Abstract

Using different chaotic systems in secure communication, nonlinear control, and many other applications has revealed that these systems have several drawbacks in different aspects. This can cause unfavorable effects to chaos-based applications. Therefore, presenting a chaotic map with complex behaviors is considered important. In this paper, we introduce a new 2D chaotic map, namely, the 2D infinite-collapse-Sine model (2D-ICSM). Various metrics including Lyapunov exponents and bifurcation diagrams are used to demonstrate the complex dynamics and robust hyperchaotic behavior of the 2D-ICSM. Furthermore, the cross-correlation coefficient, phase space diagram, and Sample Entropy algorithm prove that the 2D-ICSM has a high sensitivity to initial values and parameters, extreme complexity performance, and a much larger hyperchaotic range than existing maps. To empirically verify the efficiency and simplicity of the 2D-ICSM in practical applications, we propose a symmetric secure communication system using the 2D-ICSM. Experimental results are presented to demonstrate the validity of the proposed system.

Highlights

  • Numerous phenomena have been comprehended by studying the complex behaviors in many natural and non-natural dynamical systems

  • We introduce an analytical framework to understand the dynamical behavior of the 2D infinite-collapse-Sine model (2D-ICSM)

  • It is quite clear that the 2D-ICSM has the largest Sample Entropy (SamEn) values, which indicates that one needs more information to predict the generated sequences by this map

Read more

Summary

A New Hyperchaotic Map for a Secure Communication

G. Al-Saidi 1 , Dhurgham Younus 1 , Hayder Natiq 2,3 , M. Received: 27 September 2020; Accepted: 3 November 2020; Published: 15 November 2020

Introduction
Definition of 2D-ICSM
Stability Analysis
Bifurcation Diagram and Lyapunov Exponents
Hyperchaotic Attractor
Performance Evaluations
Cross-Correlation Coefficient
Chaos-Based Pseudorandom Number Generator
Complexity-Based Sample Entropy
Chaos Based Cryptography
Arduino Transmitter
Delta Modulation
Encryption Process
Decryption Process
Simulation Implementation
Hardware Implementation
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call