Next Article in Journal
Risk-Based Maintenance Optimization for a Subsea Production System with Epistemic Uncertainty
Next Article in Special Issue
Finite-Time Disturbance Observer of Nonlinear Systems
Previous Article in Journal
A Deep-Learning Method for the Classification of Apple Varieties via Leaf Images from Different Growth Periods in Natural Environment
Previous Article in Special Issue
Optimal Design and Analysis for a New 1-DOF Compliant Stage Based on Additive Manufacturing Method for Testing Medical Specimens
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System

1
Institute for Control Engineering and Automation, Hanoi University of Science and Technology, No. 1, Dai Co Viet, Hai Ba Trung, Ha Noi 100000, Vietnam
2
School of Electrical & Electronic Engineering, Hanoi University of Science and Technology, No. 1, Dai Co Viet, Hai Ba Trung, Ha Noi 100000, Vietnam
3
Faculty of Electrical and Electronic Engineering, Hung Yen University of Technology and Education, Hai Duong 160000, Vietnam
4
Department of Mechanical Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(8), 1668; https://doi.org/10.3390/sym14081668
Submission received: 10 July 2022 / Revised: 5 August 2022 / Accepted: 8 August 2022 / Published: 11 August 2022

Abstract

:
This paper mainly proposes a new disturbance observer (DO) for a secure communication system (SCS) of the chaos-based system (CBS). First, the fractional-order (FO) Chen chaotic system is remodeled by a Takagi–Sugeno (T–S) fuzzy system with the aim of softening in calculation. Second, the robust fixed-time was designed to synchronize two nonidentical chaotic systems. Third, a new disturbance observer was proposed to compensate for the disturbance and uncertainty of the secure communication system. Fourth, the proof of the proposed method based on Lyapunov condition together with simulation are given to illustrate the correctness and effectiveness of the proposed theory. The tested disturbance on the public channel was mostly compensated by the appropriately estimated disturbance value. The states of master and slave systems (MSSs) were closed to each other in fixed-time. These factors are used to confirm that the symmetry of two chaotic systems were obtained by the proposed control methods.

1. Introduction

The disturbance of a control system is well known as the inversed signal from outside of the system. Inside variations of the parameters of the controlled system are uncertain. To handle these inversed signals, the disturbance rejection techniques need to be equipped to the control system. The main problem of the disturbance observer (DO) is the boundary first derivative of the DO. In [1], the nonlinear DO was proposed with the condition of the first derivative disturbance is zero. The applications of the nonlinear DO can be found in [2,3]. To delete the requirement of disturbance conjunction, the improvement of the nonlinear DO can be found in [4,5,6,7]. The DO with the requirement of fixed format can be found in [8]. The DO for secure communication system is a potential area, which can be found in [4,5,6,9]. Other robust control methods for secure communication system (SCS) can be found in [10,11].
In recent years, the secure communication of the chaos-based system (CBS) has been rapidly developed. The request of the 4.0 industrial revolution for secure data has pushed the rate of research regarding SCS growth up. The basic background of the field is the synchronization of two nonidentical chaotic systems and the scheme of encryption and decryption of the date. Therefore, the radar information encryption technique was investigated in [12]. A novel method for the synchronization two chaotic systems can be found in [13]. The finite time synchronization method can be found in [14]. The image encryption technique can be found in [15,16,17,18]. The synchronization of network systems can be found in [19,20,21,22,23]. The synchronization of the chaotic systems in electronic circuits can be found in [24,25,26,27,28]. To simply design the controller and disturbance observer, this paper used the previous model in [9] with the sector nonlinearity method in [29,30] to change the format of a rescaled chaotic system into T–S fuzzy format. The Chen system was proposed in [31], and the fractional-order (FO) Chen system in this paper is reused from previous published paper [9]. To simulate the FO operation, the FOMCON toolbox is used. FOMCON is a toolbox which allows for fractional-order calculus simulation. The guide to using FOMCON can be found in [32]. To synchronize two nonidentical chaotic systems, the fixed-time sliding mode control (SMC) is used to obtain the goal. The basic concept of fixed-time stability (FTS) was proposed in [33]. Taking advantage of the double phase fixed-time SMC in [34], this paper designed the double phases with the fixed-time stability for the synchronization of two nonidentical chaotic systems with the aim of softening the chattering problem. There are several methods to solve the chattering problem, such as adaptive SMC [35,36]. Therefore, the main contributions of this work are as follows: first, the details of the Chen chaotic system were rewritten in the T–S fuzzy format from [9]. The detail of FO Chen chaotic system is represented in this paper. Second, the synchronization of two nonidentical T–S fuzzy chaotic systems obtained a good result with the power of fixed-time SMC. Here, the sliding phase is fixed-time stable is presented with the aim of softening the chattering value. The tracking error will be converged into the zero coordinate in fixed-time. The sliding phase is also in fixed-time. Third, to avoid the perturbations of the SCS, a new DO was proposed. This is a main contribution of this paper. The tested uncertainty in the master system and the disturbance and uncertainty in the slave system are all presented in this paper. All of these values are mostly compensated by the proposed DO. Fourth, to define the power and originality of the proposed theory, the MATLAB simulation was used to verify the provided theories.
The layout of the paper is as follows: first, the introduction is given to illustrate the gap in the research. Next, the preliminary mathematics are presented. In the second section, the analysis of the idea of the proposed DO is illustrated. Third, the proposed control methods are analyzed for the SCS. Fourth, an illustrative example is given to show the effectiveness of the mentioned theories. Finally, the conclusion is given to state that the proposed control method is suitable for the synchronization of two nonidentical chaotic systems.

