An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers...

10
Research Article An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers Mauricio Zapateiro De la Hoz, 1 Leonardo Acho, 2 and Yolanda Vidal 2 1 Universidade Tecnol´ ogica Federal do Paran´ a, Avenida Alberto Carazzai 1640, 86300-000 Corn´ elio Proc´ opio, PR, Brazil 2 Control, Dynamics and Applications Group (CoDAlab), Departament de Matem` atica Aplicada III, Universitat Polit´ ecnica de Catalunya, d’Urgell 187, E08036 Barcelona, Spain Correspondence should be addressed to Mauricio Zapateiro De la Hoz; [email protected] Received 7 May 2015; Revised 27 July 2015; Accepted 9 August 2015 Academic Editor: Chengqing Li Copyright © 2015 Mauricio Zapateiro De la Hoz et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. e input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. e key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. e proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. 1. Introduction Security and secrecy in communications are some of the most important concerns in societies nowadays. With the advent of worldwide networks and digital communication techniques, the cryptographic techniques that once were restricted to military and state affairs are now covering several domains such as banks, private companies, medical organi- zations, and so forth. is has led to a very active research field oriented to finding optimal solutions to the problem of communications security [1–3]. As a result, numerous cryptographic techniques that seek to preserve the privacy of the information transmitted have been designed. Chaos is the base of many encryption and decryption techniques because chaotic signals have a highly unpredictable and random-look nature [4]. ere are basically two main approaches to designing secure communication systems based on chaotic dynamics: analog and digital. Analog communication systems based on chaos are possible because of the possibility of synchro- nization [5]. Synchronization occurs when the output of the driving system (master) controls the response system (slave) in such a way that they both oscillate in a synchronized manner. On the other hand, digital chaos communication systems do not depend on chaos synchronization at all. Instead, they usually use one or more chaotic maps in which the initial conditions and the control parameters play the role of the secret key [6]. Several examples of chaos-based communication systems can be found in the literature. For instance, Zapateiro et al. [7] designed a chaotic communication system in which a binary signal is encrypted in the frequency of the sinusoidal term of a chaotic Duffing oscillator. Two chaotic signals of the oscillator are further encrypted with a Delta modulator before they are sent through the channel. In the receiver, a Lyapunov-based observer uses the chaotic signals for retriev- ing the sinusoidal term that contains the message. A novel frequency estimator is then used to obtain the binary signal. Hindawi Publishing Corporation e Scientific World Journal Volume 2015, Article ID 123080, 10 pages http://dx.doi.org/10.1155/2015/123080

Transcript of An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers...

Page 1: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

Research ArticleAn Experimental Realization of a Chaos-Based SecureCommunication Using Arduino Microcontrollers

Mauricio Zapateiro De la Hoz1 Leonardo Acho2 and Yolanda Vidal2

1Universidade Tecnologica Federal do Parana Avenida Alberto Carazzai 1640 86300-000 Cornelio Procopio PR Brazil2Control Dynamics and Applications Group (CoDAlab) Departament de Matematica Aplicada IIIUniversitat Politecnica de Catalunya drsquoUrgell 187 E08036 Barcelona Spain

Correspondence should be addressed to Mauricio Zapateiro De la Hoz hozutfpredubr

Received 7 May 2015 Revised 27 July 2015 Accepted 9 August 2015

Academic Editor Chengqing Li

Copyright copy 2015 Mauricio Zapateiro De la Hoz et al This is an open access article distributed under the Creative CommonsAttribution License which permits unrestricted use distribution and reproduction in any medium provided the original work isproperly cited

Security and secrecy are some of the important concerns in the communications world In the last years several encryptiontechniques have been proposed in order to improve the secrecy of the information transmitted Chaos-based encryption techniquesare being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signalsIn this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple modelthat is chaotic under certain conditionsThe inputmessage signal ismodulated using a simple Deltamodulator and encrypted usinga logistic mapThe key signal is also encrypted using the same logistic map with different initial conditions In the receiver side thebinary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels Theproposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows forthe implementation of the communication system for testing purposes

1 Introduction

Security and secrecy in communications are some of themost important concerns in societies nowadays With theadvent of worldwide networks and digital communicationtechniques the cryptographic techniques that once wererestricted tomilitary and state affairs are now covering severaldomains such as banks private companies medical organi-zations and so forth This has led to a very active researchfield oriented to finding optimal solutions to the problemof communications security [1ndash3] As a result numerouscryptographic techniques that seek to preserve the privacy ofthe information transmitted have been designed Chaos is thebase of many encryption and decryption techniques becausechaotic signals have a highly unpredictable and random-looknature [4]

There are basically two main approaches to designingsecure communication systems based on chaotic dynamicsanalog and digital Analog communication systems based

on chaos are possible because of the possibility of synchro-nization [5] Synchronization occurs when the output of thedriving system (master) controls the response system (slave)in such a way that they both oscillate in a synchronizedmanner On the other hand digital chaos communicationsystems do not depend on chaos synchronization at allInstead they usually use one or more chaotic maps in whichthe initial conditions and the control parameters play the roleof the secret key [6]

Several examples of chaos-based communication systemscan be found in the literature For instance Zapateiro et al[7] designed a chaotic communication system in which abinary signal is encrypted in the frequency of the sinusoidalterm of a chaotic Duffing oscillator Two chaotic signals ofthe oscillator are further encrypted with a Delta modulatorbefore they are sent through the channel In the receiver aLyapunov-based observer uses the chaotic signals for retriev-ing the sinusoidal term that contains the message A novelfrequency estimator is then used to obtain the binary signal

Hindawi Publishing Corporatione Scientific World JournalVolume 2015 Article ID 123080 10 pageshttpdxdoiorg1011552015123080

2 The Scientific World Journal

Furthermore in a new proposal Zapateiro De la Hoz et al[8] investigated a modified Chua chaotic oscillator in whichthe nonlinear term of the original oscillator was changed for asmooth and bounded function that allows for easier analysisand synchronization with other oscillators An applicationto secure communications using the modified oscillatorwas developed and its performance evaluated by numericalsimulations Hammami [9] proposed an image cryptosystemthat makes use of hyperchaotic systems Synchronizationwas achieved by assuming some structural assumptions ofthe master system and using some aggregation techniquesassociated with the arrow form matrix Fallahi and Leung[10] developed a chaotic communication system based ona chaos multiplication modulator that encrypts the signalThe chaotic signal is generated by using the Genesio-Tesichaotic system The authors also prove that the systemsecurity could not be broken with the existing methods atthat time Liu and Sun [11] propose a new design of chaoticcryptosystems in which they use high dimensional chaoticmaps along with some cryptography techniques to achievea high security level The high dimensionality of the mapleads to a high complexity and effective byte confusion anddiffusion of the output ciphertext at the time that the smallkey space problem is overcome Pareek et al [12] designedan image encryption scheme in which two logistic mapsare used along with an 80-bit key to encryptdecrypt theimages Eight different types of operation are used to encryptthe pixels of an image the type of operation is chosenaccording to the outcome of the logistic maps This securecommunication scheme was criptanalyzed in detail in Li etal [13] Lee et al [14] proposed a chaotic cipher stream a newscheme for generating pseudorandom numbers based on thecomposition of chaotic maps The method consists of usingone chaotic map to generate a sequence of pseudorandombytes and then apply some permutation on them usinganother chaotic map Shyamsunder and Kaliyaperumal [15]incorporate the concept of modular arithmetic and chaoticmaps for image encryption and decryption Zhang et al [16]propose a simple but secure chaotic cipher by improving thefamiliar permutation-diffusion structure

