By Topic

Secure communication using a chaos based signal encryption scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
K. Murali ; Dept. of Electr. & Comput Eng., Calgary Univ., Alta., Canada ; Haiyang Yu ; V. Varadan ; H. Leung

The large-scale proliferation of wireless communications both inside and outside the home-office environment has led to an increased demand for effective and cheap encryption schemes. Now a new chaos based signal encryption scheme is proposed to transmit digital information signals by using the conventional synchronization of chaos and digital encryption approaches. In this scheme, either a chaotic or hyperchaotic system is used to generate a digital key after thresholding a chaotic signal. This signal along with the information digital signal is used to generate the encrypted signal. Then the encrypted signal is masked by one of the chaotic signals of the transmitter and is transmitted through the channel to the receiver as well as used to drive the transmitter chaotic system using the concept of self-modulation. At the receiver end, a suitable feedback loop is constructed for unmasking and then the decryption rule is used to recover the information signal. By suitable combinations of the chaotic signals, the effect of additional nonlinear-keys has also been considered. The effect of typical perturbing factors, like channel noise and parameter mismatch, are included and their corresponding performance analysis is discussed. By considering an appropriate circuit configuration, simulation results are presented

Published in:

IEEE Transactions on Consumer Electronics  (Volume:47 ,  Issue: 4 )