2. Mathematical Modeling and Preliminary Mathematics

2.1. Mathematical Modeling of MSSs

In this paper, FO T–S fuzzy Chen system in [9] is reused with the mathematical model as below.
{ d α d t α x 1 ( t ) = ( a + Δ a ) x 1 ( t ) + ( a + Δ a ) x 2 ( t ) + d 1 ( t ) d α d t α x 2 ( t ) = ( τ + Δ τ ) x 1 ( t ) + ( c + Δ c ) x 2 ( t ) x 1 x 3 + d 2 ( t ) d α d t α x 3 ( t ) = x 1 ( t ) x 2 ( t ) ( b + Δ b ) x 3 ( t ) + d 3 ( t )
where x 1 ( t ) ,   x 2 ( t ) , and x 3 ( t ) are states. Δ a ,   Δ b ,   Δ τ , and Δ c are uncertainty parameters of the system. d 1 ( t ) ,   d 2 ( t ) , and d 3 ( t ) are the disturbance from outside of the system. According to a previous paper [31], the parameters of the system were selected as follows: a = 35 ,   b = 3 ,   c = 28 , and τ = a c .
Assumption 1.
All uncertainties and disturbances must be bounded as follows: | Δ a x 1 ( t ) | a 11 ,   | Δ a x 2 ( t ) | a 12 ,   | Δ τ x 1 ( t ) | τ 11 ,   | Δ c x 2 ( t ) | τ 11 ,   | Δ b x 3 ( t ) | b 11 ,   | d 1 ( t ) | d 1 ,   | d 2 ( t ) | d 2 ,   and | d 3 ( t ) | d 3 . These upper bound values need to be positively defined. In [31], the mathematical formula after rescaling is shown as follows:
[ d α d t α x ( t ) d α d t α y ( t ) d α d t α z ( t ) ] = [ a a 0 τ c 20 x ( t ) 0 5 x ( t ) b ] [ x ( t ) y ( t ) z ( t ) ] + [ 1 0 0 0 1 0 0 0 1 ] [ l x ( t ) l y ( t ) l z ( t ) ]
where x 1 ( t ) 10 x ( t ) ,   x 2 ( t ) 10 y ( t ) , and x 3 ( t ) 20 z ( t ) , and l x ( t ) = Δ a x ( t ) + Δ a y ( t ) + d 1 ( t ) ,   l x ( t ) = Δ τ x ( t ) + Δ c y ( t ) + d 2 ( t ) , and l x ( t ) = Δ b z ( t ) + d 3 ( t ) . These uncertainty values need to be bounded as per Assumption 2 below.
Assumption 2.
All uncertainties must be bounded as follows: | l x ( t ) | L 1 , | l y ( t ) | L 2 , and | l z ( t ) | L 3 , where L 1 , L 2 , L 3 are positively defined.
This paper used the sector nonlinearity method in [29] to remodel the system (2) into the T–S fuzzy system, then system (2) can be represented as follows:
D α d t X ( t ) = i = 1 2 ω ( X i ( t ) ) A i X ( t ) + B i u ( t ) + C i l ( t )
where l ( t ) = [ l x ( t ) l y ( t ) l z ( t ) ] T . Detail of T-S fuzzy modeling can be found in Appendix A.
Remark 1.
C i and B i should be identity matrices for easy in calculation.
The parameters of (3) are as follows:
B i = E i = I 3 × 3 ,   A 2 = [ 35 35 0 7 28 100 0 25 3 ] , and A 1 = [ 35 35 0 7 28 100 0 25 3 ] . The states and trajectories of the rescaled system are shown in Figure 1 below.
The phase portraits are shown in Figure 2 below.
To secure the date, the MSS of a SCS, respectively, should selected as follows: the master is
D α d t X m ( t ) = i = 1 2 ω ( X i m ( t ) ) A i X m ( t ) + C i l m ( t )
where l m ( t ) is perturbation of master system. The slave system is
D α d t α 1 X s ( t ) = i = 1 2 ω ( X i s ( t ) ) A i X s ( t ) + B i u s ( t ) + C i l s ( t )
where l s ( t ) is perturbation of slave system. System (5) can work if the assumption below is fulfilled.
Remark 2.
The uncertainties of MSSs must be bounded.
Errors of the MSSs are
e ( t ) = X m ( t ) X s ( t )  
By taking derivative for Equation (6) corresponding to the degree of α leads to
D α d t α 1 e ( t ) = i = 1 2 ω ( X i m ( t ) ) A i X m ( t ) i = 1 2 ω ( X i s ( t ) ) A i X s ( t ) B i u s ( t ) + C i l ( t )  
where C i l ( t ) = C i [ l m ( t ) l s ( t ) ] is used to represent the total disturbance and uncertainty on the public channel.
Remark 3.
In this paper, y m ( t ) and y s ( t ) were used for encryption and decryption of the data, the structure of secure communication is as follows:
M ^ ( t ) = y m ( t ) + M ( t ) y s ( t )  
where M ^ ( t ) and M ( t ) are the received and sent data.

