A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks

In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network co...

Full description

Saved in:
Bibliographic Details
Published inNonlinear dynamics Vol. 96; no. 2; pp. 869 - 883
Main Authors Zhou, Lili, Tan, Fei
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.04.2019
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0924-090X
1573-269X
DOI:10.1007/s11071-019-04828-7