Next Article in Journal
On the Effect of Training Convolution Neural Network for Millimeter-Wave Radar-Based Hand Gesture Recognition
Previous Article in Journal
Single- and Cross-Modality Near Duplicate Image Pairs Detection via Spatial Transformer Comparing CNN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication

by
Ali Akbar Kekha Javan
1,
Afshin Shoeibi
2,3,
Assef Zare
1,*,
Navid Hosseini Izadi
4,
Mahboobeh Jafari
5,
Roohallah Alizadehsani
6,
Parisa Moridian
7,
Amir Mosavi
8,9,10,*,
U. Rajendra Acharya
11,12,13 and
Saeid Nahavandi
6
1
Faculty of Electrical Engineering, Gonabad Branch, Islamic Azad University, Gonabad 6518115743, Iran
2
Biomedical Data Acquisition Lab (BDAL), Faculty of Electrical Engineering, K. N. Toosi University of Technology, Tehran 1996715433, Iran
3
Computer Engineering Department, DDEMS Lab, Ferdowsi University of Mashhad, Mashhad 9177948974, Iran
4
Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan 8415683111, Iran
5
Electrical and Computer Engineering Faculty, Semnan University, Semnan 3513119111, Iran
6
Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Waurn Ponds, VIC 3217, Australia
7
Faculty of Engineering, Science and Research Branch, Islamic Azad University, Tehran 1477893855, Iran
8
Faculty of Civil Engineering, Technische Universität Dresden, 01069 Dresden, Germany
9
John von Neumann Faculty of Informatics, Obuda University, 1034 Budapest, Hungary
10
School of Economics and Business, Norwegian University of Life Sciences, 1430 Ås, Norway
11
Department of Biomedical Engineering, School of Science and Technology, Singapore University of Social Sciences, Singapore 599494, Singapore
12
Department of Electronics and Computer Engineering, Ngee Ann Polytechnic, Singapore 599489, Singapore
13
Department of Bioinformatics and Medical Engineering, Asia University, Taichung City 41354, Taiwan
*
Authors to whom correspondence should be addressed.
Sensors 2021, 21(1), 254; https://doi.org/10.3390/s21010254
Submission received: 3 December 2020 / Revised: 25 December 2020 / Accepted: 28 December 2020 / Published: 2 January 2021
(This article belongs to the Section Communications)

Abstract

:
In this paper, the multi-state synchronization of chaotic systems with non-identical, unknown, and time-varying delay in the presence of external perturbations and parametric uncertainties was studied. The presence of unknown delays, unknown bounds of disturbance and uncertainty, as well as changes in system parameters complicate the determination of control function and synchronization. During a synchronization scheme using a robust-adaptive control procedure with the help of the Lyapunov stability theorem, the errors converged to zero, and the updating rules were set to estimate the system parameters and delays. To investigate the performance of the proposed design, simulations have been carried out on two Chen hyper-chaotic systems as the slave and one Chua hyper-chaotic system as the master. Our results showed that the proposed controller outperformed the state-of-the-art techniques in terms of convergence speed of synchronization, parameter estimation, and delay estimation processes. The parameters and time delays were achieved with appropriate approximation. Finally, secure communication was realized with a chaotic masking method, and our results revealed the effectiveness of the proposed method in secure telecommunications.

1. Introduction

Applications of digital telecommunications can be seen in all aspects of daily life and all industries including medicine and education, as well as social interactions [1]. Hence, there is a need to have secure communication. To do this, many cryptography methods have been introduced, mainly encoding the data from the sender and decoding them at the receiver [1]. Cryptographical methods are based on various schemes, and a number of related papers have been published in this field [2,3,4,5]. There has been a considerable amount of work done in this field, and chaotic systems play a significant role among all cryptographical schemes [6,7,8].
One of the fundamental characteristics of chaotic systems is the extreme response to small changes in initial circumstances. The main goal of proposing synchronization methods is the suitable tuning of controller parameters in chaotic systems [9,10,11,12]. In chaotic synchronization, the vector state of the master system follows the slave system [13]. Various control-based schemes have been used previously for synchronization, such as adaptive [14,15,16], sliding mode [17,18], back stepping [19], fuzzy [20], predictive [21], and robust [22].
The work on applications of chaotic synchronization in secure communication has grown dramatically in recent years [23,24,25,26,27,28,29,30,31,32,33,34,35,36]. Developing control systems for synchronization of various chaotic systems has been one of the main focuses of prior works, aiming to improve security in communication. Furthermore, few researchers have concentrated on the hardware implementation of these systems in order to create reliable and rapid hardware for sending and receiving data securely [23]. The summary of various works done on this topic is given below.
Çiçek et al. [24] conducted the design and implementation of an analog circuit of a secure telecommunications system based on slipping mode control (SMC). The chaos system is the jerk, which is less complex than other chaotic systems. The most significant novelty of this work is applying SMC synchronization along with the jerk chaos system, which was introduced for the first time. The results of Op-Amp-based analog circuit simulation in SMC and jerk-based synchronization demonstrated the effectiveness of the proposed method.
A method based on a four-dimensional chaotic system has been proposed by Ayub Khan et al. [25]. The chaotic system proposed is of the fractional-order type, contributing greatly to the confidentiality of information. The results obtained justified the theoretical scheme and simulation results.
Yu et al. [26] recommended a system based on hyper-chaotic theory for secure telecommunications. The proposed chaotic system is multistable four-wing memristive (FWMHS), which is five-dimensional and was used to conduct the experiments. The disturbance included in the inputs of the proposed method enhanced the security factor in telecommunications. The sliding mode control is also used in this method, the parameters of which are unknown.
A novel model for synchronization in secure telecommunications based on the fractional-order complex chaotic system has been proposed in [27]. The fractional difference function synchronization (FDFS) method used in this work yielded good results.
In [28], a new synchronization approach for utilization in internet of things (IoT) applications has been used. The design of the synchronization system in their work is based on the Lyapunov stability theorem. Synchronization is based on a nonlinear adaptive controller. In their work, the input signals are first decomposed into small segments and then combined and transmitted with chaotic signals. Subsequently, important information is separated from the chaotic signals at the receiver. The simulation results proved the effectiveness of the proposed scheme in sending and receiving confidential information.
Another work by [29] proposed the design of an Op-Amp-based analog circuit to obtain secure communication. The proposed analog circuit of the seven-dimensional chaotic system is designed and implemented. The results of the circuit simulation confirm the greater capability of the circuit designed for secure communication.
Chen et al. [30] proposed a novel methodology for the synchronization of secure telecommunications. This new technique is based on the polynomials fuzzy model applied to the Chen chaotic system. The approach proposed in this paper is implemented on several various examples, and the results showed that the receiver worked successfully in retrieving the signals transmitted by the transmitter.
Wangli He et al. [31] introduced a new approach based on quantized synchronization of neural networks. In their work, the implementation of the master and slave section of the chaos system is done on the Chua circuit. In order to perform experiments, different images for synchronization with the proposed procedure are employed, and successful results were achieved.
The idea of utilizing adaptive control for synchronization is proposed in [32]. The master and slave chaos systems discussed in this work are of the memristor type. Additionally, to enhance the security of information, an unknown parameter in the slave system is applied. The most significant contribution of this scheme is that it is simple to implement, and it helps to achieve valuable results in secure communication applications.
Ouannas et al. [33] adopted linear and nonlinear controllers to synchronize in secure telecommunications applications. The improved Robinovich chaotic system employed in this study is of the fractional order type. The stability investigation of the proposed technique is proven by means of the Lyapunov theorem. Numerical results illustrated the effectiveness of their proposed scheme in maintaining the confidentiality of information.
In a study, Wang et al. [34] proposed a novel idea of synchronization in secure telecommunications based on neural networks. Associative memory neural networks are widely employed in various applications for synchronization. This network has been chosen based on memristor. In the Lyapunov stability theorem, two controllers with different activation functions are applied. The proposed approach ensured synchronization of drive and response systems in a finite time.
Jing Wang et al. [35] conducted the implementation of analog hardware for a synchronization method; the chaotic system tested in this method is six-dimensional. In order to implement the hardware, all conditions are considered so that the theory of the proposed scheme is consistent with the simulation results.
Zirkohi et al. [36] used terminal slipping model control (TSM) for synchronization. The Duffing–Holmes oscillator is considered the first chaotic system, and the chaotic gyro oscillator as the second chaotic system. Uncertainty, unknown parameters, and ultimately external disturbances are taken into account in both chaotic systems. In the controller section, Chebyshev polynomials are applied to approximate the master and slave systems.
In this paper, a robust adaptive controller was proposed for multi-mode synchronization of chaotic systems. In the proposed method, both slave and master systems have uncertainty, disturbance, unknown parameters, and time-varying delay characteristics. By defining a suitable Lyapunov function, rules for updating parameters, time delays, and estimation errors of uncertainty and disturbance bounds were determined. The proposed controller guarantees that convergence of disturbance and uncertainty bounds estimation error and synchronization error to zero. To prevent the chattering phenomenon, the control law is a continuous function. By using the masking method and using chaotic signals as a carrier signal, the security of communication channels was improved. In the provided example, a 3D Chua system was chosen as the master system, and two Rössler systems were chosen as the slave system. Given the proper and quick reconstruction of message signals and also the convergence of all errors to zero, it was shown that the proposed method has the ability to obtain better performance for synchronization of chaotic systems.
In time-delayed chaotic systems, little work has been done on delay uncertainty with parametric uncertainties, external perturbations, and uncertainty in modeling the multi-state synchronization problems of chaotic systems. The novelties of this paper are as follows:
(1)
synchronization of chaotic systems with unknown time delays;
(2)
synchronization of chaotic systems in the presence of disturbance and uncertainty with unknown boundaries and variable parameters;
(3)
guarantee of convergence of tracking errors and parameters estimation to zero;
(4)
Determining the rules for updating parameters, time delays, and disturbance and uncertainty boundaries.
The paper is organized as follows. First, the concept of multi-state synchronization in the presence of perturbation and uncertainty is described. Then, the essential theorems to prove the convergence of errors to zero are explained. Adaptive rules for updating parameters and delays are achieved. Finally, the concept of masking the synchronization of three chaotic systems and its application in secure communication is presented.

2. Multi-State Synchronization of Chaotic Systems in the Presence of Disturbance and Uncertainty

In multi-state synchronization of chaotic systems, a master chaotic system is synchronized with multiple chaotic systems. Figure 1 shows the synchronization of the master system with multiple system slave systems.
We represent the driver system with the following equation [30]:
x ˙ 1 ( t )   = f 1 ( x 1 ) + F 1 ( x 1 ( t τ 1 ) ) + H 1 ( x 1 ) θ 1 ( t ) + Δ f 1 ( x 1 ) + D 1 ( t )
The N-1 slave systems control function can be represented as [30]
x ˙ i ( t ) = f i ( x i ) + F i ( x i ( t τ i ) ) + H i ( x i ) θ i ( t ) + Δ f i ( x i ) + D i ( t ) .     i = 2 , 3 , , N
where x i ( t )   = [ x i 1 , x i 2 , , x i n ] T is the state vector of i-th system, f i ( x i ( t ) )   = [ f i 1 , f i 2 , , f i n ] T is a continuous function,   F i ( x i ( t τ i ) ) is a continuous function with Lipschitz [30] condition and constant h i , τ i is the unknown variable system delay, and H i ( x i ( t ) )   = [ H i 1 , H i 2 , , H i n ] T is a matrix function. Moreover, θ i ( t )   = [ θ i 1 , θ i 2 , , θ i n ] T are the main parameters with unknown step changes, Δ f i ( x i ) uncertainties, and bounded disturbance D i ( t ) .
Based on Equations (1) and (2), the synchronization of chaotic system with control function is as follows:
{ x ˙ 1 = f 1 ( x 1 ) + F 1 ( x 1 ( t τ 1 ) ) + H 1 ( x 1 ) θ 1 ( t ) + Δ f 1 ( x 1 ) + D 1 ( t ) . x ˙ 2 = f 2 ( x 2 ) + F 2 ( x 2 ( t τ 2 ) ) + H 2 ( x 2 ) θ 2 ( t ) + Δ f 2 ( x 2 ) + D 2 ( t ) + u 1 ( t ) . x ˙ N = f N ( x N ) + F N ( x N ( t τ N ) ) + H N ( x N ) θ N ( t ) + Δ f N ( x N ) + D N ( t ) + u N 1 ( t ) .
in which it is assumed that u i 1 ( t ) = [ u i 1.1 ( t ) , u i 1.2 ( t ) , , u i 1 . n ( t ) ] T is the i-th slave system control function, uncertainties and disturbance have unknown bounds,
| Δ f i ( x i ) | γ i g i ( x i )   , | D i ( t ) |   d i i   =   1 , 2 , , N .
In Equation (4) γ i and d i are unknown constants, g i ( x i ) is a known function, and in few cases g i ( x i )   =   | x i | .
In multi-state synchronization, the synchronization error is defined as [37]
e i 1 ( t ) = x i ( t ) x 1 ( t ) .   i = 2 , 3 , N .
Hence, the error dynamics can be represented as [37]
e ˙ i 1 ( t ) = f i ( x i ) + F i ( x i ( t τ i ) ) f 1 ( x 1 ) F 1 ( x 1 ( t τ 1 ) ) + H i ( x i ) θ i ( t ) H 1 ( x 1 ) θ 1 ( t ) +   Δ f i ( x i ) Δ f 1 ( x 1 ) +   D i ( t ) D 1 ( t ) + u i 1 ( t ) .   i   =   2 , 3 ,   , N 1 .
Assuming that the control function is defined as
u i 1 ( t )   =   f i ( x i ) + f 1 ( x 1 ) H i ( x i ) θ ^ i ( t ) + H 1 ( x 1 ) θ ^ 1 ( t ) + K i 1 e i 1 F i ( x i ( t τ ^ i ) ) + F 1 ( x 1 ( t τ ^ 1 ) ) + u ¯ i 1 ( t ) . i   =   2 , 3 ,   , N 1 ,
The control function is selected in such a way that first it removes well-determined sentences ( f 1 ( x 1 )   , f i ( x i ) ) from the error dynamics, and then it approximates the sentences with variable parameters ( H 1 ( x 1 ) θ ^ 1 ( t ) and F i ( x i ( t τ ^ i ) ) ). To stabilize the system, it exploits the K i 1 e i 1 state feedback, and finally the sentence u ¯ i 1 ( t ) determines the proper estimation of the disturbance and uncertainty boundaries.
Where θ ^ i ( t ) and τ ^ i ( t ) are the estimates of θ i ( t ) and τ i ( t ) , and u ¯ i 1 ( t ) is a part of the control function (introduced later in the paper), the feedback gain matrix is defined as
K i 1 = diag ( k i 1 , 1 , k i 1 , 2 , , k i 1 , n ) ·   k i 1 , j > 0   j = 1 , 2 , , n .
K i 1 is a diagonal matrix with negative elements that result in the synchronization error to converge to zero in the design.
Plugging the control function into Equation (6), the errors dynamics read as
e ˙ i 1 ( t )   = H i ( x i ) θ ˜ i ( t ) H 1 ( x 1 ) θ ˜ 1 ( t ) + Δ f i ( x i ) Δ f 1 ( x 1 ) + F i ( x i ( t τ i ) ) F i ( x i ( t τ ^ i ) ) F 1 ( x 1 ( t τ 1 ) ) + F 1 ( x 1 ( t τ ^ 1 ) ) + D i ( t ) D 1 ( t ) + K i 1 e i 1 + u ¯ i 1 ( t ) . i = 2 , 3 ,   , N 1
where θ ˜ i ( t )   = θ i ( t ) θ ^ i ( t ) is the approximation error.
Theorem 1.
If the derivative of function f ( t ) is bounded in ( a , b ) i.e., | d f d t | M , then f ( t ) is Lipschitz.
Proof of Theorem 1.
Considering the mean value theorem,
t 1 , t 2 ( a , b )   c ( a , b ) :   f ( t 1 ) f ( t 2 ) t 1 t 2 = f ( c ) ,
| f ( t 1 ) f ( t 2 ) | = | t 1 t 2 | | f ( c ) | | t 1 t 2 | s u b t ( a , b ) | f ( c ) | M | t 1 t 2 | .
Theorem 2.
In a chaotic system, all the state variables are Lipschitz.
Proof of Theorem 2.
Considering a chaotic system characteristic, all of its state variables are bounded. On the other hand, the derivative of state variables is nothing but a set of addition, subtraction, and multiplication operations. Hence, the state variable derivatives are bounded so according to Theorem 1, the state variables are Lipschitz with δ i constant, which in turn implies
t 1 , t 2 R   δ i > 0   :   | x i ( t 1 ) x i ( t 2 ) | δ i | t 1 t 2 | .
where x i ( t ) is the state vector of i-th system.
Theorem 3.
The errors dynamics System (6), controlled by (46), using updating Rules (29)–(34) is stable. Moreover, the synchronization errors assuming uncertainty and disturbance will converge to zero.
Proof of Theorem 3.
Defining the Lyapunov function as
V   =   1 2 ( V e +   V θ + V γ + V d + V τ ) .
where
V e   =   i   =   2 N e i 1 T e i 1   ,   V θ   = i   =   1 N θ ˜ i T θ ˜ i .
V γ   =   i   =   2 N γ ˜ i 2 + γ ˜ 1 2 ,    V d   =   i   =   1 N d ˜ i 2 ,    V τ   =   i   =   1 N ϑ i τ ˜ i 2 ϑ i > 0 .
In Equation (14), γ ˜ i = γ i γ ^ i , d ˜ i   =   d i d ^ i ,   τ ˜ i   =   τ i τ ^ i are the estimation errors. Computing the Lyapunov function derivative,
V ˙ = i = 2 N [ e i 1 T ( H i ( x i ) θ ˜ i H 1 ( x 1 ) θ ˜ 1 + Δ f i ( x i ) Δ f 1 ( x 1 ) + D i ( t ) D 1 ( t ) + 1 2 ( K i 1 + K i 1 T ) e i 1 + F i ( x i ( t τ i ) ) F i ( x i ( t τ ^ i ) ) F 1 ( x 1 ( t τ 1 ) ) + F 1 ( x 1 ( t τ ^ 1 ) ) + u ¯ i 1 ( t ) ) + θ ˜ i T θ ˜ ˙ i + γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i ] + θ ˜ 1 T θ ˜ ˙ 1 + γ ˜ 1 γ ˜ ˙ 1 + d ˜ 1 d ˜ ˙ 1 + ϑ 1 τ ˜ 1 τ ˜ ˙ 1
The adapting rules of system parameters are determined as
θ ˜ ˙ i   =   ( H i ( x i ) T e i 1 + σ i θ ˜ i   ) .    σ i > 0    i   =   2 , 3 , , N
θ ˜ ˙ 1   =   i   =   2 N 1 H 1 ( x 1 ) T e i 1 σ 1 θ ˜ 1 .    σ 1 > 0 .
If θ i s are constant, then their derivatives are zero ( θ ˙ i   =   0 ) , and the update rules for the parameters estimation are computed as
θ ^ ˙ i   =   H i ( x i ) T e i 1 + σ i θ ˜ i .    σ i > 0 i   = 2 , 3 , , N
θ ^ ˙ 1 = i = 2 N 1 H 1 ( x 1 ) T e i 1 + σ 1 θ ˜ 1 .    σ 1 > 0
Plugging the updating rules (16–17) in Equation (15) yields
V ˙ = i = 2 N [ e i 1 T ( Δ f i ( x i ) Δ f 1 ( x 1 ) + D i ( t ) D 1 ( t ) + K i 1 e i 1 + F i ( x i ( t τ i ) ) F i ( x i ( t τ ^ i ) ) F 1 ( x 1 ( t τ 1 ) ) + F 1 ( x 1 ( t τ ^ 1 ) ) + u ¯ i 1 ( t ) ) + γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i ] + γ ˜ 1 γ ˜ ˙ 1 + d ˜ 1 d ˜ ˙ 1 + ϑ 1 τ ˜ 1 τ ˜ ˙ 1 i   = 1 N σ i θ ˜ i T θ ˜ i
If Δ f i j , F i j ,   D i j ,   e i 1 j , and u ¯ i 1 j are the j-th component of vectors Δ f i , F i ,   D i , e i 1 , and u ¯ i 1 ( t ) , respectively, then
V ˙ = i = 2 N j = 1 n e i 1 j ( Δ f i j Δ f 1 j + D i j D 1 j + F i j ( x i ( t τ i ) ) F i j ( x i ( t τ ^ i ) ) F 1 j ( x 1 ( t τ 1 ) ) + F 1 j ( x 1 ( t τ ^ 1 ) ) + u ¯ i 1 j + i   =   2 N ( γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i ) + i   =   2 N 1 2 e i 1 T K i 1 e i 1 + γ ˜ 1 γ ˜ ˙ 1 + d ˜ 1 d ˜ ˙ 1 + ϑ 1 τ ˜ 1 τ ˜ ˙ 1 i   =   1 N σ i θ ˜ i T θ ˜ i .
Therefore,
V ˙ i   =   2 N j   =   1 n [ | e i 1 j | ( | Δ f i j | + | Δ f 1 j | + | D i j | + | D 1 j | + | F i j ( x i ( t τ i ) ) F i j ( x i ( t τ ^ i ) ) | + | F 1 j ( x 1 ( t τ ^ 1 ) ) F 1 j ( x 1 ( t τ 1 ) ) | ) + e i 1 j u ¯ i 1 j ] + i   =   2 N ( γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i ) + i   =   2 N e i 1 T K i 1 e i 1 + γ ˜ 1 γ ˜ ˙ 1 + d ˜ 1 d ˜ ˙ 1 + ϑ 1 τ ˜ 1 τ ˜ ˙ 1 i   =   1 N σ i θ ˜ i T θ ˜ i .
In Equation (22), bounds of disturbance and uncertainty can be applied on components Δ f i and D i ( t ) as follows:
| Δ f i j | m a x j | Δ f i j | | Δ f i ( x i ) | γ i g i ( x i ) .
| D i j ( t ) | m a x j | D i j ( t ) | | D i ( t ) | d i .
Since F i ( x i ( t τ i ) ) and x i ( t τ i ) are Lipschitz, their components are Lipschitz as well:
| F i j ( x i ( t τ i ) ) F i j ( x i ( t τ ^ i ) ) | h i | x i ( t τ i ) x i ( t τ ^ i ) | h i δ i | ( t τ i ) ( t τ ^ i ) | = h i δ i | τ i τ ^ i |   =   h i δ i | τ ˜ i |   =   ϑ i | τ ˜ i |
ϑ i h i δ i .
Substituting the above equation in Equation (22) yields
V ˙ i   =   2 N j   =   1 n [ | e i 1 j | ( γ i g i ( x i ) + γ 1 g 1 ( x 1 ) + d i + d 1 ) + ϑ i | τ ˜ i | + ϑ 1 | τ ˜ 1 | ) + e i 1 j u ¯ i 1 j ] + i   =   2 N ( γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i ) + i   =   2 N e i 1 T K i 1 e i 1 + γ ˜ 1 γ ˜ ˙ 1 + d ˜ 1 d ˜ ˙ 1 + ϑ 1 τ ˜ 1 τ ˜ ˙ 1 i   =   1 N σ i θ ˜ i T θ ˜ i .
Defining u ¯ i 1 j ( t ) as
u ¯ i 1 j ( t )   =   ( γ ^ i g i ( x i ) + γ ^ 1 g 1 ( x 1 ) + d ^ i + d ^ 1 ) · sgn ( e i 1 j ) .
yields
V ˙ i   =   2 N j   =   1 n [ | e i 1 j | ( γ ˜ i g i ( x i ) + γ ˜ 1 g 1 ( x 1 ) + d ˜ i + d ˜ 1 + ϑ i | τ ˜ i | + ϑ 1 | τ ˜ 1 | ) ] + i   =   1 N ( γ ˜ i γ ˜ ˙ i + d ˜ i d ˜ ˙ i + ϑ i τ ˜ i τ ˜ ˙ i σ i θ ˜ i T θ ˜ i ) + i   =   2 N e i 1 T K i 1 e i 1 =   j   =   1 n ( | e i 1 j | γ ˜ i g i ( x i ) + γ ˜ i γ ˜ ˙ i ) + j   =   1 n ( | e i 1 j | ϑ i | τ ˜ i | + ϑ i τ ˜ i τ ˜ ˙ i ) + j   =   1 n ( | e i 1 j | d ˜ i + d ˜ i d ˜ ˙ i ) + ( γ ˜ 1 γ ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | γ ˜ 1 g 1 ( x 1 ) ) + ( d ˜ 1 d ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | d ˜ 1 ) + ( ϑ 1 τ ˜ 1 τ ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | ϑ 1 | τ ˜ 1 | ) i   =   1 N σ i θ ˜ i T θ ˜ i + i   =   2 N e i 1 T K i 1 e i 1 .
To determine the update rules, we determine the derivatives of the signals in (28) in such a way that V ˙ is negative. To that end, the updating rules can be set as follows:
j   =   1 n ( | e i 1 j | ϑ i | τ ˜ i | + ϑ i τ ˜ i τ ˜ ˙ i )   =   ω i τ ˜ i 2 τ ˜ ˙ i   =   j   =   1 n | e i 1 j | sgn ( τ ˜ i ) ρ i τ ˜ i · ρ i   =   ω i ϑ i .
ϑ 1 τ ˜ 1 τ ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | ϑ 1 | τ ˜ 1 |   =   τ ˜ 1 2 τ ˜ ˙ 1   =   i   =   1 N j   =   1 n | e i 1 j | sgn ( τ ˜ 1 ) ρ 1 τ ˜ 1 ·   ρ 1   =   ω 1 ϑ 1 .
j   =   1 n ( | e i 1 j | γ ˜ i g i ( x i ) + γ ˜ i γ ˜ ˙ i )   =   α i γ ˜ i 2   γ ˜ ˙ i   =   j   =   1 n | e i 1 j | g i ( x i ) α i γ ˜ i .
γ ˜ 1 γ ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | γ ˜ 1 g 1 ( x 1 )   =   α 1 γ ˜ 1 2 γ ˜ ˙ 1   =   g 1 ( x 1 ) i   =   1 N j   =   1 n | e i 1 j | α 1 γ ˜ 1 .  
j   =   1 n ( | e i 1 j | d ˜ i + d ˜ i d ˜ ˙ i )   =   β i d ˜ i 2 d ˜ ˙ i   =   j   =   1 n | e i 1 j | β i d ˜ i .
d ˜ 1 d ˜ ˙ 1 + i   =   1 N j   =   1 n | e i 1 j | d ˜ 1   =   β 1 d ˜ 1 2 d ˜ ˙ 1   =   i   =   1 N j   =   1 n | e i 1 j | β 1 d ˜ 1 .
where α i , β i , and ω i are positive values. Substituting the update rules (Equations (29)–(34)) in Equation (28) yields
V ˙ i   =   2 N e i 1 T K i 1 e i 1 i   =   1 N ( α i γ ˜ i 2 + β i d ˜ i 2 + ω i τ ˜ i 2 + σ i θ ˜ i T θ ˜ i ) .
Given that the matrixes K i 1 are diagonal and have negative elements (Hurwitz). Therefore:   e i 1 T K i 1 e i 1 < 0 .
Defined μ as
μ   =   m i n i . j ( α i , β i ,   σ i   , ω i , k i 1 , j ) > 0
Using (35) for the derivative of the Lyapunov function, the following inequality is established:
V ˙ μ V V ( t ) V ( 0 ) e μ t V ( t ) 0
As the values of the parameters α i , β i ,   σ i   , ω i , k i 1 , j augment, the convergence speed of synchronization errors and estimation error signals to zero increases.
Therefore, the system stability is proved. Additionally, the convergence of synchronization errors to zero in the presence of time delay, uncertainty, and disturbance is guaranteed. The update rules for delays estimation, disturbance bounds, and uncertainty are as follows
τ ^ i ˙   =   j   =   1 n | e i 1 j | sgn ( τ ˜ i ) + ρ i τ ˜ i . i   =   2 , 3 , , N
τ ^ 1 ˙ =   i   =   1 N j   =   1 n | e i 1 j | sgn ( τ ˜ 1 ) + ρ 1 τ ˜ 1 .
γ ^ i ˙   =   g i ( x i ) j   =   1 n | e i 1 j | + α i γ ˜ i . i   =   2 , 3 , , N
γ ^ i ˙   =   g 1 ( x 1 ) i   =   1 N j   =   1 n | e i 1 j | + α 1 γ ˜ 1 .
d ^ i ˙   =   j   =   1 n | e i 1 j | + β i d ˜ i . i   =   2 , 3 , , N
d ^ 1 ˙   = i   =   1 N j   =   1 n | e i 1 j | + β 1 d ˜ 1 .
Theorem 4.
If τ i ( t ) are constant values, then τ ˜ i ( t ) 0 . In other words, the delays are identified accurately.
Proof of Theorem 4.
Based on Equations (29) and (30), τ ˜ i τ ˜ ˙ i < ω i τ ˜ i 2   i = 1 , 2 , 3 , , N , as t approaches infinity ( t ), τ ˜ i ( t ) approaches zero ( τ ˜ i ( t ) 0 ). Therefore, estimation τ ^ i ( t ) approaches the true value.
Theorem 5.
If the delays change in a step-wise manner and the steps are large enough, the update Rules (17) and (19) hold.
Proof of Theorem 4.
Similar to Theorem 4 with the exception that t condition is replaced with condition “the step changes are large enough”.
Note 1: If the delays vary with time and | τ i ˙ ( t ) | s i holds with s i < 1 , then the update rules in (38-39) are valid with reasonable approximation.
Considering that τ ˜ i ( t )   =   τ i ( t ) τ ^ i ( t ) , τ ^ ˙ i   =   τ i ˙ ( t ) τ ˜ ˙ i τ ˜ ˙ i , the update rules (38-39) are valid with reasonable approximation. Moreover, under such conditions, update Rule (29-30) is exactly valid.
Note 2: If the systems vary with time, i.e., θ i = θ i ( t ) , Equations (16) and (17) hold, which allow us to apply Theorem (3) based on which Lyapunov Function (12) can be used, and its derivative satisfies Condition (35) as well. Hence, the Lyapunov function approaches zero:
V 0 V θ =   i = 1 N θ ˜ i T θ ˜ i 0 | θ ˜ i | 0
Therefore, if θ i ( t ) is a vector function with step changes and appropriate temporal distance between the changes, the update Rules (16) and (17) hold and parameter are estimated accurately. Let | θ i ˙ ( t ) | < q i   <   1 , then update Rules (18) and (19) are valid with reasonable accuracy.
Note 3: To guarantee the continuity of the control function, the following equation can be used:
u ¯ i 1 j ( t )   =   ( γ ^ i g i ( x i ) + γ ^ 1 g 1 ( x 1 ) + d ^ i + d ^ 1 ) · tan h ( λ e i 1 j ) ) . λ 10
Note 4: If the uncertainties are in their typical form, i.e., | Δ f i ( x i ) | γ i | x i |   i   =   1.2 . . N .., it suffices to set g i ( x i )   =   | x i | in the update equations and the control rule.
Note 5: The final control function is as below:
u i 1 ( t )   =   f i ( x i ) + f 1 ( x 1 ) H i ( x i ) θ ^ i ( t ) + H 1 ( x 1 ) θ ^ 1 ( t ) + K i 1 e i 1 ( t ) ( γ ^ i g i ( x i ) + γ ^ 1 g 1 ( x 1 ) + d ^ i + d ^ 1 ) · tan h ( λ e i 1 ( t ) ) . λ 10

3. Application in Secure Communication Based on Chaotic Masking

In chaotic masking, an information signal is added to the linear combination of base state signals. Given that Q(t) is the primary signal carried by the master system and W(t) is the transfer message given by [38,39]:
W ( t )   =   Q ( t ) + i   =   1 n η i z i ( t ) .  
where z i ( t ) is the i-th component of the master system, and W(t) is masked using the chaotic signal. This signal is transmitted via the communication channel from sender to the receiver. Using the proposed controller, the multi-state chaotic synchronization is performed in one of its states. The received signal can be recovered using the following equation [40]:
P ( t )   =   W ( t ) i   =   1 n η i y i ( t ) .
where y i ( t ) is the i-th component of the slave system. Considering the synchronization concept, the following equation is obtained [40]:
P ( t )   =   Q ( t ) + i   =   1 n η i z i ( t ) i   =   1 n η i y i ( t )   =   Q ( t ) + i   =   1 n η i ( z i ( t ) y i ( t ) )   =   Q ( t ) + i   =   1 n η i e i ( t ) Q ( t )
Figure 2 shows the block diagram of chaotic masking using multi-state synchronization. Since we have one master and two slave systems, two independent messages are sent to the master which are encrypted, then the master is synchronized with two slaves. After the synchronization with the receiver side, the signals are decrypted and the original messages are recovered.
Using chaotic masking, we demonstrated the encryption and decryption of two sinusoidal signals using our proposed multi-state synchronization approach. The simulation is carried out with Matlab software. The encryption and decryption are applied when the chaotic signals are synchronized. To evaluate this, two sinusoidal signals are added to the master system signals. Next, the master system is synchronized with two slave systems. Finally, based on the synchronization error, the signal is decrypted and recovered at the receiver side.

4. Simulation and Results

We used one Chua chaotic system and two Rössler time-delayed chaotic systems as master and slaves, respectively. These systems are defined as follows:
{ x ˙ 11 = θ 11 ( x 12 x 11 f ( x 11 ) ) . x ˙ 12 = x 11 ( t τ 1 ) x 12 x 13 . x ˙ 13 = θ 12 x 12 . f ( x 11 ) = a x 11 + 0.5 ( a b ) ( | x 11 + 1 | ) | x 11 1 | .
{ x ˙ 21 = x 22 x 23 + u 11 . x ˙ 22 = x 21 ( t τ 2 ) + θ 21 x 22 + u 12 .       x ˙ 23 = θ 22 x 21 θ 23 x 23 + x 21 x 23 + u 13
{ x ˙ 31 = x 32 x 33 + u 21 . x ˙ 32 = x 31 ( t τ 3 ) + θ 31 x 32 + u 22 .         x ˙ 33 = θ 32 x 11 θ 33 x 33 + x 31 x 33 + u 23 .
where θ i , j , b , a are system parameters. The values of the parameters are set as a   =   61 44 , b   =   3 4 , θ 11   =   10 , θ 12   =   18 , θ 21   =   θ 31   =   0.34 , θ 22   =   θ 32   =   0.4 , θ 23   =   θ 33   =   4.5   .
τ 1 ( t ) = { 1    0 t 2 0.3    2 < t 4 1    t > 4
τ 2 ( t ) = { 2    0 t 3 5    3 < t 6.5 3    t > 6.5
τ 3 ( t ) = { 3    0 t 2.5 5 + 0.4 s i n ( 2 π t )    2.5 < t 5.5 10 + 0.6 s i n ( π t 2 )    t > 5.5
The initial values of the parameters are set as below:
θ ^ 1 ( 0 )   =   [ 10 10 10 10 ] θ ^ 2 ( 0 )   =   [ 2 2 2 2 ] θ ^ 3 ( 0 )   =   [ 3 3 3 3 ] σ i   =   10   .   i   =   1.2.3.4.5
Under such circumstances, the parameters have step changes. In addition, the disturbance and uncertainties influencing the master and slave systems are expressed as
Δ f 1   =   [ 0.2 x 11 sin ( x 11 + x 13 ) 0.01 x 13 sin ( x 11 + x 13 ) 0.02 ( x 11 + x 12 ) cos ( x 11 x 13 ) ]
Δ f 2 = [ 0.5 sin ( x 21 x 22 ) 0.2 x 24 cos ( x 21 3 x 22 ) 0.5 cos ( x 21 + 2 x 23 ) ]
Δ f 3   =   [ 0.3 x 32 c o s ( x 31 + x 32 ) 0.5 s i n ( x 31 x 32 ) 0.4 x 32 s i n ( x 31 + x 33 ) ]
| Δ f i j |   m a x j | Δ f i j | | Δ f i ( x i ) | γ i | x i |
D 1   =   [ 0.2 s i n ( π 3 t ) 0.1 s i n ( π 10 t ) 0.25 s i n ( π 4 t ) ] . D 2   =   [ 0.25 s i n ( π 2 t ) 0.15 s i n ( π 20 t ) 0.20 s i n ( π 10 t ) ] . D 3   =   [ 0.3 s i n ( π 30 t ) 0.2 s i n ( π 20 t ) 0.15 s i n ( π 10 t ) ]
The controller’s parameters are chosen as
α i   =   1 , β i   =   20 ,   i   =   1 , 2 , 3 K 1   =   K 2   =   d i a g ( 20 , 20 , 20 )
In Figure 3, the synchronization errors and control efforts are illustrated. As can be seen, despite the parameter uncertainties and time-variable delays, the error signals were reduced to zero quickly. During large parameter changes, the error increased slightly but turned back to zero quickly. Hence, the proposed controller was robust against parameter uncertainties, external disturbance, and variable delays. Moreover, the control function was continuous and smooth, which was helpful in the implementation of the proposed method.
It can be noted from Figure 4 that the estimated parameters of Chua and Rössler systems have converged to their real values. It is evident from this figure that, despite being variable with time, the delays have also converged to their real values quickly. During the instances when delays exhibited step changes, the system parameters deviated from their real values, but they were corrected in short duration. Since Lipschitz conditions are F i ( x i ( t τ i ) ) functions, the parameter changes do not affect the delays significantly. On the other hand, Chua is a non-smooth system, which causes more complication in the control as well as synchronization problems.
In Figure 5, the plots of estimation error of unknown uncertainties bounds γ ˜ i ,   i = 1 , 2 , 3 and unknown disturbances bounds d ˜ i ,   i = 1 , 2 , 3 are shown.
It can be seen in Figure 5 that the estimation error of unknown parameter bounds and uncertainties bounds have approached zero quickly. In the tenth second, little error is observed, which is compensated in a short amount of time. Figure 6, Figure 7 and Figure 8 shows the phase curves of the slave system and indicates the chaotic behavior of the system. In spite of various changes, the behavior of the system is still chaotic.
Phase curves of the master system: Chua time-delayed chaotic system ( x 11 x 13 , x 11 x 12 , x 12 x 13 ) indicating the chaotic behavior for the provided parameters.
The phase curve of the first slave system: Rössler time-delayed chaotic systems ( x 21 x x 22 x 23 , x 21 x 23 22 ) which shows the chaotic behavior for the given parameters.
The phase curve of the second slave system: Rössler time-delayed chaotic systems ) x 31 x 33 , x 32 x 33 , x 31 x 32 ) representing the chaotic behavior for the given parameters.

5. Discussion

The presented results reveal good performance of the proposed method in estimating parameters, delays, as well as disturbance bounds and uncertainties. This in turn leads to an acceptable performance of the overall system in synchronization and convergence of errors to zero.
In the rest of the paper, the proposed method was evaluated in secure communication using chaotic masking. To evaluate this, five sinusoid signals were added as messages to the master system’s signal, independently. The decryption and recovering of each message was done by synchronization of the master system with two slave systems. The message signals added to the master system are given below:
S 1 ( t )   =   s i n ( 0.7 t ) + 2 c o s ( 5 t ) + 4 s i n ( π t ) S 2 ( t )   =   s i n ( 0.8 t ) + 2 c o s ( 8 t ) + 5 s i n ( π t ) S 3 ( t )   =   2 s i n ( 0.85 t ) + 5 c o s ( 5.1 t ) + 6 s i n ( π t ) S 4 ( t )   =   2.5 s i n ( 0.85 t ) + 3.2 c o s ( 5.16 t ) + 5.5 s i n ( π t ) S 5 ( t )   =   2.5 s i n ( 0.85 t ) + 3.2 c o s ( 5.16 t ) + 4.5 s i n ( π t )
After the synchronization, the recovered signals were obtained. In Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13, the original and recovered message signals obtained using multi-state synchronization and chaotic masking are shown.
Figure 9 shows the recovered signal (R1) followed the original signal (S1) very well. Due to sudden changes in delays and parameters, there was a pick at 10 s, which was dealt with, and after that the recovered signal faithfully followed the original signal again.
Figure 10, Figure 11, Figure 12 and Figure 13 show that the original signal given to the master and received by the slave has been recovered faithfully using our proposed multi-state synchronization method. The advantages of the proposed method are as follows:
Guaranteed closed loop stability in the presence of disturbance, uncertainty, parameter changes, and delays.
  • Accurate estimation of variable time delays and parameters.
  • Specifying the control laws as continuous time functions.
  • Capable of dealing with disturbance and uncertainties with unknown boundaries.
  • Faithful recovery of message signal in secure communication.
The disadvantages of our method are given below:
  • Involves relatively large magnitude of control signal in a few cases (control functions u 13 ,   u 23 ).
  • Changes occur solely in a step-like manner; hence, there is a large distance between parameter changes.
In the future, we intend to extend this work by multi-state synchronization with minimization of sum of control efforts and synchronization of chaotic systems with variable parameters. Secure communication can be employed in medical applications as well [41]. Medical data stored in hospitals contain significant information about the patients. In future work, the proposed method for secure communication can be used for medical applications [42,43,44,45,46,47]. Synchronization of chaotic systems is also used in some other applications such as electromagnetism [48] and mechanics [49,50]. As a future work, the chaotic synchronization method of this paper can be developed and implemented for electromagnetic and mechanical applications.
In this paper, we have proposed that, using our multi-state synchronization and chaotic masking method, secure communication can be achieved. In secure communication, encoding (masking) and accurately recovering the message signal is very important. The most important feature in secure communication is the security of the method and complexity of the algorithm, which makes decoding practically impossible or very difficult. In this regard, important points of the proposed method are given below:
(1)
Presence of delay and variable parameters in master and slave systems.
(2)
Ability to switch to different slave systems.
(3)
Presence of undesirable and unwanted factors such as disturbances and uncertainty.
Therefore, our proposed method helps to ensure secure communication. Accurate retrieval of message signal was another prominent feature of this method. It can be noted from our examples that our proposed method is able to recover the message signal faithfully at the receiver. Hence, our proposed approach has two important properties: the ability to mask the data and to recover the message accurately, which can be used in secure communications.

6. Conclusions

In this paper, multi-state synchronization of two time-delayed chaotic systems with unknown parameters and delays in the presence of unknown parameters and external disturbance was investigated. The disturbance and uncertainties have unknown bounds, and the master system was non-smooth. To estimate the parameters and time delays, the Lyapunov method was used. This way, convergence of various types of defined errors were guaranteed, and the adaptive rules for estimation of parameters and time delays were determined. Moreover, the update of rules for the bounds of unknown parameters and external disturbance were established. To evaluate the proposed method, the simulations were carried out in a multi-state synchronization setting with time variable delays and parameters. Our results revealed that the proposed controller was good at reducing the synchronization errors to zero with little oscillations. In addition, despite changes such as step and sinusoid, the time delays have been identified and estimated well. Moreover, the errors related to the bounds of unknown parameters and external disturbance converged to zero quickly. The experimental results revealed the capability and flexibility of the proposed method in synchronization of chaotic systems, parameters, and time delay identification in the presence of uncertainty and disturbance. Finally, the capability of the proposed method to recover the message signals in secure communication applications was presented. Due to time variability of the system, the chaotic behavior was more complex, which leads to better protection in secure communication.

Author Contributions

Conceptualization, A.A.K.J. and A.S.; methodology, A.Z. and S.N.; software, A.A.K.J. and A.S.; validation, A.Z., U.R.A., A.A.K.J. and A.M.; formal analysis, A.S., R.A., N.H.I. and M.J.; resources, A.Z. and A.A.K.J.; writing-original draft preparation, A.A.K.J., A.S., R.A. and P.M.; writing-review and editing, A.S., A.Z., A.M., U.R.A., N.H.I. and M.J.; visualization, A.Z., A.A.K.J. and A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bendoukha, S.; Abdelmalek, S.; Ouannas, A. Secure communication systems based on the synchronization of chaotic systems. In Mathematics Applied to Engineering, Modelling, and Social Issues; Springer: Cham, Switzerland, 2019; pp. 281–311. [Google Scholar]
  2. Mewada, D.; Dave, N.; Prajapati, R.K. A survey: Prospects of Internet of Things (IoT) using cryptography based on its subsequent challenges. Aust. J. Wirel. Technol. Mobil. Secur. 2019, 1, 28–30. [Google Scholar] [CrossRef]
  3. Taha, M.S.; Rahim, M.S.M.; Lafta, S.A.; Hashim, M.M.; Alzuabidi, H.M. Combination of steganography and cryptography: A short survey. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2019; Volume 518, p. 052003. [Google Scholar]
  4. AlMajed, H.; AlMogren, A. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things. Sensors 2020, 20, 6158. [Google Scholar] [CrossRef] [PubMed]
  5. Gulsezim, D.; Zhansaya, S.; Razaque, A.; Ramina, Y.; Amsaad, F.; Almiani, M.; Oun, A. Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; IEEE: New York, NY, USA, 2019; pp. 405–411. [Google Scholar]
  6. Yang, T.; Wu, C.W.; Chua, L.O. Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 1997, 44, 469–472. [Google Scholar] [CrossRef]
  7. Crandall, R.E. Cryptographic system using chaotic dynamics. U.S. Patent 6587563, 2003. [Google Scholar]
  8. Liu, S.; Wei, Y.; Liu, J.; Chen, S.; Zhang, G. Multi-Scroll Chaotic System Model and Its Cryptographic Application. Int. J. Bifurc. Chaos 2020, 30, 2050186. [Google Scholar] [CrossRef]
  9. Pham, V.T.; Kingni, S.T.; Volos, C.; Jafari, S.; Kapitaniak, T. A simple three-dimensional fractional-order chaotic system without equilibrium: Dynamics, circuitry implementation, chaos control and synchronization. AEU Int. J. Electron. Commun. 2017, 78, 220–227. [Google Scholar] [CrossRef]
  10. Chen, D.; Li, S.; Wu, Q. Rejecting chaotic disturbances using a super-exponential-zeroing neurodynamic approach for synchronization of chaotic sensor systems. Sensors 2019, 19, 74. [Google Scholar] [CrossRef] [Green Version]
  11. Pham, V.T.; Ouannas, A.; Volos, C.; Kapitaniak, T. A simple fractional-order chaotic system without equilibrium and its synchronization. AEU Int. J. Electron. Commun. 2018, 86, 69–76. [Google Scholar] [CrossRef]
  12. Zare, A.; Mirrezapour, S.Z.; Hallaji, M.; Shoeibi, A.; Jafari, M.; Ghassemi, N.; Mosavi, A. Robust Adaptive Synchronization of a Class of Uncertain Chaotic Systems with Unknown Time-Delay. Appl. Sci. 2020, 10, 8875. [Google Scholar] [CrossRef]
  13. Tirandaz, H.; Hajipour, A. Adaptive synchronization and anti-synchronization of TSUCS and Lü unified chaotic systems with unknown parameters. Optik 2017, 130, 543–549. [Google Scholar] [CrossRef]
  14. Vaidyanathan, S.; Pham, V.T.; Volos, C. Adaptive control, synchronization and circuit simulation of a memristor-based hyperchaotic system with hidden attractors. In Advances in Memristors, Memristive Devices and Systems; Springer: Cham, Switzerland, 2017; pp. 101–130. [Google Scholar]
  15. Khan, A. Hybrid function projective synchronization of chaotic systems via adaptive control. Int. J. Dyn. Control 2017, 5, 1114–1121. [Google Scholar] [CrossRef]
  16. Mani, P.; Rajan, R.; Shanmugam, L.; Joo, Y.H. Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Inf. Sci. 2019, 491, 74–89. [Google Scholar] [CrossRef]
  17. Chen, X.; Park, J.H.; Cao, J.; Qiu, J. Adaptive synchronization of multiple uncertain coupled chaotic systems via sliding mode control. Neurocomputing 2018, 273, 9–21. [Google Scholar] [CrossRef]
  18. Song, C.; Fei, S.; Cao, J.; Huang, C. Robust synchronization of fractional-order uncertain chaotic systems based on output feedback sliding mode control. Mathematics 2019, 7, 599. [Google Scholar] [CrossRef] [Green Version]
  19. Shukla, M.K.; Sharma, B.B. Control and synchronization of a class of uncertain fractional order chaotic systems via adaptive backstepping control. Asian J. Control 2018, 20, 707–720. [Google Scholar] [CrossRef]
  20. Zhu, Z.Y.; Zhao, Z.S.; Zhang, J.; Wang, R.K.; Li, Z. Adaptive fuzzy control design for synchronization of chaotic time-delay system. Inf. Sci. 2020, 535, 225–241. [Google Scholar] [CrossRef]
  21. Mohammadzadeh, A.; Ghaemi, S.; Kaynak, O. Robust predictive synchronization of uncertain fractional-order time-delayed chaotic systems. Soft Comput. 2019, 23, 6883–6898. [Google Scholar] [CrossRef]
  22. Xu, S.; Lv, H.; Liu, H.; Liu, A. Robust Control of Disturbed Fractional-Order Economical Chaotic Systems with Uncertain Parameters. Complexity 2019, 2019. [Google Scholar] [CrossRef] [Green Version]
  23. Chen, H.C.; Liau, B.Y.; Hou, Y.Y. Hardware implementation of Lorenz circuit systems for secure chaotic communication applications. Sensors 2013, 13, 2494–2505. [Google Scholar] [CrossRef]
  24. Cicek, S.; Kocamaz, U.E.; Uyaroğlu, Y. Secure chaotic communication with jerk chaotic system using sliding mode control method and its real circuit implementation. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 687–698. [Google Scholar] [CrossRef]
  25. Khan, A.; Jahanzaib, L.S.; Trikha, P. Secure communication: Using parallel synchronization technique on novel fractional order chaotic system. IFAC PapersOnLine 2020, 53, 307–312. [Google Scholar] [CrossRef]
  26. Yu, F.; Zhang, Z.; Liu, L.; Shen, H.; Huang, Y.; Shi, C.; Xu, Q. Secure communication scheme based on a new 5D multistable four-wing memristive hyperchaotic system with disturbance inputs. Complexity 2020, 2020. [Google Scholar] [CrossRef]
  27. Liu, J.; Wang, Z.; Shu, M.; Zhang, F.; Leng, S.; Sun, X. Secure communication of fractional complex chaotic systems based on fractional difference function synchronization. Complexity 2019, 2019. [Google Scholar] [CrossRef] [Green Version]
  28. Wang, T.; Wang, D.; Wu, K. Chaotic adaptive synchronization control and application in chaotic secure communication for industrial Internet of Things. IEEE Access 2018, 6, 8584–8590. [Google Scholar] [CrossRef]
  29. Yu, W.; Wang, J.; Wang, J.; Zhu, H.; Li, M.; Li, Y.; Jiang, D. Design of a new seven-dimensional hyperchaotic circuit and its application in secure communication. IEEE Access 2019, 7, 125586–125608. [Google Scholar] [CrossRef]
  30. Chen, Y.J.; Chou, H.G.; Wang, W.J.; Tsai, S.H.; Tanaka, K.; Wang, H.O.; Wang, K.C. A polynomial-fuzzy-model-based synchronization methodology for the multi-scroll Chen chaotic secure communication system. Eng. Appl. Artif. Intell. 2020, 87, 103251. [Google Scholar] [CrossRef]
  31. He, W.; Luo, T.; Tang, Y.; Du, W.; Tian, Y.C.; Qian, F. Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31. [Google Scholar] [CrossRef]
  32. A Rahman, Z.A.S.; Al-Kashoash, H.A.; Ramadhan, S.M.; Al-Yasir, Y.I. Adaptive Control Synchronization of a Novel Memristive Chaotic System for Secure Communication Applications. Inventions 2019, 4, 30. [Google Scholar] [CrossRef] [Green Version]
  33. Ouannas, A.; Bendoukha, S.; Volos, C.; Boumaza, N.; Karouma, A. Synchronization of fractional hyperchaotic Rabinovich systems via linear and nonlinear control with an application to secure communications. Int. J. Control. Autom. Syst. 2019, 17, 2211–2219. [Google Scholar] [CrossRef]
  34. Wang, W.; Jia, X.; Luo, X.; Kurths, J.; Yuan, M. Fixed-time synchronization control of memristive MAM neural networks with mixed delays and application in chaotic secure communication. Chaos Solitons Fractals 2019, 126, 85–96. [Google Scholar] [CrossRef]
  35. Wang, J.; Yu, W.; Wang, J.; Zhao, Y.; Zhang, J.; Jiang, D. A new six-dimensional hyperchaotic system and its secure communication circuit implementation. Int. J. Circuit Theory Appl. 2019, 47, 702–717. [Google Scholar] [CrossRef]
  36. Zirkohi, M.M. An efficient approach for digital secure communication using adaptive backstepping fast terminal sliding mode control. Comput. Electr. Eng. 2019, 76, 311–322. [Google Scholar] [CrossRef]
  37. Chen, X.; Park, J.H.; Cao, J.; Qiu, J. Sliding mode synchronization of multiple chaotic systems with uncertainties and disturbances. Appl. Math. Comput. 2017, 308, 161–173. [Google Scholar] [CrossRef]
  38. Ren, H.P.; Bai, C.; Huang, Z.Z.; Grebogi, C. Secure communication based on hyperchaotic Chen system with time-delay. Int. J. Bifurc. Chaos 2017, 27, 1750076. [Google Scholar] [CrossRef] [Green Version]
  39. Lin, T.C.; Huang, F.Y.; Du, Z.; Lin, Y.C. Synchronization of fuzzy modeling chaotic time delay memristor-based Chua’s circuits with application to secure communication. Int. J. Fuzzy Syst. 2015, 17, 206–214. [Google Scholar] [CrossRef]
  40. Kwon, O.M.; Park, J.H.; Lee, S.M. Secure communication based on chaotic synchronization via interval time-varying delay feedback control. Nonlinear Dyn. 2011, 63, 239–252. [Google Scholar] [CrossRef]
  41. Ali, T.S.; Ali, R. A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map. IEEE Access 2020, 8, 71974–71992. [Google Scholar] [CrossRef]
  42. Shoeibi, A.; Ghassemi, N.; Khodatars, M.; Jafari, M.; Hussain, S.; Alizadehsani, R.; Zare, A. Epileptic seizure detection using deep learning techniques: A Review. arXiv 2020, 2007, 01276. [Google Scholar]
  43. Shoeibi, A.; Ghassemi, N.; Alizadehsani, R.; Rouhani, M.; Hosseini-Nejad, H.; Khosravi, A.; Nahavandi, S. A comprehensive comparison of handcrafted features and convolutional autoencoders for epileptic seizures detection in EEG signals. Exp. Syst. Appl. 2020, 163, 113788. [Google Scholar] [CrossRef]
  44. Martin-Isla, C.; Campello, V.M.; Izquierdo, C.; Raisi-Estabragh, Z.; Baeßler, B.; Petersen, S.E.; Lekadir, K. Image-based cardiac diagnosis with machine learning: A review. Front. Cardiovasc. Med. 2020, 7, 1. [Google Scholar] [CrossRef] [Green Version]
  45. Alizadehsani, R.; Khosravi, A.; Roshanzamir, M.; Abdar, M.; Sarrafzadegan, N.; Shafie, D.; Bishara, A. Coronary Artery Disease Detection Using Artificial Intelligence Techniques: A Survey of Trends, Geographical Differences and Diagnostic Features 1991–2020. Comput. Biol. Med. 2020, 128, 104095. [Google Scholar] [CrossRef]
  46. Shoeibi, A.; Khodatars, M.; Alizadehsani, R.; Ghassemi, N.; Jafari, M.; Moridian, P. Alizadehsani, Z. Automated detection and forecasting of covid-19 using deep learning techniques: A review. arXiv 2020, 2007, 10785. [Google Scholar]
  47. Kumar, A.; Gupta, P.K.; Srivastava, A. A review of modern technologies for tackling COVID-19 pandemic. Diabet. Metab. Syndr. Clin. Res. Rev. 2020. [CrossRef] [PubMed]
  48. Abd-Elaziz, E.M.; Marin, M.; Othman, M.I. On the effect of Thomson and initial stress in a thermo-porous elastic solid under GN electromagnetic theory. Symmetry 2019, 11, 413. [Google Scholar] [CrossRef] [Green Version]
  49. Vlase, S.; Marin, M.; Öchsner, A.; Scutaru, M.L. Motion equation for a flexible one-dimensional element used in the dynamical analysis of a multibody system. Contin. Mech. Thermodyn. 2019, 31, 715–724. [Google Scholar] [CrossRef]
  50. Jian, B.L.; Wang, C.C.; Chang, J.Y.; Su, X.Y.; Yau, H.T. Machine tool chatter identification based on dynamic errors of different self-synchronized chaotic systems of various fractional orders. IEEE Access 2019, 7, 67278–67286. [Google Scholar] [CrossRef]
Figure 1. Synchronization of the master system with multiple slave systems.
Figure 1. Synchronization of the master system with multiple slave systems.
Sensors 21 00254 g001
Figure 2. Block diagram of chaotic masking using multi-state synchronization.
Figure 2. Block diagram of chaotic masking using multi-state synchronization.
Sensors 21 00254 g002
Figure 3. Plots of synchronization errors and control efforts.
Figure 3. Plots of synchronization errors and control efforts.
Sensors 21 00254 g003
Figure 4. Plots of parameters and delays estimations versus time.
Figure 4. Plots of parameters and delays estimations versus time.
Sensors 21 00254 g004
Figure 5. Estimation error of disturbance bounds (left). Estimation error of uncertainties bounds versus time (right).
Figure 5. Estimation error of disturbance bounds (left). Estimation error of uncertainties bounds versus time (right).
Sensors 21 00254 g005
Figure 6. Sample phase curves of the Master system.
Figure 6. Sample phase curves of the Master system.
Sensors 21 00254 g006
Figure 7. Sample phase curves of the first slave system.
Figure 7. Sample phase curves of the first slave system.
Sensors 21 00254 g007
Figure 8. Sample phase curves of the second slave system.
Figure 8. Sample phase curves of the second slave system.
Sensors 21 00254 g008
Figure 9. Plot of original signal ( S 1 ) and recovered signal ( R 1 ) obtained using multi-state synchronization and chaotic masking.
Figure 9. Plot of original signal ( S 1 ) and recovered signal ( R 1 ) obtained using multi-state synchronization and chaotic masking.
Sensors 21 00254 g009
Figure 10. Plot of original signal ( S 2 ) and recovered signal ( R 2 ) obtained using multi-state synchronization and chaotic masking.
Figure 10. Plot of original signal ( S 2 ) and recovered signal ( R 2 ) obtained using multi-state synchronization and chaotic masking.
Sensors 21 00254 g010
Figure 11. Plot of original signal ( S 3 ) and recovered signal ( R 3 ) obtained using multi-state synchronization and chaotic masking.
Figure 11. Plot of original signal ( S 3 ) and recovered signal ( R 3 ) obtained using multi-state synchronization and chaotic masking.
Sensors 21 00254 g011
Figure 12. Plot of original signal ( S 4 ) and recovered signal ( R 4 ) obtained using multi-state synchronization and chaotic masking.
Figure 12. Plot of original signal ( S 4 ) and recovered signal ( R 4 ) obtained using multi-state synchronization and chaotic masking.
Sensors 21 00254 g012
Figure 13. Plot of original signal ( S 5 ) and recovered signal ( R 5 ) obtained using multi-state synchronization and chaotic masking.
Figure 13. Plot of original signal ( S 5 ) and recovered signal ( R 5 ) obtained using multi-state synchronization and chaotic masking.
Sensors 21 00254 g013
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kekha Javan, A.A.; Shoeibi, A.; Zare, A.; Hosseini Izadi, N.; Jafari, M.; Alizadehsani, R.; Moridian, P.; Mosavi, A.; Acharya, U.R.; Nahavandi, S. Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication. Sensors 2021, 21, 254. https://doi.org/10.3390/s21010254

AMA Style

Kekha Javan AA, Shoeibi A, Zare A, Hosseini Izadi N, Jafari M, Alizadehsani R, Moridian P, Mosavi A, Acharya UR, Nahavandi S. Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication. Sensors. 2021; 21(1):254. https://doi.org/10.3390/s21010254

Chicago/Turabian Style

Kekha Javan, Ali Akbar, Afshin Shoeibi, Assef Zare, Navid Hosseini Izadi, Mahboobeh Jafari, Roohallah Alizadehsani, Parisa Moridian, Amir Mosavi, U. Rajendra Acharya, and Saeid Nahavandi. 2021. "Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication" Sensors 21, no. 1: 254. https://doi.org/10.3390/s21010254

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop