Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication

In this paper, the multi-state synchronization of chaotic systems with non-identical, unknown, and time-varying delay in the presence of external perturbations and parametric uncertainties was studied. The presence of unknown delays, unknown bounds of disturbance and uncertainty, as well as changes in system parameters complicate the determination of control function and synchronization. During a synchronization scheme using a robust-adaptive control procedure with the help of the Lyapunov stability theorem, the errors converged to zero, and the updating rules were set to estimate the system parameters and delays. To investigate the performance of the proposed design, simulations have been carried out on two Chen hyper-chaotic systems as the slave and one Chua hyper-chaotic system as the master. Our results showed that the proposed controller outperformed the state-of-the-art techniques in terms of convergence speed of synchronization, parameter estimation, and delay estimation processes. The parameters and time delays were achieved with appropriate approximation. Finally, secure communication was realized with a chaotic masking method, and our results revealed the effectiveness of the proposed method in secure telecommunications.


Introduction
Applications of digital telecommunications can be seen in all aspects of daily life and all industries including medicine and education, as well as social interactions [1]. Hence, there is a need to have secure communication. To do this, many cryptography methods have been introduced, mainly encoding the data from the sender and decoding them at the receiver [1]. Cryptographical methods are based on various schemes, and a number of related papers have been published in this field [2][3][4][5]. There has been a considerable amount of work done in this field, and chaotic systems play a significant role among all cryptographical schemes [6][7][8].
One of the fundamental characteristics of chaotic systems is the extreme response to small changes in initial circumstances. The main goal of proposing synchronization methods is the suitable tuning of controller parameters in chaotic systems [9][10][11][12]. In chaotic synchronization, the vector state of the master system follows the slave system [13]. Various control-based schemes have been used previously for synchronization, such as adaptive [14][15][16], sliding mode [17,18], back stepping [19], fuzzy [20], predictive [21], and robust [22].
The work on applications of chaotic synchronization in secure communication has grown dramatically in recent years [23][24][25][26][27][28][29][30][31][32][33][34][35][36]. Developing control systems for synchronization of various chaotic systems has been one of the main focuses of prior works, aiming to improve security in communication. Furthermore, few researchers have concentrated on the hardware implementation of these systems in order to create reliable and rapid hardware for sending and receiving data securely [23]. The summary of various works done on this topic is given below.
Çiçek et al. [24] conducted the design and implementation of an analog circuit of a secure telecommunications system based on slipping mode control (SMC). The chaos system is the jerk, which is less complex than other chaotic systems. The most significant novelty of this work is applying SMC synchronization along with the jerk chaos system, which was introduced for the first time. The results of Op-Amp-based analog circuit simulation in SMC and jerk-based synchronization demonstrated the effectiveness of the proposed method.
A method based on a four-dimensional chaotic system has been proposed by Ayub Khan et al. [25]. The chaotic system proposed is of the fractional-order type, contributing greatly to the confidentiality of information. The results obtained justified the theoretical scheme and simulation results.
Yu et al. [26] recommended a system based on hyper-chaotic theory for secure telecommunications. The proposed chaotic system is multistable four-wing memristive (FWMHS), which is five-dimensional and was used to conduct the experiments. The disturbance included in the inputs of the proposed method enhanced the security factor in telecommunications. The sliding mode control is also used in this method, the parameters of which are unknown.
A novel model for synchronization in secure telecommunications based on the fractionalorder complex chaotic system has been proposed in [27]. The fractional difference function synchronization (FDFS) method used in this work yielded good results.
In [28], a new synchronization approach for utilization in internet of things (IoT) applications has been used. The design of the synchronization system in their work is based on the Lyapunov stability theorem. Synchronization is based on a nonlinear adaptive controller. In their work, the input signals are first decomposed into small segments and then combined and transmitted with chaotic signals. Subsequently, important information is separated from the chaotic signals at the receiver. The simulation results proved the effectiveness of the proposed scheme in sending and receiving confidential information.
Another work by [29] proposed the design of an Op-Amp-based analog circuit to obtain secure communication. The proposed analog circuit of the seven-dimensional chaotic system is designed and implemented. The results of the circuit simulation confirm the greater capability of the circuit designed for secure communication.
Chen et al. [30] proposed a novel methodology for the synchronization of secure telecommunications. This new technique is based on the polynomials fuzzy model applied to the Chen chaotic system. The approach proposed in this paper is implemented on several various examples, and the results showed that the receiver worked successfully in retrieving the signals transmitted by the transmitter.
Wangli He et al. [31] introduced a new approach based on quantized synchronization of neural networks. In their work, the implementation of the master and slave section of the chaos system is done on the Chua circuit. In order to perform experiments, different images for synchronization with the proposed procedure are employed, and successful results were achieved.
The idea of utilizing adaptive control for synchronization is proposed in [32]. The master and slave chaos systems discussed in this work are of the memristor type. Additionally, to enhance the security of information, an unknown parameter in the slave system is applied. The most significant contribution of this scheme is that it is simple to implement, and it helps to achieve valuable results in secure communication applications.
Ouannas et al. [33] adopted linear and nonlinear controllers to synchronize in secure telecommunications applications. The improved Robinovich chaotic system employed in this study is of the fractional order type. The stability investigation of the proposed technique is proven by means of the Lyapunov theorem. Numerical results illustrated the effectiveness of their proposed scheme in maintaining the confidentiality of information.
In a study, Wang et al. [34] proposed a novel idea of synchronization in secure telecommunications based on neural networks. Associative memory neural networks are widely employed in various applications for synchronization. This network has been chosen based on memristor. In the Lyapunov stability theorem, two controllers with different activation functions are applied. The proposed approach ensured synchronization of drive and response systems in a finite time.
Jing Wang et al. [35] conducted the implementation of analog hardware for a synchronization method; the chaotic system tested in this method is six-dimensional. In order to implement the hardware, all conditions are considered so that the theory of the proposed scheme is consistent with the simulation results.
Zirkohi et al. [36] used terminal slipping model control (TSM) for synchronization. The Duffing-Holmes oscillator is considered the first chaotic system, and the chaotic gyro oscillator as the second chaotic system. Uncertainty, unknown parameters, and ultimately external disturbances are taken into account in both chaotic systems. In the controller section, Chebyshev polynomials are applied to approximate the master and slave systems.
In this paper, a robust adaptive controller was proposed for multi-mode synchronization of chaotic systems. In the proposed method, both slave and master systems have uncertainty, disturbance, unknown parameters, and time-varying delay characteristics. By defining a suitable Lyapunov function, rules for updating parameters, time delays, and estimation errors of uncertainty and disturbance bounds were determined. The proposed controller guarantees that convergence of disturbance and uncertainty bounds estimation error and synchronization error to zero. To prevent the chattering phenomenon, the control law is a continuous function. By using the masking method and using chaotic signals as a carrier signal, the security of communication channels was improved. In the provided example, a 3D Chua system was chosen as the master system, and two Rössler systems were chosen as the slave system. Given the proper and quick reconstruction of message signals and also the convergence of all errors to zero, it was shown that the proposed method has the ability to obtain better performance for synchronization of chaotic systems.
In time-delayed chaotic systems, little work has been done on delay uncertainty with parametric uncertainties, external perturbations, and uncertainty in modeling the multi-state synchronization problems of chaotic systems. The novelties of this paper are as follows: (1) synchronization of chaotic systems with unknown time delays; (2) synchronization of chaotic systems in the presence of disturbance and uncertainty with unknown boundaries and variable parameters; (3) guarantee of convergence of tracking errors and parameters estimation to zero; (4) Determining the rules for updating parameters, time delays, and disturbance and uncertainty boundaries.
The paper is organized as follows. First, the concept of multi-state synchronization in the presence of perturbation and uncertainty is described. Then, the essential theorems to prove the convergence of errors to zero are explained. Adaptive rules for updating parameters and delays are achieved. Finally, the concept of masking the synchronization of three chaotic systems and its application in secure communication is presented.

Multi-State Synchronization of Chaotic Systems in the Presence of Disturbance and Uncertainty
In multi-state synchronization of chaotic systems, a master chaotic system is synchronized with multiple chaotic systems. Figure 1 shows the synchronization of the master system with multiple system slave systems. three chaotic systems and its application in secure communication is presented.

Multi-State Synchronization of Chaotic Systems in the Presence of Disturbance and Uncertainty
In multi-state synchronization of chaotic systems, a master chaotic system is synchronized with multiple chaotic systems. Figure 1 shows the synchronization of the master system with multiple system slave systems.
We represent the driver system with the following equation [30]: The N-1 slave systems control function can be represented as [30] (t) = ( ) + ( − ) + ( ) ( ) + ∆ ( ) + ( ). = 2,3, ⋯ , where ( ) = [ , , ⋯ , ] is the state vector of i-th system,    We represent the driver system with the following equation [30]: The N-1 slave systems control function can be represented as [30] . where is a continuous function with Lipschitz [30] condition and constant h i , τ i is the unknown variable system delay, and . . , θ in ] T are the main parameters with unknown step changes, ∆ f i (x i ) uncertainties, and bounded disturbance D i (t). Based on Equations (1) and (2), the synchronization of chaotic system with control function is as follows: in which it is assumed that u i−1 (t) = [u i−1.1 (t), u i−1.2 (t), . . . , u i−1.n (t)] T is the i-th slave system control function, uncertainties and disturbance have unknown bounds, In Equation (4) γ i and d i are unknown constants, g i (x i ) is a known function, and in few cases g i (x i ) = |x i |.
In multi-state synchronization, the synchronization error is defined as [37] Hence, the error dynamics can be represented as [37] .
Assuming that the control function is defined as The control function is selected in such a way that first it removes well-determined sentences ( f 1 (x 1 ) , f i (x i )) from the error dynamics, and then it approximates the sentences with variable parameters (H 1 (x 1 )θ 1 (t) and F i (x i (t −τ i ))). To stabilize the system, it exploits the K i−1 e i−1 state feedback, and finally the sentence u i−1 (t) determines the proper estimation of the disturbance and uncertainty boundaries.
Whereθ i (t) andτ i (t) are the estimates of θ i (t) and τ i (t), and u i−1 (t) is a part of the control function (introduced later in the paper), the feedback gain matrix is defined as K i−1 is a diagonal matrix with negative elements that result in the synchronization error to converge to zero in the design.
Plugging the control function into Equation (6), the errors dynamics read aṡ Proof of Theorem 1. Considering the mean value theorem, Theorem 2. In a chaotic system, all the state variables are Lipschitz.
Proof of Theorem 2. Considering a chaotic system characteristic, all of its state variables are bounded. On the other hand, the derivative of state variables is nothing but a set of addition, subtraction, and multiplication operations. Hence, the state variable derivatives are bounded so according to Theorem 1, the state variables are Lipschitz with δ i constant, which in turn implies where x i (t) is the state vector of i-th system. (6), controlled by (46), using updating Rules (29)-(34) is stable. Moreover, the synchronization errors assuming uncertainty and disturbance will converge to zero.

Proof of Theorem 3. Defining the Lyapunov function as
where In Equation (14), The adapting rules of system parameters are determined as .
If θ i s are constant, then their derivatives are zero ( . θ i = 0), and the update rules for the parameters estimation are computed as Sensors 2021, 21, 254 Plugging the updating rules (16)(17) in Equation (15) yields Therefore, In Equation (22), bounds of disturbance and uncertainty can be applied on components ∆ f i and D i (t) as follows: Since F i (x i (t − τ i )) and x i (t − τ i ) are Lipschitz, their components are Lipschitz as well: Substituting the above equation in Equation (22) Defining To determine the update rules, we determine the derivatives of the signals in (28) in such a way that . V is negative. To that end, the updating rules can be set as follows: where α i , β i , and ω i are positive values. Substituting the update rules (Equations (29)-(34)) in Equation (28) yields Given that the matrixes K i−1 are diagonal and have negative elements (Hurwitz). Therefore: Using (35) for the derivative of the Lyapunov function, the following inequality is established: As the values of the parameters α i , β i , σ i , ω i , k i−1,j augment, the convergence speed of synchronization errors and estimation error signals to zero increases. Therefore, the system stability is proved. Additionally, the convergence of synchronization errors to zero in the presence of time delay, uncertainty, and disturbance is guaranteed. The update rules for delays estimation, disturbance bounds, and uncertainty are as follows .
In other words, the delays are identified accurately. (29) and (30)

Proof of Theorem 4. Based on Equations
. Therefore, estimationτ i (t) approaches the true value.
Theorem 5. If the delays change in a step-wise manner and the steps are large enough, the update Rules (17) and (19) hold.
Proof of Theorem 4. Similar to Theorem 4 with the exception that t → ∞ condition is replaced with condition "the step changes are large enough". τ i (t) ≤ s i holds with s i < 1, then the update rules in (38)(39) are valid with reasonable approximation.
Note 2: If the systems vary with time, i.e., θ i = θ i (t), Equations (16) and (17) hold, which allow us to apply Theorem (3) based on which Lyapunov Function (12) can be used, and its derivative satisfies Condition (35) as well. Hence, the Lyapunov function approaches zero: Therefore, if θ i (t) is a vector function with step changes and appropriate temporal distance between the changes, the update Rules (16) and (17) hold and parameter are estimated accurately. Let . θ i (t) < q i < 1, then update Rules (18) and (19) are valid with reasonable accuracy.
Note 3: To guarantee the continuity of the control function, the following equation can be used: Note 4: If the uncertainties are in their typical form, i.e., |∆ f i (x i )| ≤ γ i |x i | i = 1.2. . . . .N.., it suffices to set g i (x i ) = |x i | in the update equations and the control rule.
Note 5: The final control function is as below:

Application in Secure Communication Based on Chaotic Masking
In chaotic masking, an information signal is added to the linear combination of base state signals. Given that Q(t) is the primary signal carried by the master system and W(t) is the transfer message given by [38,39]: where z i (t) is the i-th component of the master system, and W(t) is masked using the chaotic signal. This signal is transmitted via the communication channel from sender to the receiver. Using the proposed controller, the multi-state chaotic synchronization is performed in one of its states. The received signal can be recovered using the following equation [40]: where y i (t) is the i-th component of the slave system. Considering the synchronization concept, the following equation is obtained [40]: Figure 2 shows the block diagram of chaotic masking using multi-state synchronization. Since we have one master and two slave systems, two independent messages are sent to the master which are encrypted, then the master is synchronized with two slaves. After the synchronization with the receiver side, the signals are decrypted and the original messages are recovered.

Application in Secure Communication Based on Chaotic Masking
In chaotic masking, an information signal is added to the linear combination of base state signals. Given that Q(t) is the primary signal carried by the master system and W(t) is the transfer message given by [38,39]: where ( ) is the i-th component of the master system, and W(t) is masked using the chaotic signal. This signal is transmitted via the communication channel from sender to the receiver. Using the proposed controller, the multi-state chaotic synchronization is performed in one of its states. The received signal can be recovered using the following equation [40]: where ( ) is the i-th component of the slave system. Considering the synchronization concept, the following equation is obtained [40]: Figure 2 shows the block diagram of chaotic masking using multi-state synchronization. Since we have one master and two slave systems, two independent messages are sent to the master which are encrypted, then the master is synchronized with two slaves. After the synchronization with the receiver side, the signals are decrypted and the original messages are recovered. Using chaotic masking, we demonstrated the encryption and decryption of two sinusoidal signals using our proposed multi-state synchronization approach. The simulation is carried out with Matlab software. The encryption and decryption are applied when the chaotic signals are synchronized. To evaluate this, two sinusoidal signals are added to Using chaotic masking, we demonstrated the encryption and decryption of two sinusoidal signals using our proposed multi-state synchronization approach. The simulation is carried out with Matlab software. The encryption and decryption are applied when the chaotic signals are synchronized. To evaluate this, two sinusoidal signals are added to the master system signals. Next, the master system is synchronized with two slave systems. Finally, based on the synchronization error, the signal is decrypted and recovered at the receiver side.

Simulation and Results
We used one Chua chaotic system and two Rössler time-delayed chaotic systems as master and slaves, respectively. These systems are defined as follows: The initial values of the parameters are set as below: Under such circumstances, the parameters have step changes. In addition, the disturbance and uncertainties influencing the master and slave systems are expressed as The controller's parameters are chosen as In Figure 3, the synchronization errors and control efforts are illustrated. As can be seen, despite the parameter uncertainties and time-variable delays, the error signals were reduced to zero quickly. During large parameter changes, the error increased slightly but turned back to zero quickly. Hence, the proposed controller was robust against parameter uncertainties, external disturbance, and variable delays. Moreover, the control function was continuous and smooth, which was helpful in the implementation of the proposed method.
In Figure 3, the synchronization errors and control efforts are illustrated. As can be seen, despite the parameter uncertainties and time-variable delays, the error signals were reduced to zero quickly. During large parameter changes, the error increased slightly but turned back to zero quickly. Hence, the proposed controller was robust against parameter uncertainties, external disturbance, and variable delays. Moreover, the control function was continuous and smooth, which was helpful in the implementation of the proposed method.
It can be noted from Figure 4 that the estimated parameters of Chua and Rössler systems have converged to their real values. It is evident from this figure that, despite being variable with time, the delays have also converged to their real values quickly. During the instances when delays exhibited step changes, the system parameters deviated from their real values, but they were corrected in short duration. Since Lipschitz conditions are ( ( − )) functions, the parameter changes do not affect the delays significantly. On the other hand, Chua is a non-smooth system, which causes more complication in the control as well as synchronization problems.  It can be noted from Figure 4 that the estimated parameters of Chua and Rössler systems have converged to their real values. It is evident from this figure that, despite being variable with time, the delays have also converged to their real values quickly. During the instances when delays exhibited step changes, the system parameters deviated from their real values, but they were corrected in short duration. Since Lipschitz conditions are F i (x i (t − τ i )) functions, the parameter changes do not affect the delays significantly. On the other hand, Chua is a non-smooth system, which causes more complication in the control as well as synchronization problems.  In Figure 5, the plots of estimation error of unknown uncertainties bounds γ , = 1,2,3 and unknown disturbances bounds d , = 1,2,3 are shown. It can be seen in Figure 5 that the estimation error of unknown parameter bounds and uncertainties bounds have approached zero quickly. In the tenth second, little error is observed, which is compensated in a short amount of time. Figures 6 to 8 shows the phase curves of the slave system and indicates the chaotic behavior of the system. In spite of various changes, the behavior of the system is still chaotic. In Figure 5, the plots of estimation error of unknown uncertainties bounds γ i , i = 1, 2, 3 and unknown disturbances bounds d i , i = 1, 2, 3 are shown.  In Figure 5, the plots of estimation error of unknown uncertainties bounds γ , = 1,2,3 and unknown disturbances bounds d , = 1,2,3 are shown. It can be seen in Figure 5 that the estimation error of unknown parameter bounds and uncertainties bounds have approached zero quickly. In the tenth second, little error is observed, which is compensated in a short amount of time. Figures 6 to 8 shows the phase curves of the slave system and indicates the chaotic behavior of the system. In spite of various changes, the behavior of the system is still chaotic. It can be seen in Figure 5 that the estimation error of unknown parameter bounds and uncertainties bounds have approached zero quickly. In the tenth second, little error is observed, which is compensated in a short amount of time. Figures 6-8 shows the phase curves of the slave system and indicates the chaotic behavior of the system. In spite of various changes, the behavior of the system is still chaotic. Sensors 2021, 21, x FOR PEER REVIEW 15 of 21

Discussion
The presented results reveal good performance of the proposed method in estimating parameters, delays, as well as disturbance bounds and uncertainties. This in turn leads to

Discussion
The presented results reveal good performance of the proposed method in estimating parameters, delays, as well as disturbance bounds and uncertainties. This in turn leads to

Discussion
The presented results reveal good performance of the proposed method in estimating parameters, delays, as well as disturbance bounds and uncertainties. This in turn leads to Phase curves of the master system: Chua time-delayed chaotic system (x 11 − x 13 , x 11 − x 12 , x 12 − x 13 ) indicating the chaotic behavior for the provided parameters.
The phase curve of the first slave system: Rössler time-delayed chaotic systems (x 21 − xx 22 − x 23 , x 21 − x 2322 ) which shows the chaotic behavior for the given parameters.
The phase curve of the second slave system: Rössler time-delayed chaotic systems ) x 31 − x 33 , x 32 − x 33 , x 31 − x 32 ) representing the chaotic behavior for the given parameters.

Discussion
The presented results reveal good performance of the proposed method in estimating parameters, delays, as well as disturbance bounds and uncertainties. This in turn leads to an acceptable performance of the overall system in synchronization and convergence of errors to zero.
In the rest of the paper, the proposed method was evaluated in secure communication using chaotic masking. To evaluate this, five sinusoid signals were added as messages to the master system's signal, independently. The decryption and recovering of each message was done by synchronization of the master system with two slave systems. The message signals added to the master system are given below: S 1 (t) = sin(0.7t) + 2cos(5t) + 4sin(πt) S 2 (t) = sin(0.8t) + 2cos(8t) + 5sin(πt) S 3 (t) = 2sin(0.85t) + 5cos(5.1t) + 6sin(πt) S 4 (t) = 2.5sin(0.85t) + 3.2cos(5.16t) + 5.5sin(πt) S 5 (t) = 2.5sin(0.85t) + 3.2cos(5.16t) + 4.5sin(πt) After the synchronization, the recovered signals were obtained. In Figures 9-13, the original and recovered message signals obtained using multi-state synchronization and chaotic masking are shown. an acceptable performance of the overall system in synchronization and convergence of errors to zero. In the rest of the paper, the proposed method was evaluated in secure communication using chaotic masking. To evaluate this, five sinusoid signals were added as messages to the master system's signal, independently. The decryption and recovering of each message was done by synchronization of the master system with two slave systems. The message signals added to the master system are given below: After the synchronization, the recovered signals were obtained. In Figures 9-13, the original and recovered message signals obtained using multi-state synchronization and chaotic masking are shown.  Figure 9 shows the recovered signal (R1) followed the original signal (S1) very well. Due to sudden changes in delays and parameters, there was a pick at 10 s, which was dealt with, and after that the recovered signal faithfully followed the original signal again.  an acceptable performance of the overall system in synchronization and convergence of errors to zero.
In the rest of the paper, the proposed method was evaluated in secure communication using chaotic masking. To evaluate this, five sinusoid signals were added as messages to the master system's signal, independently. The decryption and recovering of each message was done by synchronization of the master system with two slave systems. The message signals added to the master system are given below: After the synchronization, the recovered signals were obtained. In Figures 9-13, the original and recovered message signals obtained using multi-state synchronization and chaotic masking are shown. Figure 9. Plot of original signal (S ) and recovered signal (R ) obtained using multi-state synchronization and chaotic masking. Figure 9 shows the recovered signal (R1) followed the original signal (S1) very well. Due to sudden changes in delays and parameters, there was a pick at 10 s, which was dealt with, and after that the recovered signal faithfully followed the original signal again.      Figures 10-13 show that the original signal given to the master and received by the slave has been recovered faithfully using our proposed multi-state synchronization method. The advantages of the proposed method are as follows:     Figures 10-13 show that the original signal given to the master and received by the slave has been recovered faithfully using our proposed multi-state synchronization method. The advantages of the proposed method are as follows:     Figures 10-13 show that the original signal given to the master and received by the slave has been recovered faithfully using our proposed multi-state synchronization method. The advantages of the proposed method are as follows: Figure 13. Plot of original signal (S 5 ) and recovered signal (R 5 ) obtained using multi-state synchronization and chaotic masking. Figure 9 shows the recovered signal (R 1 ) followed the original signal (S 1 ) very well. Due to sudden changes in delays and parameters, there was a pick at 10 s, which was dealt with, and after that the recovered signal faithfully followed the original signal again. Figures 10-13 show that the original signal given to the master and received by the slave has been recovered faithfully using our proposed multi-state synchronization method. The advantages of the proposed method are as follows: Guaranteed closed loop stability in the presence of disturbance, uncertainty, parameter changes, and delays.

1.
Accurate estimation of variable time delays and parameters.

2.
Specifying the control laws as continuous time functions.

3.
Capable of dealing with disturbance and uncertainties with unknown boundaries. 4.
Faithful recovery of message signal in secure communication.
The disadvantages of our method are given below: 1.
Involves relatively large magnitude of control signal in a few cases (control functions u 13 , u 23 ).

2.
Changes occur solely in a step-like manner; hence, there is a large distance between parameter changes.
In the future, we intend to extend this work by multi-state synchronization with minimization of sum of control efforts and synchronization of chaotic systems with variable parameters. Secure communication can be employed in medical applications as well [41]. Medical data stored in hospitals contain significant information about the patients. In future work, the proposed method for secure communication can be used for medical applications [42][43][44][45][46][47]. Synchronization of chaotic systems is also used in some other applications such as electromagnetism [48] and mechanics [49,50]. As a future work, the chaotic synchronization method of this paper can be developed and implemented for electromagnetic and mechanical applications.
In this paper, we have proposed that, using our multi-state synchronization and chaotic masking method, secure communication can be achieved. In secure communication, encoding (masking) and accurately recovering the message signal is very important. The most important feature in secure communication is the security of the method and complexity of the algorithm, which makes decoding practically impossible or very difficult. In this regard, important points of the proposed method are given below: (1) Presence of delay and variable parameters in master and slave systems.
(2) Ability to switch to different slave systems.
(3) Presence of undesirable and unwanted factors such as disturbances and uncertainty. Therefore, our proposed method helps to ensure secure communication. Accurate retrieval of message signal was another prominent feature of this method. It can be noted from our examples that our proposed method is able to recover the message signal faithfully at the receiver. Hence, our proposed approach has two important properties: the ability to mask the data and to recover the message accurately, which can be used in secure communications.

Conclusions
In this paper, multi-state synchronization of two time-delayed chaotic systems with unknown parameters and delays in the presence of unknown parameters and external disturbance was investigated. The disturbance and uncertainties have unknown bounds, and the master system was non-smooth. To estimate the parameters and time delays, the Lyapunov method was used. This way, convergence of various types of defined errors were guaranteed, and the adaptive rules for estimation of parameters and time delays were determined. Moreover, the update of rules for the bounds of unknown parameters and external disturbance were established. To evaluate the proposed method, the simulations were carried out in a multi-state synchronization setting with time variable delays and parameters. Our results revealed that the proposed controller was good at reducing the synchronization errors to zero with little oscillations. In addition, despite changes such as step and sinusoid, the time delays have been identified and estimated well. Moreover, the errors related to the bounds of unknown parameters and external disturbance converged to zero quickly. The experimental results revealed the capability and flexibility of the proposed method in synchronization of chaotic systems, parameters, and time delay identification in the presence of uncertainty and disturbance. Finally, the capability of the proposed method to recover the message signals in secure communication applications was presented. Due to time variability of the system, the chaotic behavior was more complex, which leads to better protection in secure communication.