Next Article in Journal
Reinforcement Learning-Based Network Dismantling by Targeting Maximum-Degree Nodes in the Giant Connected Component
Previous Article in Journal
A Spatial Agent-Based Model for Studying the Effect of Human Mobility Patterns on Epidemic Outbreaks in Urban Areas
Previous Article in Special Issue
Block Cipher Nonlinear Component Generation via Hybrid Pseudo-Random Binary Sequence for Image Encryption
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling a Single-Channel Synergetic Observer for Chaos-Based Secure Communication System Applications

1
Institute for Computer Technologies and Information Security, Southern Federal University, Chekhova 2, Taganrog 347922, Russia
2
Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 042 00 Košice, Slovakia
3
Faculty of Aeronautics, Technical University of Košice, Rampová 7, 041 21 Košice, Slovakia
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(17), 2764; https://doi.org/10.3390/math12172764
Submission received: 6 August 2024 / Revised: 27 August 2024 / Accepted: 2 September 2024 / Published: 6 September 2024
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)

Abstract

:
This paper explores secure communication systems with a chaotic carrier. The use of chaotic oscillations instead of regular van der Pol oscillators as a signal carrier is a promising and active research area, providing not only communication systems with new protection principles and organization but also high steganographic efficiency when transmitting short messages. The problem is to select methods and techniques for mixing a useful signal into a chaotic one and its recovery on the receiver side, featuring a set of properties acceptable for implementation and real-world application. We demonstrate application of synergetic control theory (SCT), which provides advanced observer-basing methods for nonlinear dynamic systems as well as explore example of data transmission system consisting of a Genesio–Tesi chaotic oscillator, data signal transmission with a method of nonlinear modulation, and recovering with a single-channel synergetic observer at the receiver side. The paper presents a nonlinear state observer modeling procedure followed by building a MATLAB/Simulink simulation model of the data transmission system for the PC-platform along with software implementation for the Raspberry Pi platform, with simulation and experimental run results showing data transmission rates seem to be acceptable for the considered practical applications. Practical applications and limitations issues are discussed. Future research will be universal modeling procedures for different classes of chaotic generators and whole system experimental hardware implementation. The obtained results can be primarily used in short messages and/or encryption keys secure transmission systems, cyber-physical system component command communications, as well as chaotic carrier system R&D competitive studies and other applications.

1. Introduction

The use of dynamic chaos phenomena for the creation and operation of secure data transmission systems can be identified as a special area of theoretical and applied research since the last decade of the 20th century. There are a big number of significant publications on this topic in the world literature, including the definitive research of Lorenz, Rössler [1], Anishchenko [2,3], Pecora [4], Chua [5], Leonov and Kuznetsov [6], and other researchers [7,8,9,10], which show the use of chaotic systems as carrier oscillation generators for communication channels. Chaotic generators, in contrast to the van der Pol generator of regular oscillations widely used in communication channels, are commonly called nonlinear dynamic systems that, with certain combinations of their parameters, go into the mode of generating chaotic oscillations with the formation of so-called “strange” attractors in their phase space [1,6,11], including recently discovered “hidden” attractors [6,12]. There is a huge number of publications, starting with the works of Lorenz, Roesler, etc. [1,11], in which models of this kind of nonlinear dynamic systems are identified and studied, which provides a rich selection of chaotic generators models when creating secure data transmission systems with a chaotic carrier. When forming such systems, various methods can be used [7,10,13] both for:
(i)
Introducing useful information into a chaotic carrier (masking with chaotic oscillations [7], modulating the parameters of a chaotic generator by additive or multiplicative injection of a useful signal [9], Runge–Kutta method modulation [14], mixing, nonlinear mixing, shift keying, additive mixing, etc. [7]) on the transmitter side;
(ii)
Restoring or recover/decoding the information component of the transmitted signal on the receiver side (most of them are chaotic carrier filtering, estimation of the least squares method (LS method), and adaptive methods including chaotic synchronization, and the use of state observers). Chaotic carrier filtering [7] may apply only to low security methods of masking; LS method [2] mainly provides great error of signal recovering for nonlinear systems [15] so the probable good practice methods are the adaptive ones.
Along with continuous chaotic systems, discrete-form chaotic systems are also used for secure transmission of data and images, which in some cases can facilitate their physical hardware implementation. Modern methods, allowing to work with such systems, may include but are not limited to various types of construction of chaotic maps and chaotic masking and modulation. For example, in [16,17], variants of two-dimensional and one-dimensional chaotic maps for discrete chaotic systems are presented, including issues of their realization on field-programmable gate arrays (FPGAs). In [18,19], the issues in the construction of chaotic maps for discrete chaotic systems for secure image transmission, as well as their encryption using models of high-order chaotic systems and chaotic maps of various kinds [20,21,22,23], are considered.
In continuous chaotic systems, chaotic synchronization [8] refers now to the most popular principle of both restoring a useful signal and forming the structure of a data transmission system with a chaotic carrier as a whole due to the possibility of practical implementation.
There are different methods and approaches to chaotic system synchronization: backstepping [24], sliding mode control (SMC) [25], forced SMC with an analytical design of aggregated regulators (ADARs) method [26], robust methods [27], indirect coupled synchronization [28], and others.
An alternative to chaotic synchronization may be a method of restoring the useful signal on the receiving side using state observers [29]. Interest in research in this area [9] may be that the use of well-known state observers (the well-known Luenberger observer and the Kalman filter [30]) is limited by essentially nonlinear systems, the models of which are chaotic generators.
The state-of-the-art state observer technologies used in the development of chaotic carrier communication systems include unknown input observer synchronization [29,31], adaptive unknown-input observer [32], descriptor observer [33], high gain observer synchronization [34], robust chaotic observer [35], chaotic synchronization and communication via linear-state observer design [36], and other observed-based methods for secure communication [13,37,38,39], but most of these observers have some limitations for direct application to nonlinear systems. Nonlinear system unknown variables’ recovery may be provided by a nonlinear synergetic observer based on the ADAR method of the synergetic control theory (SCT).
ADAR and SCT were developed by the scientific school of Professor A.A. Kolesnikov of the Southern Federal University [40,41]. SCT is partially based on Synergetics general principles formulated by H. Haken. Within the framework of this technique, the problems of synthesizing state observers for single- and multi-channel data transmission systems with a chaotic carrier were explored in our previous publications [15,42,43]. These results may be used to create secure data transmission systems based on various chaotic generators of the second and third order.
In this paper, we explore the issues of practical implementation of results that have been achieved in our previous manuscripts [42,44]. A procedure is presented for the analytical synthesis of a single-channel synergetic state observer based on the Genesio–Tesi chaotic generator [11]. The system model was implemented in MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) based on the model-based design [45] approach to modeling. Software implementation of the system was completed and ready for transfer and further implementation on Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) single-board computers, as well as a part of various cyber-physical systems [46].
The main contributions of this study are summarized as follows:
  • We firstly present, in detail, a mathematical procedure for modeling a single-channel synergetic state observer for a third-order nonlinear chaotic system.
  • The procedure is realized on the example of a chaotic Genesio–Teri generator with generator model parameter multiplicative modulation of the useful signal on the transmitter side.
  • An example of realization of chaotic system on the basis of Genesio–Teri generator and synergetic state observer in MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) environment is provided.
  • Experimental realization of the obtained system on a single-board computer Raspberri Pi to demonstrate the fundamental possibility of physical implementation of the system of secure data transmission on the above principles for certain areas of application.
Thus, the aim of the manuscript is to demonstrate in detail an analytical modeling procedure for a nonlinear state observer for building a single-channel data transmission system with a chaotic carrier for a Genesio–Tesi chaotic generator as well as to provide some examples of practical application and implementation.
The rest of this paper is organized as follows: In Section 2, a description of the mathematical model of a Genesio–Tesi third-order chaotic generator is given, which is chosen as a generator of chaotic carrier oscillations in this work. The selected system structure and coding (chaotic mixing) and decoding (signal recovery) technologies are described, with a brief overview of synergetic state observers given as well as target hardware platform and received signal decoding/restore issues are discussed. Section 3 describes the modeling sequence (analytical form design procedure) of a synergetic state observer for a Genesio–Tesi chaotic generator with resulting system simulation, as well as MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) and stand-alone software implementation for PC and Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) platforms. Section 4 concludes the paper.

2. Materials and Methods

This paper sets the task of building a system of hidden information transmission using the phenomena of dynamic chaos. In the developed system, data securing will be provided by means of masking the chaotic carrier of the selected chaos generator model. The signal recovery will be performed using a single-channel synergetic state observer.
The modeling procedure of the synergetic state observer is performed in symbolic form by virtue of the given nonlinear mathematical model of the dynamic system. Thus, the algorithm and the general procedure depend on the dimensionality of the system and the structure of the right parts of the system of differential equations, the number and location of unobservable variables. These differences require making some (although finite in the number of possible variants) decisions in the general modeling process, which leads to the need to develop a unique procedure for virtually every nonlinear model of the chaotic oscillator used. These procedures are the novelty and build up a scientific value of this and other our related works. In addition, in some cases, the modeling procedure may not result in a performable observer since the modulation of some coefficients may adversely affect the overall stability of the system, which requires additional study and research.

2.1. Chaotic Generator Model

As the modeling procedure is chaotic generator model dependent, and we have been presented synergetic observer design procedures for some famous chaotic generator in our previous works (e.g., Lorenz, Rössler, Shimizu–Morioka, etc. [15,41,42,43]), here we consider Genesio–Tesi chaotic system mathematical model [11] as a chaotic carrier generator component:
d x d t = y , d y d t = z , d z d t = c x b y a z + x 2 ,
where x ,   y , z are system dynamic (or state) variables, a , b , c are system constant parameters, and t is the time. The phase portrait along with its projections is shown in Figure 1.
The canonical form of the mathematical model of a third-order chaotic generator for single-channel transmission [2,3] is:
d x 1 d t = x 2 , d x 2 d t = x 1 , d x 3 d t = f x 1 , x 2 ,   k ,
where x 1 ,   x 2 ,   x 3 are the system state variables, t is the time, and k is the vector of constant coefficients.
This form allows us to collect all the significant information about the parameters in the value of one system variable, which ensures masking of the chaotic carrier and transmission of all necessary information over only a single channel.
If we apply another mathematical model of a chaotic generator of the third order that does not correspond to the canonical form of Equation (2) (a fairly common case), to bring it to the canonical form of Equation (2), it is necessary to apply the procedure for reconstructing a dynamic system by the method of sequential differentiation [3].
Since the original system of Equation (1) has the form for which the global reconstruction synthesis procedure [3] is not required to obtain its one-dimensional implementation by Equation (2), we may just proceed to the direct synthesis of the synergetic observer.

2.2. Transmitter Side Useful Signal Modulation Method

From a number of different methods of chaotic signal substitution mentioned in the previous section, for this work we choose chaos modulation by nonlinear substitution of a useful signal into the structure of the mathematical model. For this purpose, we choose a constant coefficient in the chaotic oscillator model by Equation (1) as an unobservable parameter, which will be the carrier of the useful signal.
In this case, the modulating term must be chosen so that it enters the mathematical model multiplicatively rather than additively; otherwise, the useful signal can be extracted from the transmitted one by filtering, which was shown by Short in [47]. Moreover, the security issue of chaotic masking with additive modulation was also demonstrated in [48]. Results of [47,48] mean that more simple masking techniques [10] a priori provide more weak protection overall or at disclosing some information about implemented modulation methods and should not be considered.
We explore short message transmission in order to maintain the steganographic property, which is an advantage of the chaotic carrier system, that may disappear for long message transmission. In [47,48] and our previous study [15,44] it is shown that despite chaotic carrier signal added additively to a chaotic oscillator model is amenable to extraction by filtering [47], in our work [15,44] when multiplicative mixing is used, it is still possible to detect periodic (non-chaotic sequences) in the communication channel when analyzed in detail using fast Fourier transform (FFT) of the signal. When transmitting long messages, such detection will be some noticeable, and when transmitting short messages, the possibility of their detection against the background of noise and other interference is reduced, which increases the steganographic property of the system. In general, there are no fundamental restrictions on the transmission of long and even streaming messages, but here we should take into account the computational delay due to the work of the observer in the restoration of the signal on the receiver side.
According to the above-mentioned considerations, as an unobserved parameter in Equation (1), we take the parameter a. We introduce a new parameter a*(t) for the Genesio–Tesi generator instead of a constant:
a * t = a + μ t ,
where μ t is a useful signal to be transmitted via secure communication channel. We then take the signal Z t , generated by the system of Equation (1), as the basis for the transmission, which will be transmitted over an open communication channel, under the following assumptions:
  • The communication channel is used to transmit digital information, in this case the modulating signal μ t is piecewise constant;
  • Modulated parameter a > 0 .
From [11], it is known that the system acquires chaotic properties when a b < c , i.e., such a set of parameters ensures the generation of chaotic oscillations for the system under consideration. To restore a useful signal nonlinearly masked by chaotic oscillations, below we construct an observer for the system of Equation (1), which will estimate the parameter a 1 t = a + 1 on the receiver side.

2.3. Receiver Side Signal Reconstruction Method

As a data signal recovery mechanism on the receiver side, we will use the synergetic state observer. The state observer allows you to continuously receive information from the plant regarding changes in the control action and/or control value.
These algorithms are nonlinear feedbacks, guaranteeing a regular or chaotic mode appearing. The method consists in introducing invariant manifolds to reduce the geo-metric dimension and stage-by-stage decomposition of the original system. This theory, method, and procedure were developed based on the ADAR method [42,43]. Using a synergetic observer eliminates any other command links or synchronization mechanisms mandatory for the data recovery methods, including chaotic synchronization.
In a synergetic nonlinear observer, the final structure of the observer contains the right parts of the original observation object differential equations, in our case the nonlinear Genesio–Tesi system used as a generator of carrier chaotic oscillations. As a result, the structure of the observer changes depending on the chosen chaotic generator, which increases the security of the developed system for hidden information transmission, while all terms of the original system are taken into account. But due to this reason, the modeling of the synergetic observer should be considered each time as a separate design problem, because the procedure generally depends on the selected chaotic mathematical model of the system, its dimension, and its structure.

2.4. Secured Data Transmission System Block Diagramm

The block diagram of the system is presented in Figure 2. An information signal is received at the input of the system, which is then multiplicatively masked in the transmitter by a chaotic signal produced by a chaotic generator. In a communication channel, noise is mixed into the received complex signal. Thus, a mixed signal is obtained, which is then sent to the receiver unit. In the receiver, the signal is restored, and the reconstruction error is visible on the simulation results, that is, how accurately the useful signal is restored from that received in the communication channel and the restored signal itself.

2.5. Target Hardware Platforms

Initial analytical modeling of the state observer and initial simulation were performed in the Maple 6 (Waterloo Maple Inc., Waterloo, ON, Canada) symbolic computing environment software. The following hardware and software tools and platforms are assumed to be used for more detailed computer simulation: First is a typical PC with Intel Core i5 10505, 3.2 GHz, RAM: 8 GB DDR, ROM: SSD 256 GB, Intel UHD Graphics 630 (DELL Optiplex 7780, DELL Inc., Round Rock, TX, USA) under MS Windows 10 (Microsoft Corp., Redmond, TX, USA) with MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) numerical simulation software to build a simulation model of the transmitter, receiver, and communication channel with Simulink blocks in the MATLAB environment. This will allow us to verify the results of symbolic modeling in Maple 6 (Waterloo Maple Inc., Waterloo, ON, Canada), as well as to create a simulation model of any complexity, including sub-models of communication channels, external influences, etc. The visual design interface makes this tool convenient and intuitive to adapt the presented results to specific requirements and conditions. Additionally, the feature of automatic generation of C/C++ code from Simulink block-models within the framework of a model-based design approach allows realizing stand-alone applications reflecting Simulink block diagrams with minimal efforts.
The second is a single-board Raspberry Pi 4B (Raspberry Pi Foundation, Pencoed, UK) computer used as an example of a single-purpose industrial controller providing transmitter and/or receiver hardware platform simulation [49]. This platform can sufficiently simulate real encryption or decryption devices on the transmitter and receiver sides or components of the target cyber-physical system. The presence of a standard Linux-based operating system allows creating a universal software implementation of the system components and actually simulates the operation of the system layout in the field.

2.6. Transmission and Recovery Error Detection/Correction

The used method of elimination of transmission and recovery errors of binary data is repeated/multiple transmission. Special methods of error detection and correction were not applied within the framework of this work; their selection and application to data transmitted over chaotic carrier systems requires further study and discussion, and since at this stage it is not the main problem, to demonstrate the fundamental feasibility of the method we have been using: the method of multiple transmission with statistical selection of the most frequently repeated variant. The disadvantage of the method is the need for redundant multiple transmissions, but due to its unambiguity, it gives significant results, which can serve as initial data for studying the applicability of other known methods of error detection and correction.

3. Results and Discussion

3.1. Modeling Procedure of Synergetic State Observer for Genesio–Tesi Chaotic Generator

For further work, the Genesio–Tesi chaotic generator model by Equation (1) was chosen.
In accordance with the methodology for constructing a parameter observer a 1 t , it is necessary to replace the unknown parameter with an appropriate dynamic model that demonstrates its evolution. In this case, the following model is suitable:
d w d t = 0 ,
because the solution to this differential equation is w t = c o n s t , which represents an abrupt change in time of the parameter a 1 t . Thus, the system of Equation (1) can be extended as follows:
d X d t = y , d Y d t = z , d Z d t = c x b y w + 1 z + x 2 , d w d t = 0 ,
or for convenience, as follows:
d X d t = y , d Y d t = z , d Z d t = G 1 z w , d w d t = 0 ,
where: G 1 = b y c x + x 2 z , w is state variable of the dynamic model for the desired parameter a 1 . In system of Equation (6) the known, i.e., observable parameters are variables x ,   y ,   z , and unobservable (unknown) one is w .
Let w ^ is the required estimate of the parameter a 1 , that is w ^ = a ^ 1 , then to find an estimate of the unknown parameter w ^ a macrovariable has to be entered as follows:
Ψ = w w ^
The observer reduction equation is as follows:
w ^ = Q X , Y , Z + υ 1 ,  
where Q X , Y , Z is a new unknown function of the observed state variables of the system of Equation (6), and υ 1 is the state variable of the dynamic observer.
The time derivative for the reduction equation has the following form:
d w ^ d t = Q ( X , Y , Z ) X d X d t + Q ( X , Y , Z ) Y d Y d t + Q ( X , Y , Z ) Z d Z d t + d υ 1 d t .
According to the synthesis procedure, the macrovariable Equation (7) must, in a mathematical sense, satisfy the following basic functional equation:
d Ψ d t + L X ,   Y ,   Z Ψ = 0 ,
where L X , Y , Z > 0 is an unknown function, which, when the specified positive-definiteness condition is met, ensures the stability of the main functional Equation (9).
The time derivative for the reduction equation has the following form:
d Ψ d t = d w d t d w ^ d t .
Substituting into Equation (9) the corresponding expressions from (7) and (8), and taking into account (6), according to the synthesis procedure, we obtain the following:
Q X , Y , Z X y Q X , Y , Z Y z Q X , Y , Z Z z w + G 1 d υ 1 d t + L X , Y , Z w w ^ = 0 .
According to the synthesis methodology, we exclude all unobservable state variables. Therefore, from Equation (11) we need to write out all terms containing the unobservable variable w and set them to zero as follows:
w Q X , Y , Z Z z + L X , Y , Z = 0 .
Because w 0 , then the equality in Equation (12) is satisfied if the following condition is met:
Q X , Y , Z Z z + L X , Y , Z = 0 .
Let us express from Equation (13) the derivative with respect to Z functions of observed system state variables as follows:
Q X , Y , Z Z = L X , Y , Z z .
Based on the above stability conditions, and also taking into account Equation (14), we set the following:
L ( X , Y , Z ) = α ( z ) 2 > 0 ,
where α > 0 is a constant coefficient that determines the “speed” of estimating the desired unknown parameter a 1 .
Next, we need to integrate Equation (14) and substitute the found of Equation (15) to obtain the following function of the observed variables:
Q X , Y , Z = α z 2 2 .
Now that Q X , Y , Z and L X , Y , Z are known, based on Equation (11), we can derive the following equation for the dynamic component of the observer:
d υ 1 d t = Q X , Y , Z X Z Q X , Y , Z Y X Q X , Y , Z Z G 1 L X , Y , Z w ^ = α b y z α c x z α x 2 z α z 2 + 1 2 α 2 z 4 α z 2 v 1 .
In addition, parameter estimation a 1 will look like the following:
w ^ = a ^ 1 = α z 2 2 + υ 1 .
Thus, according to a 1 = a + 1 and Equation (6), we obtain the following:
a ^ = 1 a ^ 1 = 1 + α z 2 2 + υ 1 .
Now from Equation (3) we can find the signal that is restored at the receiver side. It is equal to the difference between the estimated parameter and its original value, calculated as follows:
μ r e c o v e r e d = a ^ a .
Based on the above procedure, the synergetic parameter observer a 1 includes two components:
  • The dynamic part, expressed by the differential Equation (11);
  • The static part described in Equation (17).
The results of modeling in Maple 6 (Waterloo Maple Inc., Waterloo, ON, Canada) with the system of Equation (1) and a synergetic observer of the parameter state a are shown in Figure 3 and Figure 4. For the simulation, the following parameters of the chaotic generator and observer model were chosen:
  • Unchanged constant parameters of the original Genesio–Tesi system b = 3.03 and c = 3.55 ;
  • Synergetic observer parameter α = 1 ;
  • Modulated parameter pricewise form provided with a Heaviside function.
a ( t ) = 0 , H e a v i s i d e t 0 , H e a v i s i d e t 0 , H e a v i s i d e t 0 , H e a v i s i d e t 0 , H e a v i s i d e t 1 < t < 10 , 10 t < 20 , 20 t < 30 , 30 t < 40 , 40 t < 50 , 60 t < 70 , 70 t < 80 , 80 t < 40 , 40 t < 45 , 45 t < 90 ,
As can be seen from Figure 4, the signal in the communication channel (Figure 4a) has a complex shape masking the original rectangular pulses, and the recovered information signal (Figure 4b) has an approximate shape of the original signal, which can confirm the performance of the synthesized state observer.

3.2. MATLAB’s Implementation of Secure Communication System and Simulation

The model conditionally consists of three blocks: transmitter, communication channel, and receiver. The functional diagram of the system is presented in Figure 5.
System of Equation (1) acquires chaotic properties for parameter values a b < c . The following parameter values were selected empirically: a = 0.9, b = 3.55, and c = 5.55.
The transmitter input receives the parameter value a and information signal mu(t). In the transmitter, the information signal at the adder is mixed with the chaotic carrier. The output of the transmitter produces a complex signal Z(t). The functional diagram of the system is presented in Figure 6.
The initial values of the blocks “Integrator 1”, “Integrator 2”, and “Integrator 3” must be selected so that the initial error is close to zero; in our case it is dx = 0.9, dy = 0.9, and dz = 0. The information signal is generated by the uniform random number block, the settings of which are presented in Figure 7. In the block dz/dt, we write down the values according to Equation (1) (Figure 8).
In the communication channel, the signal Z(t) noise is mixed in z_noise(t). The general view of the communication channel is shown in Figure 9. The noise amplitude is ± 0.0001 .
The resulting signal z 1 t arrives at the receiver. The signal is decrypted at the receiver, and a reconstructed signal is formed at the receiver output mu*(t) and recovery error error(t). The general view of the receiver is shown in Figure 10. Block type dv/dt is written according to Equation (17) and is presented in Figure 11, and the block estimation—according to Equation (19) and is presented in Figure 12. Parameter α cannot be universal and is selected depending on the system setup. In our case, we set it equal to 10.
By running the model, the obtained results are presented in Figure 13 and Figure 14.

3.3. Stand-Alone Software Implementation of Secure Communication System

3.3.1. General

For stand-alone software implementation, we will use program code files generated automatically by the MATLAB R2022a (The MathWorks, Inc., Natick, MA, USA) software package. Namely, we need files describing the operation of the system with all the settings for integrators and message transmission processing, as well as some header files. We export program code to C++ language as well as use the Qt4 framework (The Qt Company, Oslo, Norway) to create stand-alone applications for the Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) platform.
The C++ code was derived according to the principles of model-based design [45] approach using the functional diagram of the system (Figure 5), including the functional diagram of the transmitter (Figure 6), the functional diagram of the communication channel (Figure 9), and the functional diagram of the receiver (Figure 10). In this approach, the C++ code is generated automatically with these diagrams through MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) functionality.
The test application functions are based on the following ideas: We will use a string of characters in Latin as the transmitted message. In the loop, each character is encoded into binary using UTF-16 encoding. After presenting the message in binary code, it enters the input of the Genesio–Tesi chaotic generator, but the binary one is represented as the number 0.8 and the binary zero as the number 0.9; the end of the message is the number 0.95. This choice is due to the fact that the Genesio–Tesi system retains chaotic properties only for a certain set of parameters; due to the selected initial conditions and parameter values, this particular set of parameter a values is suitable. On the receiver side, the message is decoded using a single-channel observer and converted back into binary form and then into a character string.
The program application interface is shown in Figure 15. In the upper left window in the “Transmitter” block, the original message is entered; in the window below it, the message is presented in binary form. The “Channel” block displays information that flows through the communication channel. “Iterations” is the number of times of sending a signal per bit of information. In the “Receiver” block, the recovered message is displayed as a string at the top of the block and in binary form at the bottom of the block. Sending a message is carried out by entering information in the “Transmitter” window and clicking on the “Send” button. Clicking the “Close” button closes the application. A seven-bit binary code in our case is chosen for simplicity of experimental realization, as for transfer of control commands or encryption key, there can be a sufficient alphabet with the 128 ASCII symbols.
The test bed hardware and software configurations employed in the followed experiments are:
  • Hardware: One pcs. Raspberry Pi 4B (Raspberry Pi Foundation, Pencoed, UK) single-board computer (RAM: 4 GB; ROM: SD-card 32 GB; CPU: ARM Cortex A72 1.5 GHz; GPU: VideoCore VI, 500 MHz), power adapter (5V, 3A); video monitor: Philips 273V (27”, HDMI Interface); generic mouse and keyboard (USB);
  • Software: operating system Raspberry Pi OS with desktop 32-bit (Raspberry Pi Foundation, Pencoed, UK), released 7 May 2021 (a port of Debian Linux); integrated development environment: Qt Creator (The Qt Company, Oslo, Norway).

3.3.2. Short Message Transmission

As a first experiment, we will transmit a message consisting of 10 characters “Hello world”. We set 1000 iterations, that is, 1000 times per bit of information. As you can see in Figure 16, the message was not restored correctly, and it took 3.492 milliseconds. The received message is unreadable, so the sending cannot be considered successful.
By increasing the number of iterations to 3000, we obtained the result presented in Figure 17. The transmission time is 5.043 milliseconds. Most of the message was restored correctly.
We increase the number of iterations to 5000. As a result, the transfer time increased to 5.516 milliseconds, as can be seen from Figure 18, and the message was completely restored correctly.

3.3.3. Long Message Transmission

As a second experiment, we will transmit a message consisting of 37 characters in English: “Chop your own wood and it will warm you twice.” We put 1000 iterations, that is, 1000 times per bit of information. As can be seen in Figure 19, the message was not recovered correctly, and it took 5.159 milliseconds to send the signal.
We increase the number of iterations to 3000. As a result, the transmission time increased to 12.804 milliseconds, the message is again incorrectly restored, as can be seen in Figure 20.
We increase the number of iterations to 5000. As a result, the transmission time has increased to 24.486 milliseconds, the message is again recovered incorrectly, as can be seen in Figure 21, but a few words can already be distinguished.
We increase the number of iterations to 7000. As a result, the transmission time has increased to 32.004 milliseconds, as can be seen in Figure 22, the message becomes clearer but still not completely correct.
The final number of iterations is 9000. As a result, the transmission time increased to 52.560 milliseconds, as can be seen in Figure 23, the message was recovered completely correctly.
For clarity, we have compiled the results of the experiment into Table 1.
Error-free data transmission requires at least 5000 iterations for a message of 10 characters length, and at least 9000 iterations for messages of 37 characters length. The large number of iterations for error-free message transmission is a disadvantage in the error correction method used, but, in general, it allows us to confirm the fundamental efficiency of the considered data transmission scheme with chaotic carrier and synergetic state observer.

3.4. Discussion

The software implementation for the Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) platform showed the fundamental possibility of creating a device for secure information transfer from a chaotic carrier, based on the principles outlined in the work, both in the form of a cyber-physical system and as part of other cyber-physical systems. Currently, the implementation is done on a single Raspberry Pi device, simulating both the transmitter and receiver sides. The disadvantage of the current experimental design is the lack of real communication channels and the lack of consideration of the associated physical limitations, including uncontrolled noise in the communication channel. However, the use of a system of two Raspberry Pis for separate modeling of the transmitting and receiving sides is limited by a number of extra software and electronic issues that will be resolved in further research on the practical implementation of these systems.
The results of the experimental run for the Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) platform, which can be considered a model of an operating cyber-physical system, showed that it is necessary to take into account both the operating time of the observer itself (which can be adjusted by the parameter α) and the time of checking for reliability (in this case, the simplest method is used based on repeated transmission of the same message), which depends on the length of the transmitted message. Therefore, in this configuration, it is advisable to use the system not for streaming continuous data transmission but for a number of other cases that require secure transmission of short messages. These may include but are not limited to:
  • Steganographic information transmission, when it is necessary to hide the very fact of transmitting a useful signal from an outside party. In this case, when organizing a communication system, it is necessary to take into account the identified limitations on the speed and volume of transmitted information.
  • Transfer of encryption keys for organizing traditional secure communication channels based on AES encryption and other traditional encryption algorithms. In fact, existing AES encryption systems operate successfully and cover the actual current needs for the secure transmission of digital data. However, for the system to work, the recipient must have the encryption key received from the transmission side, so this alternative system, which also has the property of steganography, can be useful for its initial receipt.
  • In short-range wired and radio communication systems for industrial cyber-physical systems in cases where an unconventional secure communication channel, including steganography, is required to transmit control and feedback signals [50].
Overall, it is promising to use such systems with secure communication networks of various cyber-physical systems to transmit command or information signals between components. The communication subsystem is one of the three key components of modern cyber-physical systems [51].
Security and steganography analysis issues of the employed method of useful/data signal modulation in chaotic carriers may be further evaluated with methods of autocorrelation and FFT according to techniques presented in our previous works [15,44].
Additional methods are needed to increase the reliability and noise immunity of the transmitted signal to reduce processing time.

4. Conclusions

In this paper, a scheme of secure data transmission with a chaotic carrier based on parametric modulation and adaptive reception using a synergetic state observer is shown and brought to an experimental working state. A single-channel synergetic observer for a nonlinear chaotic Genesio–Tesi system is constructed for the first time, and a detailed procedure for its modeling is given. The proposed system is also given in the form of a simulation model in MATLAB/Simulink R2022a (The MathWorks, Inc., Natick, MA, USA) blocks, which allows its reproduction quite simply. The possibility of hardware-software implementation of the obtained algorithms on the Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) platform is demonstrated, and their practical performance is tested.
The obtained single-channel observer for the chaotic Genesio–Tesi system and the provided modeling procedure will allow to create secure data transmission systems with chaotic carriers that do not require the use of chaotic synchronization methods, including asynchronous operation with the transmitter of the system. The use of a nonlinear state observer and multiplicative modulation of a useful signal into the structure (i.e., parameter) of the chaotic oscillator model increases the security of the proposed system (does not allow the separation of a useful signal from the chaotic one by filtering) and also gives them the properties of steganography in the transmission of short messages, including control commands for cyber-physical systems.
The limitations of the resulting system include the following: At the moment the system justifies itself only in a number of special application areas, where the complexity of the creation of a new communication infrastructure is feasible by the use of non-traditional methods of modulation of useful signals and the presence of steganographic properties (e.g., full or partial control of UAVs, components of cyber-physical systems, the transfer of encryption keys to organize traditional channels of secure communication, etc.). In addition, the choice of short message transmission as an application area is related to the steganographic properties, since even with multiplicative substitution of a useful signal into the chaotic oscillator structure, some regularities in the transmitted message can be detected by FFT analysis, as shown in our previous works [15,44]. When transmitting short messages, it will be virtually impossible to conclude about the presence of a non-chaotic component (i.e., a useful signal) in the transmission stream.
The next step of the study will be a universal modeling procedure for different classes of chaotic generators and a whole system experimental hardware implementation on two Raspberry Pi (Raspberry Pi Foundation, Pencoed, UK) devices. Further research will also address other aspects of transmission rate and security indicators under different jam-proof codes with error detection and correction of different message lengths as well as comparison with other popular schemes of chaos-based communications for the same chaotic generator model.

Author Contributions

Conceptualization, A.M., E.P. and E.B.; methodology, A.M. and E.B.; software, A.M.; validation, E.P., A.N., M.G. and P.K.; formal analysis, M.G. and P.K.; investigation, A.M., E.P., E.B., A.N., M.G. and P.K.; resources, E.B.; data curation, A.M., E.P., E.B., A.N. and P.K.; writing—original draft preparation, A.M., E.P., E.B. and A.N.; writing—review and editing, A.M., E.P., E.B., A.N., M.G. and P.K.; visualization, A.M. and M.G.; supervision, A.M., E.B. and A.N.; project administration, E.B.; funding acquisition, E.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Russian Science Foundation, grant number 22-11-00184, https://rscf.ru/project/22-11-00184/ (accessed on 27 August 2024). The APC was also funded by the Russian Science Foundation grant number 22-11-00184.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Rössler, O.E. An equation for continuous chaos. Phys. Lett. A 1976, 57, 397–398. [Google Scholar] [CrossRef]
  2. Anishchenko, V.S.; Astakhov, V.; Neiman, A.; Vadivasova, T.; Schimansky-Geier, L. Nonlinear Dynamics of Chaotic and Stochastic Systems, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2007; p. 446. [Google Scholar]
  3. Anishchenko, V.S.; Pavlov, A.N.; Yanson, N.B. Reconstruction of dynamic systems as applied to secure communications. Technol. Phys. 1998, 43, 1401–1407. [Google Scholar] [CrossRef]
  4. Pecora, L.M.; Carroll, T.L. Synchronization in Chaotic Systems. Phys. Rev. Lett. 1990, 64, 821–824. [Google Scholar] [CrossRef] [PubMed]
  5. Chua, L.O.; Kočarev, L.; Eckert, K.; Itoh, M. Experimental chaos synchronization in Chua’s circuit. Int. J. Bifurcat. Chaos 1992, 2, 705–708. [Google Scholar] [CrossRef]
  6. Kuznetsov, N.; Mokaev, T.; Ponomarenko, V.; Seleznev, E.; Stankevich, N.; Chua, L. Hidden attractors in Chua circuit: Mathematical theory meets physical experiments. Nonlinear Dyn. 2023, 111, 5859–5887. [Google Scholar] [CrossRef]
  7. Dmitriev, A.S.; Panas, A.I. Dynamic Chaos. New Data Media for Communication Systems; PHISMATLIT: Moscow, Russia, 2002; p. 251. (In Russian) [Google Scholar]
  8. Feki, M. An adaptive chaos synchronization scheme applied to secure communication. Chaos Solit. Fract. 2003, 18, 141–148. [Google Scholar] [CrossRef]
  9. Andrievsky, B.R.; Fradkov, A.L. Adaptive-based methods for information transmission by means of chaotic signal source modulation. Autom. Remote Control 2011, 72, 1967–1980. [Google Scholar] [CrossRef]
  10. Riaz, A.; Ali, M. Chaotic communications, their applications and advantages over traditional methods of communication. In Proceedings of the 2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing, Graz, Austria, 25 July 2008; pp. 21–24. [Google Scholar] [CrossRef]
  11. Genesio, R.; Tesi, A. Harmonic balance methods for the analysis of chaotic dynamics in nonlinear systems. Automatica 1992, 28, 531–548. [Google Scholar] [CrossRef]
  12. Jafari, S.; Sprott, J.C.; Nazarimehr, F. Recent new examples of hidden attractors. Eur. Phys. J. Spec. Top. 2015, 224, 1469–1476. [Google Scholar] [CrossRef]
  13. Celikovsky, S.; Lynnyk, V.; Sebek, M. Observer-based chaos synchronization in the generalized chaotic Lorenz systems and its application to secure encryption. In Proceedings of the 45th IEEE Conference on Decision and Control, San Diego, CA, USA, 13–15 December 2006; pp. 3783–3788. [Google Scholar] [CrossRef]
  14. Babkin, I.; Rybin, V.; Andreev, V.; Karimov, T.; Butusov, D. Coherent chaotic communication using generalized Runge–Kutta method. Mathematics 2024, 12, 994. [Google Scholar] [CrossRef]
  15. Mushenko, A.; Dzuba, J.; Nekrasov, A.; Fidge, C. A data secured communication system design procedure with a chaotic Carrier and synergetic observer. Electronics 2020, 9, 497. [Google Scholar] [CrossRef]
  16. Tang, J.; Zhang, Z.; Huang, T. Two-dimensional cosine–sine interleaved chaotic system for secure communication. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 2479–2483. [Google Scholar] [CrossRef]
  17. Tang, J.; Zhang, Z.; Chen, P.; Huang, Z.; Huang, T. A simple chaotic model with complex chaotic behaviors and its hardware implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 2023, 70, 3676–3688. [Google Scholar] [CrossRef]
  18. Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert. Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
  19. Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
  20. Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
  21. Kocak, O.; Erkan, U.; Toktas, A.; Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert. Syst. Appl. 2024, 237, 121452. [Google Scholar] [CrossRef]
  22. Toktas, F.; Erkan, U.; Yetgin, Z. Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions. Expert. Syst. Appl. 2024, 249, 123583. [Google Scholar] [CrossRef]
  23. Li, H.; Yu, S.; Feng, W.; Chen, Y.; Zhang, J.; Qin, Z.; Zhu, Z.; Wozniak, M. Exploiting dynamic vector-level operations and a 2D-Enhanced logistic modular map for efficient chaotic image encryption. Entropy 2023, 25, 1147. [Google Scholar] [CrossRef]
  24. Tan, X.; Zhang, J.; Yang, Y. Synchronizing chaotic systems using backstepping design. Chaos Soliton. Fract. 2003, 16, 37–45. [Google Scholar] [CrossRef]
  25. Chiang, M.-Y.; Giap, V.N.; Pham, D.-H.; Nguyen, V.L.; Huang, S.-C. Disturbance observer based on sliding mode control for secure communication of chaotic circuits. IEEE Access 2023, 11, 43294–43304. [Google Scholar] [CrossRef]
  26. Kuz’menko, A.A. Forced sliding mode control for chaotic systems synchronization. Nonlinear Dyn. 2022, 109, 1763–1775. [Google Scholar] [CrossRef]
  27. Liu, L.; Wang, Y.; Li, Y.; Feng, X.; Song, H.; He, Z.; Guo, C. Noise robust method for analytically solvable chaotic signal reconstruction. Circuits Syst. Signal Process. 2019, 38, 4096–4114. [Google Scholar] [CrossRef]
  28. Kharel, R.; Busawon, K.; Ghassemlooy, Z. Observer-based secure communication using indirect coupled synchronization. In Proceedings of the 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Poznan, Poland, 18–20 July 2012; pp. 1–6. [Google Scholar] [CrossRef]
  29. Loh, R.N.K.; Das, M.K. Nonlinear Unknown-Input Observer-Based Systems for Secure Communication. In Advances in Underwater Acoustics; InTech: Hong Kong, China, 2017. [Google Scholar] [CrossRef]
  30. Chien, T.-H.; Chen, Y.-C. Combination of Observer/Kalman Filter Identification and Digital Redesign of Observer-Based Tracker for Stochastic Chaotic Systems. In Proceedings of the 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi’an, China, 4–6 July 2016; pp. 103–107. [Google Scholar] [CrossRef]
  31. Zhang, J.; Zhu, F. Chaos synchronization and chaos-based secure communication based on new unknown input observer approach. In Proceedings of the 35th Chinese Control Conference (CCC), Chengdu, China, 27–29 July 2016; pp. 1891–1896. [Google Scholar] [CrossRef]
  32. Dimassi, H.; Loría, A. Adaptive unknown-input observers-based synchronization of chaotic systems for telecommunication. IEEE Trans. Circuits Syst. I. Fundam. Theory Appl. 2011, 58, 800–812. [Google Scholar] [CrossRef]
  33. Wang, H.; Han, Z.; Zhang, W.; Xie, Q. Chaotic synchronization and secure communication based on descriptor observer. Nonlinear Dyn. 2009, 57, 69–73. [Google Scholar] [CrossRef]
  34. Cherrier, E.; M’Saad, M.; Farza, M. High gain observer synchronization for a class of time-delay chaotic systems. Application to secure communications. J. Nonlinear Syst. Appl. 2010, 1, 102–112. [Google Scholar]
  35. Senouci, A.; Busawon, K.; Bouridane, A.; Binns, R.; Ouslimani, A. A robust chaotic communication scheme for a class of dynamical systems. In Proceedings of the 2014 IEEE Conference on Control Applications (CCA), Juan Les Antibes, France, 8–10 October 2014; pp. 1178–1183. [Google Scholar] [CrossRef]
  36. Liao, T.-L.; Huang, N.-S. An observer-based approach for chaotic synchronization with applications to secure communications. IEEE Trans. Circuits Syst. I. Fundam. Theory Appl. 1999, 46, 1144–1150. [Google Scholar] [CrossRef]
  37. Chen, L.-C.; Lee, T.-F.; Chao, P.-J.; Chen, W.-C. An Observer-Based Method for Secure Communication. In Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, 12–14 September 2009; pp. 222–225. [Google Scholar] [CrossRef]
  38. Xiao, X.-S.; Pan, C. Observer-based adaptive synchronization of uncertain time-delay chaotic systems. In Proceedings of the 36th Chinese Control Conference (CCC), Dalian, China, 26–28 July 2017; pp. 3321–3324. [Google Scholar] [CrossRef]
  39. N’Doye, I.; Voos, H.; Darouach, M. Observer-based approach for fractional-order chaotic synchronization and secure communication. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 442–450. [Google Scholar] [CrossRef]
  40. Kolesnikov, A.A. Introduction of synergetic control. In Proceedings of the 2014 American Control Conference, Portland, OR, USA, 4–6 June 2014; pp. 3013–3016. [Google Scholar] [CrossRef]
  41. Kolesnikov, A.A. Analiticheskij sintez nelinejnyh sistem, optimal’nyh otnositel’no linejnyh agregirovannyh peremennyh. Elektromehanika 1985, 11, 71–79. (In Russian) [Google Scholar]
  42. Kolesnikov, A.A.; Mushenko, A.; Dzuba, J.N.; Zolkin, A.D. Synergetic observer of state variables in problems of reconstruction of systems with chaotic dynamics. In Proceedings of the 2017 IEEE II International Conference on Control in Technical Systems (CTS), St. Petersburg, Russia, 25–27 October 2017; pp. 55–58. [Google Scholar] [CrossRef]
  43. Mushenko, A.S.; Zolkin, A.D.; Yatsumira, A.I. Three-channel synergetic state observer for data transmission system with chaotic dynamics. J. Phys. Conf. Ser. 2021, 1813, 012030. [Google Scholar] [CrossRef]
  44. Mushenko, A.; Zolkin, A.; Yatsumira, A. Steganography analysis of chaotic carrier signal transmission with non-linear parametric modulation. In Proceedings of the 2021 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 5–11 September 2021; pp. 1018–1023. [Google Scholar] [CrossRef]
  45. The MathWorks, Inc. Model-Based Design. Available online: https://www.mathworks.com/solutions/model-based-design.html (accessed on 27 August 2024).
  46. Makhmudov, F.; Privalov, A.; Privalov, A.; Kazakevich, E.; Bekbaev, G.; Boldinov, A.; Kim, K.H.; Im-Cho, Y. Mathematical model of the process of data transmission over the radio chasnnel of cyber-physical systems. Mathematics 2024, 12, 1452. [Google Scholar] [CrossRef]
  47. Short, K.M. Unmasking a modulated chaotic communications scheme. Int. J. Bifurc. Chaos 1996, 6, 367–375. [Google Scholar] [CrossRef]
  48. Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G. Breaking two secure communication systems based on chaotic masking. IEEE Trans. Circuits Syst. II Express Briefs 2004, 51, 505–506. [Google Scholar] [CrossRef]
  49. Basan, E.; Basan, A.; Mushenko, A.; Nekrasov, A.; Fidge, C.; Lesnikov, A. Analysis of attack intensity on autonomous mobile robots. Robotics 2024, 13, 101. [Google Scholar] [CrossRef]
  50. Gamec, J.; Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Sushkin, N. An adaptive protection system for sensor networks based on analysis of neighboring nodes. Sensors 2021, 21, 6116. [Google Scholar] [CrossRef]
  51. Fradkov, A.L. Cybernetical Physics: From Control of Chaos to Quantum Control; Springer: Berlin/Heidelberg, Germany, 2007; p. 236. [Google Scholar] [CrossRef]
Figure 1. Phase portrait of the Genesio–Tesi system at a = 1 ,   b = 3.03 ,   c = 5.55 ,   x 0 , y 0 , z 0 = 0.1,0.1,0.1 : (a) three-dimensional chart; (b) projection xy; (c) projection zx.
Figure 1. Phase portrait of the Genesio–Tesi system at a = 1 ,   b = 3.03 ,   c = 5.55 ,   x 0 , y 0 , z 0 = 0.1,0.1,0.1 : (a) three-dimensional chart; (b) projection xy; (c) projection zx.
Mathematics 12 02764 g001
Figure 2. Functional diagram of the system.
Figure 2. Functional diagram of the system.
Mathematics 12 02764 g002
Figure 3. Visualization of Maple observer modeling simulation results: (a) x(t) state variable transient; (b) y(t) state variable transient.
Figure 3. Visualization of Maple observer modeling simulation results: (a) x(t) state variable transient; (b) y(t) state variable transient.
Mathematics 12 02764 g003
Figure 4. Visualization of Maple observer modeling simulation results: (a) z(t) state variable transient (signal in communication channel); (b) estimated information signal w t (blue line) and original information signal a t (red line).
Figure 4. Visualization of Maple observer modeling simulation results: (a) z(t) state variable transient (signal in communication channel); (b) estimated information signal w t (blue line) and original information signal a t (red line).
Mathematics 12 02764 g004
Figure 5. Functional diagram of the communication system.
Figure 5. Functional diagram of the communication system.
Mathematics 12 02764 g005
Figure 6. Functional diagram of the transmitter.
Figure 6. Functional diagram of the transmitter.
Mathematics 12 02764 g006
Figure 7. Setting values for generating an information signal.
Figure 7. Setting values for generating an information signal.
Mathematics 12 02764 g007
Figure 8. Block view dz/dt.
Figure 8. Block view dz/dt.
Mathematics 12 02764 g008
Figure 9. System communication channel.
Figure 9. System communication channel.
Mathematics 12 02764 g009
Figure 10. System receiver.
Figure 10. System receiver.
Mathematics 12 02764 g010
Figure 11. View of the block of the dynamic component of the observer.
Figure 11. View of the block of the dynamic component of the observer.
Mathematics 12 02764 g011
Figure 12. View of the evaluator block.
Figure 12. View of the evaluator block.
Mathematics 12 02764 g012
Figure 13. MATLAB numerical model simulation: (a) Initial information signal; (b) signal in the communication channel.
Figure 13. MATLAB numerical model simulation: (a) Initial information signal; (b) signal in the communication channel.
Mathematics 12 02764 g013
Figure 14. MATLAB numerical model simulation: (a) Signal reconstructed using a synergetic observer (denoted as μ * ( t ) ); (b) reconstruction error (denoted as e ( t ) ).
Figure 14. MATLAB numerical model simulation: (a) Signal reconstructed using a synergetic observer (denoted as μ * ( t ) ); (b) reconstruction error (denoted as e ( t ) ).
Mathematics 12 02764 g014
Figure 15. Program interface window.
Figure 15. Program interface window.
Mathematics 12 02764 g015
Figure 16. Message of 10 characters, 1000 iterations.
Figure 16. Message of 10 characters, 1000 iterations.
Mathematics 12 02764 g016
Figure 17. Message of 10 characters, 3000 iterations.
Figure 17. Message of 10 characters, 3000 iterations.
Mathematics 12 02764 g017
Figure 18. Message of 10 characters, 5000 iterations.
Figure 18. Message of 10 characters, 5000 iterations.
Mathematics 12 02764 g018
Figure 19. Message of 37 characters, 1000 iterations.
Figure 19. Message of 37 characters, 1000 iterations.
Mathematics 12 02764 g019
Figure 20. Message of 37 characters, 3000 iterations.
Figure 20. Message of 37 characters, 3000 iterations.
Mathematics 12 02764 g020
Figure 21. Message of 37 characters, 5000 iterations.
Figure 21. Message of 37 characters, 5000 iterations.
Mathematics 12 02764 g021
Figure 22. Message of 37 characters, 7000 iterations.
Figure 22. Message of 37 characters, 7000 iterations.
Mathematics 12 02764 g022
Figure 23. Message of 37 characters, 9000 iterations.
Figure 23. Message of 37 characters, 9000 iterations.
Mathematics 12 02764 g023
Table 1. Short message transmission results data.
Table 1. Short message transmission results data.
Number of CharactersNumber of IterationsElapsed
Time, ms
Character Transmission
Errors, Approx. %
1010003.49275
1030005.04350
1050005.5160
3710005.15990
37300012.80490
37500024.48675
37700032.00425
37900052.5600
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mushenko, A.; Pakulova, E.; Basan, E.; Nekrasov, A.; Gamcová, M.; Kurdel, P. Modeling a Single-Channel Synergetic Observer for Chaos-Based Secure Communication System Applications. Mathematics 2024, 12, 2764. https://doi.org/10.3390/math12172764

AMA Style

Mushenko A, Pakulova E, Basan E, Nekrasov A, Gamcová M, Kurdel P. Modeling a Single-Channel Synergetic Observer for Chaos-Based Secure Communication System Applications. Mathematics. 2024; 12(17):2764. https://doi.org/10.3390/math12172764

Chicago/Turabian Style

Mushenko, Alexey, Ekaterina Pakulova, Elena Basan, Alexey Nekrasov, Mária Gamcová, and Pavol Kurdel. 2024. "Modeling a Single-Channel Synergetic Observer for Chaos-Based Secure Communication System Applications" Mathematics 12, no. 17: 2764. https://doi.org/10.3390/math12172764

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop