in wavelength. The chaos is modulated by the input
signal, which varies the delay between time intervals T0 (511.5 µs) and T1 (543.2 µs). This modulation is then picked up by
a receiver matched to T0, and the error signal (where the signal and receiver are unsynchronized) shows the location of
the nonmatching bits(ones)
THREE OPTIONS
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
FIGURE 2. By representing ones and zeros as different time delays in the laser feedback circuit
(top), the data remained securely hidden in the chaotic signal (center), and yet could be recovered
without additional signal processing (bottom). (Photo courtesy of Georgia Tech Lorraine)
Changing the time delay in the feedback loop, however, was successful. The re-
searchers showed that the bit seq-uence was well-hidden and easily received
(see Fig. 2), and the signal could not be decrypted by looking at the signal
spectrum or through autocorrelation.
ALTERNATIVE METHOD
In another project, a collaboration between engineers at Takushoku
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
7.CHAOTIC ATTRACTOR
Also known as a strange attractor, a type of attractor (i.e., an attracting set of states) in
a complex dynamical system's phase space that shows sensitivity to initial conditions.
Because of this property, once the system is on the attractor nearby states diverge from
each other exponentially fast. Consequently, small amounts of noise are amplified.
Once sufficiently amplified the noise determines the system's large-scale behavior and
the system is then unpredictable. Chaotic attractors themselves are markedly patterned,
often having elegant, fixed geometric structures, despite the fact that the trajectories
moving within them appear unpredictable. The chaotic attractor's geometric shape is the
order underlying the apparent chaos. It functions in much the same way as someone
kneading dough. The local separation of trajectories corresponds to stretching the
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
dough and the global attraction property corresponds to folding the stretched dough
back onto itself. One result of the stretch-and-fold aspect of chaotic attractors is that
they are fractals; that is, some cross-section of them reveals similar structure on all
scales.
TYPES OF ATTRACTOR
1. FIXED POINT ATTRACTOR
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
Then the synchronization between two identical chaotic systems was reported
in1990 [23]. In 1992, the electrical engineering community realized that chaos
could used in secure communication systems [24, 25, 26 ] because chaos is
extremely sensitive to initial conditions and parameters. The concept of chaotic
hardware key for secure communication systems was then gradually realized by
engineers and scientists .Since the great potential of applying chaos to secure
communication systems, many groups over the world involved in the researches
in this field. So far, chaotic communication systems have been updated to the
fourth generation. In this paper, theory and structure of the fourth generation is
presented. It is useful to provide the reader who is not involved in chaotic secure
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
First generation
The first generation was developed in 1993 known as additive chaos masking [25]
shown in Fig. 1(a) and chaotic shift keying [26] shown in Fig. 1(b). The additive chaos
masking scheme shown in Fig.1(a) consists of two identical chaotic systems in both the
transmitter and the receiver. The chaotic mask denoted by c(t) is one of the state
variables of the chaotic system2 in the transmitter. The message signal m(t), which is
typically 20 dB to 30dB weaker than c(t) is added into the chaotic mask signal and gives
the transmitted signal s(t). Since the chaotic signal c(t) is very complex and m(t) is much
smaller than c(t), one may hope that the message signal m(t) can not be separated from
s(t) without knowing the exact c(t).To give the reader a hands-on experience on chaotic
secure communication systems, an example of additive chaotic masking scheme is
given as follow. From Fig. 1(a) we can see that a chaotic synchronization block is
needed in the receiver. Chaotic synchronization is a generalization of “carrier
synchronization” in the normal communication systems but it is very different from the
latter. We use Chua’s oscillators to demonstrate the
chaotic synchronization. A Chua’s Oscillator is shown in Fig. 2(a)
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
This scheme is very robust to noise and parameter mismatch. However, it has a low
degree of security[7] if the chaotic attractors are too far away in the bifurcation space.
However, since this is the first scheme of chaotic digital communication systems, there
still exist many possibilities of improving it.
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
Second generation:
The second generation was proposed during 1993 to 1995
known as chaotic modulation. This generation used two different ways to modulate
message signals into chaotic carriers. The first method called chaotic parameter
modulation [27] shown in Fig. 7(a) used message signals to change parameters of the
chaotic transmitter. The second method called chaotic non-autonomous modulation [28]
shown in Fig. 7(b) used the message signal to change the phase space of the chaotic
transmitter.
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
In Fig. 7(a) the message signal m(t) is used to modulate some parameters of the
chaotic system in the transmitter such that its trajectories keep changing in different
chaotic attractors. Since the bifurcation space of a chaotic system is very complex, it is
very difficult to figure out the way of the changes of the parameters even through the
intruder knows some partial knowledge of the structure of the chaotic system in the
transmitter. At the receiver end an adaptive controller is used to adaptively tune the
parameters of the chaotic system such that the synchronization error approach zero.