2.2. Preliminary Mathematics

This section is used to show some preliminary mathematics. First, the fractional-order calculation is rewritten from a previous paper [37]. Second, the fixed-time SMC concept is rewritten from the published paper [37]. Finally, the concept of the proposed DO is presented.

2.2.1. Fractional Calculus

The preliminary mathematics of the fractional-order calculus are as below.
Definition 1.
[37]: The Euler’s Gamma function.
Γ ( ρ ) = 0 t ρ 1 e t d t  
where ρ and t are order and time of the operation.
Definition 2.
[37]: Derivation and integration of the fractional calculus.
D t n = { d n d t n , n > 0 1 ,   n = 0 a t ( d τ ) n , n < 0  
where n is the order of the operation.
Definition 3.
[37]: The Caputo fractional derivative.
D t n h ( t ) = 1 Γ ( l n ) a t f n ( τ ) ( t τ ) n l + 1 d τ  
with l 1 < n < l .
Definition 4.
[37]: Stability of the FO system.
Considering FO system as below.
D t n ξ = h ( ξ )  
where ξ = [ ξ 1 , ξ l ] T is state vector. Where 0 < n < 1 is the order of FO calculus. System (12) is stable when the eigenvalues of Jacobian J = h ( ξ ) / ξ are all located in area of
| a r g ( e i g ( J ) ) | > n π 2  
Some properties of FO operation are listed as follows:
Property 1.
Ifn = 0,
D t 0 h ( X ) = h ( X )
Property 2.
Caputo operation.
D t γ ( g ( X ) + h ( X ) ) = D t γ g ( X ) + D t γ h ( X )
Property 3.
The product of fractional derivative.
D t m + n h ( X ) = D t m D t n h ( X )

2.2.2. Fixed-Time Sliding Mode Control

Herein, the FTS concept in [33,34] are used to design the SMC for the synchronization of two nonidentical chaotic systems. The basic concepts of fixed-time stability are below. The settling-time of the reaching law is as below.
s ˙ = [ K s 1 | s | a 11 b 11 s i g n ( s ) + K s 2 | s | a 12 b 12 s i g n ( s ) ]
is calculated as follows:
T max = b 11 K s 1 ( a 11 b 11 ) + b 12 K s 2 ( b 12 a 12 )
where a 11 > b 11 , a 12 < b 12 ,   a 11 ,   a 12 ,   b 11 ,   b 12 ,   K s 1 > 0 , and K s 2 > 0 . This paper proposed a new structure of DO. Therefore, this section is used to illustrate the idea of the novel DO for such a kind of SCS.

2.2.3. Proposed DO

Based on the mathematical model in Equations (4) and (5), the real disturbance can be approximated by
i = 1 2 ω ( X i s ( t ) ) A i X s ( t ) + B i u s ( t ) i = 1 2 ω ( X i m ( t ) ) A i X m ( t ) = D α d t α 1 X s ( t ) C i l s ( t ) ( D α d t X m ( t ) C i l m ( t ) )
or
C i l ( t ) = i = 1 2 ω ( X i s ( t ) ) A i X s ( t ) + B i u s ( t ) i = 1 2 ω ( X i m ( t ) ) A i X m ( t )
if D α d t α X s ( t ) D α d t α X m ( t ) or X s ( t ) X m ( t ) . The proposed DO in this paper is as follows:
l ^ ( t ) = l ( t ) + K l 1 | l ˜ ( t ) | a 1 b 1 s i g n ( l ˜ ( t ) ) + K l 2 | l ˜ ( t ) | a 2 b 2 s i g n ( l ˜ ( t ) )
or
l ˜ ˙ ( t ) = [ K l 1 | l ˜ ( t ) | a 1 b 1 s i g n ( l ˜ ( t ) ) + K l 2 | l ˜ ( t ) | a 2 b 2 s i g n ( l ˜ ( t ) ) ]
The stability of the proposed DO is fixed-time, with the format of disturbance error similar to the fixed-time SMC in [33].

3. Proposed Approach

Herein, the proposed method for the SCS is presented. The contents of this section are listed as follows: first, the sliding mode control for SCS is analyzed. Second, the DO for estimating perturbations of SCS is illustrated. The calculation is corresponding to the time, therefore writing time (t) is ignored.

3.1. Fixed-Time SMC for SCS

Taking advantage of the double-phase fixed-time SMC [34], the FO fixed-time SMC is designed for the secure communication system with the surface of SMC for each axis designed as below.
s j = D α 1 d t α 1 e j + D α 2 d t α 2 [ k e 1 j | e j | a 1 e j b 1 e j s i g n ( e j ) + k e 2 j | e j | c 1 e j d 1 e j s i g n ( e j ) ]
For j goes from 1 to 3. Taking derivative for Equation (23) yields
s ˙ j = D α d t α e j + D α 1 d t α 1 [ k e 1 j | e j | a 1 e j b 1 e j s i g n ( e j ) + k e 2 j | e j | c 1 e j d 1 e j s i g n ( e j ) ]
The equivalent control value of SMC can be calculated by ignoring the disturbance effect. Solving Equation (24) by
0 = D α d t α e j + D α 1 d t α 1 [ k e 1 j | e j | a 1 e j b 1 e j s i g n ( e j ) + k e 2 j | e j | c 1 e j d 1 e j s i g n ( e j ) ]
or
i = 1 2 ω ( X i m ( t ) ) A i X m ( t ) i = 1 2 ω ( X i s ( t ) ) A i X s ( t ) B i u s ( t ) + D α 1 d t α 1 [ k e 1 j | e j | a 1 e j b 1 e j s i g n ( e j ) + k e 2 j | e j | c 1 e j d 1 e j s i g n ( e j ) ] = 0
The equivalent control is then calculated
B j u e q s j = i = 1 2 ω ( Ω i j m ) A i j X m j i = 1 2 ω ( Ω i j s ) A i j X s j + D α 1 d t α 1 [ k e 1 j | e j | a 1 e j b 1 e j s i g n ( e j ) + k e 2 j | e | c 1 e j d 1 e j s i g n ( e j ) ]
In steady-state, the state of the slave system is converged to the state of the master in the fixed-time as below.
T e m a x = b 1 e j K e 1 j ( a 1 e j b 1 e j ) + d 1 e j K e 2 j ( d 1 e j c 1 e j )
The reaching law is designed as follows:
B j u s w s j ( t ) = k s 1 j | s j | a 1 s j b 1 s j s i g n ( s j ) + k s 2 j | s j | c 1 s j d 1 s j s i g n ( s j )
The settling-time of the reaching law is
T s m a x = b 1 s j K s 1 j ( a 1 s j b 1 s j ) + d 1 s j K s 2 j ( d 1 s j c 1 s j )
To soften the effects of the perturbations, a new DO is proposed in the next section.

