Next Article in Journal
Numerical Simulations of the Effect of the Asymmetrical Bending of the Hindwings of a Hovering C. buqueti Bamboo Weevil with Respect to the Aerodynamic Characteristics
Next Article in Special Issue
Combined Distributed Shared-Buffered and Diagonally-Linked Mesh Topology for High-Performance Interconnect
Previous Article in Journal
Engineering Atomic-to-Nano Scale Structural Homogeneity towards High Corrosion Resistance of Amorphous Magnesium-Based Alloys
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things

Department of Intelligent Commerce, National Kaohsiung University of Science and Technology, Kaohsiung 824004, Taiwan
Micromachines 2022, 13(11), 1993; https://doi.org/10.3390/mi13111993
Submission received: 29 September 2022 / Revised: 7 November 2022 / Accepted: 9 November 2022 / Published: 17 November 2022
(This article belongs to the Special Issue Network on Chip (NoC) and Reconfigurable Systems)

Abstract

:
Recently, with the rapid development of data and information, it has become necessary to establish secure communications and appropriate security services to ensure a secure information exchange process. Therefore, to protect the privacy and confidentiality of private data, in this research, we use the Lorenz chaotic system to generate chaotic signals and apply them to the encryption of the communication of the Internet of Things (IoT) terminal sensor nodes. In addition, we design a simple proportional–integral–derivative (PID) controller and a quasi-sliding mode controller (QSMC) to synchronize the master-slave chaotic systems for decrypting the signals. Then, we encrypt the environmental signals measured from the IoT node at the transmitting side (master) and send them to the receiving side (slave). After the receiving side receives the encrypted signals, it decrypts them with the PID controller. Thus, the security of IoT information can be assured and realized.

1. Introduction

The term Internet of Things (IoT) originated in 1999, and was proposed by Kevin Aston of the MIT Auto-ID Center. With the current rapid development of technology, several methods are available for information transmissions, such as Wi-Fi, Bluetooth, and various Internet of Things communication protocols. However, with the advent of these methods, “information security” has become a crucial and inevitable concern. If important information is stolen by others, it is likely to cause irreparable impacts. Furthermore, there has been considerable focus and attention paid to the security of personal information, such as private biomedical information and home information. Thus, the secrecy of personal information must be ensured. Therefore, designing an effective information encryption system is an important goal that this study looks to achieve. Traditional encryption methods can be classified into symmetric encryption (e.g., data encryption standard, DES) and asymmetric encryption (e.g., RSA, ElGamal, and Paillier) [1,2,3]. The basic principle of symmetric encryption is to use Shannon’s concept of multiple encryptions, and apply confusion and diffusion for converting plain text into other formats and spreading every small part of the plain text to each part of the ciphertext to encrypt the information.
Many asymmetric encryption methods have been proposed, such as RSA, ElGamal, and Paillier encryption. These encryption methods mainly use mathematical computation and encrypt important information to avoid its decryption. However, the above algorithms can only be run under the integer domain. In this study, we use signals generated by two chaotic systems to encrypt the IoT signals/information and design a proportional–integral–derivative (PID) controller [4] and a quasi-sliding mode controller (QSMC) [5,6] to synchronize the systems and then recover the IoT signals/information.
In 1989, Ott et al. first proposed a method for controlling chaotic systems and named it the OGY method [7]. Subsequently, Pecora proposed the idea of synchronization control between two independent chaotic systems [8].
A chaotic system is a nonlinear dynamic system with complicated behaviors. Lorenz first used this system in an atmospheric simulation equation in 1963 [9]. However, it did not attract the attention of scientists until 1978. A chaotic system is extremely sensitive to initial conditions [10]. Butterfly effects can be generated by slight changes in the initial conditions, as well as by different attractors. There are various chaotic systems available, including the Hénon map [11], dynamic system in discrete time, Rössler attractor [12,13], and Lorenz oscillator, all of which are ternary nonlinear equations in continuous time.
Due to its complicated behaviors, the chaotic system has been employed in many domains, including communication, biology, mathematics, physics, and chemistry, as well as economics [14]. Thereafter, controlling/synchronizing chaotic systems and their applications became a research focus in the literature [15].
In this study, it is assumed that the collected IoT signals/information are very important signals, and therefore cannot be exposed to unsafe spaces. This study aims to encrypt, decrypt, and safely transmit the IoT signal/information. We use the chaotic system in the master-slave system, which requires a controller to synchronize the chaotic system.