By doing this, the output of the adaptive controller can recover the message signal. The
simulation results are shown in Fig. 8. In this simulation, three message signals are
used to tune three different parameters of the chaotic system in the transmitter. Since
the chaotic system keeps changing its attractors, the waveform of the transmitted signal
as shown in Fig. 8(a) is much more complex than a normal chaotic signal. In Figs.8(b)
to (d) we show the three original message signals and the three recovered message
signals. Observe that after a transient process of synchronization, the message signals
are recovered with some cross talks and small delays.
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
Third generation:
The third generation shown in Fig. 9 was proposed in 1997[9] for the
purpose of improving the degree of security to a much higher level than the first two
generations. We call this generation as chaotic cryptosystem. In this generation, the
combination of the classical cryptographic technique and chaotic synchronization is
used to enhance the degree of security. So far, this generation has the highest security
in all the chaotic secure communication systems had been proposed and has not yet
been broken. In the chaotic cryptosystem the plain text signal p(t) is encrypted by a
encryption rule with a key signal, k(t), which is generated by the chaotic system in the
transmitter. The scrambled signal is used further to drive the chaotic system such that
the chaotic dynamics is changed chaotic system in the transmitter is transmitted to
through public channel which can be accessed by the intruder. Since the intruder can
not get access to the chaotic hardware key, it is very difficult to find p(t) out from s(t). At
the receiver, the received signal r(t) = s(t)+n(t), where n(t) is the channel noise, is used
to synchronize both of the chaotic systems in transmitter and the receiver. After the
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
chaotic synchronization had been achieved, the signal k(t) and y(t) can be recovered at
the receiver with some noises as denoted by ˜k(t) and ˜y(t). By feeding ˜k(t) and ˜y(t)
into the decryption rule at the receiver, the plain text signal can be recovered with some
noises as ˜p(t). The simulation result is shown in Fig. 10. Figure 10(a) shows the
transmitted signal s(t), from which one can not observe the embedded plain signal.
Figure 10(b) shows the recovered and decrypted result at the receiver. Observe that
after the transient process of synchronization, the plain text signal is recovered. To show
the high security of this scheme, the unmasking method provided in [18] is used to
decode the plain text signal. Figure 10(c) shows the unmasked signal ˜y(t) by the
intruder, from which it is impossible to retrieve the plain text signal as shown in Fig.
10(d).
Fourth generation:
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
signal. The impulsive synchronization presented in this paper offers a very promising
approach of reducing the redundancy in transmitted signals.
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
of time frames. Every frame has a length of T seconds and consists of two
regions.
In Fig. 20 we show the concept of a time frame and its components. The
first region of the time frame is a synchronization region consisting of synchronization
impulses. The synchronization impulses are used to impulsively synchronize the chaotic
systems in both transmitter and receiver. The second region is the scrambled signal
region where the scrambled signal is contained. To ensure synchronization, we have T
< ¢max. Within every time frame, the synchronization region has a length of Q and the
remaining time interval T ¡ Q is the scrambled signal region. The composition block in
Fig. 19 is used to combine the synchronization impulses and the scrambled signal into
the time frame structure shown in Fig. 20.
The decomposition block is used to separate the synchronization region and the
scrambled signal region within each frame at the receiver end. Then the separated
synchronization impulses are used to make the chaotic system in the receiver to
synchronize with that in the transmitter. The stability of this impulsive synchronization is
guaranteed by our results in Section 4. In the transmitter and the receiver, we use the
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
1. At high speed it is easier to generate strong , high power chaotic signals than periodic
signals.
2. Chaotic signals are not sensitive to initial conditions and have
noise like time series
3. Chaotic transmission has less risks of interception and are hard to detect by
eavesdropper.
4. In chaotic communication, then on linear characteristic of communication devices
are utilized instead of being avoided, this eliminates the complicated measures to
maintain linearity.
5. Chaotic communication systems can function over a larger dynamical range, with
fewer complex components and operate at higher power levels than traditional
communication systems .
6. The optimal asynchronous CDMA codes using chaotic spread-spectrum sequences
can support 15% more users than the standard GOLD codes for the same bit error rate
(BER) performance.
7. It has auto cross correlation properties, low multipath interference and self-
synchronization property.
8. Power output remains constant regardless of the information content.
9. It is resistant against multi-path fading and offers cheaper solution to traditional
spread spectrum systems.
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
source source
S
encoder decoder
encryptor decryptor
CHAOS
CHAOS
channel channel
encoder decoder
modulator demodulator
Communication
channel
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
12.CONCLUSION
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
BIBLIOGRAPHY
Website referred
DEPARTMENT OF E&C 1
KNSIT,BANGALORE
CHAOTIC COMMUNICATION
www.dbebooks.com
www.google.com
www.tech-faq.com
http//en.wikipedia.org/wiki/
DEPARTMENT OF E&C 1
KNSIT,BANGALORE