Skip to main content

Communication Method for Chaotic Encryption in Remote Monitoring Systems for Product e-Manufacturing and e-Maintenance

  • Conference paper
Book cover Applied Soft Computing Technologies: The Challenge of Complexity

Part of the book series: Advances in Soft Computing ((AINSC,volume 34))

  • 1203 Accesses

Abstract

In chaotic cryptosystems, it is recognized that using (very) high dimensional chaotic attractors for encrypting a given message may improve the privacy of chaotic encoding. In this paper, we study a kind of hyperchaotic systems using some classical methods. The results show that besides the high dimension, the sub-Nyquist sampling interval is also an important factor that can improve the security of the chaotic cryptosystems. We use the method of time series analysis to verify the result.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Parlitz, U., Kocarev, L. (1997), Using surrogate data analysis for unmasking chaotic communication systems, International Journal of Bifurcation and Chaos, 7(2): 407–413

    Article  MATH  MathSciNet  Google Scholar 

  • Parlitz, U. (1998) Nonlinear time series analysis, Proceedings of the 3rd International Specialist Workshop on Nonlinear Dynamics of Electronic Systems, p 179–192

    Google Scholar 

  • Abarbanel, H. D. I., Brown, R., Sidorowich, J. J. et al (1993), The analysis of observed chaotic data in physical systems, Review Modern Physics, 65(4): 1331–1392

    Article  MathSciNet  Google Scholar 

  • Barahona, M., Poon, Shi-Sang (1996), Detection of nonlinear dynamics in short, noisy time series, Nature, 381: 215–217

    Article  Google Scholar 

  • Hilborn, R.C., Ding, M.Z. (1996), Optimal Reconstruction space for Estimating Correlation Dimension. International Journal of Bifurcation and Chaos, 6(2): 377–381

    Article  MATH  Google Scholar 

  • Gibson, J. F. Farmer, J. D., Casdagli, M. et al (1992), An analytic approach to practical state space reconstruction. Physica D, 57: 1–30.

    Article  MATH  MathSciNet  Google Scholar 

  • Kennel, M., Brown R., and Abarbanel, H. D. I. (1992), Determining embedding dimension for phase-space reconstruction using a geometrical construction, Physical Review A, 45(5): 3403–3411

    Article  Google Scholar 

  • Palus, M. and Dvorak, I. (1992), Singular-value decomposition in attractor reconstruction: pitfalls and precautions, Physica D, 55: 221–234

    Article  MATH  MathSciNet  Google Scholar 

  • Sakaguchi, Hidetsugu. (2002), Parameter evaluation from time sequences using chaos synchronization, Physical Review E, 65, p027201–l-4

    Article  Google Scholar 

  • Theiler, J., Prichard, D. (1996), Constrained-realization Monte- Carlo method for hypothesis testing, Physica D, 94: 221–235

    Article  MATH  Google Scholar 

  • Lei, M., Wang, Z. Z. and Feng, Z. J. (2001), Detecting nonlinearity action surface EMG signal, Physics Letters A, 290: 297–303.

    Article  MATH  Google Scholar 

  • Lei, M. (2002), Chaotic Time Series Analysis and Its Application Study on Chaotic Encryption System. PhD Thesis, Shanghai Jiao Tong University, China

    Google Scholar 

  • Parlitz, U., Chua, L. O., Kocarev, Lj., Halle, K. S., and Shang, A. (1992), Transmission of digital signals by chaotic synchronization, International Journal of Bifurcation and Chaos, 2(4): 973–977

    Article  MATH  Google Scholar 

  • Parlitz, U., Kocarev, L., Stojanovski, T. & Preckel, H. (1996), Encoding messages using chaotic synchronization, Physical Review E53, 4351–4361

    Google Scholar 

  • Pecora, L. M. & Carroll, T. L. (1990), Synchronization in chaotic systems, Physical Review Letter, 64, 821–824

    Article  MATH  MathSciNet  Google Scholar 

  • Koc, Muammer and Lee, J. (2001), A system framework for next-generation e-maintenance systems, http://www.umw.edu/ceas/ims/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer

About this paper

Cite this paper

Liu, C., Xie, K., Miao, Y., Zha, X.F., Feng, Z., Lee, J. (2006). Communication Method for Chaotic Encryption in Remote Monitoring Systems for Product e-Manufacturing and e-Maintenance. In: Abraham, A., de Baets, B., Köppen, M., Nickolay, B. (eds) Applied Soft Computing Technologies: The Challenge of Complexity. Advances in Soft Computing, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-31662-0_64

Download citation

  • DOI: https://doi.org/10.1007/3-540-31662-0_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31649-7

  • Online ISBN: 978-3-540-31662-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics