2011
DOI: 10.1007/s11071-011-0053-z
|View full text |Cite
|
Sign up to set email alerts
|

A new digital communication scheme based on chaotic modulation

Abstract: Based on parameter identification, a parameter observer is designed for a class of chaotic systems. The digital signals modulated in the parameter will be recovered by the observer. By choosing different frequency signals as "0" and "1," a practical digital secure communication scheme is proposed by this parameter modulation method. Numerical simulations show the effectiveness of this communication scheme.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Different approaches for the transmission of information signals using chaotic dynamics have been proposed, for example, chaotic masking Cuomo & Oppenheim, 1993], chaotic switching or chaos shift keying Dedieu et al, 1993], chaotic modulation [Halle et al, 1993], nonlinear mixing [Volkovskii & Rulkov, 1993;Dmitriev et al, 1995;Dmitriev & Panas, 2002], and others. Based on these approaches, a variety of chaotic communication schemes has been proposed [Van Wiggeren & Roy, 1998;Dmitriev & Panas, 2002;Tao, 2004;Argyris et al, 2005;Koronovskii et al, 2009;Wang et al, 2012;Stankovski et al, 2014]. However, many chaotic communication schemes are not as secure as expected and can be successfully unmasked [Pérez & Cerdeira, 1995;Short, 1997;Zhou & Chen, 1997;Yang et al, 1998;Ponomarenko & Prokhorov, 2002;Alvarez & Li, 2006;Millerioux, 2013].…”
Section: Introductionmentioning
confidence: 99%
“…Different approaches for the transmission of information signals using chaotic dynamics have been proposed, for example, chaotic masking Cuomo & Oppenheim, 1993], chaotic switching or chaos shift keying Dedieu et al, 1993], chaotic modulation [Halle et al, 1993], nonlinear mixing [Volkovskii & Rulkov, 1993;Dmitriev et al, 1995;Dmitriev & Panas, 2002], and others. Based on these approaches, a variety of chaotic communication schemes has been proposed [Van Wiggeren & Roy, 1998;Dmitriev & Panas, 2002;Tao, 2004;Argyris et al, 2005;Koronovskii et al, 2009;Wang et al, 2012;Stankovski et al, 2014]. However, many chaotic communication schemes are not as secure as expected and can be successfully unmasked [Pérez & Cerdeira, 1995;Short, 1997;Zhou & Chen, 1997;Yang et al, 1998;Ponomarenko & Prokhorov, 2002;Alvarez & Li, 2006;Millerioux, 2013].…”
Section: Introductionmentioning
confidence: 99%
“…The first unauthenticated key agreement protocol based on asymmetric cryptographic techniques was proposed by Diffie and Hellman [17,18]. Later, some authenticated key agreement [19][20][21][22][23][24] and anonymous key agreement [25,26] protocols were developed and proposed.…”
Section: Introductionmentioning
confidence: 99%