Next Article in Journal
Multiscale Price Lead-Lag Relationship between Steel Materials and Industry Chain Products Based on Network Analysis
Previous Article in Journal
The Paradox of Time in Dynamic Causal Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication

1
Electronic Engineering College, Heilongjiang University, Harbin 150080, China
2
Beijing Aerospace Institute of Automatic Control, Beijing 100854, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(7), 864; https://doi.org/10.3390/e24070864
Submission received: 16 May 2022 / Revised: 28 May 2022 / Accepted: 20 June 2022 / Published: 23 June 2022

Abstract

:
The physical implementation of the continuous-time memristor makes it widely used in chaotic circuits, whereas the discrete-time memristor has not received much attention. In this paper, the backward-Euler method is used to discretize the T i O 2 memristor model, and the discretized model also meets the three fingerprints characteristics of the generalized memristor. The short period phenomenon and uneven output distribution of one-dimensional chaotic systems affect their applications in some fields, so it is necessary to improve the dynamic characteristics of one-dimensional chaotic systems. In this paper, a two-dimensional discrete-time memristor model is obtained by linear coupling of the proposed T i O 2 memristor model and one-dimensional chaotic systems. Since the two-dimensional model has infinite fixed points, the stability of these fixed points depends on the coupling parameters and the initial state of the discrete T i O 2 memristor model. Furthermore, the dynamic characteristics of one-dimensional chaotic systems can be enhanced by the proposed method. Finally, we apply the generated chaotic sequence to secure communication.

1. Introduction

In 1971, Chua et al. theoretically predicted the existence of a nonlinear passive electronic component between charge and magnetic flux according to the theory of electronics, which they named the memristor, and proposed the concept of the generalized memristor [1,2]. For a long time, due to the lack of suitable materials, the research of memristors has been in the theoretical stage. Until 2008, HP Laboratory in the United States manufactured a solid memristor by using double-layer T i O 2 thin film, which made the memristor model physically realized [3]. In 2013, Adhikari and Biolek [4,5] proposed three fingerprints of the memristor, showing that a memristor can exhibit a pinched hysteresis loop when applying a bipolar sinusoidal current. When the frequency exceeds the critical value, the area of hysteresis sidelobe decreases monotonically with the increase of the frequency. As the frequency increases to infinity, the tight hysteresis loop of the device degenerates into a single-valued function. As the memristor is a nonlinear component and has memory capability, memristors are widely used in neural networks [6,7,8], nonlinear circuit systems [9,10], nanotechnology [11], electrical engineering, [12,13] and other fields.
Chaos is an inherent randomness of deterministic systems and a special motion of nonlinear dynamic systems widely existing in nature [14]. Due to the defects of the classical chaotic systems, such as simple algebraic structure and few control parameters, the system output has a short period and the value distribution of the sequence is not uniform [15,16]. Many scholars are devoted to improving the complexity of classical chaotic systems. Zhou et al. [17] proposed a parametric switching chaotic system and applied it to image encryption schemes. Hua et al. [18,19] took the output of a low-dimensional system as the input of a nonlinear function to improve the dynamic characteristics of low-dimensional chaotic system. All these works were based on mathematical concepts without physical background. In 2008, Chua [20] replaced the original Chua diode with an active memristor in a chaotic circuit, and the results show that the circuit can also generate chaotic behavior. Later, scholars have done a lot of research on the memristor chaotic system, such as multi-stable states [21,22], co-existence attractor [23,24], and hidden attractor [25]. However, all these work are based on continuous-time memristor models (CMM). Compared with CMM, discrete-time memristor models (DMM) have not received much attention. In recent years, Peng et al. [26] proposed a discrete-time ideal charge-controlled memristor model. The output of the model was used as a control parameter of the two-dimensional Hénon mapping, and the output of the Hénon mapping was disturbed to enhance the dynamic characteristics of the Hénon mapping. Bao et al. [27] proposed a discrete time ideal charge-controlled memristor model, and linearly coupled the model with a logistic map to obtain a new two-dimensional memristor model. Deng et al. [28] also proposed a two-dimensional hyperchaotic system based on a discrete memristor and analyzed the nonparameteric bifurcation mechanism of the system. However, the above works just replace the output of the discrete memristor with the parameters of the chaotic system, or use the output of the discrete memristor as the input of the chaotic system. This method can improve the complexity of the chaotic system, but the effect is not obvious enough. In this paper, a generalized two-dimensional hyperchaotic system based on a discrete memristor is proposed. The discrete memristor is coupled with a classical logistic map, a sine map, and a tent map, respectively, to generate a two-dimensional memristor chaotic map. These three models are chaotic in a wide range of parameters, and even hyperchaotic in a suitable range of parameters. This method is simple and effective to enhance the dynamic characteristics of chaotic systems.
The rest of this paper is arranged as follows: In Section 2, the T i O 2 memristor model is discretized by using the backward-Euler method, and the discretized model also conforms to the essential characteristics of the generalized memristor. Then, the T i O 2 memristor model is linearly coupled with the one-dimensional chaotic system to obtain the two-dimensional discrete memristor map. In Section 3, three numerical examples are given and the three systems are evaluated by chaotic dynamics characteristic index and complexity analysis. In Section 4, three systems are used as chaotic sequence generators of chaotic keying communication scheme, and the advantages and disadvantages of chaotic sequence are evaluated by the bit error rate of communication scheme. Finally, some conclusions are draw in Section 5.

2. Two Dimensional Generalized Discrete Memristor Coupling Model

In 2014, Chua [29] proposed three mathematical expressions of time-varying memristor (i.e., CMM), namely three different memristor models. At the same time, according to the input signal of the memristor, each model is divided into charge-controlled memristor and flux-controlled memristor. The mathematics expression of these are shown in Table 1, where M ( · ) is the memristance function based on the charge-controlled memristor, while W ( · ) is the memristance function based on the magnetic flux-controlled memristor.
In the ideal model, M ( · ) is only a function of charge q, and the derivative of charge q is the current i through the device, while W ( · ) is only a function of magnetic flux ϕ . The derivative of magnetic flux ϕ is the voltage v at both ends of the device. In the general model, M ( · ) is only a function of the system state variable x, and the derivative of the system variable x is a function of the state variable x and the current i flowing through the device, denoted by f ( x , i ) , while W ( · ) is also a function of the system state variable x, and the derivative of the system variable x is a function of the state variable x and the voltage v both ends of the device, denoted by g ( x , v ) . In the generalized model, M ( · ) is the function of the system state variable x and the current i flowing through the device, and the derivative of the system variable x is a function of the state variable x and the current i flowing through the device, denoted by f ( x , i ) , while W ( · ) is the function of the system state variable x and the voltage v at both ends of the device, and the derivative of the system variable x is a function of the state variable x and the voltage v both ends of the device, denoted by g ( x , v ) . In this paper, we take the ideal charge-controlled memristor model as the research object, so we can get a charge-controlled memristor characterized by voltage v ( t ) and current i ( t ) , and the mathematics expression is as follows
v ( t ) = M ( q ) i ( t ) d q ( t ) / d t = i ( t )
where v ( t ) and i ( t ) is the voltage and the input current of the memristor, and q ( t ) is the charge the memristor at time t. The relationship between charge q ( t ) and input current i ( t ) is written as
q ( t ) = q ( t 0 ) + t 0 t i ( τ ) d τ ,
where q ( t 0 ) is the initial charge of memristor. After discretization by the backward- Euler method, the mathematical expression of the discretized model is as follows:
v n = M ( q n ) i n q n + 1 = q 0 + h j = 1 n i j
where h represents the step size required for each iteration. Generally, suppose h = 1 . In this paper, the memristance function M ( q n ) is based on T i O 2 memristor model, and the mathematical expression of M ( q n ) for the function can be obtained as
M ( q n ) = ( R 1 q n + R 2 q n 2 ) ,
where R 1 = R O F F , R 2 = R O F F μ V R O N / D 2 . However, R O F F is the undoped partial voltage, R O N is the doped partial voltage, D is the length of the memristor element, and μ V is the average ion mobility. In this paper, set R 1 = 1 , R 2 = 0.001 . In order to illustrate the characteristics of the discrete-time T i O 2 memristor model, a discrete sine current signal i n = A sin ( ω t ) is added to the memristor. The amplitude curves of current i n and voltage v n of the memristor are shown in Figure 1. Given A , ω , and q 0 in details, the iterative sequences of current i n and voltage v n are shown in Figure 1a. By fixing A , q 0 , the pinched hysteresis loop of the memeristor at different frequencies ω are simulated in Figure 1b. It can be seen that the area of the pinched hysteresis loop decreases with the increase of frequencies ω . By fixing ω , q 0 , the pinched hysteresis loop of the memeristor at different amplitude A are plotted in Figure 1c. In addition, by fixing A , ω , the pinched hysteresis loop of the memeristor at initial charge q is depicted in Figure 1d. The above simulation results show that the discrete memristor model meets the characteristics of a generalized memristor.

Memristor Coupled Low-Dimensional Discrete Chaos Model

Due to its simple algebraic structure, one-dimensional discrete chaotic systems such as logistic map, sine map, and tent map have defects such as short period phenomenon, uneven distribution of output sequence, and predictable motion trajectory. However, these defects will limit the application of one-dimensional chaotic systems in some security fields. In order to enhance the chaotic dynamics characteristics of one-dimensional chaotic maps, a generalized two-dimensional discrete memristor model (2D-DMM) is obtained by coupling one-dimensional chaotic systems with the discrete memristor model constructed above. The structural block diagram of 2D-DMM is shown in Figure 2, in which F ( μ , x n ) represents an existing 1D discrete map, and μ is the control parameter of it. The parameter k is the coupling coefficient between the chaotic map and the discrete memristor model. Some 2D-DMM can be yielded by using such a system structure. The mathematical expression of 2D-DMM can be obtained
x n + 1 = F ( μ , x n ) + k ( R 1 q n + R 2 q n 2 ) x n q n + 1 = x n + q n
According to Equation (5), based on different one-dimensional discrete chaotic systems, corresponding two-dimensional discrete memristor models can be obtained by using this system framework. This model combines the outputs of two nonlinear systems linearly to improve the dynamics of one system. This method is simple and effective to enhance the dynamic characteristics of chaotic systems.
The stability of discrete chaotic system is described by its fixed point. A fixed point of a map is the value of iteration at the next moment, which is the same as the value at this moment. The fixed point of Equation (5) is denoted as ( x ˜ , q ˜ ) , and one can obtain the following expression.
x ˜ n = F ( μ , x ˜ n ) + k ( R 1 q ˜ n + R 2 q ˜ n 2 ) x ˜ n q ˜ n = x ˜ n + q ˜ n
Obviously, when F ( μ , x ) = 0 , the system has infinite fixed points, which are expressed as
S = ( x ˜ , q ˜ ) = ( 0 , ξ )
where ξ is an arbitrary real number. While F ( μ , x ) 0 , since Equation (6) has no real root, the system has no fixed point. The Jacobian matrix of Equation (5) is shown as follows
J = k ( R 1 q n + R 2 q n 2 ) + ϕ ( μ ) , k ( R 1 q n + R 2 q n 2 ) x n 1 , 1 ,
where ϕ ( μ ) = d F ( μ , x n ) / d x n . The eigenvalue polynomial at the fixed point S of Equation (5) can be obtained
P ( λ ) = ( λ 1 ) ( λ k ( R 1 q n + R 2 q n 2 ) ϕ ( μ ) ) .
Therefore, the two eigenvalues at fixed points S of Equation (5) are calculated as
λ 1 = 1 , λ 2 = k ( R 1 q n + R 2 q n 2 ) ϕ ( μ ) .
According to the stability criterion of fixed points, when the modules of the two eigenvalues are in the unit circle, the fixed point is stable, otherwise it is unstable. Since λ 1 is always on the unit circle, whether λ 2 is inside or outside the unit circle depends on ϕ ( μ ) , the coupling coefficient k, and the initial state ξ of the memristor. Therefore, the fixed points S of the model may be stable or unstable. While F ( μ , x ) 0 , the Equation (6) has no fixed point. In this case, the trajectory of the map is periodic, chaotic, or even hyperchaotic.

3. Numerical Example of Two-Dimensional Discrete Memristor Model

In this Section, we construct the corresponding two-dimensional discrete memristor model based on the logistic map, sine map, and tent map, respectively. In addition, the performance of their chaotic sequences will be evaluated.

3.1. Numerical Examples

According to Equation (5), 2D-DMM based on the logistic map, sine map, and tent map can be obtained, respectively. The mathematical expression of the two-dimensional discrete memristor coupled-Logistic model (2D-DMLM) is as follows
x n + 1 = μ x n ( 1 x n ) + k ( R 1 q n + R 2 q n 2 ) x n q n + 1 = x n + q n
where μ is the control parameter of the logistic map, F ( μ , x ) = 0 , and ϕ ( μ ) = μ . The mathematical expression of the two-dimensional discrete memristor coupled-Sine model (2D-DMSM) is described as
x n + 1 = μ sin ( 2 π x n ) + k ( R 1 q n + R 2 q n 2 ) x n q n + 1 = x n + q n
where μ is the control parameter of the sine map, F ( μ , x ) = 0 , and ϕ ( μ ) = 2 π μ . The mathematical expression of the two-dimensional discrete memristor coupled-Tine model (2D-DMTM) is obtained as
x n + 1 = μ x n + k ( R 1 q n + R 2 q n 2 ) x n , x n < 0.5 μ ( 1 x n ) + k ( R 1 q n + R 2 q n 2 ) x n , x n 0.5 q n + 1 = x n + q n
where μ is the control parameter of the tent map, F ( μ , x ) = 0 , and ϕ ( μ ) = ± μ . The mathematical expressions of the three models are given in this section, and the chaotic performance evaluation of the three models is given in the following section.

3.2. Bifurcation with Coupling Strength

The bifurcation diagram of a chaotic system is an important tool to analyze its characteristics. It can directly observe the period-doubling bifurcation and chaotic state of the system under different control parameters. The Lyapunov exponent (LE) is an important index to measure the separation rate of adjacent trajectories in phase space. In this paper, Wolf’s Jacobian algorithm is used to calculate LE. The LE can be calculated as follows
L E = lim n + 1 n i = 0 n 1 ln ( λ i ) ,
where i represents the number of iterations of the system, while λ i is the eigenvalue of the Jacobian matrix of the system after i iterations. If a dynamic system has a positive Lyapunov exponent, the system is in chaos. The larger the value of LE is, the stronger the chaotic characteristics of the system will be. When the number of positive LE is greater than 1, the system is a hyperchaotic system, indicating that the system has stronger chaotic characteristics. Given control parameter μ and initial conditions ( x 0 , q 0 ) , the bifurcation diagram and LE spectrum of the change of coupling coefficient k of the models are shown in Figure 3. As can be seen from Figure 3, under different coupling coefficients, the three models exhibit complex dynamic properties, such as periodic Windows, periodic or period-like states, chaos and hyperchaotic states. It is worth noting that 2D-DMLM and 2D-DMTM enter the chaos state from a period-doubling way, while 2D-DMSM enters chaos state from periodic state in period-like way. It can be seen from the LE spectrum that the system has a positive LE in most parameter intervals, and even two positive LEs in some intervals. Given the control parameter μ , initial conditions ( x 0 , q 0 ) , and coupling coefficient k, the two Lyapunov exponents for the three models are given in Table 2. Note that the length of the sequence is set to 10 5 . It can be seen that the three models all have two positive LEs, indicating that the three models are all hyperchaotic.

3.3. Hyperchaotic Attractor

From Section 3.2, we know that the three models are in a hyperchaotic state with determined parameters. This section will study the hyperchaotic sequences generated by three models. Given control parameter μ , initial conditions ( x 0 , q 0 ) , and coupling coefficient k in details, respectively, the trajectories of the three models in phase space are shown in Figure 4. It can be seen that all hyperchaotic attractors are distributed in a bounded region and have complex fractal structures. Secondly, hyperchaotic sequences generated by the three models are shown in Figure 5. The three sequences are all similar to noise signals, and the magnitude of sequence values is irregular and aperiodic. Next, we will evaluate the performance of hyperchaotic sequences through Sample entropy (SE) [30], Permutation entropy (PE) [31], Correlation dimension (CorDim) [32], and Kaplan–Yorke dimension (K-YDim) [33]. Note that the length of the sequence is set to 10 5 . The calculation results of the three hyperchaotic sequences are shown in Table 3. It can be seen that the hyperchaotic sequence generated by the system has excellent complexity and can be used in image encryption, chaotic secure communication, and other fields. Secondly, the discrete memristor model based on chaotic systems can enhance the complexity of a one-dimensional chaotic system.

4. Application of Hyperchaotic Sequence in Secure Communication

Due to the unpredictability and ergodicity of chaotic systems, chaotic systems are widely used to transmit data safely through various networks. When a chaotic system is used for data transmission, the distribution of its output has great influence on the performance of transmission error resistance. In this section, we take the three chaotic sequences as the chaotic sequence generators of the chaotic keying communication model and evaluate the sequences by the bit error rate of signal in the process of transmission with noise. In this paper, a chaotic keying communication model is used as the reference modulation-differential chaotic shift keying model (RM-DCSK). The RM-DCSK scheme consists of a transmitter and a receiver. The transmitter first uses a chaotic sequence to encode the information bits to generate the transmission signal, and then sends the transmission signal to the receiver. The receiver decodes the received signal to recover bits of information.

4.1. Transmitter Sructure

The transmission signal structure in RM-DCSK is depicted in Figure 6, where a frame signal is made up with two neighboring slots. The detailed structure of the sender of the RM-DCSK is plotted in Figure 7. Take the k frame signal for example, where the chaotic sequence x k is sent on the basis of information bit b 2 k { 1 , + 1 } in the first slot. However, the signal of the second time slot is the sum of two parts, the first part is the modulation of information bit b 2 k + 1 { 1 , + 1 } and the transmission signal of the first time slot; the second part is the chaotic sequence of this slot. We set the length of chaotic sequence to M, and the mathematical expression of the k-frame signal s i is as follows
s i = b 2 k x i , 2 k M < i ( 2 k + 1 ) M b 2 k + 1 b 2 k x i M + x i , ( 2 k + 1 ) M < i 2 ( k + 1 ) M
where x i satisfies the following conditions
x ( 2 k + 1 ) M + m = x 2 ( k + 1 ) M + m , 0 < m M ; k Z .

