N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi...

21
NOVEL CASCADED CHAOTIC MASKING FOR SECURE COMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria University

Transcript of N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi...

Page 1: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

NOVEL CASCADED CHAOTIC MASKING FOR SECURECOMMUNICATIONSRupak Kharel, Krishna Busawon & Zabi Ghassemloy

Northumbria Communication Research Lab

Northumbria University

Page 2: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

OUTLINE

Chaos – Introduction Application to communication Different techniques for chaotic

communication Problem statement Cascaded chaotic masking technique Results Final Comments

2

Page 3: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOS – INTRODUCTION Deterministic system

means that the system has no random or noisy inputs or parameters. The irregular behaviour arises from the system’s nonlinearity rather than from the noisy driving forces.

Aperiodic long term behaviour means that there should be trajectories which

do not settle down to fixed points, periodic orbits or quasiperiodic orbits as t →∞.

Sensitive dependence on initial conditions means that nearby trajectories separate

exponentially fast, which means the system has positive Liapunov exponent.

3

Page 4: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOS – EXAMPLE; LORENZ EQUATIONS

4

Are dynamical system exhibiting chaotic property

Three dimensional system given as:

States are evolving in a complex non repetitive pattern over time.

Page 5: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOS – APPLICATIONS IN COMMUNICATION

Chaotic signal has a broadband spectrum, hence the presence of information does not necessarily change the properties of transmitted signal.

Power output remains constant regardless of the information content.

It is resistant against multi-path fading and offers cheaper solution to traditional spread spectrum systems.

Chaotic signal are aperiodic therefore limited predictability.

Hence, chaotic signal can be used for providing security at physical level.

5

Page 6: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOTIC SYNCHRONIZATION (HOW???) Chaotic systems are very sensitive:

Slightly different initial conditions and initial parameters lead to totally different trajectories.

slight errors between transmitter and receiver can be expected to grow exponentially.

Q1: How can one achieve synchronization?Q2: Can this sensitive chaotic system be used

in communication? Pecora & Carroll1 showed that it is possible to

synchronize two chaotic system if they are coupled with common signals.

Cuomo & Oppenheim2 practically utilized chaotic synchronization for transmitting message signal.

1) L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Phys. Rev. Lett., 64,

pp. 821-824, 1990 2) K. M. Cuomo and A. V. Oppenheim, “Circuit implementation of synchronized chaos with

applications to communications,” Phy. Rev. Lett., 71, pp. 65-68, 1993.

6

Page 7: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOTIC COMMUNICATION –TECHNIQUES

Chaotic Masking Technique

Chaotic Parameter Modulation Technique

Message Inclusion Technique

Chaotic Shift Keying (CSK)

Almost all other methods falls into one or more of these categories.

7

Page 8: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOTIC MASKING TECHNIQUE

8

Message signal (m) is buried in the broad chaos spectrum by adding m to a chaotic mask y.

At receiver, the chaotic mask that is estimated from chaotic synchronization, is removed from received signal to obtain m.

Page 9: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

PARAMETER MODULATION TECHNIQUE

9

Some parameters of chaotic system are varied by adding the message signal.

At receiver an adaptive controller is used to tune the chaotic system parameters to ensure zero synchronization error .

Page 10: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

MESSAGE INCLUSION TECHNIQUE

10

Rather than changing the chaotic parameter, the message is included in one of the states of the chaotic oscillator. By doing this, we are directly changing the chaotic attractor at phase space.

A transmitted signal will be different than the state where the message will be included.

Encryption rule can also be applied.

Page 11: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOTIC SHIFT KEYING (CSK)

11

Used for transmitting digital message signal. Two statistically similar chaotic attractor are

respectively used to encode bit ‘1’ or ‘0’.

These two attractors are generated by two chaotic systems having the same structure but slightly different parameters.

At receiver, the received signal is used to drive a chaotic system similar to one of the transmitters.

The message is recovered by thresholding the synchronization error signal.

Page 12: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOS – TECHNIQUES PROBLEMS Masking, parametric modulation technique

and CSK has been proved to be insecure1,2,3. Breaking methods were based on forecasting

and predicting the carrier values, which when subtracted revealed the spectrum of message.

Inclusion method is secure, however presents a problem of inversion.

Hence, the need to improve the security of the above techniques.

1) K. M. Short, "Steps toward unmasking secure communications," International Journal of Bifurcation and Chaos, vol. 4, pp. 959-977, 1994.

2) G. Alvarez, F. Montoya, M. Romera, and G. Pastor, "Breaking parameter modulated chaotic secure communication systems," Chaos Solitons & Fractals, vol. 21, pp. 783-787, 2004.

3) T. Yang, L. B. Yang, and C. M. Yang, "Application of neural networks to unmasking chaotic secure communication," Physica D, vol. 124, pp. 248-257, 1998.

12

Page 13: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CHAOS – PROBABLE SOLUTION Cascaded Masking Technique (CMT).

Two chaotic signals (generated by two oscillators) are added together at roughly equal power to generate a carrier of sufficient complexity.

Forecasting and predicting carrier behaviour is hence not possible.

Simpler masking technique thus can be extended as cascaded structure for more secure links.

13

Page 14: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CASCADED MASKING TECHNIQUE (CMT)

14

Chaotic receiver ‘B’ synchronizes with oscillator ‘B’ to estimate and recover ym to drive chaotic receiver ‘A’ to synchronize with oscillator ‘A’.

Page 15: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CMT – APPLICATION USING LORENZ SYSTEM

15

Transmitter A

Transmitter B

Receiver B

Receiver A

Note: A scaled Lorenz equation is used as done by Cuomo & Oppenheim for favourable electronic implementation, otherwise wide dynamic range of the solution will exceed typical power supply limit.

Page 16: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CMT – RESULTS

16Fig. 1: Output ym after first level of masking Fig. 2: Output ym after first level of masking (transmitted signal)

Parameters adopted and assumption made• σ, r, b = 16,45.6 and 4• m(t) = 0.1 sin(2πt)• All the gains are set to zero• Arbitrary Initial conditions• Ideal channel and no noise

Page 17: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CMT – RESULTS (CONTD…)

Input and output waveforms

17

Page 18: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

LIMITATIONS & FUTURE WORK

Taking into consideration non-ideal channel with noise.

The synchronization robustness of receiver B is critical for the proper synchronization of receiver A and proper message extraction.

Expanding the system to work with other chaotic oscillator such Chua’s circuit, Duffing oscillator, Colpitts oscillator, etc.

Hardware implementation.

18

Page 19: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

CONCLUSION

A novel cascaded masking technique to increase the security of the chaotic communication system was presented.

Theoretical analysis was given. Simulation results presented demonstrated successful recovery of the message signal.

Limitation and future works were also outlined.

19

Page 20: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

ACKNOWLEDGEMENTS

I would like to thank Northumbria University for providing me with

PhD studentship to carry out the research. My supervisors Dr. Krishna Busawon and Prof.

Zabi Ghassemlooy. My collegues in NCRLab.

20

Page 21: N OVEL C ASCADED C HAOTIC M ASKING FOR S ECURE C OMMUNICATIONS Rupak Kharel, Krishna Busawon & Zabi Ghassemloy Northumbria Communication Research Lab Northumbria.

THANK YOU. (ANY QUESTIONS !!!)

21