• Previous Article
    Optimization algorithm for embedded Linux remote video monitoring system oriented to the internet of things (IOT)
  • DCDS-S Home
  • This Issue
  • Next Article
    An optimization detection algorithm for complex intrusion interference signal in mobile wireless network
doi: 10.3934/dcdss.2019093

Optical chaotic secure algorithm based on space laser communication

1. 

College of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China

2. 

College of Humanities & Information, Changchun University of Technology, Changchun, China

* Corresponding author: Lu Song

Received  June 2017 Revised  November 2017 Published  November 2018

The traditional drive response synchronization control method has the poor robustness, which results in the low security performance of the optical chaotic secure communication. To address this problem, an optical chaotic secure algorithm based on space laser communication is proposed in this paper. With the advantage of space laser communication and full consideration of the influence of complex environment on signal transmission of laser wireless communication, a laser wireless communication channel model is built. Based on this, a hybrid self-synchronization chaotic system model is proposed. It can reduce the information needed for transmission, and only need to transmit a small amount of error correction signals on the channel to achieve synchronization of the receiving and the transmitting system, which greatly suppress the drawback of the traditional method. On the basis of chaotic synchronization, the erbium-doped fiber laser is used for information transmission. Different encryption techniques are used to achieve optical chaotic secure communication within the allowable range of error. Numerical simulation results show that the proposed algorithm has good security and robustness, and can realize the secure communication for different signals.

Citation: Ruiqiang Guo, Lu Song. Optical chaotic secure algorithm based on space laser communication. Discrete & Continuous Dynamical Systems - S, doi: 10.3934/dcdss.2019093
References:
[1]

V. Annovazzi-Lodi and G. Aromataris, Privacy in two-laser and three-laser chaos communications, IEEE Journal of Quantum Electronics, 51 (2015), 1-5.

[2]

H. W. ChenG. C. YangC. Y. ChangT. C. Lin and W. C. Kwong, Enhancing optical-cdma confidentiality with multicode-keying encryption, Journal of Lightwave Technology, 27 (2015), 1708-1718.

[3]

M. ChengX. GaoL. DengL. LiuY. DengS. FuM. Zhang and D. Liu, Time-delay concealment in a three-dimensional electro-optic chaos system, IEEE Photonics Technology Letters, 27 (2015), 1030-1033.

[4]

A. ElsonbatyS. F. Hegazy and S. S. A. Obayya, Simultaneous suppression of time-delay signature in intensity and phase of dual-channel chaos communication, IEEE Journal of Quantum Electronics, 51 (2015), 1-9.

[5]

L. I. Feng and Y. F. Zhang, Network communication encryption method based on the structure of semigroup simulation, Computer Simulation, 280-283.

[6]

W. Gao and M. R. Farahani, The hyper-zagreb index for an infinite family of nanostar dendrimer, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2016), 515-523.

[7]

S. K. Y., C. F., W. T. T. and et al, Full state based adaptive control of fractional order chaotic system without equilibrium point, Journal of Jilin University (Engineering and Technology Edition), 138 (2017), 1225-1230

[8]

T. LanY. LanP. Chen and W. Lo, A study of investigating adolescents' eating out behavior by using analytic hierarchy process, Eurasia Journal of Mathematics Science and Technology Education, 13 (2016), 3227-3234.

[9]

A. J. Lawrance, T. Papamarkou and A. Uchida, Synchronized laser chaos communication: Statistical investigation of an experimental system, IEEE Journal of Quantum Electronics, 1-1.

[10]

N. LiH. SusantoB. CemlynI. D. Henning and M. J. Adams, Secure communication systems based on chaos in optically pumped spin-vcsels., Optics Letters, 42 (2017), 3494-3497.

[11]

L. LiuY. N. WangL. Hou and X. R. Feng, Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator, Iet Signal Processing, 11 (2017), 869-876.

[12]

D. S. Mao, Connotation of quantum cascaded lasers technology and its application prospect, Journal of China Academy of Electronics & Information Technology, 333-340.

[13]

S. Nazari-ShirkouhiS. Miri-Nargesi and A. Ansarinejad, A fuzzy decision making methodology based on fuzzy ahp and fuzzy topsis with a case study for information systems outsourcing decisions, Journal of Intelligent & Fuzzy Systems, 32 (2017), 3921-3943.

[14]

L. Q. J., Information hiding algorithm based on frequency band division key frames coding, Bulletin of Science and Technology, 120-122.

[15]

D. RontaniE. MercierD. Wolfersberger and M. Sciamanna, Enhanced complexity of optical chaos in a laser diode with phase-conjugate feedback, Optics Letters, 41 (2016), 4637-4640.

[16]

L. I. ShileiC. LiuH. U. Xiaoyu and N. I. Junkang, A chaotic oscillator with high security for secret communication, Journal of Xian Jiaotong University, 51 (2017), 35-40.

[17]

L. WangZ. M. WuJ. G. Wu and G. Q. Xia, Long-haul dual-channel bidirectional chaos communication based on polarization-resolved chaos synchronization between twin 1550 nm vcsels subject to variable-polarization optical injection, Optics Communications, 334 (2015), 214-221.

[18]

T. T. Wang and C. H. Ma, A re-examination of expectation hypothesis with time varying term premium, Journal of Interdisciplinary Mathematics, 20 (2017), 1-12.

[19]

C. XueN. JiangY. LvC. WangG. LiS. Lin and K. Qiu, Security-enhanced chaos communication with time-delay signature suppression and phase encryption, Optics Letters, 41 (2016), 3690.

show all references

References:
[1]

V. Annovazzi-Lodi and G. Aromataris, Privacy in two-laser and three-laser chaos communications, IEEE Journal of Quantum Electronics, 51 (2015), 1-5.

[2]

H. W. ChenG. C. YangC. Y. ChangT. C. Lin and W. C. Kwong, Enhancing optical-cdma confidentiality with multicode-keying encryption, Journal of Lightwave Technology, 27 (2015), 1708-1718.

[3]

M. ChengX. GaoL. DengL. LiuY. DengS. FuM. Zhang and D. Liu, Time-delay concealment in a three-dimensional electro-optic chaos system, IEEE Photonics Technology Letters, 27 (2015), 1030-1033.

[4]

A. ElsonbatyS. F. Hegazy and S. S. A. Obayya, Simultaneous suppression of time-delay signature in intensity and phase of dual-channel chaos communication, IEEE Journal of Quantum Electronics, 51 (2015), 1-9.

[5]

L. I. Feng and Y. F. Zhang, Network communication encryption method based on the structure of semigroup simulation, Computer Simulation, 280-283.

[6]

W. Gao and M. R. Farahani, The hyper-zagreb index for an infinite family of nanostar dendrimer, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2016), 515-523.

[7]

S. K. Y., C. F., W. T. T. and et al, Full state based adaptive control of fractional order chaotic system without equilibrium point, Journal of Jilin University (Engineering and Technology Edition), 138 (2017), 1225-1230

[8]

T. LanY. LanP. Chen and W. Lo, A study of investigating adolescents' eating out behavior by using analytic hierarchy process, Eurasia Journal of Mathematics Science and Technology Education, 13 (2016), 3227-3234.

[9]

A. J. Lawrance, T. Papamarkou and A. Uchida, Synchronized laser chaos communication: Statistical investigation of an experimental system, IEEE Journal of Quantum Electronics, 1-1.

[10]

N. LiH. SusantoB. CemlynI. D. Henning and M. J. Adams, Secure communication systems based on chaos in optically pumped spin-vcsels., Optics Letters, 42 (2017), 3494-3497.

[11]

L. LiuY. N. WangL. Hou and X. R. Feng, Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator, Iet Signal Processing, 11 (2017), 869-876.

[12]

D. S. Mao, Connotation of quantum cascaded lasers technology and its application prospect, Journal of China Academy of Electronics & Information Technology, 333-340.

[13]

S. Nazari-ShirkouhiS. Miri-Nargesi and A. Ansarinejad, A fuzzy decision making methodology based on fuzzy ahp and fuzzy topsis with a case study for information systems outsourcing decisions, Journal of Intelligent & Fuzzy Systems, 32 (2017), 3921-3943.

[14]

L. Q. J., Information hiding algorithm based on frequency band division key frames coding, Bulletin of Science and Technology, 120-122.

[15]

D. RontaniE. MercierD. Wolfersberger and M. Sciamanna, Enhanced complexity of optical chaos in a laser diode with phase-conjugate feedback, Optics Letters, 41 (2016), 4637-4640.

[16]

L. I. ShileiC. LiuH. U. Xiaoyu and N. I. Junkang, A chaotic oscillator with high security for secret communication, Journal of Xian Jiaotong University, 51 (2017), 35-40.

[17]

L. WangZ. M. WuJ. G. Wu and G. Q. Xia, Long-haul dual-channel bidirectional chaos communication based on polarization-resolved chaos synchronization between twin 1550 nm vcsels subject to variable-polarization optical injection, Optics Communications, 334 (2015), 214-221.

[18]

T. T. Wang and C. H. Ma, A re-examination of expectation hypothesis with time varying term premium, Journal of Interdisciplinary Mathematics, 20 (2017), 1-12.

[19]

C. XueN. JiangY. LvC. WangG. LiS. Lin and K. Qiu, Security-enhanced chaos communication with time-delay signature suppression and phase encryption, Optics Letters, 41 (2016), 3690.

Figure 1.  Optical chaotic self-synchronization model based on space laser communication
Figure 2.  Optical chaotic secure communication structure based on erbium-doped fiber single-ring laser
Figure 3.  Optical chaotic secure communication structure based on erbium-doped fiber double-ring laser
Figure 4.  Time history of drive signal
Figure 5.  Test result of sinusoidal signal secure communication
Figure 6.  Test result of square wave signal secure communication
[1]

Dmitry Turaev, Sergey Zelik. Analytical proof of space-time chaos in Ginzburg-Landau equations. Discrete & Continuous Dynamical Systems - A, 2010, 28 (4) : 1713-1751. doi: 10.3934/dcds.2010.28.1713

[2]

Neal Koblitz, Alfred Menezes. Another look at security definitions. Advances in Mathematics of Communications, 2013, 7 (1) : 1-38. doi: 10.3934/amc.2013.7.1

[3]

Isabelle Déchène. On the security of generalized Jacobian cryptosystems. Advances in Mathematics of Communications, 2007, 1 (4) : 413-426. doi: 10.3934/amc.2007.1.413

[4]

Xiangyu Gao, Yong Sun. A new heuristic algorithm for laser antimissile strategy optimization. Journal of Industrial & Management Optimization, 2012, 8 (2) : 457-468. doi: 10.3934/jimo.2012.8.457

[5]

Elena Shchepakina, Olga Korotkova. Canard explosion in chemical and optical systems. Discrete & Continuous Dynamical Systems - B, 2013, 18 (2) : 495-512. doi: 10.3934/dcdsb.2013.18.495

[6]

Archana Prashanth Joshi, Meng Han, Yan Wang. A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 2018, 1 (2) : 121-147. doi: 10.3934/mfc.2018007

[7]

Philip Lafrance, Alfred Menezes. On the security of the WOTS-PRF signature scheme. Advances in Mathematics of Communications, 2019, 13 (1) : 185-193. doi: 10.3934/amc.2019012

[8]

Luca Schenato, Sandro Zampieri. On rendezvous control with randomly switching communication graphs. Networks & Heterogeneous Media, 2007, 2 (4) : 627-646. doi: 10.3934/nhm.2007.2.627

[9]

Lizhong Peng, Shujun Dang, Bojin Zhuang. Localization operator and digital communication capacity of channel. Communications on Pure & Applied Analysis, 2007, 6 (3) : 819-827. doi: 10.3934/cpaa.2007.6.819

[10]

Jesus R. Artalejo, Tuan Phung-Duc. Markovian retrial queues with two way communication. Journal of Industrial & Management Optimization, 2012, 8 (4) : 781-806. doi: 10.3934/jimo.2012.8.781

[11]

Jiaquan Zhan, Fanyong Meng. Cores and optimal fuzzy communication structures of fuzzy games. Discrete & Continuous Dynamical Systems - S, 2018, 0 (0) : 1187-1198. doi: 10.3934/dcdss.2019082

[12]

Piotr Słowiński, Bernd Krauskopf, Sebastian Wieczorek. Mode structure of a semiconductor laser with feedback from two external filters. Discrete & Continuous Dynamical Systems - B, 2015, 20 (2) : 519-586. doi: 10.3934/dcdsb.2015.20.519

[13]

Herbert Egger, Manuel Freiberger, Matthias Schlottbom. On forward and inverse models in fluorescence diffuse optical tomography. Inverse Problems & Imaging, 2010, 4 (3) : 411-427. doi: 10.3934/ipi.2010.4.411

[14]

Lukas F. Lang, Otmar Scherzer. Optical flow on evolving sphere-like surfaces. Inverse Problems & Imaging, 2017, 11 (2) : 305-338. doi: 10.3934/ipi.2017015

[15]

Thomas Schuster, Joachim Weickert. On the application of projection methods for computing optical flow fields. Inverse Problems & Imaging, 2007, 1 (4) : 673-690. doi: 10.3934/ipi.2007.1.673

[16]

Boris P. Belinskiy. Optimal design of an optical length of a rod with the given mass. Conference Publications, 2007, 2007 (Special) : 85-91. doi: 10.3934/proc.2007.2007.85

[17]

Cuiling Fan, Koji Momihara. Unified combinatorial constructions of optimal optical orthogonal codes. Advances in Mathematics of Communications, 2014, 8 (1) : 53-66. doi: 10.3934/amc.2014.8.53

[18]

Aniello Raffaele Patrone, Otmar Scherzer. On a spatial-temporal decomposition of optical flow. Inverse Problems & Imaging, 2017, 11 (4) : 761-781. doi: 10.3934/ipi.2017036

[19]

T. L. Alderson, K. E. Mellinger. Geometric constructions of optimal optical orthogonal codes. Advances in Mathematics of Communications, 2008, 2 (4) : 451-467. doi: 10.3934/amc.2008.2.451

[20]

Ryszard Rudnicki. An ergodic theory approach to chaos. Discrete & Continuous Dynamical Systems - A, 2015, 35 (2) : 757-770. doi: 10.3934/dcds.2015.35.757

2017 Impact Factor: 0.561

Metrics

  • PDF downloads (5)
  • HTML views (66)
  • Cited by (0)

Other articles
by authors

[Back to Top]