4.2. Receive Structure

When the receiver receives a transmission signal from the sender, the correlator can be used to recover the original bits of information. The RM-DCSK system mainly utilizes chaotic delay characteristics and noncoherent demodulation. The structure diagram of the receiving end is shown in Figure 8. Since signals may be interfered by noises when transmitted in different networks, the received signals are different from the original signals. In this paper, the Additive White Gaussian Noise (AWGN) channel model is used as the main communication transmission medium. The interference in the channel is mainly the noise signal ζ , so the received signal r i is as follows:
r i = s i + ζ i .
The output of the correlator Z n is the product of the received signal r i and its delayed version r i M . Therefore, the mathematical expression of correlator Z n is calculated as the sum
Z n = i = n M + 1 ( n + 1 ) M r i r i M .
Then, the mathematical expression of correlator Z 2 k for recovering bit b 2 k is rewritten as the sum
Z 2 k = i = 2 k M + 1 ( 2 k + 1 ) M ( s i + ζ i ) ( s i M + ζ x i M ) = i = 2 k M + 1 ( 2 k + 1 ) M ( b 2 k 1 b 2 ( k 1 ) x i 2 M + x i M + ζ i M ) × ( b 2 b x i + ζ i ) .
Equation (16) tells us that x i M = x i , then Equation (19) can be simplified as
Z 2 k = i = 2 k M + 1 ( 2 k + 1 ) M ( b 2 k 1 b 2 ( k 1 ) x i 2 M + x i M + ζ i M ) × ( b 2 b x i + ζ i ) = b 2 k i = 2 k M + 1 ( 2 k + 1 ) M x i 2 + i = 2 k M + 1 ( 2 k + 1 ) M x i A i
where A i is calculated as follows:
Z 2 k = b 2 k b 2 k 1 b 2 ( k 1 ) x i x i 2 M + b 2 k x i ζ i M + b 2 b 1 b 2 ( b 1 ) x i 2 M ζ i + x i ζ i + ζ i ζ i M .
Since the noise signal needs much less energy than the useful signal, the square term containing chaotic signal is the signal of subject discrimination. Then the positive and negative of the correlator Z 2 k is mainly determined by the bit information b 2 k . In addition, the correlator Z 2 k + 1 can similarly recover information bit Z 2 k + 1 . Finally, information bit Z n will be demodulated according to the decision threshold.
b n = 1 , b n > 0 1 , b n 0 .
where x i satisfies the following conditions
x ( 2 k + 1 ) M + m = x 2 ( k + 1 ) M + m , 0 < m M ; k Z .

4.3. Simulation Results

In order to display the complex dynamic characteristics of the generated hyperchaotic sequence, we use three groups of chaotic models as the RM-DCSK scheme chaotic sequence generators. The chaos model of the first group is the classical logistic map, sine map, and tent map. The second group was the memristor model proposed in reference [27]. We generated two-dimensional memristor models based on the classical logistic map, sine map, and tent map, denoted as 2D-MLM, 2D-MSM, and 2D-MTM, respectively. The last group is three two-dimensional memristor models constructed in this paper. We use the above three groups of chaotic sequence generators to simulate the RM-DCSK scheme. The bit error rates (BERs) are calculated under different signal-noise-rate (SNR) and spread spectrum factor M. Note that each experiment transmits data in a randomly generated binary sequence of 10 5 bits. The initial conditions and control parameters of these models are listed in Table 4, which can make these models in a state of chaos.
Firstly, the RM-DCSK scheme with different SNR are considered. By setting SNR { 0 , 1 , 2 , , 30 } and fixing M = 300 , we simulated the RM-DCSK scheme using three groups of chaotic sequence, respectively. The BERs of the demodulated and modulated signal under different SNR is shown in Figure 9a. It can be seen that when the spectrum factor M is determined, when SNR is small, the models based on three groups of chaotic sequence generators can obtain almost the same BERs. However, the model based on the third group of the chaotic sequence can obtain smaller BERs than the first two groups of chaotic sequence with the increase of SNR. Furthermore, By setting M { 260 , 260 , 270 , , 350 } and fixing SNR = 18 , we also simulated the RM-DCSK scheme using three groups of chaotic sequence, respectively. The BERs of the demodulated and modulated signal under different spectrum factor M is depicted in Figure 9b. As shown, the model based on the third group of chaotic sequence can obtain smaller BERs than the first two groups of chaotic sequence under different M. Chaotic system is used in secure communication. The distribution of chaotic output sequence is a key factor affecting transmission efficiency. Therefore, compared with the first two groups of chaotic sequence generators, the third group of chaotic sequence generators is more suitable for chaotic secure communication.

5. Conclusions

As the fourth basic circuit component, the memristor is a nonlinear element. If the memristor is introduced into the chaotic circuit, the complexity of the circuit can be strengthened. In this paper, we discretized the ideal flow-controlled memristor model using the Eluer method, obtained the discrete memristor model, and coupled the discrete memristor model with the one-dimensional discrete chaotic system to obtain the two-dimensional discrete memristor coupling model. In chapter 3, three real numerical examples are given. The Lyapunov index, bifurcation diagram and chaotic hyacinth are used to show that the dynamic behavior of the system has been significantly improved. Secondly, the system has high complexity through sample entropy, permutation entropy, correlation dimension, and the Kaplan–Yorke dimension. Finally, the model proposed in this paper is applied to secure communication. Compared with the one-dimensional chaotic system and the existing two-dimensional memristor model, the transmission efficiency of the model proposed in this paper is significantly improved. Therefore, by coupling the model with the discrete memristor, the dynamic characteristics of the low-dimensional chaotic system can be enhanced.

Author Contributions

W.Y. was in charge of the methodology, software, validation, and writing—original draft preparation. W.D. and P.W. were in charge of software and validation. Y.W. and Y.X. performed the evaluation methods of the security analysis. Project administration and supervision were done by Q.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 61471158; Natural Science Foundation of Heilongjiang Province of China, grant number YQ2020F012.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article, as no datasets were generated or analyzed during the current study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chua, L.O. Memristor-the missing circuit element. IEEE Trans. Circ. Theory 1971, 18, 507–514. [Google Scholar] [CrossRef]
  2. Chua, L.O.; Kang, S.M. Memristive devices and systems. Proc. IEEE 1976, 64, 209–223. [Google Scholar] [CrossRef]
  3. Strukov, D.B.; Snider, G.S.; Stewart, D.R.; Williams, R.S. The missing memristor found. Nature 2008, 453, 80–83. [Google Scholar] [CrossRef] [PubMed]
  4. Adhikari, S.P.; Sah, M.P.; Kim, H.; Chua, L.O. Three fingerprints of memristor. IEEE Trans. Circ. Syst. I Reg. Pap. 2013, 60, 3008–3021. [Google Scholar] [CrossRef]
  5. Sun, J.; Yao, L.; Zhang, X.; Wang, Y.; Cui, G. Generalised mathematical model of memristor. IET Circ. Device Syst. 2015, 10, 244–249. [Google Scholar] [CrossRef]
  6. Wang, C.; Xiong, L.; Sun, J.; Yao, W. Memristor-based neural networks with weight simultaneous perturbation training. Nonlinear Dyn. 2018, 93, 2893–2906. [Google Scholar] [CrossRef]
  7. Duan, S.; Hu, X.; Dong, Z.; Wang, L.; Mazumder, P. Memristor-based cellular nonlinear/neural network: Design, analysis, and applications. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 1202–1213. [Google Scholar] [CrossRef]
  8. Zhang, Y.; Zhuang, J.; Xia, Y.; Bai, Y.; Cao, J.; Gu, L. Fixed-time synchronization of the impulsive memristor-based neural networks. Commun. Nonlinear Sci. 2019, 77, 40–45. [Google Scholar] [CrossRef]
  9. Yuan, F.; Li, Y. A chaotic circuit constructed by a memristor, a memcapacitor and a meminductor. Chaos 2019, 29, 101101. [Google Scholar] [CrossRef]
  10. Fang, Y.; Yue, D.; Li, Y.; Wang, G. The amplitude, frequency and parameter space boosting in a memristor–meminductor-based circuit. Nonlinear Dyn. 2019, 96, 389–405. [Google Scholar]
  11. Ghenzi, N.; Levy, P. Impact of sub- and supra-threshold switching in the synaptic behavior of TiO2 memristor. Microelectron. Eng. 2018, 193, 13–17. [Google Scholar] [CrossRef]
  12. Wang, Y.; Ma, J.; Xu, Y.; Wu, F.; Zhou, P. The electrical activity of neurons subject to electromagnetic induction and gaussian white noise. Int. J. Bifurc. Chaos 2017, 27, 1750030. [Google Scholar] [CrossRef]
  13. Kim, H.; Sah, M.P.; Yang, C.; Cho, S.; Chua, L.O. Memristor emulator for memristor circuit applications. IEEE Trans. Circ. Syst. I Reg. Pap. 2012, 59, 2422–2431. [Google Scholar]
  14. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1976, 20, 130–141. [Google Scholar] [CrossRef] [Green Version]
  15. Liu, Y.; Luo, Y.; Song, S.; Cao, L.; Liu, J.; Harkin, J. Counteracting dynamical degradation of digital chaotic chebyshev map via perturbation. Int. J. Bifurc. Chaos 2017, 27, 1750033. [Google Scholar] [CrossRef]
  16. Zheng, J.; Hu, H.P.; Xia, X. Applications of symbolic dynamics in counteracting the dynamical degradation of digital chaos. Nonlinear Dyn. 2018, 94, 1535–1546. [Google Scholar] [CrossRef]
  17. Zhou, Y.; Bao, L.; Chen, C. Image encryption using a new parametric switching chaotic system. Signal Processing 2013, 93, 3039–3052. [Google Scholar] [CrossRef]
  18. Hua, Z.; Zhou, B.; Zhou, Y. Sine-transform-based chaotic system with FPGA implementation. IEEE Trans. Ind. Electron. 2017, 65, 2557–2566. [Google Scholar] [CrossRef]
  19. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  20. Itoh, M.; Chua, L.O. Memrsitor Oscillator. Int. J. Bifurc. Chaos 2008, 18, 3183–3206. [Google Scholar] [CrossRef]
  21. Zhang, Y.; Liu, Z.; Wu, H.; Chen, S.; Bao, B. Two-memristor-based chaotic system and its extreme multistability reconstitution via dimensionality reduction analysis. Chaos Solitons Fractals 2017, 127, 354–363. [Google Scholar] [CrossRef]
  22. Ma, J.; Wu, F.; Ren, G.; Tang, J. A class of initials-dependent dynamical system. Appl. Math. Comput. 2017, 298, 65–76. [Google Scholar] [CrossRef]
  23. Zhou, L.; Wang, C.H.; Zhang, X.; Yao, W. Various attractors, coexisting attractors and antimonotonicity in a simple fourth-order memristive Twin-T oscillator. Int. J. Bifurc. Chaos 2018, 28, 1850050. [Google Scholar] [CrossRef] [Green Version]
  24. Lai, Q.; Kuate, P.; Liu, F.; Iu, H.C. An extremely simple chaotic system with infinitely many coexisting attractors. IEEE Trans. Circ. Syst. II Exp. Briefs 2019, 67, 1129–1133. [Google Scholar] [CrossRef]
  25. Varshney, V.; Sabarathinam, S.; Awadhesh, P.; Thamilmaran, K. Infinite number of hidden attractors in memristor-based autonomous duffing oscillator. Int. J. Bifurc. Chaos 2019, 67, 1129–1133. [Google Scholar] [CrossRef]
  26. Peng, Y.; Sun, K.; He, S. A discrete memristor model and its application in Hénon map. Chaos Solitons Fractals 2020, 137, 109873. [Google Scholar] [CrossRef]
  27. Bao, B.; Rong, K.; Li, H.; Li, K.; Hua, Z.; Zhang, X. Memristor-coupled Logistic hyperchaotic map. IEEE Trans. Circ. Syst. II Exp. Briefs 2021, 68, 2992–2996. [Google Scholar] [CrossRef]
  28. Deng, Y.; Li, Y. Nonparametric bifurcation mechanism in 2-D hyperchaotic discrete memristor-based map. Nonlinear Dyn. 2021, 104, 4601–4614. [Google Scholar] [CrossRef]
  29. Chua, L.O. If it’s pinched it’s a memristor. Semicond. Sci. Tech. 2014, 29, 104001. [Google Scholar]
  30. Richman, J.; Moorman, J. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart Circ. Physiol. 2000, 278, 2039–2049. [Google Scholar] [CrossRef] [Green Version]
  31. Bandt, C.; Pompe, B. Permutation entropy: A natural complexity measure for time series. Phys. Rev. Lett. 2002, 88, 174102. [Google Scholar] [CrossRef]
  32. Theiler, J. Efficient algorithm for estimating the correlation dimension from a set of discrete points. Phys. Rev. A 1987, 36, 4456–4462. [Google Scholar] [CrossRef]
  33. Frederickson, P.; Kaplan, J.; Yorke, E.; Yorke, J. The liapunov dimension of strange attractors. J. Differ. Equ. 1983, 49, 185–207. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The i n v n amplitude curves of the memeristor: (a) i n and v n iterative sequences; (b) The pinched hysteresis loop of the memeristor at different frequencies ω ; (c) The pinched hysteresis loop of the memeristor at different amplitudes A; (d) The pinched hysteresis loop of the memeristor at different initial charges q.
Figure 1. The i n v n amplitude curves of the memeristor: (a) i n and v n iterative sequences; (b) The pinched hysteresis loop of the memeristor at different frequencies ω ; (c) The pinched hysteresis loop of the memeristor at different amplitudes A; (d) The pinched hysteresis loop of the memeristor at different initial charges q.
Entropy 24 00864 g001
Figure 2. Structure block diagram of the two-dimensional discrete memristor model.
Figure 2. Structure block diagram of the two-dimensional discrete memristor model.
Entropy 24 00864 g002
Figure 3. The bifurcation and LEs of three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Figure 3. The bifurcation and LEs of three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Entropy 24 00864 g003
Figure 4. The phase space trajectory of three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Figure 4. The phase space trajectory of three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Entropy 24 00864 g004
Figure 5. The hyperchaotic sequence produced by three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Figure 5. The hyperchaotic sequence produced by three models: (a) 2D-DMLM; (b) 2D-DMSM; (c) 2D-DMTM.
Entropy 24 00864 g005
Figure 6. Structure of the transmission signal in RM-DCSK.
Figure 6. Structure of the transmission signal in RM-DCSK.
Entropy 24 00864 g006
Figure 7. Structure of the transmission signal in RM-DCSK.
Figure 7. Structure of the transmission signal in RM-DCSK.
Entropy 24 00864 g007
Figure 8. Structure of the transmission signal in RM-DCSK.
Figure 8. Structure of the transmission signal in RM-DCSK.
Entropy 24 00864 g008
Figure 9. BERs of the RM-DCSK using three groups of chaotic sequence: (a) different SNR; (b) different M.
Figure 9. BERs of the RM-DCSK using three groups of chaotic sequence: (a) different SNR; (b) different M.
Entropy 24 00864 g009
Table 1. Mathematical models of three continuous-time memristors.
Table 1. Mathematical models of three continuous-time memristors.
CMsCharge-ControlledFlux-Controlled
ideal v ( t ) = M ( q ) i ( t ) d q / d t = i ( t ) i ( t ) = W ( ϕ ) v ( t ) d ϕ / d t = v ( t )
general v ( t ) = M ( x ) i ( t ) d x / d t = f ( x , i ) i ( t ) = W ( x ) v ( t ) d x / d t = v ( x , v )
generalized v ( t ) = M ( x , i ) i ( t ) d x / d t = i ( x , i ) i ( t ) = W ( x , v ) v ( t ) d x / d t = v ( x , v )
Table 2. The two Lyapunov exponents of three models.
Table 2. The two Lyapunov exponents of three models.
Iterms μ k ( x 0 , q 0 ) LE 1 , LE 2
2D-DMLM0.2001.99(0.3, 0.7)0.3028, 0.0731
2D-DMSM−0.051.82(0.2, 0.4)0.3200, 0.0757
2D-DMTM−0.401.58(0.1, 0.6)0.2797, 0.1062
Table 3. Performance of hyperchaotic sequences generated by three models.
Table 3. Performance of hyperchaotic sequences generated by three models.
ItermsSEPECorDimK-YDim
2D-DMLM0.72680.83111.61632
2D-DMSM0.77860.80101.63152
2D-DMTM0.70760.82161.62952
Table 4. The initial conditions and control parameters of these models.
Table 4. The initial conditions and control parameters of these models.
ItemsInitial ConditionsControl Parameters
Logistic x 0 = 0.4 μ = 3.87
Sine x 0 = 0.2 μ = 0.95
Tent x 0 = 0.3 μ = 1.47
2D-MLM x 0 = 0.5 , q 0 = 0.5 μ = 0.1 , k = 1.88
2D-MSM x 0 = 0.4 , q 0 = 0.7 μ = 0.1 , k = 1.78
2D-MTM x 0 = 0.3 , q 0 = 0.6 μ = 0.3 , k = 1.68
2D-DMLM x 0 = 0.2 , q 0 = 0.3 μ = 0.2 , k = 1.99
2D-DMLM x 0 = 0.4 , q 0 = 0.1 μ = 0.05 , k = 1.82
2D-DMTM x 0 = 0.2 , q 0 = 0.6 μ = 0.4 , k = 1.58
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yan, W.; Dong, W.; Wang, P.; Wang, Y.; Xing, Y.; Ding, Q. Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication. Entropy 2022, 24, 864. https://doi.org/10.3390/e24070864

AMA Style

Yan W, Dong W, Wang P, Wang Y, Xing Y, Ding Q. Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication. Entropy. 2022; 24(7):864. https://doi.org/10.3390/e24070864

Chicago/Turabian Style

Yan, Wenhao, Wenjie Dong, Peng Wang, Ya Wang, Yanan Xing, and Qun Ding. 2022. "Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication" Entropy 24, no. 7: 864. https://doi.org/10.3390/e24070864

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop