Published August 28, 2016 | Version v1
Journal article Open

DESIGN OF CHAOTIC MOBILE COMMUNICATION SYSTEM USING ARDUINO

  • 1. Electrical & Electronic Engineering Department, Yüzüncü Yıl University, Zeve Kampüsü, Tuşba/Van, Turkey

Description

Security and secrecy are some of the significant concerns in the communications world. In the last years, several encryption techniques had been proposed to improve the secrecy of the information transition. Chaos-based encryption techniques are being exceedingly studied as part of the because of the random-look nature and very unpredictable of the chaotic signals.  In this study, a digital-based mobile communication system was proposed that uses chaotic encryption code, Arduino platforms was utilized for this work because it possess an open-source prototyping platform, software and hardware very accessible and extremely flexible to be customized and extended. The ASCII code of input message signal was encrypted using a Chaotic Random Number Generator it will send to the receiver side through mobile GSM system. In the receiver side, the ASCII coded message was decrypted using the same Chaotic Random Number Generator code for decryption. The target of this system is to make a more security based on the mobile communication system, the obtained results of this study confirm a secure system for sending and receiving SMS-based on the mobile communication system.

Files

DESIGN_OF_CHAOTIC_MOBILE_COMMUNICATION_SYSTEM_USING_ARDUINO.pdf

Files (748.4 kB)

Additional details

References

  • [1] Larger, L. and Goedgebuer, J.P., “Encryption using chaotic dynamics for optical telecommunications,” ComptesRendus Physique, Vol .5(6), 2004, pp. 609-611.
  • [2] Chen, C.K. and Lin, C.L., “Text encryption using ECG sig-nals with chaotic Logistic map,” 5th IEEE Conference in Industrial Electronics and Applications (ICIEA), pp. 1741-1746. June 2010, doi: 10.1109/ICIEA.2010.5515285.
  • [3] Kennedy, Michael, Riccardo Rovatti, and Gianluca Setti, eds., “Chaotic electronics in telecommunications,” CRC press, 2000.
  • [4] Bender, W., Gruhl, D., Morimoto, N. and Lu, A., “Techniques for data hiding,” IBM systems journal, Vol .35(3.4), 1996, pp. 313-336.
  • [5] Kocarev, L. and Jakimoski, G., “Logistic map as a block en-cryption algorithm,” Physics Letters A, Vol. 289(4), 2001, pp. 199-206.
  • [6] Pecora, L.M. and Carroll, T.L., “Synchronization in chaotic systems,” Physical review letters, Vol.64 (8), 1990, pp. 821.
  • [7] Pecora, L.M. and Carroll, T.L., “Driving systems with chaotic signals,” Physical Review A, Vol. 44(4), 1991, pp. 2374.
  • [8] Kocarev, L., Halle, K.S., Eckert, K., Chua, L.O. and Parlitz, U., “Experimental demonstration of secure communications via chaotic synchronization,” International Journal of Bi-furcation and Chaos, Vol. 2(03), 1992, pp. 709-713.
  • [9] Cuomo, K.M. and Oppenheim, A.V., “Circuit implementa-tion of synchronized chaos with applications to communica-tions,” Physical review letters, Vol. 71(1) , 1993, pp.65-68.
  • [10] Pehlivan, I. and Uyaroglu, Y., “Rikitake attractor and its synchronization application for secure communication sys-tems,” Journal of Applied Sciences, Vol.7 (2), 2007, pp.232-236.
  • [11] Uyaroğlu, Y.andPehlivan, I., “Simplified chaotic diffusion-less Lorentz attractor and its application to secure communi-cation systems,” Communications, IET, Vol.1 (5), 2007, pp. 1015-1022.
  • [12] Alvarez, G. and Li, S., “Some basic cryptographic require-ments for chaos-based cryptosystems,” International Jour-nal of Bifurcation and Chaos, Vol. 16(8), 2006, pp. 2129-2151.
  • [13] Boccaletti, S., Kurths, J., Osipov, G., Valladares, D.L. and Zhou, C.S., “The synchronization of chaotic sys-tems,” Physics reports, Vol.366 (1), 2002, pp. 1-101.
  • [14] KHAREL, R., “design and implementation of secure chaotic communication systems,” PhD dissertation, Dept. of Compu-ting, Engineering and Information Sciences, Northumbria University, Newcastle, United Kingdom, 2011.
  • [15] Yang, S.G., Li, C.X. and Sun, S.H., “Text information hiding method based on chaotic map and BCH code in DWT do-main of a carrier image,” International Conference on Wave-let Analysis and Pattern Recognition, pp. 1754-1758, Nov. 2007, doi: 10.1109/ICWAPR.2007.4421737.
  • [16] Sukhraliya, V., Chaudhary, S. and Solanki, S., “Encryption and Decryption Algorithm using ASCII values with substitu-tion array Approach,” International Journal of Advanced Research in Computer and Communication Engineering, Vol .2(8), 2013, pp. 3094-3097.
  • [17] Cuomo, K.M., Oppenheim, A.V. and Strogatz, S.H., “Syn-chronization of Lorenz-based chaotic circuits with applica-tions to communications,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, Vol. 40, no.10, pp. 626-633, Oct 1993, dio: 10.1109/82.246163.
  • [18] Abel, A. and Schwarz, W.,” Chaos communications princi-ples, schemes, and system analysis,” Proc. IEEE, Vol 90, pp. 691-710, May 2002, doi: 10.1109/JPROC.2002.1015002.
  • [19] J M blackledge, "Cryptography using chaos," Warsaw Uni-versity of Technology Development Programme, 2010.
  • [20] Elsherbeny, Mohamed Nageb, and M. Raha., "Pseudo–Random Number Generator Using Deterministic Chaotic System," International Journal of Scientific and Technology Research 1.9 (2012).