Chaotic Secure Communication Schemes employing Chua’s Circuit

Abstract—In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications systems and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.

Subscribe to access this work and thousands more
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Kamil, I (2021). Chaotic Secure Communication Schemes employing Chua’s Circuit. Afribary. Retrieved from https://afribary.com/works/chaotic-secure-communication-schemes-employing-chua-s-circuit-1

MLA 8th

Kamil, I.A. "Chaotic Secure Communication Schemes employing Chua’s Circuit" Afribary. Afribary, 03 Apr. 2021, https://afribary.com/works/chaotic-secure-communication-schemes-employing-chua-s-circuit-1. Accessed 29 Apr. 2024.

MLA7

Kamil, I.A. . "Chaotic Secure Communication Schemes employing Chua’s Circuit". Afribary, Afribary, 03 Apr. 2021. Web. 29 Apr. 2024. < https://afribary.com/works/chaotic-secure-communication-schemes-employing-chua-s-circuit-1 >.

Chicago

Kamil, I.A. . "Chaotic Secure Communication Schemes employing Chua’s Circuit" Afribary (2021). Accessed April 29, 2024. https://afribary.com/works/chaotic-secure-communication-schemes-employing-chua-s-circuit-1