Skip to main content
Log in

Study on the communication method for chaotic encryption in remote monitoring systems

  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In chaotic cryptosystems, it is recognized that using (very) high dimensional chaotic attractors for encrypting a given message may improve the privacy of chaotic encoding. In this paper, we study a kind of hyperchaotic systems by using some classical methods. The results show that besides the high dimension, the sub-Nyquist sampling interval (SI) is also an important factor that can improve the security of the chaotic cryptosystems. We use the method of time series analysis to verify the results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Parlitz U, Kocarev L (1997) Using surrogate data analysis for unmasking chaotic communication systems. Int J Bifurcation Chaos 7(2):407–413

    Google Scholar 

  2. Parlitz U(1998) Nonlinear time series analysis. In: Proceedings of the 3rd international specialist workshop on nonlinear dynamics of electronic systems, pp. 179–192

  3. Abarbanel HDI, Brown R, Sidorowich JJ et al. (1993) The analysis of observed chaotic data in physical systems. Rev Modern Phys 65(4):1331–1392

    Google Scholar 

  4. Barahona M, Poon Shi-Sang (1996) Detection of nonlinear dynamics in short, noisy time series. Nature 381:215–217

    Google Scholar 

  5. Hilborn RC, Ding MZ (1996) Optimal reconstruction space for estimating correlation dimension. Int J Bifurcation Chaos 6(2):377–381

    Google Scholar 

  6. Gibson JF, Farmer JD, Casdagli M et al. (1992) An analytic approach to practical state space reconstruction. Physica D 57: 1–30

    Google Scholar 

  7. Kennel M, Brown R, Abarbanel HDI (1992) Determining embedding dimension for phase-space reconstruction using a geometrical construction. Phys Rev A 45(5):3403–3411

    Google Scholar 

  8. Palus M, Dvorak I (1992) Singular-value decomposition in attractor reconstruction: pitfalls and precautions. Physica D 55: 221–234

    Google Scholar 

  9. Sakaguchi Hidetsugu (2002) Parameter evaluation from time sequences using chaos synchronization. Phys Rev E 65 p 027201-1-4

    Google Scholar 

  10. Theiler J, Prichard D (1996) Constrained-realization Monte-Carlo method for hypothesis testing. Physica D 94:221–235

    Google Scholar 

  11. Lei M, Wang ZZ, Feng ZJ (2001) Detecting nonlinearity action surface EMG signal. Phys Let A 290:297–303

    Google Scholar 

  12. Lei M (2002) Chaotic time series analysis and its application study on chaotic encryption system. PhD Thesis, Shanghai Jiao Tong University, China

  13. Parlitz U, Chua LO, Kocarev Lj, Halle KS, Shang A (1992) Transmission of digital signals by chaotic synchronization. Int J Bifurcation Chaos 2(4):973–977

  14. Parlitz U, Kocarev L, Stojanovski T, Preckel H (1996) Encoding messages using chaotic synchronization. Phys Rev E53:4351–4361

    Google Scholar 

  15. Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Let 64:821–824

    Google Scholar 

  16. Koc Muammer, Lee J (2001) A system framework for next-generation e-maintenance systems. http://www.umw.edu/ceas/ims/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. L. Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, C., Xie, K., Miao, Y. et al. Study on the communication method for chaotic encryption in remote monitoring systems. Soft Comput 10, 224–229 (2006). https://doi.org/10.1007/s00500-005-0475-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-005-0475-y

Keywords

Navigation