Next Article in Journal
Understanding of Various Type of Unambiguous Discrimination in View of Coherence Distribution
Previous Article in Journal
Statistical Features in High-Frequency Bands of Interictal iEEG Work Efficiently in Identifying the Seizure Onset Zone in Patients with Focal Epilepsy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Time Delay Complex Chen Chaotic System and Secure Communication Scheme for Wireless Body Area Networks

1
School of Electrical Engineering and Automation, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, China
2
Shandong Computer Science Center (National Supercomputer Center in Jinan), Shandong Artificial Intelligence Institute, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250101, China
3
School of Mathematics and Statistics, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(12), 1420; https://doi.org/10.3390/e22121420
Submission received: 8 November 2020 / Revised: 9 December 2020 / Accepted: 14 December 2020 / Published: 16 December 2020

Abstract

:
Although many chaotic systems with time delays have been studied in recent years, most studies have only focused on the theoretical level, without special applications. Therefore, we present a basic introduction of a time delay complex Chen chaotic system, including the influence of parameter changes and time delay factors on the time delay system. On the basis of complex modified projection synchronization (CMPS), we detail the design of a new controller and communication scheme and apply this communication scheme to a wireless body area network (WBAN), in order to encrypt and decrypt body data collected by sensors. Finally, we perform a numerical simulation, demonstrating the effectiveness of the proposed communication scheme.

1. Introduction

In 1977, Mackey and Glass [1], while studying first-order non-linear delay differential equations to describe physical control systems, first discovered that chaos exists in delay systems. Following this, researchers began to pay close attention to time delay chaotic systems, finding that those with a time delay can better describe real physical processes than systems without a time delay. On the basis of the stability of a class of linear-system theory, the synchronization of Chen systems with time-varying delay has been discussed. Research on time delay chaotic systems with real variables, as well as on time delay chaotic systems with complex variables, has made great progress. Since Fowler et al. [2] introduced the complex Lorenz system, research on the characteristics of complex chaotic systems and their synchronization has attracted much attention [3,4,5,6,7,8]. However, time delay is an inevitable factor in actual complex chaotic systems. Therefore, many scholars have studied complex chaotic systems with time delay [9,10,11].
Since Leon O. Chua realized chaotic synchronization by circuits [12], the application of chaotic systems in secure communication has become a hot issue in the field of information security. Similarly to random signals, chaotic signals have very complex trajectories, are difficult to predict, and have inherent concealment, which make them suitable as carriers for secure communication [13,14,15,16,17]. Generally speaking, the information is encrypted as streams with chaotic characteristics at the sending end. At the receiving end, the correct information is decrypted from the received signal. Chaotic secure communication requires the synchronization of chaotic systems at the sending and receiving ends. A chaotic system is completely determined by a non-linear system of equations, including its parameters and initial conditions. The most interesting fact is that a determinate system can produce a large number of complex, uncorrelated, and quasi-random chaotic sequences. Time delay is inevitable in nature, where time delay systems have more complicated dynamic characteristics than ordinary chaotic systems. Therefore, time delay complex chaotic systems have become a prominent topic in current chaotic secure communication research.
Countless scholars have conducted research on secure communication, in order to achieve high security levels. In order to achieve fast communication, Chee and Xu used the proportional characteristics of projection synchronization (PS) and extended binary to M-ary ( M > 2 ) systems. Mahmoud G.M. [18,19] studied the projection synchronization of complex hyperchaotic systems and proposed corresponding communication schemes. As the rapid communication of projection synchronization and the unpredictability of the scale factor can increase communication security, PS has been widely used. On the basis of the definition of real scale-factor projection synchronization and modified projection synchronization (MPS) [20,21], the definition of modified projection synchronization with a complex scale factor—in fact, complex modified projection synchronization (CMPS)—has been proposed by Zhang et al. [22] and Mahmoud [23], almost at the same time. If the real part of a complex scale factor is 1 and its imaginary part is 0, it is complete synchronization (CS); if the real part of the complex scale factor is −1 and the imaginary part is 0, it is the anti synchronization (AS); if the real part of the complex scale factor is a real number and the imaginary part is 0, it is the projection synchronization (PS) of the real scale factor; if only the imaginary part is 0, it is the modified projection synchronization (MPS) of the real scale factor; if the complex scale factor is j, it is complex complete synchronization (CCS). Therefore, CS, AS, PS, MPS, and CCS are all special cases of CMPS. As complex numbers have real and imaginary parts, a complex scale factor can be more arbitrary and unpredictable than a real scale factor, such that the calculation of complex numbers is more complicated than that of real numbers and, so, it is more difficult to obtain signal information from transmitted information. Moreover, CMPS establishes a connection between real and complex chaos, thus increasing the selection range of the chaos generator at the sending and receiving ends. Studying CMPS can increase the complexity of synchronization and, consequently, the diversity and security of communications.
Recently, great improvements in integrated chips and wireless communications have promoted the development of wireless body area networks (WBANs). The security of data transmission in WBANs is more important and essential. Due to the low cost and high-security properties of chaotic signals, the implementation of chaos communication in WBANs is an effective and promising solution, which can improve communication security in WBANs. However, to the best of our knowledge, secure communication in WBANs based on the CMPS of complex chaos under noisy conditions has seldom been studied in the literature. The main contributions of this paper are as follows:
(1) A basic introduction of the time delay complex Chen system, including the influence of parameter changes and time delay factors on the time delay system, is presented.
(2) On the basis of complex modified projection synchronization (CMPS), a new controller and communication scheme are designed.
(3) This communication scheme is applied to a wireless body area network (WBAN) for encrypting and decrypting body data that are collected by sensors.
The rest of this article is organized as follows: In Section 2, the time delay characteristics of the complex Chen system are analyzed and its randomness, symmetry, and unpredictability are discussed. In Section 3, the innovation and advantages of the communication scheme for wireless body area networks are introduced. In Section 4, the CMPS controller design is described. In Section 5, the feasibility of the scheme is verified through MATLAB simulation. In Section 6, the security of the communication scheme for WBAN is analyzed. Section 7 summarizes this article.

2. Characteristics of Time Delay Complex Chen System

Consider the following time delay complex Chen system:
y ˙ 1 = a 1 ( y 2 y 1 ) , y ˙ 2 = ( a 2 a 1 ) y 1 + a 2 y 2 y 1 y 3 ( t τ ) , y ˙ 3 = a 3 y 3 ( t τ ) + ( 1 / 2 ) ( y ¯ 1 y 2 + y 1 y ¯ 2 ) ,
where 0 τ τ m is the time delay factor, y 1 = u 1 + j u 2 and y 2 = u 3 + j u 4 are the complex state variables, and y 3 = u 5 is the real state variable. Overbar y ¯ 1 ( y ¯ 2 ) stands for the complex conjugate of y 1 ( y 2 ) , and ( a 1 , a 2 , a 3 ) T is the real parameter vector.
Separating the real and imaginary parts of each variable in System (1), we obtain
u ˙ 1 = a 1 ( u 3 u 1 ) , u ˙ 2 = a 1 ( u 4 u 2 ) , u ˙ 3 = ( a 2 a 1 ) u 1 u 1 u 5 ( t τ ) + a 2 u 3 , u ˙ 4 = ( a 2 a 1 ) u 2 u 2 u 5 ( t τ ) + a 2 u 4 , u ˙ 5 = a 3 u 5 ( t τ ) + ( u 1 u 3 + u 2 u 4 ) .

2.1. Chaos Attractor

We adopted a 1 = 35 , a 2 = 23 , a 3 = 1 , and ( 1 , 2 , 3 , 4 , 1 ) T as the initial conditions. Their different chaotic attractor projections are shown as blue attractors in Figure 1 ( τ = 1 s) and Figure 2 ( τ = 1.5 s), where the red attractor is a complex Chen system with τ = 0 s. The projection of the time delay complex Chen system is quite different than the original system. The attractor of the former occupies much more space than the latter. Time delay systems produce time-series data with extremely high randomness and unpredictability. The time delay complex Chen system with τ = 1 s was chaotic, while the Chen system with τ = 1.5 s exhibited a limit cycle. This indicates that, under the same parameters and initial values, different time delay factors cause hugely different outputs.

2.2. Symmetry and Initial Value Sensitivity

System (2) was unchanged after introducing the following transformation: ( u 1 , u 2 , u 3 , u 4 , u 5 ) ( u 1 , u 2 , u 3 , u 4 , u 5 ) ; thus, the system exhibited symmetry about the u 5 axis. This symmetry held for all parameters; namely, a 1 , a 2 , and a 3 .
When τ = 2   s , we selected two close initial conditions—namely, ( 1 , 2 , 3 , 4 , 1 ) T and ( 1 , 2 , 3 , 4 , 1.001 ) T —and obtained the evolution of states, as shown in Figure 3. The time delay complex Chen system displayed sensitive dependence on the initial conditions.

2.3. Lyapunov Exponent and Bifurcation Diagram

The Lyapunov exponent can quantitatively reflect the chaotic performance of a system. Letting a 1 = 35 , a 2 = 23 , and a 3 = 1 , we obtained the Lyapunov exponent curve of the time delay complex Chen system, as shown in Figure 4. Table 1 shows some values of the Lyapunov exponent. Obviously, the characteristics of the time delay complex Chen system and the number of positive Lyapunov exponents are related to the time delay factor τ , which also indicates the randomness and unpredictability of the delay system.
In order to more intuitively see the change of system characteristics with time delay factors, the bifurcation diagram of the system output u 5 and τ was produced, as shown in Figure 5. When 0.5 < τ 1.3 , the system was chaotic; when τ = 1.5 , the system gradually exhibited limit-cycle behavior. Therefore, by choosing different time delay parameters, τ , the time delay complex system produced different dynamic phenomena. The existence of time delay parameters increased the complexity of the Chen system and, thus, the security of confidential communication. The design of a secure communication scheme based on the CMPS of the time delay complex Chen system is described in the following section.

3. Communication Scheme Based on CMPS

3.1. Design of CMPS Controller

Consider the following n-dimensional complex chaotic non-linear system as a response system:
x ˙ = f ( x ) + v + ϵ 1 ,
where x = ( x 1 , x 2 , , x n ) T is the complex state vector, x = x r + j x i , and the superscripts r and i denote the real and imaginary parts of the complex state vector, respectively. Let x 1 = x 1 r + j x 1 i , x 2 = x 2 r + j x 2 i , , x n = x n r + j x n i ; then, x r = ( x 1 r , x 2 r , , x n r ) T , x i = ( x 1 i , x 2 i , , x n i ) T . f ( x ) is an n × m complex matrix, with its elements being functions of complex state variables. f = ( f 1 , f 2 , , f n ) T is a non-linear complex function vector. The controller to be designed is v = v r + j v i , where v r = ( v 1 r , v 2 r , , v n r ) T and v i = ( v 1 i , v 2 i , , v n i ) T . ϵ 1 = ( ϵ 11 , ϵ 12 , , ϵ 1 n ) T indicates external bounded interference, such that | ϵ 1 l | < ρ ( l = 1 , 2 , , n ) , where ρ 1 is a positive constant ( | · | is the modulus of a complex number).
Consider the drive chaotic complex system y = ( y 1 , y 2 , , y n ) T satisfying
y ˙ = g ( y ) + ϵ 2 ,
where y = ( y 1 , y 2 , , y n ) T is the complex state vector, y = y r + j y i , with y r = ( y 1 r , y 2 r , , y n r ) T and y i = ( y 1 i , y 2 i , , y n i ) T . g = ( g 1 , g 2 , , g n ) T is a non-linear complex function vector. ϵ 2 = ( ϵ 21 , ϵ 22 , , ϵ 2 n ) T is bounded external interference, such that | ϵ 2 l | < ρ 2 ( l = 1 , 2 , , n ) , where ρ 2 is a positive constant.
For the response System (3) and drive System (4), if there is a complex constant matrix H = d i a g { h 1 , h 2 , , h n } = d i a g { h 1 r + j h 1 i , h 2 r + j h 2 i , , h n r + j h n i } satisfying
lim t e ( t ) 2 = lim t x ( t ) H y ( t ) 2 = lim t ( x r ( t ) H r y r ( t ) + H i y i ( t ) ) 2 + x i ( t ) H r y i ( t ) H i y r ( t ) 2 ) = 0 ,
where e ( t ) is an error vector, then the chaotic Systems (3) and (4) realize complex modified projection synchronization.
Therefore, on the basis of active control and [22,24,25], we designed the controller as
v = H g ( y ) f ( x ) + K e ,
where K = d i a g ( k 1 , k 2 , , k n ) is the real control intensity matrix. The specific proof process can be found in [22,24].

3.2. Communication Scheme for Wireless Body Area Network

In wireless body area networks, sensors are used to measure the temperature, blood pressure, heart rate, and other physiological information of users, first transmitting the measurement results to smart mobile devices (e.g., smartphones) and, then, sending them to a telematics terminal. After mutual authentication between the smart mobile device and the telematics terminal, the smart mobile device encrypts the collected sensor information (clear text) and the shared chaotic signal (produced from time delay complex Chen system with the same parameters and initial values) of the telematics terminal after authentication and sends them to storage devices for remote services. After the remote service storage device successfully receives the data, it synchronously decrypts the data, according to the complex modified proportional projection, such that the plain-text is obtained in the data buffer of the remote service storage device. The communication block diagram is based on CMPS, as shown in Figure 6.
We use L 1 and L 2 to represent smart devices (transmitting end) and the telematics terminal (receiving end), respectively. The plain-text signals to be transmitted are body temperature h 1 r , high blood pressure value h 1 i , low blood pressure value h 2 r , heart rate h 2 i , and blood sugar h 3 , which are all complex scale factors in CMPS; the duration of every sample was 1 min. Then, the ciphertext transmission signal
s ( t ) = H g ( y ) + D ε ( t ) = d i a g { h 1 r + j h 1 i , h 2 r + j h 2 i , h 3 } g ( y ) + d i a g { D ε ( t ) + j D ε ( t ) , D ε ( t ) + j D ε ( t ) , D ε ( t ) }
is expanded into five channels; that is,
s 1 r ( t ) = h 1 r g 1 ( y ) r h 1 i g 1 ( y ) i + D ε ( t ) , s 1 i ( t ) = h 1 r g 1 ( y ) i + h 1 i g 1 ( y ) r + D ε ( t ) , s 2 r ( t ) = h 2 r g 2 ( y ) r h 2 i g 2 ( y ) i + D ε ( t ) , s 2 i ( t ) = h 2 i g 2 ( y ) r + h 2 r g 2 ( y ) i + D ε ( t ) , s 3 ( t ) = h 3 g 3 ( y ) + D ε ( t ) ,
where D ε ( t ) simulates the noise generated by the communication channel and noise source. The controller v at the receiving end was designed as (6), which contains the transmission signal s ( t ) and v = s ( t ) f ( x ) + k e . As CMPS occurs, x ( t ) approaches H ( t ) y ( t ) ( H ( t ) = d i a g { h 1 r + j h 1 i , h 2 r + j h 2 i , h 3 } ). The information signal recovered at the receiving end is H g ( t ) = d i a g { h g 1 , h g 2 , h g 3 } = d i a g { x 1 / y 1 , x 2 / y 2 , x 3 / y 3 } .
Compared with other examples of communication systems [26,27,28,29,30,31,32,33], the CMPS-based communication scheme has the following advantages:
(1) As shown in Equation (7), two layers masked by noise and chaotic signals are used here, where the chaotic signal is the derivative of the system state variable, not the state variable itself, which differs from traditional chaotic masking, thus increasing the difficulty of decoding.
(2) The method of recovering plain-text signals is essentially different. In traditional chaos masking, a transmission signal is used to subtract a synchronized chaotic signal, in order to recover a plain-text signal. The effect of channel noise is theoretically ignored and the bit error rate (BER) cannot be guaranteed to be zero. In our communication scheme, we use a CMPS controller to ensure that the signal at the receiving end is equal to the product of the plain-text and chaotic signals. Therefore, BER = 0 for the recovered signal in theory.
(3) Compared with CS, which is often used for chaotic communication, CMPS can be observed from partially or completely different dynamic systems. CS requires the sender and receiver to be identical, which is difficult in practical applications; especially for long-term device operation. With regard to CMPS, the channel transmitter and receiver can be the same or different, which avoids this problem at a basic level.
(4) The transmission signal involves complex operations, such as the multiplication of complex numbers and taking derivatives. The ciphertext signal transmitted by each channel is a combination of five pieces of plain-text information and chaotic signal derivatives. The smartphone samples the sensor every minute. Even if a certain channel is intercepted, it is extremely hard to crack the plain-text in one minute, thereby increasing attack resistance and information security.
(5) The dynamic characteristics of the time delay complex Chen system are more complicated than those of the time delay-free complex system, which can increase the secrecy of chaotic communication.

4. Controller Design

We adopted the following time delay complex Chen system as the drive system L 1 at the sending end and response system L 2 at the receiving end:
L 1 : y ˙ 1 = a 1 ( y 2 y 1 ) , y ˙ 2 = ( a 2 a 1 ) y 1 + a 2 y 2 y 1 y 3 ( t τ ) , y ˙ 3 = a 3 y 3 ( t τ ) + ( 1 / 2 ) ( y ¯ 1 y 2 + y 1 y ¯ 2 ) ,
L 2 : x ˙ 1 = a 1 ( x 2 x 1 ) + v 1 + j v 2 , x ˙ 2 = ( a 2 a 1 ) x 1 + a 2 x 2 x 1 x 3 ( t τ ) + v 3 + j v 4 , x ˙ 3 = a 3 x 3 ( t τ ) + ( 1 / 2 ) ( x ¯ 1 x 2 + y 1 x ¯ 2 ) + v 5 ,
where y 1 = u 1 + j u 2 and y 2 = u 3 + j u 4 are the complex state variables of the drive system L 1 , x 1 = u 1 + j u 2 , and x 2 = u 3 + j u 4 are the complex state variables of the response system L 2 , and the real variables are y 3 = u 5 and x 3 = u 5 . The controller is v = d i a g { v 1 + j v 2 , v 3 + j v 4 , v 5 } . Here, τ = 1   s and the system is chaotic, as shown as Figure 1.
The system parameters ( a 1 = 35 , a 2 = 23 , a 3 = 1 , τ = 1   s ) and initial conditions ( u ( 0 ) = ( 1 , 2 , 3 , 4 , 1 ) T , u ( 0 ) = ( 1 , 2 , 3 , 4 , 1 ) T ) are certified by the sender and receiver. We employed controller ( 6 ) , with k 1 = k 2 = k 3 = k 4 = k 5 = 100 . Therefore, the controller was designed as:
v 1 r = s 1 r f 1 r ( x ) + k 1 e 1 r = s 1 a 1 ( u 3 ( t τ ) u 1 ) k 1 ( u 1 h 1 u 1 + h 2 u 2 ) v 1 i = s 1 i f 1 i ( x ) + k 2 e 1 i = s 2 a 1 ( u 4 u 2 ) k 2 ( u 2 h 1 u 2 h 2 u 1 ) v 2 r = s 2 r f 2 r ( x ) + k 3 e 2 r = s 3 ( a 2 a 1 ) u 1 a 2 u 3 ( t τ ) u 1 u 5 k 3 ( u 3 ( t τ ) h 3 u 3 + h 4 u 4 ) v 2 i = s 2 i f 2 i ( x ) + k 4 e 2 i = s 4 ( a 2 a 1 ) u 2 a 2 u 4 u 2 u 5 k 4 ( u 4 h 3 u 4 h 3 u 4 ) v 3 = s 3 f 3 ( x ) + k 5 e 5 = s 5 + a 3 u 3 ( t τ ) ( u 1 u 3 ( t τ ) + u 2 u 4 ) k 5 ( u 5 h 5 u 5 )
First, we chose h 1 = h 2 = j , h 3 = 1 , which means that e 1 = ( u 1 + u 2 ) + j ( u 2 u 1 ) = 0 , e 2 = ( u 3 ( t τ ) + u 4 ) + j ( u 4 u 3 ) = 0 , and e 3 = u 5 + u 5 = 0 . In fact, x 1 , x 2 and y 1 , y 2 realize CCS, while x 3 and y 3 realize anti-synchronization. The attractor projections of this synchronization for the time delay complex Chen system are shown in Figure 7.

5. Application and Simulation

In this section, we describe the simulation of the information transmission process for a real wireless body area network. We chose
  • h 1 r = 35 + 5 r a n d ( 1 , 1 ) as the temperature, within the range of [35, 40] (°C);
  • h 1 i = 70 + 130 r a n d ( 1 , 1 ) to stand for the high blood pressure value, within the range of [70, 200] (mmHg);
  • h 2 r = 40 + 60 r a n d ( 1 , 1 ) to stand for the low blood pressure value, within the range of [40, 100] (mmHg);
  • h 2 i = 60 + 40 r a n d ( 1 , 1 ) as the heart rate, within the range of [60, 100] (beats per minute, bpm); and
  • h 3 = 3.9 + 6.1 r a n d ( 1 , 1 ) as blood sugar, within the range of [3.9, 10] (mmol/L).
We obtained the CMPS error, as shown in Figure 8. The sender system collected data every minute, such that system errors were larger at the beginning of every minute, but quickly converged to zero. This indicates that CMPS takes place with complex scaling factors h 1 , h 2 , h 3 . In reality, the physiological condition of the human body does not suddenly change and, so, the CMPS controller is able to maintain synchronization in one sampling period. The information transmission process is depicted in Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13. The transmitted signal s ( t ) completely covered the information signal, while information signals h ( t ) were recovered with high precision. The above simulations demonstrate that the experimental results were in accordance with our theoretical analysis. The proposed communication system can quickly transmit information with high security.

6. Security Analysis

In this section, we analyze the security of the proposed CMPS communication scheme for WBAN.

6.1. Key Space Analysis

For the convenience of analysis, noise is not considered in the communication scheme. If a third party intercepts the signals of transmission channel such as s ( t ) , as s 1 r ( t ) = h 1 r g 1 ( y ) r h 1 i g 1 ( y ) i or s 1 i ( t ) = h 1 r g 1 ( y ) i + h 1 i g 1 ( y ) r , the message signal H cannot be decrypted without the private keys such as the function g ( y ) . In particular, when the amplitude of H is much smaller than that of g ( y ) , s ( t ) g ( y ) . It is impossible to decrypt the message signal H using only the signals of transmission channel. Therefore, for private keys g ( y ) include parameters, initial conditions and time lag τ , the key space of our algorithm is infinite.

6.2. Key Sensitivity Analysis

In the proposed scheme, the most important private key is the system parameters and initial conditions. To analyze the sensitivity, the message signal H was transmitted with two close initial conditions u 1 ( 0 ) = ( 1 , 0 , 0 , 0 , 0 ) T in the senor node and u 2 ( 0 ) = ( 1 , 0 , 0 , 0 , 0.1 ) T at the sink node. The CMPS process is presented in Figure 14. The results demonstrate that the proposed algorithm has good sensitivity to the private key.

7. Conclusions

We first analyzed the characteristics of time delay complex Chen systems, outlining their randomness and unpredictability. Then, we proposed an innovative communication scheme based on CMPS for wireless body area networks and discussed its advantages. As the complex scale factor is more complicated than the real scale factor and the calculation of complex numbers is more complicated, the scheme can greatly increase the security of communication systems. Finally, we verified the effectiveness of the proposed communication system by conducting simulation experiments. The system could quickly and securely transmit information with strong robustness against noise. From the beginning, when Lorenz discovered and proposed chaos theory based on weather changes in nature, to the current chaos theory being applied in many fields, chaos theory has been constantly enriched and developed. The application of chaos communication theory in the field of WBANs is an important branch. The proposed chaotic communication scheme based on CMPS for WBANs only has its feasibility verified at the theoretical stage. It will be realized in the future, thus enhancing WBAN development.

Author Contributions

Conceptualization, F.Z.; methodology, F.Z.; software, S.L.; validation, Z.L.; formal analysis, F.Z. and S.L.; investigation, Z.L.; writing–original draft preparation, S.L.; resources, Z.L.; data curation, S.L. and Z.L.; visualization, F.Z.; writing–review and editing, F.Z.; supervision, C.J.; project administration, C.J.; funding acquisition, F.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the International Collaborative Research Project of Qilu University of Technology (QLUTGJHZ2018020), the Young Doctorate Cooperation Fund Project of Qilu University of Technology (Shandong Academy of Sciences; 2018BSHZ001), the National Natural Science Foundation of China (61773010), Major Scientific and Technological Innovation Projects of Shandong Province (2019JZZY010731), the Key Research and Development Program of Shandong Province (2019GGX104037), and the Research Leader Studio Project of Jinan City (2019GXRC062).

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable suggestions and questions.

Conflicts of Interest

The authors declare that they have no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CMPScomplex modified projection synchronization
WBANwireless body area network
PSprojection synchronization
MPSmodified projection synchronization
CScomplete synchronization
ASanti synchronization
CCScomplex complete synchronization
BERbit error rate

References

  1. Mackey, M.C.; Glass, L. Oscillation and chaos in physiological control systems. Int. J. Bifurc. Chaos 1977, 197, 287–289. [Google Scholar] [CrossRef]
  2. Fowler, A.C.; Gibbon, J.D.; McGuinness, M.J. The complex Lorenz equations. Phys. D 1982, 4, 139–163. [Google Scholar] [CrossRef]
  3. Zhao, X.; Liu, J.; Liu, H.; Zhang, F. Dynamic analysis of a one-parameter chaotic system in complex field. IEEE Access 2020, 8, 28774–28781. [Google Scholar] [CrossRef]
  4. Liu, H.; Zhang, Y.; Kadir, A.; Xu, Y. mage encryption using complex hyper chaotic system by injecting impulse into parameters. Appl. Math. Comput. 2019, 1, 83–93. [Google Scholar]
  5. Zhang, R.; Liu, Y.; Yang, S. Adaptive synchronization of fractional-order complex chaotic system with unknown complex parameters. Entropy 2019, 21, 207. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Zhao, X.; Liu, J.; Liu, H.; Zhang, F. A theoretical implementation for a Proposed Hyper-Complex Chaotic System. J. Intell. Fuzzy Syst. 2020, 38, 2585–2590. [Google Scholar]
  7. Yang, F.; Mou, J.; Ma, C.; Cao, Y. Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt. Lasers Eng. 2020, 129, 106031. [Google Scholar] [CrossRef]
  8. Sahin, E.; Ayas, M.S. Fractional High-Order Differential Estimator and Feedback Controller Design for a Single-Input–Single-Output Affine Chaotic System. J. Comput. Nonlinear Dyn. 2020, 15, 011006. [Google Scholar] [CrossRef]
  9. Zhang, F.; Liu, S.; Yu, W. Characteristics of complex Lorenz chaotic System with Delay and its self-delay synchronization. Acta Phys. Sin. 2013, 62, 505–762. [Google Scholar]
  10. Zhang, F. Complete synchronization of coupled multiple-time delay complex chaotic system with applications to secure communication. Acta Phys. Pol. B 2015, 46, 1473–1486. [Google Scholar] [CrossRef]
  11. Sun, B.; Li, M.; Zhang, F.; Wang, H.; Liu, J. The characteristics and self-time delay synchronization of two-time delay complex Lorenz system. J. Frankl. Inst. 2015, 356, 334–350. [Google Scholar] [CrossRef]
  12. Matsumoto, T. A chaotic attractor from Chua’s circuit. IEEE Trans. Circuits Syst. 1984, 31, 1055–1058. [Google Scholar] [CrossRef]
  13. Terry, J.; Van Wiggeren, G.D. Chaotic communication using generalized synchronization. Chaos Solitons Fractals 2001, 12, 145–152. [Google Scholar] [CrossRef]
  14. Kiani-B, A.; Fallahi, K.; Pariz, N.; Leung, H. A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter. Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 863–879. [Google Scholar] [CrossRef]
  15. Trejo-Guerra, R.; Tlelo-Cuautle, E.; Cruz-Herández, C.; Sánchez-López, C. Chaotic communication system using Chua’s oscillators realized with CCII+ s. Int. J. Bifurc. Chaos 2009, 19, 4217–4226. [Google Scholar] [CrossRef]
  16. Cheng, C.; Lin, Y.; Wu, S. Design of adaptive sliding mode tracking controllers for chaotic synchronization and application to secure communications. J. Frankl. Inst. 2012, 349, 2626–2649. [Google Scholar] [CrossRef]
  17. Pisarchik, A.; Jaimes-Reátegui, R.; Sevilla-Escoboza, J.R.; Ruiz-Oliveras, F.R.; García-López, J.H. Two-channel opto-electronic chaotic communication system. J. Frankl. Inst. 2012, 349, 3194–3202. [Google Scholar] [CrossRef]
  18. Chee, C.; Xu, D. Chaos-based M-ary digital communication technique using controlled projective synchronisation. IEE Proc. Circuits Devices Syst. 2006, 153, 357–360. [Google Scholar] [CrossRef]
  19. Mahmoud, G.M.; Mahmoud, E.E.; Arafa, A.A. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications. Phys. Scr. 2006, 87, 055002. [Google Scholar] [CrossRef]
  20. Mainieri, R.; Rehacek, J. Projective Synchronization in Three-Dimensional Chaotic Systems. Phys. Rev. Lett. 1999, 82, 3042. [Google Scholar] [CrossRef]
  21. Guo, L.; Xu, Z.; Hu, M. Projective synchronization in drive—Response networks via impulsive control. Chin. Phys. Lett. 2008, 25, 2816. [Google Scholar]
  22. Zhang, F.; Liu, S.; Yu, W. Modified projective synchronization with complex scaling factors of uncertain real chaos and complex chaos. Chin. Phys. B 2013, 22, 120505. [Google Scholar] [CrossRef]
  23. Mahmoud, G.M.; Mahmoud, E.E. Complex modified projective synchronization of two chaotic complex nonlinear systems. Nonlinear Dyn. 2013, 73, 2231–2240. [Google Scholar] [CrossRef]
  24. Zhang, F.; Liu, S. Full state hybrid projective synchronization and parameters identification for uncertain chaotic (hyperchaotic) complex systems. J. Comput. Nonlinear Dyn. 2014, 9, 021009. [Google Scholar] [CrossRef]
  25. Liu, S.; Zhang, F. Complex function projective synchronization of complex chaotic system and its applications in secure communication. Nonlinear Dyn. 2014, 76, 1087–1097. [Google Scholar] [CrossRef]
  26. Liu, H.; Wang, X.; Zhu, Q. Asynchronization anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching. Phys. Lett. A 2011, 375, 2828–2835. [Google Scholar] [CrossRef]
  27. Azzaz, M.S.; Tanougast, C.; Sadoudi, S. Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Commun. Nonlinear Sci. 2013, 18, 2035–2047. [Google Scholar] [CrossRef]
  28. Zhang, J.; Zhang, L.; An, X. Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1–15. [Google Scholar] [CrossRef] [Green Version]
  29. Li, R.; Wu, H. Secure communication on fractional-order chaotic systems via adaptive sliding mode control with teaching–learning–feedback-based optimization. Nonlinear Dyn. 2019, 95, 1221–1243. [Google Scholar] [CrossRef]
  30. Nwachioma, C.; Pérez-Cruz, J.H. New Chaotic Oscillator—Properties, Analog Implementation, and Secure Communication Application. IEEE Access 2019, 17, 7510–7521. [Google Scholar] [CrossRef]
  31. Sathiyamurthi, P.; Ramakrishnan, S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed. Tools Appl. 2020, 79, 17817–17835. [Google Scholar] [CrossRef]
  32. Elsafty, A.H.; Tolba, M.F.; Said, L.A. Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU-Int. J. Electron. Commun. 2020, 125, 153347. [Google Scholar] [CrossRef]
  33. Moskalenko, O.I.; Koronovskii, A.A.; Hramov, A.E. Generalized synchronization of chaos for secure communication: Remarkable stability to noise. Phys. Lett. A 2010, 374, 2925–2931. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Chaotic attractor projections for time delay complex Chen system ( a 1 = 35 , a 2 = 23 , a 3 = 1 ). Blue attractor, complex Chen system with τ = 1   s ; red attractor, complex Chen system with τ = 0   s ). (a) u 2 u 5 , (b) u 1 u 4 , (c) u 1 u 3 u 5 , and (d) u 3 u 4 u 5 .
Figure 1. Chaotic attractor projections for time delay complex Chen system ( a 1 = 35 , a 2 = 23 , a 3 = 1 ). Blue attractor, complex Chen system with τ = 1   s ; red attractor, complex Chen system with τ = 0   s ). (a) u 2 u 5 , (b) u 1 u 4 , (c) u 1 u 3 u 5 , and (d) u 3 u 4 u 5 .
Entropy 22 01420 g001
Figure 2. Chaotic attractor projections for time delay complex Chen system ( a 1 = 35 , a 2 = 23 , a 3 = 1 ). Blue attractor, complex Chen system with τ = 1.5   s ; red attractor, complex Chen system with τ = 0   s . (a) u 1 , (b) u 2 , (c) u 3 , (d) u 4 .
Figure 2. Chaotic attractor projections for time delay complex Chen system ( a 1 = 35 , a 2 = 23 , a 3 = 1 ). Blue attractor, complex Chen system with τ = 1.5   s ; red attractor, complex Chen system with τ = 0   s . (a) u 1 , (b) u 2 , (c) u 3 , (d) u 4 .
Entropy 22 01420 g002
Figure 3. Initial sensitivity of time delay complex Chen system. Red curve represents initial state ( 1 , 2 , 3 , 4 , 1 ) T ; blue curve represents initial state ( 1 , 2 , 3 , 4 , 1.001 ) T ). (a) u 1 , (b) u 2 , (c) u 3 , (d) u 4 , and (e) u 5 .
Figure 3. Initial sensitivity of time delay complex Chen system. Red curve represents initial state ( 1 , 2 , 3 , 4 , 1 ) T ; blue curve represents initial state ( 1 , 2 , 3 , 4 , 1.001 ) T ). (a) u 1 , (b) u 2 , (c) u 3 , (d) u 4 , and (e) u 5 .
Entropy 22 01420 g003
Figure 4. Lyapunov exponent curves of time delay complex Chen system: (a) L E 1 , (b) L E 2 , (c) L E 3 , (d) L E 4 , and (e) L E 5 .
Figure 4. Lyapunov exponent curves of time delay complex Chen system: (a) L E 1 , (b) L E 2 , (c) L E 3 , (d) L E 4 , and (e) L E 5 .
Entropy 22 01420 g004
Figure 5. Bifurcation diagram of time delay complex Chen system.
Figure 5. Bifurcation diagram of time delay complex Chen system.
Entropy 22 01420 g005
Figure 6. Communication scheme based on complex modified projection synchronization (CMPS) for a wireless body area network.
Figure 6. Communication scheme based on complex modified projection synchronization (CMPS) for a wireless body area network.
Entropy 22 01420 g006
Figure 7. Attractor projections of special synchronization for time delay complex Chen system. Red attractor, system L 1 ; green attractor, system L 2 . (a) u 2 u 5 , (b) u 1 u 4 , (c) u 1 u 3 u 5 , and (d) u 3 u 4 u 5 .
Figure 7. Attractor projections of special synchronization for time delay complex Chen system. Red attractor, system L 1 ; green attractor, system L 2 . (a) u 2 u 5 , (b) u 1 u 4 , (c) u 1 u 3 u 5 , and (d) u 3 u 4 u 5 .
Entropy 22 01420 g007
Figure 8. CMPS error for time delay complex Chen system: (a) e 1 r ( t ) , (b) e 1 i ( t ) , (c) e 2 r ( t ) , (d) e 2 i ( t ) , and (e) e 3 ( t ) .
Figure 8. CMPS error for time delay complex Chen system: (a) e 1 r ( t ) , (b) e 1 i ( t ) , (c) e 2 r ( t ) , (d) e 2 i ( t ) , and (e) e 3 ( t ) .
Entropy 22 01420 g008
Figure 9. Temperature information transmission process.
Figure 9. Temperature information transmission process.
Entropy 22 01420 g009
Figure 10. High blood pressure signal transmission process.
Figure 10. High blood pressure signal transmission process.
Entropy 22 01420 g010
Figure 11. Low blood pressure signal transmission process.
Figure 11. Low blood pressure signal transmission process.
Entropy 22 01420 g011
Figure 12. Heart rate signal transmission process.
Figure 12. Heart rate signal transmission process.
Entropy 22 01420 g012
Figure 13. Blood sugar signal transmission process.
Figure 13. Blood sugar signal transmission process.
Entropy 22 01420 g013
Figure 14. The CMPS process with u 1 ( 0 ) = ( 1 , 0 , 0 , 0 , 0 ) T and u 2 ( 0 ) = ( 1 , 0 , 0 , 0 , 0.1 ) T .
Figure 14. The CMPS process with u 1 ( 0 ) = ( 1 , 0 , 0 , 0 , 0 ) T and u 2 ( 0 ) = ( 1 , 0 , 0 , 0 , 0.1 ) T .
Entropy 22 01420 g014
Table 1. Partial values of five Lyapunov indices of time delay complex Chen system.
Table 1. Partial values of five Lyapunov indices of time delay complex Chen system.
Variable LE 1 LE 2 LE 3 LE 4 LE 5 SymbolTypes
τ = 0.5  s2.2260−0.0857−0.7402−0.5030−1.1583(+,0,−,−,−)Chaos
τ = 0.7  s2.28370.7366−0.0176−0.5226−1.4729(+,+,0,−,−)Hyperchaos
τ = 1.5  s0.46800.4676−0.0298−0.8371−0.8366(0,0,0,−,−)Limit cycle
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, F.; Leng, S.; Li, Z.; Jiang, C. Time Delay Complex Chen Chaotic System and Secure Communication Scheme for Wireless Body Area Networks. Entropy 2020, 22, 1420. https://doi.org/10.3390/e22121420

AMA Style

Zhang F, Leng S, Li Z, Jiang C. Time Delay Complex Chen Chaotic System and Secure Communication Scheme for Wireless Body Area Networks. Entropy. 2020; 22(12):1420. https://doi.org/10.3390/e22121420

Chicago/Turabian Style

Zhang, Fangfang, Sen Leng, Zhengfeng Li, and Cuimei Jiang. 2020. "Time Delay Complex Chen Chaotic System and Secure Communication Scheme for Wireless Body Area Networks" Entropy 22, no. 12: 1420. https://doi.org/10.3390/e22121420

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop