A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks

In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Nonlinear dynamics 2019-04, Vol.96 (2), p.869-883
Hauptverfasser: Zhou, Lili, Tan, Fei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 883
container_issue 2
container_start_page 869
container_title Nonlinear dynamics
container_volume 96
creator Zhou, Lili
Tan, Fei
description In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.
doi_str_mv 10.1007/s11071-019-04828-7
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2838456147</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2838456147</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-f09a085aa284e7709a0d461de62b297de2b6ff6cb8bfe6ea5565b748617418263</originalsourceid><addsrcrecordid>eNp9kEtLxDAUhYMoOD7-gKuA62iSpkm6HAZfMOBGYXYhTW-djm0yJi06_no7U8Gdq8PhfudcOAhdMXrDKFW3iTGqGKGsIFRorok6QjOWq4xwWayO0YwWXBBa0NUpOktpQynNONUz5OfYrW3oG4cTuCECdqHrBt842zfB4-TW0AEubYIK7_3Ou3UMvvme7qHGVRjKFkhrdxBHyPoKd0PbN9v2UDbKF_bQf4b4ni7QSW3bBJe_eo5e7-9eFo9k-fzwtJgvict03pOaFpbq3FquBSi1d5WQrALJS16oCngp61q6Upc1SLB5LvNSCS2ZEkxzmZ2j66l3G8PHAKk3mzBEP740XGda5JIJNVJ8olwMKUWozTY2nY07w6jZ72qmXc24qznsavahbAqlEfZvEP-q_0n9AO_xfTo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2838456147</pqid></control><display><type>article</type><title>A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks</title><source>Springer Nature - Complete Springer Journals</source><creator>Zhou, Lili ; Tan, Fei</creator><creatorcontrib>Zhou, Lili ; Tan, Fei</creatorcontrib><description>In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.</description><identifier>ISSN: 0924-090X</identifier><identifier>EISSN: 1573-269X</identifier><identifier>DOI: 10.1007/s11071-019-04828-7</identifier><language>eng</language><publisher>Dordrecht: Springer Netherlands</publisher><subject>Algorithms ; Automotive Engineering ; Classical Mechanics ; Clustering ; Communication ; Complexity ; Control ; Data encryption ; Dynamical Systems ; Encryption ; Engineering ; Matching ; Mathematical models ; Mechanical Engineering ; Networks ; Nodes ; Original Paper ; Synchronism ; Vibration</subject><ispartof>Nonlinear dynamics, 2019-04, Vol.96 (2), p.869-883</ispartof><rights>Springer Nature B.V. 2019</rights><rights>Springer Nature B.V. 2019.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-f09a085aa284e7709a0d461de62b297de2b6ff6cb8bfe6ea5565b748617418263</citedby><cites>FETCH-LOGICAL-c385t-f09a085aa284e7709a0d461de62b297de2b6ff6cb8bfe6ea5565b748617418263</cites><orcidid>0000-0002-8602-2141</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11071-019-04828-7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11071-019-04828-7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Zhou, Lili</creatorcontrib><creatorcontrib>Tan, Fei</creatorcontrib><title>A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks</title><title>Nonlinear dynamics</title><addtitle>Nonlinear Dyn</addtitle><description>In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.</description><subject>Algorithms</subject><subject>Automotive Engineering</subject><subject>Classical Mechanics</subject><subject>Clustering</subject><subject>Communication</subject><subject>Complexity</subject><subject>Control</subject><subject>Data encryption</subject><subject>Dynamical Systems</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Matching</subject><subject>Mathematical models</subject><subject>Mechanical Engineering</subject><subject>Networks</subject><subject>Nodes</subject><subject>Original Paper</subject><subject>Synchronism</subject><subject>Vibration</subject><issn>0924-090X</issn><issn>1573-269X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kEtLxDAUhYMoOD7-gKuA62iSpkm6HAZfMOBGYXYhTW-djm0yJi06_no7U8Gdq8PhfudcOAhdMXrDKFW3iTGqGKGsIFRorok6QjOWq4xwWayO0YwWXBBa0NUpOktpQynNONUz5OfYrW3oG4cTuCECdqHrBt842zfB4-TW0AEubYIK7_3Ou3UMvvme7qHGVRjKFkhrdxBHyPoKd0PbN9v2UDbKF_bQf4b4ni7QSW3bBJe_eo5e7-9eFo9k-fzwtJgvict03pOaFpbq3FquBSi1d5WQrALJS16oCngp61q6Upc1SLB5LvNSCS2ZEkxzmZ2j66l3G8PHAKk3mzBEP740XGda5JIJNVJ8olwMKUWozTY2nY07w6jZ72qmXc24qznsavahbAqlEfZvEP-q_0n9AO_xfTo</recordid><startdate>20190401</startdate><enddate>20190401</enddate><creator>Zhou, Lili</creator><creator>Tan, Fei</creator><general>Springer Netherlands</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0002-8602-2141</orcidid></search><sort><creationdate>20190401</creationdate><title>A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks</title><author>Zhou, Lili ; Tan, Fei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-f09a085aa284e7709a0d461de62b297de2b6ff6cb8bfe6ea5565b748617418263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Automotive Engineering</topic><topic>Classical Mechanics</topic><topic>Clustering</topic><topic>Communication</topic><topic>Complexity</topic><topic>Control</topic><topic>Data encryption</topic><topic>Dynamical Systems</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Matching</topic><topic>Mathematical models</topic><topic>Mechanical Engineering</topic><topic>Networks</topic><topic>Nodes</topic><topic>Original Paper</topic><topic>Synchronism</topic><topic>Vibration</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhou, Lili</creatorcontrib><creatorcontrib>Tan, Fei</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Nonlinear dynamics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhou, Lili</au><au>Tan, Fei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks</atitle><jtitle>Nonlinear dynamics</jtitle><stitle>Nonlinear Dyn</stitle><date>2019-04-01</date><risdate>2019</risdate><volume>96</volume><issue>2</issue><spage>869</spage><epage>883</epage><pages>869-883</pages><issn>0924-090X</issn><eissn>1573-269X</eissn><abstract>In this paper, we mainly propose a chaotic secure communication scheme which is based on the synchronization of double-layered and multiple complex dynamical networks. Compared with the previous chaotic secure communication schemes, in which only two chaotic systems or just a single-layer network composed of multiple chaotic systems is used, the introduction of a double-layered and multiple complex networks model composed of many encryption/encryption units can not only reflect the complex characteristics of different nodes, but also can improve the complexity and security of information encryption. By using a clustering method, nodes with the same characteristics belong to the same subnet, while the nodes with different characteristics belong to different ones. The subnets in the transmitter and receiver are one-to-one correspondence and form a pair of matching subnets, but the node size of each subnet can be inconsistent. Each subnet is only responsible for encrypting a certain part of information, and thus, the synchronization between each pair of matching subnets plays a crucial role on the correct recovery of information. Multiple encryption/decryption units operating in parallel way can speed up the encryption of information, and the key space can grow with the number of nodes in the transmitter. The proposed scheme utilizes the chaotic signals generated by many chaotic systems as the key sequences and adopts the one-time-one-cipher encryption method. Moreover, this scheme is not subject to the constraint that the amplitude of the encrypted signal should be much smaller than that of the chaotic signal, and it is particularly suitable for the big data encryption. Both theoretical analysis and numerical simulation demonstrate the feasibility and effectiveness of the proposed scheme.</abstract><cop>Dordrecht</cop><pub>Springer Netherlands</pub><doi>10.1007/s11071-019-04828-7</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-8602-2141</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0924-090X
ispartof Nonlinear dynamics, 2019-04, Vol.96 (2), p.869-883
issn 0924-090X
1573-269X
language eng
recordid cdi_proquest_journals_2838456147
source Springer Nature - Complete Springer Journals
subjects Algorithms
Automotive Engineering
Classical Mechanics
Clustering
Communication
Complexity
Control
Data encryption
Dynamical Systems
Encryption
Engineering
Matching
Mathematical models
Mechanical Engineering
Networks
Nodes
Original Paper
Synchronism
Vibration
title A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T13%3A49%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20chaotic%20secure%20communication%20scheme%20based%20on%20synchronization%20of%20double-layered%20and%20multiple%20complex%20networks&rft.jtitle=Nonlinear%20dynamics&rft.au=Zhou,%20Lili&rft.date=2019-04-01&rft.volume=96&rft.issue=2&rft.spage=869&rft.epage=883&rft.pages=869-883&rft.issn=0924-090X&rft.eissn=1573-269X&rft_id=info:doi/10.1007/s11071-019-04828-7&rft_dat=%3Cproquest_cross%3E2838456147%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2838456147&rft_id=info:pmid/&rfr_iscdi=true