2. Research Methods

2.1. Generalized Lorenz Chaotic System

The generalized Lorenz chaotic system generates ternary nonlinear equations in continuous time [16]:
x ˙ 1 ( t ) = σ ( x 2 ( t ) x 1 ( t ) ) x ˙ 2 ( t ) = γ x 1 ( t ) d x 2 ( t ) x 1 ( t ) x 3 ( t ) x ˙ 3 ( t ) = b x 3 ( t ) + x 1 ( t ) x 2 ( t )
where σ > 0 ,   b > 0 , c and d are real parameters. The Chen system (2) is a Lorenz-like system (1), with d = −c, c > 0, γ = ca.
x ˙ 1 ( t ) = a ( x 2 ( t ) x 1 ( t ) ) x ˙ 2 ( t ) = ( c a ) x 1 ( t ) + c x 2 ( t ) x 1 ( t ) x 3 ( t ) x ˙ 3 ( t ) = b x 3 ( t ) + x 1 ( t ) x 2 ( t )
The system (2) takes { a , b , c } = { 35 ,   3 ,   28 } as system parameters, and its dynamic equation can be obtained in continuous time, as shown in (3).
In this study, we present the main results for synchronization of chaotic systems (3). We use two chaotic systems: the transmitting side (master) with the state variables [ x 1 , x 2 , x 3 ] , and the receiving side (slave) [ y 1 , y 2 , y 3 ] , but with different initial conditions of [ x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) ] = [ 10 ,   0 ,   37 ] and [ y 1 ( 0 ) , y 2 ( 0 ) , y 3 ( 0 ) ] = [ 0 ,   15 ,   45 ] . Figure 1 and Figure 2 depict the responses of the chaotic system in the master chaotic system and the slave chaotic system in three dimensions with double-scroll attractors, respectively.
x ˙ 1 ( t ) = 35 x 1 ( t ) + 35 x 2 ( t ) x ˙ 2 ( t ) = 7 x 1 ( t ) + 28 x 2 ( t ) x 1 ( t ) x 3 ( t ) x ˙ 3 ( t ) = 3 x 3 ( t ) + x 1 ( t ) x 2 ( t )

2.2. PID Controller Synchronizing Generalized Lorenz Chaotic Systems

Because the IoT signal/information is not continuous, in order to encrypt the IoT signal/information later, we first discretize the system from continuous-time to discrete-time, with a sampling time (T) of 0.005 s via MATLAB software; the discrete time system can be obtained as follows (4), where k is the time index [17].
In the generalized Lorenz chaotic system, x 1 , x 2 , and x 3 states affect each other, and thus, we employ the PID controller in one of the states of the chaotic system for synchronization. In this study, we control the first states, x 1 and y 1 , of the systems. Figure 3 shows the states x 1 and y 1 of the master and slave before the application of the PID controller.
Then, we add controller u [ k ] to the equations in discrete-time at the slave for synchronization, as shown in (4).
y 1 [ k + 1 ] = 0.8366 y 1 [ k ] + 0.1725 y 2 [ k ] 0.000431 y 1 [ k ] y 3 [ k ] + u [ k ] y 2 [ k + 1 ] = 0.0345 y 1 [ k ] + 1.1471 y 2 [ k ] 0.0053617 y 1 [ k ] y 3 [ k ] y 3 [ k + 1 ] = 0.9851 y 3 [ k ] + 0.0049627 y 1 [ k ] y 2 [ k ]
u [ k ] is the synchronization controller, including the proportional and differential controllers; shown in (5). The proportional controller (Kp) will consider the current error to speed up the time of the transient response so that the chaotic system, slave, will turn into a steady-state and synchronize with master as soon as possible. The integral controller (Ki) will make use of the summation of the past error to eliminate the steady-state’s error. Furthermore, once the proportional and integral controller over controls the system, the overshooting will occur. Here, we are going to use the differential controller (Kd). The differential controller will use the future error to predict the tendency of the system so that it can decrease the rise time and avoid overshooting.
u [ k ] = K p e [ k ] + K i i = 1 k e [ i ] + K d Δ e [ k ] e [ k ] = y 1 [ k ] x 1 [ k ] Δ e [ k ] = e [ k ] e [ k 1 ]
After testing and adjusting various Kp, Ki, Kd values to synchronize two generalized Lorenz chaotic systems with different initial values, we choose the better Kp, Ki, Kd parameters for the subsequent implementation. Finally, we obtain Kp = 0.0025, Ki = 0, Kd = 0.65. To quickly synchronize the two chaotic systems, the Ki value is not used to reduce the occurrence of overshooting. Figure 4 shows the different initial values: [ x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) ] = [ 10 ,   0 ,   37 ] and [ y 1 ( 0 ) , y 2 ( 0 ) , y 3 ( 0 ) ] = [ 0 ,   15 ,   45 ] create different system responses. The blue line is the master system side and the red line is the slave system side.
We use the tested PID controller, such as u [ k ] , in (6). Figure 5 shows the effect of the PID controller in synchronizing the two Generalized Lorenz chaotic systems. It can be seen from Figure 5 that the PID controller can quickly synchronize the chaotic system.
u [ k ] = 0.0025 e [ k ] + 0.65 Δ e [ k ]

2.3. Rössler Chaotic System

In the above, we used the PID controller to synchronize the generalized Lorenz chaotic system. However, this PID controller can only be applied to the master-slave chaotic system in the initial state of our design [ x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) ] = [ 10 ,   0 ,   37 ] and [ y 1 ( 0 ) , y 2 ( 0 ) , y 3 ( 0 ) ] = [ 0 ,   15 ,   45 ] . If the master and slave chaotic systems have different initial values, the synchronization effect of the above PID controller may not be effective; the chaotic system may not be able to achieve synchronization. Therefore, we want to design a chaotic system where the controller can be applied to any initial value. First, we introduce another chaotic system: the Rössler chaotic system. Its dynamic equation can be obtained in continuous time, as shown in (5), and the dynamic response, as shown in Figure 6, when the initial value is [5, 6, 14].
{ x ˙ 1 ( t ) = x 2 ( t ) x 3 ( t ) x ˙ 2 ( t ) = x 1 ( t ) + 0.2 x 2 ( t ) x ˙ 3 ( t ) = 0.2 5.7 x 3 ( t ) + x 1 ( t ) x 3 ( t )

2.4. Quasi-Sliding Mode Controller

First, we define the main system as x ( t ) and the slave system as y(t), so the error system is e ( t ) = y ( t ) x ( t ) . Because the Rössler chaotic system has a nonlinear term in the third state, the controller is placed in the third state of the error system. The final error system is shown in (8).
{ e ˙ 1 ( t ) = e 2 ( t ) e 3 ( t ) e ˙ 2 ( t ) = e 1 ( t ) + 0.2 e 2 ( t ) e ˙ 3 ( t ) = 5.7 e 3 ( t ) + y 1 ( t ) y 3 ( t ) x 1 ( t ) x 3 ( t ) + u ( t )
In terms of the error system, we hope that the three error states can be as small as possible. We define here that the error system can converge to a very small value. This means that the systems on both sides of the master and servant will reach synchronization.
Next, we need to define a sliding surface. Let the system reach the sliding surface within a limited time, and then move along the sliding surface. In the theoretical description of the sliding mode, the system will be constrained on the sliding surface to reduce the order of the system and eliminate the nonlinear term. Since the nonlinear term is composed of state 1 and state 3, the sliding surface is defined as shown in (9).
s ( t ) = e 3 ( t ) + λ e 1 ( t )
The definition of dynamic error system means that δ Q > 0 and t > t Q are entered in the sliding mode control. The solution of any error state of the error system must satisfy | s ( t ) δ Q | and t > t Q . Therefore, when the error system enters the sliding mode, t > t Q and s ( t ) = e 3 ( t ) + λ e 1 ( t ) = δ Q . Because the error system needs to converge to close to zero for the system to reach synchronization, the value of δ Q is very small. With this equation s ( t ) , the dynamic equation of the error system can be rewritten as shown in (10).
{ e ˙ 1 ( t ) = λ e 1 ( t ) e 2 ( t ) δ Q e ˙ 2 ( t ) = e 1 ( t ) + 0.2 e 2 ( t ) e ˙ 3 ( t ) = δ Q + λ e 1 ( t )
After the sliding surface is introduced, the error system is reduced to a second-order system. If we ignore the small value of δ 0 , it can be expressed as e 3 ( t ) = λ e 1 . Now, we just ignore δ 0 and consider the response of this second-order system. The second-order system can be simplified as shown in (11).
X ˙ = A X ,   X = [ e 1 ( t ) e 2 ( t ) ] ,   A = [ λ 1 1 0.2 ]
According to the control theory [18], we can know that the transfer function of the pole is q ( s ) = det ( s I A ) = s 2 ( λ + 0.2 ) s + ( 0.2 λ + 1 ) . Then, we use Routh-Hurwitz stability [19,20] to find the range of λ , as in (12). Finally, we find 5 < λ < 0.2 .
s n a n a n 2 a n 4 s n 1 a n 1 a n 3 a n 5 s n 2 b 1 = a n 1 a n 2 a n a n 3 a n 1 b 2 = a n 1 a n 4 a n a n 5 a n 1 b 3 s 2 1 ( 0.2 λ + 1 ) s 1 ( λ + 0.2 ) 0 s 0 ( 0.2 λ + 1 ) 0
So far, we have proved that δ 0 must be very small and the range of λ makes state 1 and state 2 of the error system stable. Now, it is necessary to prove that state 3 of the error system can also be stable; to prove that the sliding surface should converge and find the form of the controller. The controller form u(t) is shown in (13), and the Lyapunov function [21,22] has been used to prove (14); that the sliding surface will converge.
u ( t ) = w η ( t ) s ( t ) | s ( t ) | + δ
δ Q = w δ w 1 w > 1 ,   δ > 0 η ( t ) = | λ e 2 ( t ) ( 5.7 + λ ) e 3 ( t ) + y 1 ( t ) y 3 ( t ) x 1 ( t ) x 3 ( t ) | v = 1 2 s 2 v ˙ = s s ˙   s = e 3 + λ e 1     v ˙ = s ( e ˙ 3 + λ e ˙ 1 ) v ˙ = η ( 1 w ) ( | s | w δ w 1 )
Therefore, w > 1 has been selected from the controller, which means v ˙ < 0 , when | s ( t ) | > δ Q = w δ w 1 . This means that | s ( t ) | will converge to the region of | s ( t ) | δ Q = w δ w 1 . Then, we conduct a simple simulation: let λ = 1.8 , δ = 0.03 , w = 4 , and δ Q = w δ w 1 = 0.04 . The initial value [ x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) ] = [ 5 ,   6 ,   14 ] and [ y 1 ( 0 ) , y 2 ( 0 ) , y 3 ( 0 ) ] = [ 4 ,   7 ,   3 ] . The system response is shown in Figure 7.

3. Information Security

3.1. Chaotic System Encryption Architecture for the Information Security

In this study, we use the PID controller to synchronize the master-slave chaotic systems, which uses the error to adjust the controller and synchronize the system. Thus, one of the states of the chaotic system must be simultaneously transmitted with the encrypted data. The architecture of the secure IoT system is shown in Figure 8.
In the transmitter side (master system), x 2 is used in the encryption algorithm via the chaotic masking method, and x 1 is used for the chaos synchronization by the PID controller design; thus, x 1 is sent to the slave. When the chaotic system reaches synchronization, we take y 2 to decrypt the IoT signal. In the middle of the communication system, we use the LoRa module.

3.2. Information Security

As can be seen from Figure 8, we use x 2 of the chaotic system to encrypt the IoT signal. The encryption method is shown in (15).
d a t a = d a t a + x 2
Because the chaotic system has good pseudo-random characteristics, unpredictability of the orbit, sensitivity to the initial state, and control parameters, etc., if a thief steals the encrypted value, they cannot crack it. Even if the thief steals x 1 of the chaotic system and simulates the response of the transmitting side system, because the chaotic system has a butterfly effect, it is impossible to find x 1 . As long as the system state is worse, the response will be completely different. Finally, the receiving side (slave system) has synchronized the chaotic system y 2 = x 2 . Therefore, the receiving side can use y 2 to restore the IoT signal. The decryption method is shown in (16).
d a t a = d a t a x 2 = d a t a y 2

3.3. Simulation of Information Security

Before entering the implementation, we conduct a simulation of information security to test whether this architecture can use a chaotic system to encrypt and decrypt signals. First, we use a random number generator to generate a random signal, as shown in Figure 9.
Next, the random signal is encrypted with the state of the chaotic system, as shown in Figure 10. The blue line is the original random signal and the black line is the encrypted signal. As we can see from Figure 10, the original signal has been completely encrypted. The original random signal cannot be solved from the encrypted signal. Finally, the chaotic system at the receiving side is used for decryption, as shown in Figure 11. As can be seen from Figure 11, the decryption fails before 0.5 s because the chaotic systems at both sides have not reached synchronization. After 0.5 s, the chaotic systems at both sides reach synchronization, so the decryption is successful. Therefore, the simulation proves that this architecture is feasible.

3.4. QSMC Synchronized Chaotic System Encryption Architecture for the Information Security

Above, we outlined the encryption architecture using the PID controller. In the same way, we can fit it into the form of QSMC. First, the QSMC can be simplified into a form such as (17). Transmit u m 1 ( t ) and u m 2 ( t ) to the receiving end to realize the sliding mode controller. It is safer than the PID controller, because the value transmitted by the QSMC is a linear combination of the master state and it is not easy to guess the state of the system, and the PID controller has exposed one of the system states. Figure 12 shows the encryption architecture of QSMC.
u ( t ) = w η ( t ) s ( t ) | s ( t ) | + δ η ( t ) = | λ e 2 ( t ) ( 5.7 + λ ) e 3 ( t ) + y 1 ( t ) y 3 ( t ) x 1 ( t ) x 3 ( t ) | = | u m 1 ( t ) + u s 1 ( t ) | u m 1 ( t ) = λ x 2 ( t ) + ( 5.7 + λ ) x 3 ( t ) x 1 ( t ) x 3 ( t ) u s 1 ( t ) = λ y 2 ( t ) ( 5.7 + λ ) y 3 ( t ) y 1 ( t ) y 3 ( t ) s ( t ) = e 3 ( t ) + λ e 1 ( t ) = u m 2 ( t ) + u s 2 ( t ) u m 2 ( t ) = x 3 ( t ) λ x 1 ( t ) u s 2 ( t ) = y 3 ( t ) + λ y 1 ( t )

4. Implement

4.1. IoT Signal/Information

In this study, we used the DHT-22 sensor as an example of IoT signal/information, as shown in Figure 13. The DHT-22 sensor is a temperature and humidity composite sensor with a calibrated digital signal output. It uses dedicated digital module acquisition technology, as well as temperature and humidity sensing technology to ensure that the product has extremely high reliability and excellent long-term stability. Therefore, the product has the advantages of excellent quality, ultra-fast response, strong anti-interference ability, and high-cost performance. The temperature and humidity information are the most common signals in the IoT. We used DHT-22 with a sampling time of 0.005 s, as shown in Figure 14.

4.2. IoT Communication Channel

In order to allow temperature sensing data to be transmitted in the IoT. We used the SX LoRa-1278 communication module, as shown in Figure 15. In terms of IoT communication technology, one of the LoRa (Long Range) low-power wide-area network communication technologies was an ultra-long-distance wireless transmission scheme based on spread spectrum technology, adopted and promoted by Semtech. LoRa uses a high spreading factor to obtain a higher signal gain. Compared with the general FSK, the signal-to-noise ratio requires 8 dB, while LoRa only requires −20 dB. This provides users with a simple system that can achieve long-distance, low power consumption, and large capacity, and can then expand the sensor network. Therefore, using the many advantages of LoRa, the nodes of each LoRa module were deployed in the space to collect the required data, such as temperature, humidity, distance, etc. However, because all LoRa frequency bands are publicly shared and free, we needed an encryption system to protect the security of these data.
To ensure the correct rate of the LoRa communication module, we conducted delay time and different distance tests to find a suitable delay time for our indoor applications. We designed an experiment in which the transmitting side transmitted a thousand pieces of data, and the data was generated by the temperature and humidity sensing module, testing the reception rate of the receiving side. Table 1 shows the experimental results. Figure 16 shows the experimental environment. From Table 1, it can be seen that the reception rate of the LoRa module was better at close range, but it was found that the reception rate of the LoRa module was greatly affected when the distance was increased. Therefore, the indoor application of the LoRa module to sense, transmit, and receive various indoor data distances is an important consideration. Finally, we chose a delay time of 200 milliseconds at a receiving rate of 10 m, which was the transmission interval of the LoRa module.

4.3. Implementation of the Chaotic Encryption System in IoT Information Security

First, we used Arduino to connect the DHT-22 to detect temperature values from the environment. The chaotic signal generated by Arduino encrypts the temperature value and then it is transmitted to the receiving side by SX LoRa-1278. The receiving side uses the PID controller to synchronize the chaotic system and then performs decryption. Finally, the temperature value detected by the original DHT-22 is decrypted. The IoT information security system architecture is shown in Figure 17. The results of integrating the LoRa and the chaos system in the ARDUINO interface are shown in Figure 18. As can be seen from Figure 18, the chaotic system reached synchronization when the temperature decryption was successful. The same was true for the encryption and decryption architecture of QSMC.

5. Conclusions

The results obtained in this study verify the fact that the characteristics of IoT signals/information after encryption and decryption remain the same, which means that the two chaotic systems are synchronized and generate the same states so that the IoT information remains correct.
We used SX LoRa-1278 to communicate between the two chaotic systems and synchronize them with the proportional–derivative controller or the quasi-sliding mode controller. The experimental results indicate that the master chaotic system successfully transmits the encrypted IoT signals/information to the other side by using the slave chaotic system. Moreover, we obtained the same IoT signals/information after decryption.
Thus, we achieved our goal based on the chaotic system, with a synchronization controller applied to the security of the IoT information.

Funding

This work was financially supported by the National Science and Technology Council, Taiwan, under grant 111-2218-E-006-009-MBK and 111-2218-E-006-018.

Data Availability Statement

Data are contained within the article.

Acknowledgments

I would also like to extend my thanks to the members of the Intelligent Control Laboratory of the Department of Engineering Science, National Cheng Kung University for their help.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Somani, U.; Lakhani, K.; Mundra, M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In Proceedings of the 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010), Solan, India, 28–30 October 2010; pp. 211–216. [Google Scholar] [CrossRef]
  2. ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. 1985, IT-31, 469–472. [Google Scholar] [CrossRef]
  3. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 1 January 1999; pp. 223–238. [Google Scholar]
  4. Mughees, A.; Mohsin, S.A. Design and Control of Magnetic Levitation System by Optimizing Fractional Order PID Controller Using Ant Colony Optimization Algorithm. IEEE Access 2020, 8, 116704–116723. [Google Scholar] [CrossRef]
  5. Utkin, V.; Poznyak, A.; Orlov, Y.; Polyakov, A. Conventional and high order sliding mode control. J. Frankl. Inst. 2020, 357, 10244–10261. [Google Scholar] [CrossRef]
  6. Wang, J.; Yang, C.; Shen, H.; Cao, J.; Rutkowski, L. Sliding-Mode Control for Slow-Sampling Singularly Perturbed Systems Subject to Markov Jump Parameters. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 7579–7586. [Google Scholar] [CrossRef]
  7. Ott, E.; Grebogi, C.; Yorke, J.A. Theory of 1st order phase-transitions for chaotic attractors of nonlinear dynamical-systems. Phys. Lett. A 1989, 135, 343–348. [Google Scholar] [CrossRef]
  8. Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 821–824. [Google Scholar] [CrossRef] [PubMed]
  9. Lorenz, E.N. Deterministic non-periodic flows. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  10. Azar, A.T.; Vaidyanathan, S. Advances in Chaos Theory and Intelligent Control; Springer International Publishing AG: Chem, Switzerland, 2016. [Google Scholar]
  11. Wu, J.H.; Liao, X.F.; Yang, B. Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 2018, 153, 11–23. [Google Scholar] [CrossRef]
  12. Rössler, O. An equation for continuous chaos. Phys. Lett. A 1976, 57, 397–398. [Google Scholar] [CrossRef]
  13. Rössler, O.E. Continuous chaos–four prototype equations, Bifurcation Theory and Applications in Scientific Disciplines. Ann. N. Y. Acad. Sci. 1979, 316, 376–392. [Google Scholar] [CrossRef]
  14. Jaeger, H.; Haas, H. Harnessing Nonlinearity: Predicting Chaotic Systems and Saving Energy in Wireless Communication. Science 2004, 304, 78–80. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Liao, T.-L.; Tsai, S.-H. Adaptive synchronization of chaotic systems and its application to secure communications. Chaos Solitons Fractals 2000, 11, 1387–1396. [Google Scholar] [CrossRef]
  16. Leonov, G.A.; Kuznetsov, N.V. On differences and similarities in the analysis of Lorenz, Chen, and Lu systems. Appl. Math. Comput. 2015, 256, 334–343. [Google Scholar] [CrossRef] [Green Version]
  17. Liao, T.-L.; Chen, C.-Y.; Chen, H.-C.; Chen, Y.-Y.; Hou, Y.-Y. Realization of a Secure Visible Light Communication System via Chaos Synchronization. Math. Probl. Eng. 2021, 2021, 5073562. [Google Scholar] [CrossRef]
  18. Glad, T.; Ljung, L. Control Theory; CRC Press: Boca Raton, FL, USA, 2000. [Google Scholar]
  19. DeJesus, E.X.; Kaufman, C. Routh-Hurwitz criterion in the examination of eigenvalues of a system of nonlinear ordinary differential equations. Phys. Rev. A 1987, 35, 5288–5290. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Ahmed, E.; El-Sayed, A.M.A.; El-Saka, H.A.A. On some Routh–Hurwitz conditions for fractional order differential equations and their applications in Lorenz, Rössler, Chua and Chen systems. Phys. Lett. A 2006, 358, 1–4. [Google Scholar] [CrossRef]
  21. Chang, Y.C.; Nima, R.; Gao, S. Neural lyapunov control. arXiv 2020, arXiv:2005.00611. [Google Scholar]
  22. Liu, L.; Liu, Y.-J.; Chen, A.; Tong, S.; Chen, C.L.P. Integral Barrier Lyapunov function-based adaptive control for switched nonlinear systems. Sci. China Inf. Sci. 2020, 63, 132203. [Google Scholar] [CrossRef]
Figure 1. Generalized Lorenz chaotic system response of master.
Figure 1. Generalized Lorenz chaotic system response of master.
Micromachines 13 01993 g001
Figure 2. Generalized Lorenz chaotic system response of slave.
Figure 2. Generalized Lorenz chaotic system response of slave.
Micromachines 13 01993 g002
Figure 3. Chaotic systems without PID controller.
Figure 3. Chaotic systems without PID controller.
Micromachines 13 01993 g003
Figure 4. Response to different initial values.
Figure 4. Response to different initial values.
Micromachines 13 01993 g004
Figure 5. PID controller synchronizing generalized Lorenz chaotic system.
Figure 5. PID controller synchronizing generalized Lorenz chaotic system.
Micromachines 13 01993 g005
Figure 6. Response of Rössler chaotic system.
Figure 6. Response of Rössler chaotic system.
Micromachines 13 01993 g006
Figure 7. QSM controller synchronizing the Rössler chaotic system.
Figure 7. QSM controller synchronizing the Rössler chaotic system.
Micromachines 13 01993 g007
Figure 8. The secure IoT signal system architecture (PID).
Figure 8. The secure IoT signal system architecture (PID).
Micromachines 13 01993 g008
Figure 9. The random signal graph.
Figure 9. The random signal graph.
Micromachines 13 01993 g009
Figure 10. Comparison chart of original signal and encrypted signal.
Figure 10. Comparison chart of original signal and encrypted signal.
Micromachines 13 01993 g010
Figure 11. Comparison chart of original signal and decrypted signal.
Figure 11. Comparison chart of original signal and decrypted signal.
Micromachines 13 01993 g011
Figure 12. The secure IoT signal system architecture (QSM).
Figure 12. The secure IoT signal system architecture (QSM).
Micromachines 13 01993 g012
Figure 13. Temperature sensor DHT-22.
Figure 13. Temperature sensor DHT-22.
Micromachines 13 01993 g013
Figure 14. Temperature measured by DHT-22.
Figure 14. Temperature measured by DHT-22.
Micromachines 13 01993 g014
Figure 15. SX LoRa-1278 communication module.
Figure 15. SX LoRa-1278 communication module.
Micromachines 13 01993 g015
Figure 16. SX LoRa-1278 communication experimental environment.
Figure 16. SX LoRa-1278 communication experimental environment.
Micromachines 13 01993 g016
Figure 17. Chaotic system encryption IoT signal architecture diagram.
Figure 17. Chaotic system encryption IoT signal architecture diagram.
Micromachines 13 01993 g017
Figure 18. The result of implementing a chaotic encryption system.
Figure 18. The result of implementing a chaotic encryption system.
Micromachines 13 01993 g018
Table 1. SX LoRa-1278 reception rate experiment results.
Table 1. SX LoRa-1278 reception rate experiment results.
Distance (m)Delay Time (ms)Reception Rate
1010095.3%
12596.6%
15097.4%
175100%
200100%
2010093.3%
12594.1%
15096.8%
175100%
200100%
3010080%
12591.1%
15094.4%
175100%
200100%
4010077.2%
12581.0%
15088.2%
175100%
200100%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hou, Y.-Y. Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things. Micromachines 2022, 13, 1993. https://doi.org/10.3390/mi13111993

AMA Style

Hou Y-Y. Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things. Micromachines. 2022; 13(11):1993. https://doi.org/10.3390/mi13111993

Chicago/Turabian Style

Hou, Yi-You. 2022. "Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things" Micromachines 13, no. 11: 1993. https://doi.org/10.3390/mi13111993

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop