Abstract
In chaotic cryptosystems, it is recognized that using (very) high dimensional chaotic attractors for encrypting a given message may improve the privacy of chaotic encoding. In this paper, we study a kind of hyperchaotic systems using some classical methods. The results show that besides the high dimension, the sub-Nyquist sampling interval is also an important factor that can improve the security of the chaotic cryptosystems. We use the method of time series analysis to verify the result.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Parlitz, U., Kocarev, L. (1997), Using surrogate data analysis for unmasking chaotic communication systems, International Journal of Bifurcation and Chaos, 7(2): 407–413
Parlitz, U. (1998) Nonlinear time series analysis, Proceedings of the 3rd International Specialist Workshop on Nonlinear Dynamics of Electronic Systems, p 179–192
Abarbanel, H. D. I., Brown, R., Sidorowich, J. J. et al (1993), The analysis of observed chaotic data in physical systems, Review Modern Physics, 65(4): 1331–1392
Barahona, M., Poon, Shi-Sang (1996), Detection of nonlinear dynamics in short, noisy time series, Nature, 381: 215–217
Hilborn, R.C., Ding, M.Z. (1996), Optimal Reconstruction space for Estimating Correlation Dimension. International Journal of Bifurcation and Chaos, 6(2): 377–381
Gibson, J. F. Farmer, J. D., Casdagli, M. et al (1992), An analytic approach to practical state space reconstruction. Physica D, 57: 1–30.
Kennel, M., Brown R., and Abarbanel, H. D. I. (1992), Determining embedding dimension for phase-space reconstruction using a geometrical construction, Physical Review A, 45(5): 3403–3411
Palus, M. and Dvorak, I. (1992), Singular-value decomposition in attractor reconstruction: pitfalls and precautions, Physica D, 55: 221–234
Sakaguchi, Hidetsugu. (2002), Parameter evaluation from time sequences using chaos synchronization, Physical Review E, 65, p027201–l-4
Theiler, J., Prichard, D. (1996), Constrained-realization Monte- Carlo method for hypothesis testing, Physica D, 94: 221–235
Lei, M., Wang, Z. Z. and Feng, Z. J. (2001), Detecting nonlinearity action surface EMG signal, Physics Letters A, 290: 297–303.
Lei, M. (2002), Chaotic Time Series Analysis and Its Application Study on Chaotic Encryption System. PhD Thesis, Shanghai Jiao Tong University, China
Parlitz, U., Chua, L. O., Kocarev, Lj., Halle, K. S., and Shang, A. (1992), Transmission of digital signals by chaotic synchronization, International Journal of Bifurcation and Chaos, 2(4): 973–977
Parlitz, U., Kocarev, L., Stojanovski, T. & Preckel, H. (1996), Encoding messages using chaotic synchronization, Physical Review E53, 4351–4361
Pecora, L. M. & Carroll, T. L. (1990), Synchronization in chaotic systems, Physical Review Letter, 64, 821–824
Koc, Muammer and Lee, J. (2001), A system framework for next-generation e-maintenance systems, http://www.umw.edu/ceas/ims/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer
About this paper
Cite this paper
Liu, C., Xie, K., Miao, Y., Zha, X.F., Feng, Z., Lee, J. (2006). Communication Method for Chaotic Encryption in Remote Monitoring Systems for Product e-Manufacturing and e-Maintenance. In: Abraham, A., de Baets, B., Köppen, M., Nickolay, B. (eds) Applied Soft Computing Technologies: The Challenge of Complexity. Advances in Soft Computing, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-31662-0_64
Download citation
DOI: https://doi.org/10.1007/3-540-31662-0_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31649-7
Online ISBN: 978-3-540-31662-6
eBook Packages: EngineeringEngineering (R0)