Numerous works can be found in the literature that usethe logistic map for improving security in communicationsThe logistic map is a nonlinear discrete map originally usedfor modeling population growth of different species as wellas economic and political phenomena [17ndash19] Howeverunder certain conditions it exhibits a chaotic behavior [20]This characteristic has been exploited in cryptography eversince For example Murillo-Escobar et al [21] presented asymmetric text cipher in which they used a 128-bit secret keytwo logistic maps with optimized pseudorandom sequencesplain text characteristics and one permutation diffusionsround Volos et al [22] presented a chaotic random bitgenerator and implemented it in an Arduino board Themicrocontroller runs side by side two logistic maps workingin different chaotic regimes due to the different initial con-ditions and system parameters Statistical tests were carriedout to prove security against intruders Pande and Zambreno[23] presented another experimental realization of a chaoticencryption scheme this time using a Xilin Virtex 6 FPGA

They implemented a modified logistic map that improvesthe performance of the logistic map in terms of Lyapunovexponent and uniformity of the bifurcation diagram Otherproposals can be found in Lawrance and Wolff [24] Chang[25] and Singh and Sinha [26]

In this paper we present a digital chaos communica-tion system in which the logistic map is used to encryptthe message and key of the transmission A simple Deltamodulator is used along with one of the chaotic maps toencrypt the message The Delta modulation technique is oneof the most simple and robust methods of analog-to-digital(ADC) schemes requiring serial digital communicationsof analog signals [27] In this work the transmitter andreceiver are implemented in low cost small but powerfulmicrocontroller boards Arduino Uno R3 [28] The Arduinotransmitter receives a message which is analog in nature andencrypts it using a logisticmap and theDeltamodulatorThenthe Arduino receiver decrypts the message and converts itto digital form which corresponds to the Delta-modulatedsignal In order to obtain the analog version of the messagesignal an analog circuitry performs the demodulation andretrieves the message

This paper is organized as follows Section 2 describes theproblem to be treated and a scheme of the proposed solutionSection 3 is a brief introduction to the logistic map and itsapplications to secure communications Section 4 presentsthe details of the implementation of the proposed techniqueFinally the conclusions are presented in Section 5

2 Problem Statement

The objective of this paper is to design and implement acommunication system to transmit a message 119898(119905) betweentwo points The goal is to use the logistic map to encrypt theinformation as a security means The proposed communica-tion system scheme is shown in Figure 1 and it consists of thefollowing blocks

(i) Arduino TransmitterThis is the core of the transmit-ter The Arduino board will take the message 119898(119905)through one of its analog input ports The Arduinowill sample the analog input message 119898(119905) andconvert it to the sampled signal 119898(119896) 119896 = 119899119879 119879 isthe sampling time 119899 = 0 1 2 This signal is thenencrypted by using a logistic map and a simple Deltamodulator Afterwards a key signal 119904(119896) is generatedin order to decrypt the message in the receiver Thiskey signal is further encrypted using a second logisticmap As a result the Arduino transmitter generatesthree outputs the first one is the encrypted message119898119890(119896) the second one is the encrypted key signal119904119890(119896) and the third one is an auxiliary key signal1199041(119896) that is used for decryption purposes

(ii) Channels Three wired channels are used to send theencrypted message and key signals

(iii) Arduino ReceiverThis is one of the twomain blocks inthe receiver side It takes the signals119898

119890(119896) 119904119890(119896) and

1199041(119896) to decrypt the Delta-modulated signal before

The Scientific World Journal 3

Arduino transmitter

Logmap 1 Decryption

Analog electronics

Deltademod

Arduino receiver

10-bitADC

Deltamodulator

Logmap 2 Encr 2

Encr 1m(k) mb(k)m(t)

x1(k)

me(k)

x2(k) s1(k)

se(k)

md(k) mr(t)s(k)

Figure 1 Block diagram of the communication system

it is converted into its analog form The output is adigital signal119898

119889(119896) which corresponds to the signal

119898119887(119896)

(iv) Delta Demodulator This is the second block in thereceiver It is a Delta demodulator consisting of anintegrator a filter and some amplifiers to retrievethe original message Its output is a signal 119898

119903(119905) that

approximates the original signal119898(119905)

The details of these blocks will be outlined in the follow-ing sections of this chapter

3 The Logistic Map

The logistic map has its origins in the works by the Belgianmathematician Pierre-Francois Verhulst in the first half ofthe 18th century [29 30] Verhulst published in 1845 and1847 two articles on how the population growth could bemathematically modeled He called this model the logisticcurve [31 32] and it is the continuous time version of whatnowadays is known as the logistic map

The logistic map the discrete-time version of Verhulstrsquoslogistic model is chaotic under certain conditions Its equa-tion is

119909119894+1= 119903119909119894(1 minus 119909

119894) 0 le 119909

119894le 1 (1)

where 119903 is a constant parameter Figure 2 is the bifurcationdiagram of the logistic map created by varying the parameter119903 from 25 to 40

As can be seen in the bifurcation diagram there aredifferent regions that depend on the value of 119903 It is ofparticular interest when 119903 = 3 because there it begins theperiod doubling that leads to the chaotic dynamics when119903 asymp 35699 until 119903 = 40 Figure 3 shows the Lyapunovexponent of the logistic map as 119903 is varied from 25 to 40 Itcan be seen that the Lyapunov exponent 120582 becomes positivefor values of approximately greater than 356which is a strongindicator of chaos [33]

In the next sections we will use a logistic map aspart of an encryptiondecryption scheme for transmittinginformation We will explain the details of the prototype ofthis communication system which is implemented on twoArduino Uno boards

4 Experimental Implementation

41 Description of the Communication System The com-munication system implemented in this work consists of

25 3 35 40

02

04

06

08

1

rxn

Figure 2 Logistic map bifurcation diagram

25 3 35 4

0

1

r

120582minus1

minus2

minus3

minus4

Figure 3 Logistic map Lyapunov exponent

a transmitter and a receiver whose cores are the ArduinoUnoR3 microcontroller boards [28] These are low cost simplebut powerful microcontrollers based on the ATmega328 chipThey have 14 digital inputoutput pins (6 of them can beused as PWM outputs) 6 analog inputs a 16MHz crystaloscillator a USB connection and a reset button They can beprogrammed using a language similar to C++ called Wiring

The flow diagram of the programs executed by eachArduino is shown in Figures 4 and 5 in order to facilitate thedescription of the communication system algorithms

The communication begins when a message119898(119905) gener-ated by a function generator and is sent to the analog inputA0 of the Arduino transmitter Arduino analog inputs onlyaccept unipolar signals in the range from 0V to 5V Anembedded 10-bit ADC converts the input signal from analogto digital at a maximum rate of 10000 samples per secondSince the output of theADC is a value between 0 and 1023 (theADC resolution) an internal operation to bring it back to therange from 0V to 5V is executed The result is the sampledmessage signal119898(119896)

4 The Scientific World Journal

mb(k) = true

aux = 5

Start TX

Initialize parametersh = 01 aux = 5 r = 39018

Initialize variables

x1 = 01 x2 = 05 xn = 0

Configure Arduino ports

D2 D4 D7 out

Read port A0

m(k) minus xn gt 0

xn(k + 1) = xn(k) + h lowast aux

x2(k) = r lowast x2(k) lowast (1 minus x2(k))

x1(k) = r lowast x1(k) lowast (1 minus x1(k))

x1(k) gt 05

me(k) = mb(k)

x2(k) lt 01

s1(k) = s(k)

s1(k) =s(k)

s(k) = true

se(k) = s1(k) and s2(k)

or s1(k) and s2(k)

s(k) = false

s2(k) = true

se(k) = false

mb(k) = falseD2 se(k)D4 me(k)

D7 s1(k)

