Next Article in Journal
Symbol Error-Rate Analytical Expressions for a Two-User PD-NOMA System with Square QAM
Next Article in Special Issue
On Dynamic Investigations of Cournot Duopoly Game: When Firms Want to Maximize Their Relative Profits
Previous Article in Journal
Packet Loss Measurement Based on Sampled Flow
Previous Article in Special Issue
Dynamics Analysis and Synchronous Control of Fractional-Order Entanglement Symmetrical Chaotic Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Chaos in the Real World: Recent Applications to Communications, Computing, Distributed Sensing, Robotic Motion, Bio-Impedance Modelling and Encryption Systems

Dipartimento Ingegneria Innovazione, Università del Salento, 73100 Lecce, Italy
Symmetry 2021, 13(11), 2151; https://doi.org/10.3390/sym13112151
Submission received: 14 October 2021 / Revised: 27 October 2021 / Accepted: 29 October 2021 / Published: 11 November 2021
(This article belongs to the Special Issue Chaotic Systems and Nonlinear Dynamics)

Abstract

:
Most of the papers published so far in literature have focused on the theoretical phenomena underlying the formation of chaos, rather than on the investigation of potential applications of chaos to the real world. This paper aims to bridge the gap between chaos theory and chaos applications by presenting a survey of very recent applications of chaos. In particular, the manuscript covers the last three years by describing different applications of chaos as reported in the literature published during the years 2018 to 2020, including the matter related to the symmetry properties of chaotic systems. The topics covered herein include applications of chaos to communications, to distributed sensing, to robotic motion, to bio-impedance modelling, to hardware implementation of encryption systems, to computing and to random number generation.

1. Introduction

Referring to chaotic dynamical systems, most of the papers published so far in literature have focused on the theoretical phenomena underlying the formation of chaos, rather than on the investigation of potential applications of chaos to the real world. An interesting attempt to deal with chaos applications has been done in a book published in 2016, where a number of contributions have been presented [1]. However, since five years have passed from the publication of reference [1], it would be interesting to analyse the most recent results regarding the application of chaos to the real world. This paper aims to bridge the gap between chaos theory and chaos applications by presenting a survey of very recent applications of chaos. In particular, the manuscript covers the last three years, i.e., it illustrates different applications of chaos as reported in the papers published in the years 2018–2020, including the matter related to the symmetry properties of chaotic systems. The manuscript is organized as follows. In Section 2 the applications of chaos to communications are illustrated [2,3,4,5,6,7,8,9,10,11,12], including the use of chaos in radar-based systems and underwater acoustic channels. Section 3 highlights how chaos may represent a promising approach in sensing applications [13], whereas Section 4 illustrates different applications of chaos in robotic motion [14,15,16]. In Section 5 it is shown how chaos can give significant insights to the quality assessments of fruits and vegetables [17]. Section 6 presents some applications of chaos to the hardware implementation of encryption systems [18,19,20,21,22,23,24,25,26] and to random number generation [27,28,29,30,31,32,33,34,35], including the use of chaos for secure transfer of medical images. Finally, Section 7 illustrates how chaos-based logic gates can be used for computing [36], whereas Section 8 highlights how chaos can be exploited in neuromorphic applications [37,38].

2. Applications of Chaos to Communications

Since the applications of chaos to communications cover several topics, this section is organized in three subsections: applications for chaos-based secure communications, applications of chaos for modulation efficiency and applications by virtue of the noise-like properties of chaos.

2.1. Applications for Chaos-Based Secure Communications

Some properties of chaos, such as complex behaviour, noise-like dynamics and spread spectrum can be used to encode data so that the transmitted message is inaccessible to possible eavesdroppers. To this purpose, a number of interesting papers have been published in the years 2018–2020. For example, in [5], new architectures of perturbed digital chaos for image permutation and diffusion have been proposed. The chaotic dynamics is perturbed at bit level using perturbation on state variables and/or on control parameters [5]. Under persistent perturbations, the dynamics of the chaotic map prove to be nonstationary, thus providing advantages in image permutation and diffusion based on cryptography. Simulation results using a logistic map have clearly demonstrated the effectiveness of the conceived approach [5].
In [7], an encryption-based method for region of interest (ROI) security in high-efficiency video coding (HEVC) standards has been illustrated. The selective approach exploits a chaos-based stream cipher to encrypt some HEVC syntax elements. In particular, a standard HEVC decoder is used to decode the bit stream, whereas a secret key is necessary to decrypt the ROI [7]. The suggested chaos-based ROI encryption exploits the tile property of HEVC, which enables each video frame to be split into independent rectangular areas. Experimental measurements have highlighted that the conceived approach enables secure video encryption to be achieved in real-time, with satisfying bit rate and complexity overheads [7].
In [6], the security of some steganagraphic methods (analysed in the spatial and frequency domain) has been improved by exploiting the properties of chaos. In particular, a statistical steganalysis system has been built in order to assess the robustness of three chaos-based steganographic methods [6]. Experimental results have shown that the conceived steganalysis system, which exploits multi-dimensional feature vectors, is able to effectively detect hidden information, regardless of the message size [6].
In [3], a piecewise-linear function is exploited as a dynamic selector for dynamics editing. The approach, which is based on offset boosting, enables any chaotic dynamics from any nonlinear system to be extracted without modifying the system parameters. The authors of reference [3] suggest the use of dynamic selectors as novel keys for chaos-based secure communications, particularly when very complex dynamical systems are involved.
In [4], two robust keyed hash functions comprising a chaotic system and a chaotic neural network have been proposed. The input message M is hashed to a hash value h with a fixed number of 256 or 512 bits. In particular, the chaotic system generates pseudo-chaotic samples, which become parameter values for the neural structure [4]. This combined architecture ensures that the generated hash functions possess excellent statistical properties, including high message and key sensitivity [4]. Thus, the proposed keyed chaos-based hash functions are suitable for digital signature, data integrity and message authentication [4].
In [11], a matrix projective synchronization scheme for fractional-order maps is presented. A novel synchronization error is introduced, and a control algorithm is designed to stabilize the error dynamics at the origin. The synchronization of fractional maps is exploited for a secure communication application, which includes speech encryption over a public channel [11].
In reference [12], S-boxes generated by using chaotic functions are analysed to measure their actual resistance to cryptanalysis. By using two heuristic methods and starting from pseudo-random S-boxes, the author of reference [12] has designed S-boxes that significantly outperform all previously published chaos-based S-boxes. Moreover, the approach in [12] enables to reach near-optimal average coordinate nonlinearity values, which are significantly greater than those known in literature.

2.2. Applications of Chaos for Modulation Efficiency

When chaos is used to modulate a waveform in communication systems, the bit error ratio can be improved with respect to the classical half-sine pulse frequency-modulated waveform. To this purpose, some promising results have been recently published in reference [2]. In particular, in [2] the issue related to the search for efficient solutions for the coexistence of radar and communication systems has been discussed. Specifically, the authors of reference [2] have proposed a new approach to control chaotic trajectories, which assures the coexistence of both radar and communication systems. By selecting a state variable for controlling the trajectory, it is possible to produce a controlled chaos-based frequency modulated (CCBFM) waveform for transmitting a signal in joint radar-communication systems [2]. Moreover, a communication receiver and a radar receiver have been designed in order to decode the information and extract the signature of the target, respectively. Analyses of the conceived chaos-based approach have been conducted [2]. In particular, the bit error ratio highlights that the CCBFM waveform has better performances than the classical half-sine pulse frequency-modulated waveform. Moreover, when the signal-to-noise ratio is about −30 dB, it can be shown that the adoption of CCBFM waveforms assures good target detection and classification [2]. The conducted analysis has clearly demonstrated that chaos-based frequency-modulated waveforms can be effectively exploited for joint radar-communication systems in a shared spectrum [2].

2.3. Applications of Chaos by Virtue of the Noise-Like Properties

Communications can benefit from the noise-like properties of chaotic systems. Some recent manuscripts have addressed this topic. For example, in [8], a key issue in radio wave communication systems has been discussed, i.e., how to exploit chaos with minimum modifications of conventional systems. In particular, the author of reference [8] have proposed the adoption of chaotic shape-forming filters as substitutes for conventional shape-forming filters. By using a suboptimal threshold, Bit Error Rate (BER) in both multi-path channel and system performance has been improved. Additionally, the removal of the complex algorithm for channel equalization has led to simply the software of the overall architecture [8]. The authors of reference [8] also suggest to readily use chaotic shape-forming filters in 5G or 6G communication systems, given that the shape-forming of baseband signals is of paramount importance in radio wave systems.
In [9], suitable chaotic signals and matched filters are proposed for digital communications in wireless channels characterized by severe physical constraints. In particular, the behaviour of underwater acoustic channels is studied. The novelty in the communication system illustrated in [9] is twofold. On the one hand, hybrid systems are used as chaotic signal generators, including matched filters for maximizing the signal to noise ratio at the receiver side. On the other hand, matched filters are designed in order to reduce the noise effect when the information is decoded. The approach in [9] yields good communication capabilities, mostly if we consider the challenges posed by underwater acoustic channels. Moreover, the method is characterized by many advantages related to the properties of chaos, including robustness to narrowband interference. The method in [9] is also environment-friendly, given that noise-like chaotic signals do not disturb the whale’s navigation system [10].

3. Applications of Chaos in Distributed Sensing

Since the measurement of physical variables over extended regions requires several sensors that can result in impractical bandwidth and power consumption, there is the need for distributed sensing approaches where readouts are directly obtained at the ensemble level. Chaos can face this challenging issue via a nonlinear analog approach based on chaotic synchronization. For example, in [13], a precursory study is presented, which brings together two separate research fields, i.e., wireless sensor networks and electronic chaotic oscillators. The authors of [13] demonstrate that it is possible to build distributed sensing systems by implementing the nodes with simple analog chaotic circuits. In particular, [13] presents the first physical evidence that chaotic circuits can be coupled remotely in extended networks. A remarkable result is that several emergent phenomena (including synchronization, desynchronization and chaotic transitions) can be obtained even in the case of weak coupling [13]. Experimental measurements have shown that chaotic single-transistor oscillators are suitable for wireless coupling via mutual induction [13]. This has enabled a form of telemetry for luminous flux to be implemented. The results in [13] highlight the capability to generate accurate estimations of the average of distributed physical magnitudes from complex ensemble dynamics, indicating that the use of chaotic circuits represents a promising approach in sensing applications.

4. Applications of Chaos in Robotic Motion

In applications of robotic motion, there is the need to combine an efficient area coverage with unpredictable movements of the robot. Chaos enables both goals to be achieved, as shown in some recent manuscripts [14,16]. For example, robotic systems can be used in the military for patrol missions or to find explosives [14]. In accomplishing these tasks, the robots should recognize their initial positions and those of the targets, in order to instantly update the map of the workspace [14]. Thus, efficient path planning methods for creating a trajectory in the workspace are required. Since in patrolling missions it is crucial for the robot to move randomly, the use of chaotic systems is proposed in [14] to generate unpredictable trajectories for the motion of the robots. In particular, the considered chaotic path generator is a modified logistic May map, which is exploited for implementing the robot’s movement in four and eight directions [14]. Simulations results are carried out to show the capabilities of the method. In particular, the results in [14] highlight that the use of eight directions improves the behaviour of the robot, both in coverage percentage and in the reduction of the number of visits of the same cells in the square workspace.
In [15], an efficient chaotic path planning algorithm for autonomous mobile robots is illustrated. The objective is to cover a given terrain using chaotic motion. The method in [15] exploits a logistic map with a chaotic tactic, which uses a modulo function to generate a sequence of eight directions on a grid. Using extensive simulations, it is shown that the approach is effective to guarantee path coverage, as the number of iterations increases [15]. In addition, the efficiency of the algorithm is further improved with a pheromone inspired memory technique [15].
Referring to chaotic path planning, in [16], chaotic motion patterns are generated using chaotic pseudo-random bit generators based on modified logistic maps. Namely, the bitstream produced by the generator is converted into motion commands in different directions. Successively, the chaotic logistic map is combined with an inverse pheromone approach in order to get a reduction in the number of revisits in each cell of the workspace [16]. The considered robot is able to move in four or eight directions, even though the conducted analysis highlights that the motion in eight directions provides better results [16]. Simulation results show that the use of the pheromone can significantly increase the coverage percentage, leading to better performances in different scenarios, which include the presence of obstacles in the workspace [16].

5. Applications of Chaos to Bio-Impedance Modelling

Chaotic maps have been recently used with the aim of increasing the efficacy and efficiency of some optimization algorithms. For example, in reference [17] it has been shown that, in order to assess the chemical and physiological changes of plant tissues, it is of paramount importance to carry out parameter extractions of the bio-impedance models using chaos-based optimization algorithms [17]. Namely, impedance measurements can give significant insights in the field of quality assessments of fruits and vegetables, with the aim to better characterize agricultural products. In [17] the flower pollination algorithm (FPA), the grey wolf optimizer (GWO) and a number of their chaotic variants are utilized to extract the parameters of bio-impedance models. By using experimental data for a number of different vegetables, the performances of some chaotic maps applied to FPA and GWO are evaluated over some benchmark functions [17]. The obtained results are compared using fitting errors and execution times, in order to highlight the trade-off between accuracy and speed of convergence [17]. For each presented model, the objective is to choose the best algorithm for parameter extraction. For the simplified Hayden model, both the chaotic FPA and the chaotic GWO achieve satisfying results [17]. For the double-shell model, the chaotic GWO achieves more accurate and consistent results with respect to the chaotic FPA. Finally, the fractional-order versions of the considered models are analysed, with the aim to investigate new approaches in bio-impedance parameter extractions [17].

6. Applications of Chaos to Encryption

In order to efficiently use chaos in cryptography, chaotic systems need to be implemented such that the generated entropy can produce confusion and diffusion properties. These features along with cryptographic primitives share unique characteristics, which enable chaos to be effectively applied to encryption. Herein two main topics are discussed. One issue regards the hardware implementations of encryption systems [18,19,20,21,22,23,24,25,26], whereas the other is related to the capability of chaotic systems to generate random numbers [27,28,29,30,31,32,33,34,35].

6.1. Applications of Chaos in the Hardware Implementation of Encryption Systems

Different technologies have been recently exploited for implementing cryptographic systems in hardware. For example, in [18], at first, a novel hyperchaotic map has been presented by taking a one-dimensional infinite collapse model as seed. Successively, since the conceived map highlights a wide hyperchaotic range, high sensitivity, good ergodicity and extreme complexity performance, a secure communication system has been designed and implemented in hardware [18]. The input message (that can be an image, a text, or a sound) is processed via a delta modulator and then encrypted by exploiting the conceived hyperchaotic map. At the receiver side, the map and a delta demodulator are employed to retrieve the original message. Experimental measurements have shown both efficiency and simplicity of the secure communication system when the information signal is transmitted over an optical channel [18].
In [19], a very simple chaotic system showing both odd and even symmetries is presented, along with an experimental set-up based on FPGA platforms. In particular, a chaos-based speech encryption scheme is designed and implemented on an FPGA using Verilog HDL [19]. The security of the encryption scheme is assessed, with the aim to show the effectiveness of the conceived approach [19]. Moreover, by virtue of good use of the hardware resources, the encrypted scheme is able to guarantee a throughput of 1.3 Gbit/sec via a Xilinx Kintex 7.
In [20], the FPGA implementation of a sound encryption system based on a fractional-order chaotic system is illustrated. A number of techniques are exploited to enhance the throughput as well as to reduce the hardware utilization. Security analysis techniques (including basic statistical aspects, the NIST tests, mean square error and key sensitivity) are carried out to highlight the robustness of the conceived approach [20].
In [21], a novel stream cipher based on a chaotic skew tent map is illustrated and realized in a 0.18 µm CMOS technology. The conceived ciphering algorithm exploits a linear feedback shift register, which modifies the chaotic trajectories produced by the skew tent map dynamics. This enables the randomness of the generated sequences to be improved [21]. The implemented stream cipher is able to achieve encryption speeds of 1 Gbps with power consumption as low as 24.1 mW. A security analysis of the cipher is carefully carried out [21]. In particular, the generated keystreams are analysed via NIST randomness tests, showing that they are undistinguishable from truly random sequences. Key sensitivity and key space size are analysed, with the aim to highlight the security of the conceived cipher [21].
In [22], a chaotic system without equilibrium points (i.e., with hidden attractors) is at first introduced and implemented in a real electronic circuit. Then, S-boxes are realized and employed in a new image encryption algorithm [22]. In particular, some S-boxes with good cryptographic properties are exploited for sub-byte operations. The performances of both S-boxes and encryption procedures are analysed to highlight the capabilities of the method [22].
By virtue of their complex dynamic behaviours, chaotic systems with coexisting attractors [23,24,25] represent an interesting topic in view of their practical application to encryption. For example, in [26] an extended Lü system with coexisting attractors is at first introduced, along with analyses of bifurcation diagrams and phase portraits. Then, a hardware implementation of the conceived system is illustrated, along with an efficient chaotic image encryption algorithm [26].

6.2. Applications of Chaos to Random Number Generation

With the rapid development of communication technology, it is worth noting that random numbers are used in many cryptographic protocols, including key management, identity authentication and image encryption. Since randomness and unpredictability are required by encryption, it is clear that chaos has good features in this regard, by virtue of the sensitive dependence on initial conditions, periodicity and reproduction. Some interesting manuscripts have been recently published on the topic [27,28,29,30,31,32,33,34,35]. For example, in [27] the dynamics of some discrete-time chaotic systems in the digital (i.e., finite-precision) domain is studied. Differently from classical approaches treating a digital chaotic map as a black box, in [27] the dynamical properties of the logistic map and the tent map are explored with fixed-point arithmetic from a new perspective. Namely, the innovative approach is based on state-mapping networks, where each value in the digital domain is treated as a node, whereas the mapping between pairs of nodes is treated as a directed edge [27]. Scale-free properties of the logistic map under the state-mapping network approach are clearly highlighted. Moreover, extension of the technique to floating-point arithmetic is studied in detail [27]. Finally, the authors of reference [27] highlight that to understand the state-mapping network structure of chaotic discrete-time systems in digital computers, it may help to take into account unwelcome degenerations of chaos in finite-precision domains. This may help to enhance the randomness of pseudorandom number generators based on chaotic maps [27].
In [28], it is pointed out that low-power devices used in Internet-of-things networks currently lack security owing to the high power consumption of random number generators. Consequently, the authors of reference [28] present a low-power true random number generator that exploits a four-dimensional hyperchaotic system characterized by hidden attractors. A customized circuit is realized using 130 nm CMOS technology, with the aim to integrate it into low-power devices. Moreover, chaotic data post-processing via SHIFT-XOR is exploited to produce random bit outputs [28]. The consumption of the hyperchaotic circuit reaches the maximum value of 980µW to generate the chaotic signals, whereas the dissipation of the static current is about 623µA. Finally, the authors of reference [28] highlight that the approach guarantees ready-to-use random bit sequences that passed the randomness test NIST SP800-22.
A novel chaotic system, which exploits a recently proposed signum thermostat, is presented in [29]. The implemented circuit produces a signal whose probability distribution function is accurately Gaussian. Data from the implemented circuit are analysed. The experimental results prove to be in agreement with the theoretical analysis, indicating that the implemented chaotic circuit is effective in producing accurate Gaussian random numbers [29].
In [30], a simple method for designing pseudo-random bit generators is presented. The approach enables multiple bits per iteration to be generated from the decimal part of a chaotic map [30]. The objective is achieved by removing the decimal part of the state in each iteration and by comparing each digit with respect to a threshold value. By using such a technique, more than one bit can be generated in each iteration. This represents an advantage over most of the chaos-based generators available in the literature, since they can produce only one bit [30]. The final bitstream passes all NIST tests. Moreover, simulation results show that for each iteration about 8 digits can be extracted for most of the chaotic maps, indicating the effectiveness of the conceived approach in designing innovative pseudo-random bit generators [30].
By using fuzzy triangular numbers, in [31] a modification of the well-known logistic map is proposed. The modified map, analysed via bifurcation diagrams and Lyapunov exponents, exhibits a high number of chaos-related phenomena, including antimonotonicity and crisis. The map is then exploited for generating pseudo-random bit sequences via an effective algorithm [31]. The conceived bit generator readily passes the NIST statistical tests. Note that the proposed technique enables the complexity of any chaotic map to be increased. Moreover, note that the method in [31] can be generalized and, consequently, utilized for pseudo-random bit generators based on chaotic maps different from the logistic one.
In [32], a novel chaotic system with hyperbolic sinusoidal function is introduced, where self-excited attractors and hidden attractors coexist. A chaotic circuit is designed and implemented. By varying its parameters, it is shown that the chaotic circuit presents two sets of hidden attractors (with line of equilibria and no equilibrium point), which provide additional complexity to the system dynamics [32]. On the basis of these results, a random number generator is designed, which successfully passes all the NIST statistical tests [32].
In [33], a modified logistic map that exhibits a number of different chaotic behaviours (i.e., antimonotonicity, crisis, and coexisting attractors) is proposed. The increased complexity of the map dynamics is then exploited to implement a chaos-based pseudo-random bit generator. The approach exploits techniques that include multiple map comparison, bit reversal and XOR [33]. The conceived generator passes all the NIST tests, confirming the validity of the approach.
In [34], it is pointed out that most of the chaotic maps used for cryptographic applications have a number of weaknesses, including limited chaotic ranges, small Lyapunov exponents and heavy computational costs. The authors of reference [34] make an attempt to overcome these drawbacks by constructing a new chaotic map with complex dynamic behaviour via geometric operations. In particular, Lyapunov exponents and some associated theorems are mathematically derived, so that the map is characterized by good chaotic performances [34]. Moreover, the design of a pseudo-random number generator is carried out using the conceived chaotic map. Performance evaluations show that the conceived generator can effectively produce high-quality random sequences [34].
In [35], a generalization of the double-humped logistic map is introduced and applied to pseudo-random number generation (PRNG) for the encryption of medical images. The approach offers secure communication transfer of medical MRI and X-ray images. Different tests are carried out (i.e., sensitivity test, histogram analysis, correlation coefficients and NIST analysis), with the aim to highlight the encryption efficiency in transmitting medical images [35].

7. Applications of Chaos to Computing

Modern digital computers perform computations using logic gates. On the other hand, the high sensitivity to initial conditions of chaotic systems leads their dynamics to switch fast between patterns. By combining logic gates and chaos properties, chaotic morphing logic gates can be implemented via nonlinear circuits that exhibit chaotic dynamics producing various patterns. Then, control mechanisms can be used to select patterns that correspond to different logic gates. Based on these considerations, interesting applications of chaos to computing have been recently presented [36]. In particular, the authors of reference [36] have presented an approach that combines two different research topics, i.e., chaos computing and logical stochastic resonance. On the one hand, the authors propose the implementation of fundamental logic operations by using the switch between chaotic attractors [36]. The idea is that the dynamics of some nonlinear systems can hop between attractors located in different parts of the phase space when system parameters and/or initial states are varied. Based on this idea, the implementation of the fundamental NOR gate is demonstrated [36]. The logic response can be switched from NOR to NAND via small changes of the bias parameters, indicating that the circuits are readily reconfigurable. Another advantage is that complementary logic operations can be obtained in parallel using different circuit variables [36]. On the other hand, the authors of reference [36] present a generalized concept of logical stochastic resonance (LSR). Namely, they prove that the idea of LSR (to date based on the use of steady states) can be extended to chaotic attractors. Specifically, the authors of reference [36] show that the noise floor aids the reliability of the logic operations, even when they are based on the switch between states more complex than fixed points, such as chaotic attractors. Finally, experimental circuit realization of the conceived approach is reported, indicating the feasibility of the method in real-world applications [36].

8. Applications of Chaos to Neuron Modelling

Processing of data via neuromorphic nonlinear dynamics is a key element for brain-inspired computers. In [37] it is found that the Chua Corsage memristor has rich neuromorphic behaviours, with great potentials for hardware implementations of neuromorphic computing. In particular, in [37] the theory of local activity and edge of chaos are applied to analyse the neuromorphic dynamics of the second-order Chua Corsage memristor-based neuron model.
The authors of reference [38] report on the neuromorphic dynamics of nanowire networks (NWNs), a unique brain-inspired system with synapse-like memristive junctions embedded within a recurrent neural network-like structure. The paper shows that NWNs adaptively respond to time-varying stimuli, exhibiting different dynamic behaviours, ranging from order to chaos. Finally, the authors of reference [38] show that the dynamical state at the edge-of-chaos is optimal for learning, besides improving complex information processing tasks from the computational point of view.

9. Conclusions

As a Guest Editor of the Special Issue on Chaotic Systems and Nonlinear Dynamics, the author of the present manuscript has aimed to bridge the gap between chaos theory and chaos applications by presenting a survey of very recent applications of chaos. The manuscript has made a precise choice, i.e., to cover the last three years in the literature (2018 to 2020), so that only very recent applications of chaos have been taken into account. In this way, the manuscript would be considered a landmark for readers who seek fresh and novel applications of chaos to real-world issues. The covered topics have included applications of chaos to communications, to distributed sensing, to robotic motion, to bio-impedance modelling, to hardware implementation of encryption systems, to computing and to random number generation. The approach has made perceivable the great potential of the applications of chaos in solving complex real problems and, consequently, in improving our everyday life.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The study did not report any data.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Skiadas, C.H.; Skiadas, C. Handbook of Applications of Chaos Theory; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  2. Pappu, C.S.; Carroll, T.L.; Flores, B.C. Simultaneous Radar-Communication Systems Using Controlled Chaos-Based Frequency Modulated Waveforms. IEEE Access 2020, 8, 48361–48375. [Google Scholar] [CrossRef]
  3. Li, C.; Lei, T.; Wang, X.; Chen, G. Dynamics editing based on offset boosting. Chaos 2020, 30, 063124. [Google Scholar] [CrossRef]
  4. Abdoun, N.; El Assad, S.; Hoang, T.M.; Deforges, O.; Assaf, R.; Khalil, M. Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. Entropy 2020, 22, 1012. [Google Scholar] [CrossRef]
  5. Hoang, T.M.; El Assad, S. Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos. Entropy 2020, 22, 548. [Google Scholar] [CrossRef]
  6. Battikh, D.; El Assad, S.; Hoang, T.M.; Bakhache, B.; Deforges, O.; Khalil, M. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy 2019, 21, 748. [Google Scholar] [CrossRef] [Green Version]
  7. Taha, M.A.; Hamidouche, W.; Sidaty, N.; Viitanen, M.; Vanne, J.; El Assad, S.; Deforges, O. Privacy Protection in Real Time HEVC Standard Using Chaotic System. Cryptography 2020, 4, 18. [Google Scholar] [CrossRef]
  8. Bai, C.; Ren, H.P.; Zheng, W.Y.; Grebogi, C. Radio-Wave Communication with Chaos. IEEE Access 2020, 8, 167019–167026. [Google Scholar] [CrossRef]
  9. Bai, C.; Ren, H.P.; Baptista, M.S.; Grebogi, C. Digital underwater communication with chaos. Commun. Nonlinear Sci. Numer. Simulat. 2019, 73, 14–24. [Google Scholar] [CrossRef]
  10. Bai, C.; Ren, H.P.; Grebogi, C.; Baptista, M.S. Chaos-Based Underwater Communication with Arbitrary Transducers and Bandwidth. Appl. Sci. 2018, 8, 162. [Google Scholar] [CrossRef] [Green Version]
  11. Yan, W.; Ding, Q. New Matrix Projective Synchronization of FODT Systems and Its Application in Secure Communication. IEEE Access 2020, 8, 147451–147458. [Google Scholar] [CrossRef]
  12. Dimitrov, M.M. On the Design of Chaos-Based S-Boxes. IEEE Access 2020, 8, 117173–117181. [Google Scholar] [CrossRef]
  13. Minati, L.; Tokgoz, K.K.; Frasca, M.; Koike, Y.; Iannacci, J.; Yoshimura, N.; Masu, K.; Ito, H. Distributed Sensing Via Inductively Coupled Single-Transistor Chaotic Oscillators: A New Approach and Its Experimental Proof-of-Concept. IEEE Access 2020, 8, 36536–36555. [Google Scholar] [CrossRef]
  14. Petavratzis, E.; Moysis, L.; Volos, C.; Nistazakis, H.; Muñoz-Pacheco, J.M.; Stouboulos, I. Chaotic Path Planning for Grid Coverage Using a Modified Logistic-May Map. J. Autom. Mob. Robot. Intell. Syst. 2020, 14, 3–9. [Google Scholar] [CrossRef]
  15. Moysis, L.; Petavratzis, E.; Volos, C.; Nistazakis, H.; Stouboulos, I. A chaotic path planning generator based on logistic map and modulo tactics. Robot. Auton. Syst. 2020, 124, 103377. [Google Scholar] [CrossRef]
  16. Petavratzis, E.; Volos, C.; Moysis, L.; Stouboulos, I.; Nistazakis, H.; Tombras, G.S.; Valavanis, K.P. An Inverse Pheromone Approach in a Chaotic Mobile Robot’s Path Planning Based on a Modified Logistic Map. Technologies 2019, 7, 84. [Google Scholar] [CrossRef] [Green Version]
  17. Yousri, D.; AbdelAty, A.M.; Said, L.A.; Elwakil, A.S.; Maundy, B.; Radwan, A.G. Chaotic Flower Pollination and Grey Wolf Algorithms for parameter extraction of bio-impedance models. Appl. Soft Comput. 2019, 75, 750–774. [Google Scholar] [CrossRef]
  18. Al-Saidi, N.M.G.; Younus, D.; Natiq, H.; Ariffin, M.R.K.; Asbullah, M.A.; Mahad, Z. A New Hyperchaotic Map for a Secure Communication Scheme with an Experimental Realization. Symmetry 2020, 12, 1881. [Google Scholar] [CrossRef]
  19. Tolba, M.F.; Elwakil, A.S.; Orabi, H.; Elnawawy, M.; Aloul, F.; Sagahyroon, A.; Radwan, A.G. FPGA implementation of a chaotic oscillator with odd/even symmetry and its application. Integration 2020, 72, 163–170. [Google Scholar] [CrossRef]
  20. Abd El-Maksoud, A.J.; Abd El-Kader, A.A.; Hassan, B.G.; Rihan, N.G.; Tolba, M.F.; Said, L.A.; Radwan, A.G.; Abu-Elyazeed, M.F. FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectron. J. 2019, 90, 323–335. [Google Scholar] [CrossRef]
  21. Garcia-Bosque, M.; Díez-Señorans, G.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Aldea, C.; Celma, S. A 1 Gbps Chaos-Based Stream Cipher Implemented in 0.18 µm CMOS Technology. Electronics 2019, 8, 623. [Google Scholar] [CrossRef] [Green Version]
  22. Wang, X.; Çavuşoğlu, Ü.; Kacar, S.; Akgul, A.; Pham, V.T.; Jafari, S.; Alsaadi, F.E.; Nguyen, X.Q. S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium. Appl. Sci. 2019, 9, 781. [Google Scholar] [CrossRef] [Green Version]
  23. Lai, Q. A unified chaotic system with various coexisting attractors. Int. J. Bifurc. Chaos 2021, 31, 2150013. [Google Scholar] [CrossRef]
  24. Lai, Q.; Wan, Z.; Kengne, L.K.; Kuate, P.D.K.; Chen, C. Two-memristor-based chaotic system with infinite coexisting attractors. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 2197–2201. [Google Scholar] [CrossRef]
  25. Lai, Q.; Wan, Z.; Kuate, P.D.K. Modeling and circuit realisation of a new no-equilibrium chaotic system with hidden attractor and coexisting attractors. Electron. Lett. 2020, 56, 1044–1046. [Google Scholar] [CrossRef]
  26. Lai, Q.; Norouzi, B.; Liu, F. Dynamic analysis, circuit realization, control design and image encryption application of an extended Lu system with coexisting attractors. Chaos Solitons Fractals 2018, 114, 230–245. [Google Scholar] [CrossRef]
  27. Li, C.; Feng, B.; Li, S.; Kurths, J.; Chen, G. Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. CAS-I 2019, 66, 2322–2335. [Google Scholar] [CrossRef] [Green Version]
  28. Nguyen, N.; Kaddoum, G.; Pareschi, F.; Rovatti, R.; Setti, G. A fully CMOS true random number generator based on hidden attractor hyperchaotic system. Nonlinear Dyn. 2020, 102, 2887–2904. [Google Scholar] [CrossRef]
  29. Sprott, J.C.; Thio, W.J. A Chaotic Circuit for Producing Gaussian Random Numbers. Int. J. Bifurc. Chaos 2020, 30, 2050116. [Google Scholar] [CrossRef]
  30. Moysis, L.; Tutueva, A.; Volos, C.; Butusov, D. A Chaos Based Pseudo-Random Bit Generator Using Multiple Digits Comparison. Chaos Theory Appl. 2020, 2, 58–68. [Google Scholar]
  31. Moysis, L.; Volos, C.; Jafari, S.; Munoz-Pacheco, J.M.; Kengne, J.; Rajagopal, K.; Stouboulos, I. Modification of the Logistic Map Using Fuzzy Numbers with Application to Pseudorandom Number Generation and Image Encryption. Entropy 2020, 22, 474. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Mobayen, S.; Volos, C.K.; Çavuşoğlu, Ü.; Kaçar, S. A Simple Chaotic Flow with Hyperbolic Sinusoidal Function and Its Application to Voice Encryption. Symmetry 2020, 12, 2047. [Google Scholar] [CrossRef]
  33. Moysis, L.; Tutueva, A.; Volos, C.; Butusov, D.; Munoz-Pacheco, J.M.; Nistazakis, H. A Two-Parameter Modified Logistic Map and Its Application to Random Bit Generation. Symmetry 2020, 12, 829. [Google Scholar] [CrossRef]
  34. Zhang, Z.; Wang, Y.; Zhang, L.Y.; Zhu, H. A novel chaotic map constructed by geometric operations and its application. Nonlinear Dyn. 2020, 102, 2843–2858. [Google Scholar] [CrossRef]
  35. Ismail, S.M.; Said, L.A.; Radwan, A.G.; Madian, A.H.; Abu-Elyazeed, M.F. Generalized double-humped logistic map-based medical image encryption. J. Adv. Res. 2018, 10, 85–98. [Google Scholar] [CrossRef]
  36. Murali, K.; Sinha, S.; Kohar, V.; Kia, B.; Ditto, W.L. Chaotic attractor hopping yields logic operations. PLoS ONE 2018, 13, e0209037. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Dong, Y.; Liang, Y.; Wang, G.; Lu, H.H.C. Chua Corsage memristor-based neuron models. Electron. Lett. 2021. [Google Scholar] [CrossRef]
  38. Hochstetter, J.; Zhu, R.; Loeffler, A.; Diaz-Alvarez, A.; Nakayama, T.; Kuncic, Z. Avalanches and edge-of-chaos learning in neuromorphic nanowire networks. Nat. Commun. 2021, 12, 4008. [Google Scholar] [CrossRef] [PubMed]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Grassi, G. Chaos in the Real World: Recent Applications to Communications, Computing, Distributed Sensing, Robotic Motion, Bio-Impedance Modelling and Encryption Systems. Symmetry 2021, 13, 2151. https://doi.org/10.3390/sym13112151

AMA Style

Grassi G. Chaos in the Real World: Recent Applications to Communications, Computing, Distributed Sensing, Robotic Motion, Bio-Impedance Modelling and Encryption Systems. Symmetry. 2021; 13(11):2151. https://doi.org/10.3390/sym13112151

Chicago/Turabian Style

Grassi, Giuseppe. 2021. "Chaos in the Real World: Recent Applications to Communications, Computing, Distributed Sensing, Robotic Motion, Bio-Impedance Modelling and Encryption Systems" Symmetry 13, no. 11: 2151. https://doi.org/10.3390/sym13112151

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop