A Robust Synchronization-Based Chaotic Secure Communication Scheme With Double-Layered and Multiple Hybrid Networks
In this paper, based on the exponential synchronization of double-layered networks composed of multiple subnets, we bring forward a chaotic secure communication scheme, which is robust to different network sizes, time-varying delays, and stochastic noise. Cluster analysis is used to process the node...
Saved in:
Published in | IEEE systems journal Vol. 14; no. 2; pp. 2508 - 2519 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this paper, based on the exponential synchronization of double-layered networks composed of multiple subnets, we bring forward a chaotic secure communication scheme, which is robust to different network sizes, time-varying delays, and stochastic noise. Cluster analysis is used to process the nodes with different dynamics, such that the subnets in the transmitter and receiver are one-to-one correspondence and constitute subnet pairs, while the node size of each subnet can be inconsistent. Each subnet pair is only accountable for encrypting/decrypting a part of information. There are many encryption/decryption units and they are operating in parallel, which can not only indicate the complex characteristic of different nodes but also speed up the information encryption/decryption. The proposed scheme applies the chaotic signals yielded by many chaotic systems as key sequences, such that the key space can grow with node sizes in the transmitter. This scheme is not subject to the constraint on the amplitude of the original message and chaotic signal, the influence of time-delay and stochastic noise, and it shows that only the nodes with large degrees need to apply controllers in restoring the original information. Both theoretical analysis and numerical simulation manifest the feasibility and validity of the given scheme. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1932-8184 1937-9234 |
DOI: | 10.1109/JSYST.2019.2927495 |