Write to ports

1

1

2

2

No

No

No

Yes

Yes

Yes

aux = minus5

me(k) = mb(k)

m(k) m(t)

Figure 4 Flow diagram of the transmitter Arduino codes

The Scientific World Journal 5

Start RX

Configure Arduino portsD2 D4 D7 in

D3 out

Read portsD2 se(k)

D4 me(k)

D7 s1(k)

s2(k) = s1(k) and se(k)

or s1(k) and se(k)

s2(k) = trueNo

No

Yes

Yes

s(k) = s1(k)

s(k) = s1(k)

s(k) = trueWrite to ports

Write to portsD3 me(k)

1

1

D3 me(k)

Figure 5 Flow diagram of the receiver Arduino codes

The next step is the Delta modulation This kind ofmodulation can be viewed as an 1-bit ADC conversionscheme since it generates one output bit per input sampleThe scheme of the Delta modulation is shown in Figure 6 Itconsists of a comparator in the forward path and an integratorin the feedback path of a simple control loop The inputs ofthe comparator are the signal to be modulated119898(119896) and theoutput of the integrator 119909

119899(119896) As a result the modulated

output 119898119887(119896) is either true (high) or false (low) at any

given time as shown in Figure 7 In this figure we see aninput signal and the integral of the expression 119898(119896) minus 119909

119887(119896)

Clock

Delta modulatorTransmitter (Arduino)

Delta demodulatorReceiver (analog elect)

+

minus

int

intmb(k) mb(k) m(k)m(k)

xn(k)

Figure 6 Diagram of the simple Delta modulator

0 002 004 006 008 010246

Inpu

tIn signalRec signal

Time

(a)

0 002 004 006 008 01

012

Out

put

Time

minus1

(b)

Figure 7 Delta modulation example of a sine input signal (a)Input signal and reconstructed signal comparison (b) Modulatedoutput

For instance if 119898119887(119896) is ramping up and its output is less

than the input the integrator output will continue rampingup otherwise it will ramp down The signal 119898

119887(119896) is the

differential of the input and thus it can be reconstructed inthe receiver by integrating it In this work the integral signal119909119899(119896) is digitally generated by the Arduino program On

the other hand the reconstructing integrator of the receiveris implemented with analog electronics as will be explainedlater A full description of the Delta modulation techniquecan be found in Taylor [27]

After one bit from the Delta modulator is obtained thenext step is the message encryption In order to do so twologistic maps are called to generate two values 119909

1(119896) and

1199092(119896) The logistic maps have different initial conditions

that is 1199091(0) = 119909

2(0) Firstly the message is coded with

a value true or false that is assigned depending on thevalue 119909

1(119896) of the first chaotic map as can be seen in

Algorithm 1 (Part 1) where 119898119890(119896) is the encrypted message

and 119904(119896) is the key necessary to retrieve119898119890(119896)

In order to increase the security of the system the key119904(119896) is further encrypted following the same scheme It is

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 2: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

2 The Scientific World Journal

Furthermore in a new proposal Zapateiro De la Hoz et al[8] investigated a modified Chua chaotic oscillator in whichthe nonlinear term of the original oscillator was changed for asmooth and bounded function that allows for easier analysisand synchronization with other oscillators An applicationto secure communications using the modified oscillatorwas developed and its performance evaluated by numericalsimulations Hammami [9] proposed an image cryptosystemthat makes use of hyperchaotic systems Synchronizationwas achieved by assuming some structural assumptions ofthe master system and using some aggregation techniquesassociated with the arrow form matrix Fallahi and Leung[10] developed a chaotic communication system based ona chaos multiplication modulator that encrypts the signalThe chaotic signal is generated by using the Genesio-Tesichaotic system The authors also prove that the systemsecurity could not be broken with the existing methods atthat time Liu and Sun [11] propose a new design of chaoticcryptosystems in which they use high dimensional chaoticmaps along with some cryptography techniques to achievea high security level The high dimensionality of the mapleads to a high complexity and effective byte confusion anddiffusion of the output ciphertext at the time that the smallkey space problem is overcome Pareek et al [12] designedan image encryption scheme in which two logistic mapsare used along with an 80-bit key to encryptdecrypt theimages Eight different types of operation are used to encryptthe pixels of an image the type of operation is chosenaccording to the outcome of the logistic maps This securecommunication scheme was criptanalyzed in detail in Li etal [13] Lee et al [14] proposed a chaotic cipher stream a newscheme for generating pseudorandom numbers based on thecomposition of chaotic maps The method consists of usingone chaotic map to generate a sequence of pseudorandombytes and then apply some permutation on them usinganother chaotic map Shyamsunder and Kaliyaperumal [15]incorporate the concept of modular arithmetic and chaoticmaps for image encryption and decryption Zhang et al [16]propose a simple but secure chaotic cipher by improving thefamiliar permutation-diffusion structure

Numerous works can be found in the literature that usethe logistic map for improving security in communicationsThe logistic map is a nonlinear discrete map originally usedfor modeling population growth of different species as wellas economic and political phenomena [17ndash19] Howeverunder certain conditions it exhibits a chaotic behavior [20]This characteristic has been exploited in cryptography eversince For example Murillo-Escobar et al [21] presented asymmetric text cipher in which they used a 128-bit secret keytwo logistic maps with optimized pseudorandom sequencesplain text characteristics and one permutation diffusionsround Volos et al [22] presented a chaotic random bitgenerator and implemented it in an Arduino board Themicrocontroller runs side by side two logistic maps workingin different chaotic regimes due to the different initial con-ditions and system parameters Statistical tests were carriedout to prove security against intruders Pande and Zambreno[23] presented another experimental realization of a chaoticencryption scheme this time using a Xilin Virtex 6 FPGA

They implemented a modified logistic map that improvesthe performance of the logistic map in terms of Lyapunovexponent and uniformity of the bifurcation diagram Otherproposals can be found in Lawrance and Wolff [24] Chang[25] and Singh and Sinha [26]

In this paper we present a digital chaos communica-tion system in which the logistic map is used to encryptthe message and key of the transmission A simple Deltamodulator is used along with one of the chaotic maps toencrypt the message The Delta modulation technique is oneof the most simple and robust methods of analog-to-digital(ADC) schemes requiring serial digital communicationsof analog signals [27] In this work the transmitter andreceiver are implemented in low cost small but powerfulmicrocontroller boards Arduino Uno R3 [28] The Arduinotransmitter receives a message which is analog in nature andencrypts it using a logisticmap and theDeltamodulatorThenthe Arduino receiver decrypts the message and converts itto digital form which corresponds to the Delta-modulatedsignal In order to obtain the analog version of the messagesignal an analog circuitry performs the demodulation andretrieves the message

This paper is organized as follows Section 2 describes theproblem to be treated and a scheme of the proposed solutionSection 3 is a brief introduction to the logistic map and itsapplications to secure communications Section 4 presentsthe details of the implementation of the proposed techniqueFinally the conclusions are presented in Section 5

2 Problem Statement

The objective of this paper is to design and implement acommunication system to transmit a message 119898(119905) betweentwo points The goal is to use the logistic map to encrypt theinformation as a security means The proposed communica-tion system scheme is shown in Figure 1 and it consists of thefollowing blocks

(i) Arduino TransmitterThis is the core of the transmit-ter The Arduino board will take the message 119898(119905)through one of its analog input ports The Arduinowill sample the analog input message 119898(119905) andconvert it to the sampled signal 119898(119896) 119896 = 119899119879 119879 isthe sampling time 119899 = 0 1 2 This signal is thenencrypted by using a logistic map and a simple Deltamodulator Afterwards a key signal 119904(119896) is generatedin order to decrypt the message in the receiver Thiskey signal is further encrypted using a second logisticmap As a result the Arduino transmitter generatesthree outputs the first one is the encrypted message119898119890(119896) the second one is the encrypted key signal119904119890(119896) and the third one is an auxiliary key signal1199041(119896) that is used for decryption purposes

(ii) Channels Three wired channels are used to send theencrypted message and key signals

(iii) Arduino ReceiverThis is one of the twomain blocks inthe receiver side It takes the signals119898

119890(119896) 119904119890(119896) and

1199041(119896) to decrypt the Delta-modulated signal before

The Scientific World Journal 3

Arduino transmitter

Logmap 1 Decryption

Analog electronics

Deltademod

Arduino receiver

10-bitADC

Deltamodulator

Logmap 2 Encr 2

Encr 1m(k) mb(k)m(t)

x1(k)

me(k)

x2(k) s1(k)

se(k)

md(k) mr(t)s(k)

Figure 1 Block diagram of the communication system

it is converted into its analog form The output is adigital signal119898

119889(119896) which corresponds to the signal

119898119887(119896)

(iv) Delta Demodulator This is the second block in thereceiver It is a Delta demodulator consisting of anintegrator a filter and some amplifiers to retrievethe original message Its output is a signal 119898

119903(119905) that

approximates the original signal119898(119905)

The details of these blocks will be outlined in the follow-ing sections of this chapter

3 The Logistic Map

The logistic map has its origins in the works by the Belgianmathematician Pierre-Francois Verhulst in the first half ofthe 18th century [29 30] Verhulst published in 1845 and1847 two articles on how the population growth could bemathematically modeled He called this model the logisticcurve [31 32] and it is the continuous time version of whatnowadays is known as the logistic map

The logistic map the discrete-time version of Verhulstrsquoslogistic model is chaotic under certain conditions Its equa-tion is

119909119894+1= 119903119909119894(1 minus 119909

119894) 0 le 119909

119894le 1 (1)

where 119903 is a constant parameter Figure 2 is the bifurcationdiagram of the logistic map created by varying the parameter119903 from 25 to 40

As can be seen in the bifurcation diagram there aredifferent regions that depend on the value of 119903 It is ofparticular interest when 119903 = 3 because there it begins theperiod doubling that leads to the chaotic dynamics when119903 asymp 35699 until 119903 = 40 Figure 3 shows the Lyapunovexponent of the logistic map as 119903 is varied from 25 to 40 Itcan be seen that the Lyapunov exponent 120582 becomes positivefor values of approximately greater than 356which is a strongindicator of chaos [33]

In the next sections we will use a logistic map aspart of an encryptiondecryption scheme for transmittinginformation We will explain the details of the prototype ofthis communication system which is implemented on twoArduino Uno boards

4 Experimental Implementation

41 Description of the Communication System The com-munication system implemented in this work consists of

25 3 35 40

02

04

06

08

1

rxn

Figure 2 Logistic map bifurcation diagram

25 3 35 4

0

1

r

120582minus1

minus2

minus3

minus4

Figure 3 Logistic map Lyapunov exponent

a transmitter and a receiver whose cores are the ArduinoUnoR3 microcontroller boards [28] These are low cost simplebut powerful microcontrollers based on the ATmega328 chipThey have 14 digital inputoutput pins (6 of them can beused as PWM outputs) 6 analog inputs a 16MHz crystaloscillator a USB connection and a reset button They can beprogrammed using a language similar to C++ called Wiring

The flow diagram of the programs executed by eachArduino is shown in Figures 4 and 5 in order to facilitate thedescription of the communication system algorithms

The communication begins when a message119898(119905) gener-ated by a function generator and is sent to the analog inputA0 of the Arduino transmitter Arduino analog inputs onlyaccept unipolar signals in the range from 0V to 5V Anembedded 10-bit ADC converts the input signal from analogto digital at a maximum rate of 10000 samples per secondSince the output of theADC is a value between 0 and 1023 (theADC resolution) an internal operation to bring it back to therange from 0V to 5V is executed The result is the sampledmessage signal119898(119896)

4 The Scientific World Journal

mb(k) = true

aux = 5

Start TX

Initialize parametersh = 01 aux = 5 r = 39018

Initialize variables

x1 = 01 x2 = 05 xn = 0

Configure Arduino ports

D2 D4 D7 out

Read port A0

m(k) minus xn gt 0

xn(k + 1) = xn(k) + h lowast aux

x2(k) = r lowast x2(k) lowast (1 minus x2(k))

x1(k) = r lowast x1(k) lowast (1 minus x1(k))

x1(k) gt 05

me(k) = mb(k)

x2(k) lt 01

s1(k) = s(k)

s1(k) =s(k)

s(k) = true

se(k) = s1(k) and s2(k)

or s1(k) and s2(k)

s(k) = false

s2(k) = true

se(k) = false

mb(k) = falseD2 se(k)D4 me(k)

D7 s1(k)

Write to ports

1

1

2

2

No

No

No

Yes

Yes

Yes

aux = minus5

me(k) = mb(k)

m(k) m(t)

Figure 4 Flow diagram of the transmitter Arduino codes

The Scientific World Journal 5

Start RX

Configure Arduino portsD2 D4 D7 in

D3 out

Read portsD2 se(k)

D4 me(k)

D7 s1(k)

s2(k) = s1(k) and se(k)

or s1(k) and se(k)

s2(k) = trueNo

No

Yes

Yes

s(k) = s1(k)

s(k) = s1(k)

s(k) = trueWrite to ports

Write to portsD3 me(k)

1

1

D3 me(k)

Figure 5 Flow diagram of the receiver Arduino codes

The next step is the Delta modulation This kind ofmodulation can be viewed as an 1-bit ADC conversionscheme since it generates one output bit per input sampleThe scheme of the Delta modulation is shown in Figure 6 Itconsists of a comparator in the forward path and an integratorin the feedback path of a simple control loop The inputs ofthe comparator are the signal to be modulated119898(119896) and theoutput of the integrator 119909

119899(119896) As a result the modulated

output 119898119887(119896) is either true (high) or false (low) at any

given time as shown in Figure 7 In this figure we see aninput signal and the integral of the expression 119898(119896) minus 119909

119887(119896)

Clock

Delta modulatorTransmitter (Arduino)

Delta demodulatorReceiver (analog elect)

+

minus

int

intmb(k) mb(k) m(k)m(k)

xn(k)

Figure 6 Diagram of the simple Delta modulator

0 002 004 006 008 010246

Inpu

tIn signalRec signal

Time

(a)

0 002 004 006 008 01

012

Out

put

Time

minus1

(b)

Figure 7 Delta modulation example of a sine input signal (a)Input signal and reconstructed signal comparison (b) Modulatedoutput

For instance if 119898119887(119896) is ramping up and its output is less

than the input the integrator output will continue rampingup otherwise it will ramp down The signal 119898

119887(119896) is the

differential of the input and thus it can be reconstructed inthe receiver by integrating it In this work the integral signal119909119899(119896) is digitally generated by the Arduino program On

the other hand the reconstructing integrator of the receiveris implemented with analog electronics as will be explainedlater A full description of the Delta modulation techniquecan be found in Taylor [27]

After one bit from the Delta modulator is obtained thenext step is the message encryption In order to do so twologistic maps are called to generate two values 119909

1(119896) and

1199092(119896) The logistic maps have different initial conditions

that is 1199091(0) = 119909

2(0) Firstly the message is coded with

a value true or false that is assigned depending on thevalue 119909

1(119896) of the first chaotic map as can be seen in

Algorithm 1 (Part 1) where 119898119890(119896) is the encrypted message

and 119904(119896) is the key necessary to retrieve119898119890(119896)

In order to increase the security of the system the key119904(119896) is further encrypted following the same scheme It is

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 3: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

The Scientific World Journal 3

Arduino transmitter

Logmap 1 Decryption

Analog electronics

Deltademod

Arduino receiver

10-bitADC

Deltamodulator

Logmap 2 Encr 2

Encr 1m(k) mb(k)m(t)

x1(k)

me(k)

x2(k) s1(k)

se(k)

md(k) mr(t)s(k)

Figure 1 Block diagram of the communication system

it is converted into its analog form The output is adigital signal119898

119889(119896) which corresponds to the signal

119898119887(119896)

(iv) Delta Demodulator This is the second block in thereceiver It is a Delta demodulator consisting of anintegrator a filter and some amplifiers to retrievethe original message Its output is a signal 119898

119903(119905) that

approximates the original signal119898(119905)

The details of these blocks will be outlined in the follow-ing sections of this chapter

3 The Logistic Map

The logistic map has its origins in the works by the Belgianmathematician Pierre-Francois Verhulst in the first half ofthe 18th century [29 30] Verhulst published in 1845 and1847 two articles on how the population growth could bemathematically modeled He called this model the logisticcurve [31 32] and it is the continuous time version of whatnowadays is known as the logistic map

The logistic map the discrete-time version of Verhulstrsquoslogistic model is chaotic under certain conditions Its equa-tion is

119909119894+1= 119903119909119894(1 minus 119909

119894) 0 le 119909

119894le 1 (1)

where 119903 is a constant parameter Figure 2 is the bifurcationdiagram of the logistic map created by varying the parameter119903 from 25 to 40

As can be seen in the bifurcation diagram there aredifferent regions that depend on the value of 119903 It is ofparticular interest when 119903 = 3 because there it begins theperiod doubling that leads to the chaotic dynamics when119903 asymp 35699 until 119903 = 40 Figure 3 shows the Lyapunovexponent of the logistic map as 119903 is varied from 25 to 40 Itcan be seen that the Lyapunov exponent 120582 becomes positivefor values of approximately greater than 356which is a strongindicator of chaos [33]

In the next sections we will use a logistic map aspart of an encryptiondecryption scheme for transmittinginformation We will explain the details of the prototype ofthis communication system which is implemented on twoArduino Uno boards

4 Experimental Implementation

41 Description of the Communication System The com-munication system implemented in this work consists of

25 3 35 40

02

04

06

08

1

rxn

Figure 2 Logistic map bifurcation diagram

25 3 35 4

0

1

r

120582minus1

minus2

minus3

minus4

Figure 3 Logistic map Lyapunov exponent

a transmitter and a receiver whose cores are the ArduinoUnoR3 microcontroller boards [28] These are low cost simplebut powerful microcontrollers based on the ATmega328 chipThey have 14 digital inputoutput pins (6 of them can beused as PWM outputs) 6 analog inputs a 16MHz crystaloscillator a USB connection and a reset button They can beprogrammed using a language similar to C++ called Wiring

The flow diagram of the programs executed by eachArduino is shown in Figures 4 and 5 in order to facilitate thedescription of the communication system algorithms

The communication begins when a message119898(119905) gener-ated by a function generator and is sent to the analog inputA0 of the Arduino transmitter Arduino analog inputs onlyaccept unipolar signals in the range from 0V to 5V Anembedded 10-bit ADC converts the input signal from analogto digital at a maximum rate of 10000 samples per secondSince the output of theADC is a value between 0 and 1023 (theADC resolution) an internal operation to bring it back to therange from 0V to 5V is executed The result is the sampledmessage signal119898(119896)

4 The Scientific World Journal

mb(k) = true

aux = 5

Start TX

Initialize parametersh = 01 aux = 5 r = 39018

Initialize variables

x1 = 01 x2 = 05 xn = 0

Configure Arduino ports

D2 D4 D7 out

Read port A0

m(k) minus xn gt 0

xn(k + 1) = xn(k) + h lowast aux

x2(k) = r lowast x2(k) lowast (1 minus x2(k))

x1(k) = r lowast x1(k) lowast (1 minus x1(k))

x1(k) gt 05

me(k) = mb(k)

x2(k) lt 01

s1(k) = s(k)

s1(k) =s(k)

s(k) = true

se(k) = s1(k) and s2(k)

or s1(k) and s2(k)

s(k) = false

s2(k) = true

se(k) = false

mb(k) = falseD2 se(k)D4 me(k)

D7 s1(k)

Write to ports

1

1

2

2

No

No

No

Yes

Yes

Yes

aux = minus5

me(k) = mb(k)

m(k) m(t)

Figure 4 Flow diagram of the transmitter Arduino codes

The Scientific World Journal 5

Start RX

Configure Arduino portsD2 D4 D7 in

D3 out

Read portsD2 se(k)

D4 me(k)

D7 s1(k)

s2(k) = s1(k) and se(k)

or s1(k) and se(k)

s2(k) = trueNo

No

Yes

Yes

s(k) = s1(k)

s(k) = s1(k)

s(k) = trueWrite to ports

Write to portsD3 me(k)

1

1

D3 me(k)

Figure 5 Flow diagram of the receiver Arduino codes

The next step is the Delta modulation This kind ofmodulation can be viewed as an 1-bit ADC conversionscheme since it generates one output bit per input sampleThe scheme of the Delta modulation is shown in Figure 6 Itconsists of a comparator in the forward path and an integratorin the feedback path of a simple control loop The inputs ofthe comparator are the signal to be modulated119898(119896) and theoutput of the integrator 119909

119899(119896) As a result the modulated

output 119898119887(119896) is either true (high) or false (low) at any

given time as shown in Figure 7 In this figure we see aninput signal and the integral of the expression 119898(119896) minus 119909

119887(119896)

Clock

Delta modulatorTransmitter (Arduino)

Delta demodulatorReceiver (analog elect)

+

minus

int

intmb(k) mb(k) m(k)m(k)

xn(k)

Figure 6 Diagram of the simple Delta modulator

0 002 004 006 008 010246

Inpu

tIn signalRec signal

Time

(a)

0 002 004 006 008 01

012

Out

put

Time

minus1

(b)

Figure 7 Delta modulation example of a sine input signal (a)Input signal and reconstructed signal comparison (b) Modulatedoutput

For instance if 119898119887(119896) is ramping up and its output is less

than the input the integrator output will continue rampingup otherwise it will ramp down The signal 119898

119887(119896) is the

differential of the input and thus it can be reconstructed inthe receiver by integrating it In this work the integral signal119909119899(119896) is digitally generated by the Arduino program On

the other hand the reconstructing integrator of the receiveris implemented with analog electronics as will be explainedlater A full description of the Delta modulation techniquecan be found in Taylor [27]

After one bit from the Delta modulator is obtained thenext step is the message encryption In order to do so twologistic maps are called to generate two values 119909

1(119896) and

1199092(119896) The logistic maps have different initial conditions

that is 1199091(0) = 119909

2(0) Firstly the message is coded with

a value true or false that is assigned depending on thevalue 119909

1(119896) of the first chaotic map as can be seen in

Algorithm 1 (Part 1) where 119898119890(119896) is the encrypted message

and 119904(119896) is the key necessary to retrieve119898119890(119896)

In order to increase the security of the system the key119904(119896) is further encrypted following the same scheme It is

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 4: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

4 The Scientific World Journal

mb(k) = true

aux = 5

Start TX

Initialize parametersh = 01 aux = 5 r = 39018

Initialize variables

x1 = 01 x2 = 05 xn = 0

Configure Arduino ports

D2 D4 D7 out

Read port A0

m(k) minus xn gt 0

xn(k + 1) = xn(k) + h lowast aux

x2(k) = r lowast x2(k) lowast (1 minus x2(k))

x1(k) = r lowast x1(k) lowast (1 minus x1(k))

x1(k) gt 05

me(k) = mb(k)

x2(k) lt 01

s1(k) = s(k)

s1(k) =s(k)

s(k) = true

se(k) = s1(k) and s2(k)

or s1(k) and s2(k)

s(k) = false

s2(k) = true

se(k) = false

mb(k) = falseD2 se(k)D4 me(k)

D7 s1(k)

Write to ports

1

1

2

2

No

No

No

Yes

Yes

Yes

aux = minus5

me(k) = mb(k)

m(k) m(t)

Figure 4 Flow diagram of the transmitter Arduino codes

The Scientific World Journal 5

Start RX

Configure Arduino portsD2 D4 D7 in

D3 out

Read portsD2 se(k)

D4 me(k)

D7 s1(k)

s2(k) = s1(k) and se(k)

or s1(k) and se(k)

s2(k) = trueNo

No

Yes

Yes

s(k) = s1(k)

s(k) = s1(k)

s(k) = trueWrite to ports

Write to portsD3 me(k)

1

1

D3 me(k)

Figure 5 Flow diagram of the receiver Arduino codes

The next step is the Delta modulation This kind ofmodulation can be viewed as an 1-bit ADC conversionscheme since it generates one output bit per input sampleThe scheme of the Delta modulation is shown in Figure 6 Itconsists of a comparator in the forward path and an integratorin the feedback path of a simple control loop The inputs ofthe comparator are the signal to be modulated119898(119896) and theoutput of the integrator 119909

119899(119896) As a result the modulated

output 119898119887(119896) is either true (high) or false (low) at any

given time as shown in Figure 7 In this figure we see aninput signal and the integral of the expression 119898(119896) minus 119909

119887(119896)

Clock

Delta modulatorTransmitter (Arduino)

Delta demodulatorReceiver (analog elect)

+

minus

int

intmb(k) mb(k) m(k)m(k)

xn(k)

Figure 6 Diagram of the simple Delta modulator

0 002 004 006 008 010246

Inpu

tIn signalRec signal

Time

(a)

0 002 004 006 008 01

012

Out

put

Time

minus1

(b)

Figure 7 Delta modulation example of a sine input signal (a)Input signal and reconstructed signal comparison (b) Modulatedoutput

For instance if 119898119887(119896) is ramping up and its output is less

than the input the integrator output will continue rampingup otherwise it will ramp down The signal 119898

119887(119896) is the

differential of the input and thus it can be reconstructed inthe receiver by integrating it In this work the integral signal119909119899(119896) is digitally generated by the Arduino program On

the other hand the reconstructing integrator of the receiveris implemented with analog electronics as will be explainedlater A full description of the Delta modulation techniquecan be found in Taylor [27]

After one bit from the Delta modulator is obtained thenext step is the message encryption In order to do so twologistic maps are called to generate two values 119909

1(119896) and

1199092(119896) The logistic maps have different initial conditions

that is 1199091(0) = 119909

2(0) Firstly the message is coded with

a value true or false that is assigned depending on thevalue 119909

1(119896) of the first chaotic map as can be seen in

Algorithm 1 (Part 1) where 119898119890(119896) is the encrypted message

and 119904(119896) is the key necessary to retrieve119898119890(119896)

In order to increase the security of the system the key119904(119896) is further encrypted following the same scheme It is

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 5: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

The Scientific World Journal 5

Start RX

Configure Arduino portsD2 D4 D7 in

D3 out

Read portsD2 se(k)

D4 me(k)

D7 s1(k)

s2(k) = s1(k) and se(k)

or s1(k) and se(k)

s2(k) = trueNo

No

Yes

Yes

s(k) = s1(k)

s(k) = s1(k)

s(k) = trueWrite to ports

Write to portsD3 me(k)

1

1

D3 me(k)

Figure 5 Flow diagram of the receiver Arduino codes

The next step is the Delta modulation This kind ofmodulation can be viewed as an 1-bit ADC conversionscheme since it generates one output bit per input sampleThe scheme of the Delta modulation is shown in Figure 6 Itconsists of a comparator in the forward path and an integratorin the feedback path of a simple control loop The inputs ofthe comparator are the signal to be modulated119898(119896) and theoutput of the integrator 119909

119899(119896) As a result the modulated

output 119898119887(119896) is either true (high) or false (low) at any

given time as shown in Figure 7 In this figure we see aninput signal and the integral of the expression 119898(119896) minus 119909

119887(119896)

Clock

Delta modulatorTransmitter (Arduino)

Delta demodulatorReceiver (analog elect)

+

minus

int

intmb(k) mb(k) m(k)m(k)

xn(k)

Figure 6 Diagram of the simple Delta modulator

0 002 004 006 008 010246

Inpu

tIn signalRec signal

Time

(a)

0 002 004 006 008 01

012

Out

put

Time

minus1

(b)

Figure 7 Delta modulation example of a sine input signal (a)Input signal and reconstructed signal comparison (b) Modulatedoutput

For instance if 119898119887(119896) is ramping up and its output is less

than the input the integrator output will continue rampingup otherwise it will ramp down The signal 119898

119887(119896) is the

differential of the input and thus it can be reconstructed inthe receiver by integrating it In this work the integral signal119909119899(119896) is digitally generated by the Arduino program On

the other hand the reconstructing integrator of the receiveris implemented with analog electronics as will be explainedlater A full description of the Delta modulation techniquecan be found in Taylor [27]

After one bit from the Delta modulator is obtained thenext step is the message encryption In order to do so twologistic maps are called to generate two values 119909

1(119896) and

1199092(119896) The logistic maps have different initial conditions

that is 1199091(0) = 119909

2(0) Firstly the message is coded with

a value true or false that is assigned depending on thevalue 119909

1(119896) of the first chaotic map as can be seen in

Algorithm 1 (Part 1) where 119898119890(119896) is the encrypted message

and 119904(119896) is the key necessary to retrieve119898119890(119896)

In order to increase the security of the system the key119904(119896) is further encrypted following the same scheme It is

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 6: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

6 The Scientific World Journal

Part 1(1) if 119909

1(119896) gt 05 then

(2) 119898119890(119896) =119898

119887(119896)

(3) 119904(119896) = true(4) else(5) 119898

119890(119896) = 119898

119887(119896) ⊳Symbol means boolean negation

(6) 119904(119896) = false(7) end ifPart 2(8) if 119909

2(119896) lt 01 then

(9) 1199041(119896) = 119904(119896) ⊳Symbol means boolean negation

(10) 1199042(119896) = true

(11) else(12) 119904

1(119896) = 119904(119896)

(13) 1199042(119896) = false

(14) end ifPart 3(15) 119904119890(119896) = (119904

1(119896) AND 119904

2(119896)) OR (119904

1(119896) AND 119904

2(119896))

Algorithm 1

done by assigning it a value true or false that depends onthe second chaotic map value 119909

2(119896) as shown in Algorithm 1

(Part 2) where 1199041(119896) and 119904

2(119896) are auxiliary signals that are

used for encrypting and decrypting the key signal 119904(119896)The key is then finally encrypted by applying the

XOR function to the variables 1199041(119896) and 119904

2(119896) to yield

Algorithm 1 (part 3)The signals 119904

119890(119896)119898

119890(119896) and 119904

1(119896) are sent to the receiver

through digital outputs D2 D4 and D7 respectivelyIn the receiver the signals 119904

119890(119896) 119898

119890(119896) and 119904

1(119896) go

directly to the Arduino inputs D2 D4 and D7 respectivelyTheflowdiagramof the receiver program is shown in Figure 5as well The first step in decrypting the message is thedecryption of the key signal 119904

119890(119896) This is done by applying

the boolean formula that reverts the encryptionThe formulato calculate 119904

2(119896) given 119904

119890(119896) and 119904

1(119896) is obtained as follows

Recall that in the transmitter 119904119890(119896) is obtained by using the

XOR function

119904119890(119896) = 119904

1015840

1(119896) sdot 1199042(119896) + 119904

1(119896) sdot 119904

1015840

2(119896) (2)

where (sdot)1015840 is the complement operation of the correspondinglogic variable The truth table of the function in (2) is shownin Table 1 Thus given 119904

1(119896) and 119904

119890(119896) for obtaining the signal

1199042(119896) would result in the truth Table 2The Karnaugh maps technique [34] was used to find

the desired simplified expression for 1199042(119896) It is a pictorial

method in which the truth table of the boolean functionto be simplified is represented in a bidimensional formThe boolean variables are arranged according to the Graycode The terms of the simplified expression are found bygrouping 1s or 0s in an optimal way and therefore eliminatingunnecessary variables As a result the following booleanexpression for 119904

2(119896) is obtained

1199042(119896) = 119904

1015840

1(119896) sdot 119904119890(119896) + 119904

1(119896) sdot 119904

1015840

119890(119896) (3)

Table 1 Truth table for 119904119890(119896)

1199041(119896) 119904

2(119896) 119904

119890(119896)

0 0 00 1 11 0 11 1 0

Table 2 Truth table for 1199042(119896)

1199041(119896) 119904

119890(119896) 119904

2(119896)

0 0 00 1 11 0 01 1 1

Once 1199042(119896) is retrieved the signal 119904(119896) is obtained with

Algorithm 2 (part 1)The signal 119898

119890(119896) is finally decrypted by analyzing the

value of 119904(119896) (see Algorithm 2 (part 2)) where 119898119889(119896) is the

decrypted signal The output 119898119889(119896) is sent to the output pin

D3 and it goes directly to theDelta demodulator realizedwithanalog electronics using operational amplifiers

As shown in Figure 6 the Delta demodulation consists ofan integrator The signal is passed through different stages asshown in the circuit diagram of Figure 8The circuit has threemain blocksThe first one composed of the amplifiers U1 andU2 is a unipolar to bipolar converter Recall that the Arduinoinputsmust be unipolar so in the case that the original signalsare bipolar they must be recovered to its original form at theoutput of the Arduino Thus the signal 119898(119896) isin [0 5]V isconverted to a signal 119898(119905) isin [minus25 25]V The second blockis composed of amplifiers U3 and U4 They are designed tocompute the integral of the input signal It consists of anintegrator that performs the Delta demodulation (U4) and

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 7: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

The Scientific World Journal 7

1k

1k1k

m(t) me(k)

me(k)

s(k)

s(k)

mb(k)

mr(t)

+

+

+

+ +

+ +

+

+

+

+

minus

minus

minus

minus

minus minus

minus

TL082TL082

TL082

TL082 TL082

TL082 TL082

minus5V

minus5V minus5V

minus5V

minus5V minus5V

minus5V

minus5V

47120583F

47120583F

1k

1k

Vy

Vy

Vx

Vx

U6 U7

5V5V

5V 5V 5V

5V5V

U3

U2U1

U4 U5

01 120583F

10k 10k

10k

10k 10k

10k

10k

Arduino RX

Arduino TX

and+

and+

andminus

and+

andminus

andminus

and+

andminus

and+

andminus

and+

andminus

and+

andminus

22 k

33 120583F

Figure 8 Circuit diagram of the analog electronics in the receiver

an inverter amplifier (U3) to adjust the quality of its outputThese signals are finally sent through a low-pass filter anamplifier and an inverter (amplifiers U5ndashU7) to get the final119898119903(119905) which should be approximately equal to119898(119905)

42 Experimental Results For the experiments the logisticmaps were implemented with 119903 = 39018 and initial con-ditions 119909

1(0) = 01 and 119909

2(0) = 05 As an example the

sequence of numbers generated by the logistic map when119909(0) = 05 is shown in Figure 9 Each loop of the transmitteralgorithm is executed by the Arduino microcontroller in210 120583s approximately while each receiver loop is executedin 25 120583s approximately This means that the message signalbandwidth should be at most 500Hz approximately in orderto be well retrieved in the receiver

Figures 10 to 13 are screenshots of the oscilloscopecorresponding to the first experiment In this case a 125Hzsinewave 5 V peak-to-peak amplitude was used as amessagesignal In Figure 10 we see a comparison of the sent message119898(119905) (in blue) and the retrieved message 119898

119903(119905) (in yellow)

Figure 11 compares the sent message 119898(119905) (in blue) andthe encrypted message signal 119898

119890(119896) (in yellow) Figure 12

is a comparison on the sent message 119898(119905) (in blue) andthe encrypted key signal 119904

119890(119896) (in yellow) Finally Figure 13

compares the sent message (in blue) and the auxiliary signal1199041(119896) (in yellow)In subsequent experiments different frequencies and

waveforms were tested Figure 14 shows a 125Hz triangularwave message (in blue) and its retrieved version (in yellow)Figure 15 compares a 70Hz sine wave message (in blue) and

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 8: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

8 The Scientific World Journal

Part 1(1) 1199042(119896) = (119904

1(119896) AND 119904

119890(119896)) OR (119904

1(119896) AND 119904

119890(119896))

(2) if 1199042(119896) = true then

(3) 119904(119896) = 1199041(119896)

(4) else(5) 119904(119896) = 119904

1(119896)

(6) end ifPart 2(7) if 119904(119896) = true then(8) write to port D3119898

119889(119896) = 119898

119890(119896)

(9) else(10) write to port D3119898

119889(119896) = 119898

119890(119896)

(11) end if

Algorithm 2

0 50 100 1500

02

04

06

08

1

x[i]

i

Figure 9 Numbers generated by the logistic map with 119903 = 39018and 119909(0) = 05

Figure 10 125Hz sine wave message Blue sent message Yellowretrieved message

its retrieved version (in yellow) Finally Figure 16 shows arandom wave message (in blue) and its retrieved version (inyellow)This signal was generated bymaking sounds throughan electret microphone

5 Conclusion

In this paper we presented a communication system basedon chaotic logistic maps and an experimental realization ofit The proposed communication system uses a simple Deltamodulator to modulate the message signal and a logistic

Figure 11 125Hz sine wave message Blue sent message Yellowencrypted message signal

Figure 12 125Hz sine wave message Blue sent message Yellowencrypted key

Figure 13 125Hz sine wave message Blue sent message Yellowauxiliary signal 119904

1(119896)

map for encryption A key signal is also generated andencrypted in order to retrieve the message in the receiverside without the need for synchronization The whole systemwas implemented with Arduino Uno microcontroller boardsthat run the encryption and decryption algorithms in thetransmitter and receiver respectively The experiment resultsshowed the feasibility of using the Arduino microprocessorsfor the task proposed With the proposed scheme it ispossible to transmit signals whose bandwidth is 500Hzapproximately

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 9: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

The Scientific World Journal 9

Figure 14 125Hz triangular wave message Blue sent messageYellow retrieved message

Figure 15 70Hz sine wave message Blue sent message Yellowretrieved message

Figure 16 Random wave message Blue sent message Yellowretrieved message

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

First author is supported by the fellowship fromCAPESPrograma Nacional de Pos-Doutorado from BrazilThis work was funded by the European Union (EuropeanRegional Development Fund) and the Spanish Ministryof Economy and Competitiveness through the research

projects DPI2012-32375FEDER DPI2011-28033-C03-01 andDPI2014-58427-C2-1-R and by the Government of Catalonia(Spain) through 2014SGR859

References

[1] L Larger and J-P Goedgebuer ldquoEncryption using chaoticdynamics for optical telecommunicationsrdquo Comptes RendusPhysique vol 5 no 6 pp 609ndash611 2004

[2] C K Volos ldquoChaotic random bit generator realized with amocrocontrollerrdquo Journal of Computations amp Modelling vol 3no 4 pp 115ndash136 2013

[3] C-K Chen and C-L Lin ldquoText encryption using ECG signalswith chaotic Logistic maprdquo in Proceedings of the 5th IEEEConference on Industrial Electronics and Applications (ICIEArsquo10) pp 1741ndash1746 Taichung Taiwan June 2010

[4] L Kocarev and G Jakimoski ldquoLogistic map as a block encryp-tion algorithmrdquo Physics Letters A vol 289 no 4-5 pp 199ndash2062001

[5] L M Pecora and T L Carroll ldquoSynchronization in chaoticsystemsrdquo Physical Review Letters vol 64 no 8 pp 821ndash8241990

[6] G Alvarez and S Li ldquoSome basic cryptographic requirementsfor chaos-based cryptosystemsrdquo International Journal of Bifur-cation and Chaos vol 16 no 8 pp 2129ndash2151 2006

[7] M Zapateiro Y Vidal and L Acho ldquoA secure communicationscheme based on chaotic Duffing oscillators and frequencyestimation for the transmission of binary-coded messagesrdquoCommunications in Nonlinear Science and Numerical Simula-tion vol 19 no 4 pp 991ndash1003 2014

[8] M Zapateiro De la Hoz L Acho and Y Vidal ldquoA modifiedChua chaotic oscillator and its application to secure commu-nicationsrdquo Applied Mathematics and Computation vol 247 pp712ndash722 2014

[9] S Hammami ldquoState feedback-based secure image cryptosystemusing hyperchaotic synchronizationrdquo ISA Transactions vol 54pp 52ndash59 2015

[10] K Fallahi and H Leung ldquoA chaos secure communicationscheme based on multiplication modulationrdquo CommunicationsinNonlinear Science andNumerical Simulation vol 15 no 2 pp368ndash383 2010

[11] S T Liu and F Y Sun ldquoSpatial chaos-based image encryptiondesignrdquo Science in China Series G Physics Mechanics andAstronomy vol 52 no 2 pp 177ndash183 2009

[12] N K Pareek V Patidar and K K Sud ldquoImage encryption usingchaotic logistic maprdquo Image and Vision Computing vol 24 no9 pp 926ndash934 2006

[13] C Li S Li M Asim J Nunez G Alvarez and G Chen ldquoOnthe security defects of an image encryption schemerdquo Image andVision Computing vol 27 no 9 pp 1371ndash1381 2009

[14] P-H Lee S-C Pei and Y-Y Chen ldquoGenerating chaotic streamciphers using chaotic systemsrdquo Chinese Journal of Physics vol41 no 6 pp 559ndash581 2003

[15] S Shyamsunder and G Kaliyaperumal ldquoImage encryption anddecryption using chaotic maps and modular arithmeticrdquo TheAmerican Journal of Signal Processing vol 1 no 1 pp 24ndash332011

[16] L Y Zhang X Hu Y Liu K-W Wong and J Gan ldquoA chaoticimage encryption scheme owning temp-value feedbackrdquo Com-munications inNonlinear Science andNumerical Simulation vol19 no 10 pp 3653ndash3659 2014

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953

Page 10: An Experimental Realization of a Chaos-Based …...Communication Using Arduino Microcontrollers MauricioZapateiroDelaHoz, 1 LeonardoAcho, 2 andYolandaVidal 2 1 UniversidadeTecnol´ogicaFederaldoParan

10 The Scientific World Journal

[17] C K Volos I M Kyprianidis and I N Stouboulos ldquoTheeffect of foreign direct investment in economic growth fromthe perspective of nonlinear dynamicsrdquo Journal of EngineeringScience and Technology Review vol 8 no 1 pp 1ndash7 2015

[18] J Miskiewicz and M Ausloos ldquoA logistic map approach toeconomic cycles (I) The best adapted companiesrdquo Physica AStatistical Mechanics and its Applications vol 336 no 1-2 pp206ndash214 2004

[19] D K Campbell and G Mayer-Krees ldquoChaos and politicsapplications of nonlinear dynamics to socio-political issuesrdquo inThe Impact of Chaos on Science and Society pp 18ndash63 UnitedNations University Press 1997

[20] RMMay ldquoSimplemathematicalmodels with very complicateddynamicsrdquo Nature vol 261 no 5560 pp 459ndash467 1976

[21] M A Murillo-Escobar F Abundiz-Perez C Cruz-Hernandezand RM Lopez-Gutierrez ldquoA novel symmetric text encryptionalgorithm based on logistic maprdquo in Proceedings of the Inter-national Conference on Communications Signal Processing andComputers (ICNC rsquo14) Honolulu Hawaii USA February 2014

[22] C K Volos N Doukas I M Kyprianidis I N Stouboulos andT G Kostis ldquoChaotic autonomous mobile robot for militarymissionsrdquo in Proceedings of the 17th International Conference onCommunications Rhodes Island Greece July 2013

[23] A Pande and J Zambreno ldquoA chaotic encryption schemefor real-time embedded systems design and implementationrdquoTelecommunication Systems vol 52 no 2 pp 551ndash561 2013

[24] A J Lawrance and R C Wolff ldquoBinary time series generatedby chaotic logistic mapsrdquo Stochastics and Dynamics vol 3 no4 pp 529ndash544 2003

[25] S-M Chang ldquoChaotic generator in digital secure communica-tionrdquo in Proceedings of theWorld Congress on Engineering (WCErsquo09) London UK July 2009

[26] N Singh and A Sinha ldquoChaos-based secure communicationsystemusing logisticmaprdquoOptics and Lasers in Engineering vol48 no 3 pp 398ndash404 2010

[27] D S Taylor ldquoDesign of continuously variable slope deltamodu-lation communication systemsrdquoMotorola Technical DocumentAN1544 1996

[28] Arduino httpstorearduinoccproductA000066[29] J Kint D Constales and A Vanderbauwhede ldquoPierre-Francois

Verhulstrsquos final triumphrdquo in The Logistic Map and the Route toChaos M Ausloos and M Dirickx Eds pp 13ndash28 SpringerHeidelberg Germany 2006

[30] H Pastijn ldquoThe logistic map and the route to chaosrdquo in ChaoticGrowth with the Logistic Model of P-F Verhulst M Ausloos andM Dirickx Eds p 3 Springer Heidelberg Germany 2006

[31] P F Verhulst ldquoRecherches mathematiques sur la loi drsquoaccroiss-ement de la populationrdquo Memoires de lrsquoAcademie Royale desSciences des Lettres et des Beaux-Arts de Belgique vol 18 pp1ndash38 1845

[32] P F Verhulst ldquoDeuxieme memoire sur la loi drsquoaccroissement dela populationrdquo Memoires de lrsquoAcademie Royale des Sciences desLettres et des Beaux-Arts de Belgique vol 20 pp 1ndash32 1847

[33] A Wolf J B Swift H L Swinney and J A Vastano ldquoDeter-mining Lyapunov exponents from a time seriesrdquo Physica DNonlinear Phenomena vol 16 no 3 pp 285ndash317 1985

[34] M Karnaugh ldquoThemapmethod for synthesis of combinationallogic circuitsrdquoTransactions of the American Institute of ElectricalEngineers Part I Communications and Electronics vol 72 pp593ndash599 1953