3.2. Proposed DO for SCS

With the aim of obtaining the reaching law of the DO as Equation (22), the DO is proposed as
l ^ j = i = 1 2 ω ( X i j s ) A i j X s j + B i j u s j i = 1 2 ω ( X i j m ) A i j X m j + k l 1 j | i = 1 2 ω ( X i j s ) A i j X s j + B i j u s j i = 1 2 ω ( X i j m ) A i j X m j | a 1 l j b 1 l j s i g n ( i = 1 2 ω ( X i j s ) A i j X s j + B i j u s j i = 1 2 ω ( X i j m ) A i j X m j ) + k l 2 j | i = 1 2 ω ( X i j s ) A i j X s j + B i j u s j i = 1 2 ω ( X i j m ) A i j X m j | c 1 l j d 1 l j s i g n ( i = 1 2 ω ( X i j s ) A i j X s j + B i j u s j i = 1 2 ω ( X i j m ) A i j X m j )
or
l ^ j = l j + k l 1 j | l ˜ j | a 1 l j b 1 l j s i g n ( l ˜ j ) + k l 2 j | l ˜ j | c 1 l j d 1 l j s i g n ( l ˜ j )
Taking derivative for both sides of Equation (32) we have
l ^ ˙ j = l ˙ j + k l 1 j | l ˜ j | a 1 l j b 1 l j s i g n ( l ˜ j ) + k l 2 j | l ˜ j | c 1 l j d 1 l j s i g n ( l ˜ j )
or
l ˜ ˙ j = k l 1 j | l ˜ j | a 1 l j b 1 l j s i g n ( l ˜ j ) k l 2 j | l ˜ j | c 1 l j d 1 l j s i g n ( l ˜ j )
This completes the proof of stability of the proposed DO.

3.3. Stability Analysis

The Lyapunov condition is selected as follows:
V ( t ) = 1 2 s T s + 1 2 l ˜ T l ˜
Taking the derivative for Equation (33) leads to
V ˙ ( t ) = s T s ˙ + l ˜ T l ˜ ˙
Equation (34) can be generally rewritten for each element as follows:
V ˙ j = s j s ˙ j l ˜ j l ˜ ˙ j = s j [ k s 1 j | s j | a 1 s j b 1 s j s i g n ( s j ) + k s 2 j | s j | c 1 s j d 1 s j s i g n ( s j ) ] l ˜ j ( k l 1 j | l ˜ j | a 1 l j b 1 l j s i g n ( l ˜ j ) + k l 2 j | l ˜ j | c 1 l j d 1 l j s i g n ( l ˜ j ) ) = [ k s 1 j | s j | a 1 s j b 1 s j + 1 + k s 2 j | s j | c 1 s j d 1 s j + 1 ] l ˜ j ( k l 1 j | l ˜ j | a 1 l j b 1 l j + 1 + k l 2 j | l ˜ j | c 1 l j d 1 l j + 1 ) 0
This completes the proof.

4. An Illustrative Example

4.1. Scheme of SCS of the CBS and Parameters of Proposed Method

In this section, the performances of the proposed methods are given. First, the tracking of states of MSSs are shown. Second, the phases of MSSs are shown together in one figure for each axis. Third, the tracking errors are shown together with the analysis data. Fourth, the disturbance observer effectiveness is shown. Fifth, the secure data and encrypted date are shown. The secure communication scheme is shown in Figure 3.
The secure date from the master area need to be mixed with the state of the master system and the mixed signal is provided onto the public channel, the received signal can be obtained with the decryption technique, which used the state of the slave system to archive the goal. As shown in Figure 3 above, to obtain the goal of transmission, the synchronization control and disturbance rejection are required. The control gains are as follows: first, the sliding phase gains of Equation (23) are a 1 e 1 / b 1 e 1 = 1.75 ,   a 2 e 1 / b 2 e 1 = 0.85 ,   K e 11 = 2 ,   K e 21 = 2 ,   a 1 e 2 / b 1 e 2 = 1.75 ,   a 2 e 2 / b 2 e 2 = 0.85 ,   K e 12 = 2 ,   K e 22 = 2 ,   a 1 e 3 / b 1 e 3 = 1.75 , a 2 e 3 / b 2 e 3 = 0.85 ,   K e 13 = 2 ,   K e 23 = 2 . Second, the reaching phase gains of Equation (29) are a 1 s 1 / b 1 s 1 = 1.25 ,   a 2 s 1 / b 2 s 1 = 0.75 ,   K s 11 = 50 ,   K s 21 = 50 ,   a 1 s 2 / b 1 s 2 = 1.25 ,   a 2 s 2 / b 2 s 2 = 0.75 ,   K s 12 = 50 ,   K s 22 = 50 ,   a 1 s 3 / b 1 s 3 = 1.25 , a 2 s 3 / b 2 s 3 = 0.75 ,   K s 13 = 50 ,   K s 23 = 50 . The gains of the DO in Equation (31) are a 1 l 1 / b 1 l 1 = 1.25 ,   a 2 l 1 / b 2 l 1 = 0.95 ,   K l 11 = 100 ,   K l 21 = 100 ,   a 1 l 2 / b 1 l 2 = 1.25 ,   a 2 l 2 / b 2 l 2 = 0.95 ,   K l 12 = 100 ,   K l 22 = 100 ,   a 1 l 3 / b 1 l 3 = 1.25 ,   a 2 l 3 / b 2 l 3 = 0.95 ,   K l 13 = 100 , and K l 23 = 100 . The fractional order in Equation (1) is 0.99.

4.2. Results of the Proposed Method

The sine and cosine, and complicated disturbance and uncertainty were tested on the SCS of chaos-based system. However, the hash condition is mainly analyzed in this paper. Otherwise, the simple disturbance conditions were just used to analyze the effectiveness of the proposed DO.
Case 1.
Perturbations are periodic signals.
The uncertainties of master system are l x m ( t ) = Δ a x m ( t ) + Δ a y m ( t ) = 0.25 c o s ( 2 π t ) x m ( t ) ,   l y m ( t ) = Δ τ x m ( t ) + Δ c y m ( t ) = 0.25 c o s ( 2 π t ) y m ( t ) , and l z m ( t ) = Δ b z m ( t ) = 0.25 c o s ( 2 π t ) z m ( t ) on xm-, ym-, and zm-axes, respectively. The uncertainties of slave system are l x s ( t ) = Δ a x s ( t ) + Δ a y s ( t ) = 0.15 s i n ( 2 π t ) x s ( t ) ,   l y m ( t ) = Δ τ x s ( t ) + Δ c y s ( t ) = 0.15 s i n ( 2 π t ) y s ( t ) , and l z m ( t ) = Δ b z s ( t ) = 0.25 c o s ( 2 π t ) z s ( t ) on xs-, ys-, and zs-axes, respectively. The performance of the proposed DO is shown as in Figure 4 below.
The tested uncertainties on three channels of MSSs were compensated by the estimated disturbance values. To show the effectiveness of the proposed control method with both disturbance and uncertainty rejection ability, the disturbance and uncertainty were tested in case 2 as below.
Case 2.
Perturbations are periodic signals together with square disturbances.
The uncertainties of the master system are l x m ( t ) = Δ a x m ( t ) + Δ a y m ( t ) = 0.25 c o s ( 2 π t ) x m ( t ) ,   l y m ( t ) = Δ τ x m ( t ) + Δ c y m ( t ) = 0.25 c o s ( 2 π t ) y m ( t ) , and l z m ( t ) = Δ b z m ( t ) = 0.25 c o s ( 2 π t ) z m ( t ) on xm-, ym-, and zm-axes, respectively. The uncertainties of the slave system are l x s ( t ) = Δ a x s ( t ) + Δ a y s ( t ) = 0.15 s i n ( 2 π t ) x s ( t ) ,   l y m ( t ) = Δ τ x s ( t ) + Δ c y s ( t ) = 0.15 s i n ( 2 π t ) y s ( t ) , and l z m ( t ) = Δ b z s ( t ) = 0.25 c o s ( 2 π t ) z s ( t ) on xs-, ys-, and zs-axes, respectively. The tested disturbance are as follows: d 1 ( t ) with 2.5 amplitude, 0.75 period, 70% pulse width, and delay time is 1 s, d 2 ( t ) with 1.5 amplitude, 0.75 period, 60% pulse width, and delay time is 1.25 s, and d 3 ( t ) with 1 amplitude, 0.2 period, 50% pulse width, and delay time is 0.25 s for x-, y-, and z-axes, respectively. The performance of the proposed DO is shown as in Figure 5 below.
The states of MSSs are mostly identical with very fast convergent speeds. The red color state is used for the master and blue color state for the slave systems. The states of the MSSs are unpredicted signals, which correspond with the original state of chaotic system. To show the effectiveness of proposed method for synchronizing two different chaotic systems, the phase trajectories of MSSs are displayed in Figure 6 below.
In Figure 6, the phase of the states of both the master and slave systems are mostly converged to each other. These phases are the most similar to the original phases. The phase portraits of the MSSs were mostly identical and correspond to the original one. The simulations performed demonstrated that the synchronization control method is satisfied for the secure communication of chaos-based system. To show the effectiveness of the proposed method, the synchronization errors are shown in Figure 7 below.
The tracking errors of these axes are converged to zero in the settling-times T e 1 < 0.07 (s), T e 1 < 0.07 (s), and T e 1 < 0.07 . The maximum errors are M a x e 1 < 0.022 ,   M a x e 2 < 0.095 , and M a x e 3 < 0.116 . In steady-states, the errors are located in the areas of e 1 ( 7.3 ; 7.3 ) × 10 3 ,   e 2 ( 4.5 ; 4.5 ) × 10 3 , and e 1 ( 2.65 ; 2.65 ) × 10 3 . The effectiveness of the proposed DO for estimating both disturbance and uncertainty are shown in Figure 8 below.
As shown in Figure 8 above, the tested disturbances with system parameter variations were all tested on the SCS. The expectation of disturbance rejection is met. The tested disturbance and uncertainty in both master and slave systems were mostly rejected by the proposed DO. There are simple and complicated disturbances which were mostly rejected by the proposed DO. In Figure 8, the disturbances and uncertainties were nonidentical, the disturbances were square waves and uncertainties were periodic signals. These signals were mixed together and challenged the performances of the proposed DO. Therefore, Figure 8 was used to validate the correctness and effectiveness of the proposed DO. The sent and received data are shown in Figure 9 below.
In this work, the square wave signal was used to test the performance of the SCS. The received and sent date are mostly identical. From this, we can state that the proposed control method is good for the synchronization and robustness with regards to disturbance and uncertainty. If a hacker wanted to extract the data on the public channel, they would have been able to see the signal such as that in Figure 10 below.
The signal as in Figure 10 has no meaning. This is the expectation of the work in secure communication. The obtained results are good enough for such complicated disturbance values. To show the effectiveness of the proposed method, the comparison of this paper and a previous paper is shown in Table 1 below.
Therefore, the proposed method in this paper is good for synchronizing two nonidentical chaotic systems and rejecting the perturbations from inside and outside of the SCS.

5. Conclusions

A new DO for SCS of the CBS was successfully proposed. The conditions of boundary disturbance value and the frequency of disturbance were deleted. A new DO only needs the states of MSSs to be closed to each other. The estimated and tested disturbances are closed to each other in a predefined time. This is also a new concept of the DO for SCS of CBS. In this paper, the chattering of conventional SMC was deleted by the fixed-time SMC with double reaching and sliding phases. The correction of the proposed methods was proved by using Lyapunov condition. The effectiveness of the proposed methods was verified by MATLAB simulation. The achievement of disturbance rejection was used to show the novelty and originality of proposed DO. This has huge implications for our next research in SCS of CBS. In our next study, the proposed concept of the DO will be improved and verified by experiments for the secure communication of the chaos-based system.

Author Contributions

Conceptualization, Q.D.N., V.N.G. and S.-C.H.; software, V.H.T.; validation, D.-H.P., V.N.G. and S.-C.H.; formal analysis, Q.D.N. and V.N.G.; writing—review and editing, Q.D.N. and V.N.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Ministry of Science and Technology, Republic of China, under Contract MOST 111-2221-E-992-068.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The basic concept of the T–S fuzzy modeling Lendek et al. [29] is given here. Firstly, consider the system
{ χ ˙ = G m ( χ , u ) χ + H m ( χ , u ) u y = K m ( χ , u ) χ
where χ is the state vector. G m ,   H m , and K m are the smooth functions. y is the output vector. The scheduling χ j [ χ m i n , χ m a x ] , where j = 1 , , p . The weighting functions are
{ η 0 j ( . ) = χ m a x χ j ( . ) χ m a x χ m i n η 1 j ( . ) = 1 n 0 j ( . )
The fuzzy membership is
ϑ i ( χ ) = Π j = 1 p ϑ i j ( χ i )
where ϑ i j ( χ i ) is either η 0 j ( . ) or η 1 j ( . ) Using these concepts, system (7) becomes
{ χ ˙ = i = 1 m ϑ i ( χ j ) ( A i χ + B i u ) y = i = 1 m ϑ i ( χ j ) C i χ
All these concepts are used in this paper for the control design and system mathematical modeling.
Figure 1. System state, (a) x(t), (b) y(t), and (c) z(t).
Figure 1. System state, (a) x(t), (b) y(t), and (c) z(t).
Symmetry 14 01668 g001aSymmetry 14 01668 g001b
Figure 2. Phase portraits, (a) state on yx-axis, (b) state on zx-axis, (c) state on zy-axis, (d) 3D phase portrait.
Figure 2. Phase portraits, (a) state on yx-axis, (b) state on zx-axis, (c) state on zy-axis, (d) 3D phase portrait.
Symmetry 14 01668 g002aSymmetry 14 01668 g002b
Figure 3. Scheme of SCS of the CBS.
Figure 3. Scheme of SCS of the CBS.
Symmetry 14 01668 g003
Figure 4. Tested and estimated disturbances on three axes, (a) l x and l ^ x , (b) l y and l ^ y , and (c) l z and l ^ z .  .
Figure 4. Tested and estimated disturbances on three axes, (a) l x and l ^ x , (b) l y and l ^ y , and (c) l z and l ^ z .  .
Symmetry 14 01668 g004aSymmetry 14 01668 g004b
Figure 5. States of MSSs, (a) x m and x s , (b) y m and y s , and (c) z m and z s .
Figure 5. States of MSSs, (a) x m and x s , (b) y m and y s , and (c) z m and z s .
Symmetry 14 01668 g005
Figure 6. Phase portraits of MSSs, (a) state on yx-axis, (b) state on zx-axis, (c) state on zy-axis, (d) 3D phase portrait.
Figure 6. Phase portraits of MSSs, (a) state on yx-axis, (b) state on zx-axis, (c) state on zy-axis, (d) 3D phase portrait.
Symmetry 14 01668 g006
Figure 7. Tracking errors on three axes.
Figure 7. Tracking errors on three axes.
Symmetry 14 01668 g007
Figure 8. Tested and estimated disturbances and uncertainty on three axes, (a) l x and l ^ x , (b) l y and l ^ y , and (c) l z and l ^ z .
Figure 8. Tested and estimated disturbances and uncertainty on three axes, (a) l x and l ^ x , (b) l y and l ^ y , and (c) l z and l ^ z .
Symmetry 14 01668 g008aSymmetry 14 01668 g008b
Figure 9. Sent and received data.
Figure 9. Sent and received data.
Symmetry 14 01668 g009
Figure 10. Encrypted data.
Figure 10. Encrypted data.
Symmetry 14 01668 g010
Table 1. Comparison of this paper and a previous paper [11].
Table 1. Comparison of this paper and a previous paper [11].
PaperMaximum Settling-TimeMaximum ErrorDisturbance Rejection
This paper0.07 s M a x e 3 < 0.116 . Yes
Previous paper [11] > 1 s > 5Was not mentioned

References

  1. Chen, W.H.; Ballance, D.J.; Gawthrop, P.J.; O’Reilly, J. A nonlinear disturbance observer for robotic manipulators. IEEE Trans. Ind. Electron. 2000, 47, 932–938. [Google Scholar] [CrossRef]
  2. Nguyen, A.T.; Basit, B.A.; Choi, H.H.; Jung, J.W. Disturbance attenuation for surface-mounted PMSM drives using nonlinear disturbance observer-based sliding mode control. IEEE Access 2020, 8, 86345–86356. [Google Scholar] [CrossRef]
  3. Wu, X.; Xu, K.; Lei, M.; He, X. Disturbance-compensation-based continuous sliding mode control for overhead cranes with disturbances. IEEE Trans. Autom. Sci. Eng. 2020, 17, 2182–2189. [Google Scholar] [CrossRef]
  4. Giap, V.N.; Huang, S.C.; Nguyen, Q.D.; Su, T.J. Disturbance observer-based linear matrix inequality for the synchronization of Takagi-Sugeno fuzzy chaotic systems. IEEE Access 2020, 8, 225805–225821. [Google Scholar] [CrossRef]
  5. Giap, V.N.; Nguyen, Q.D.; Huang, S.C. Synthetic adaptive fuzzy disturbance observer and sliding-mode control for chaos-based secure communication systems. IEEE Access 2021, 9, 23907–23928. [Google Scholar] [CrossRef]
  6. Giap, V.N.; Vu, H.S.; Nguyen, Q.D.; Huang, S.C. Disturbance and uncertainty rejection-based on fixed-time sliding-mode control for the secure communication of chaotic systems. IEEE Access 2021, 9, 133663–133685. [Google Scholar] [CrossRef]
  7. Giap, V.N.; Vu, H.S.; Huang, S.-C. Time-varying disturbance observer based on regulating boundary layer thickness sliding mode control for microelectromechanical systems gyroscope. Meas. Control 2022. [Google Scholar] [CrossRef]
  8. Hwang, S.; Kim, H.S. Extended disturbance observer-based integral sliding mode control for nonlinear system via T–S fuzzy model. IEEE Access 2020, 8, 116090–116105. [Google Scholar] [CrossRef]
  9. Giap, V.N.; Nguyen, Q.D.; Trung, N.K.; Huang, S.C.; Trinh, X.T. Disturbance Observer Based on Terminal Sliding-Mode Control for a Secure Communication of Fractional-Order Takagi-Sugeno Fuzzy Chaotic Systems. In Proceedings of the International Conference on Advanced Mechanical Engineering, Automation and Sustainable Development; Ha Long, Vietnam, 4–7 November 2021, Springer: Cham, Switzerland, 2022; pp. 936–941. [Google Scholar]
  10. Chen, Y.-J.; Chou, H.-G.; Wang, W.-J.; Tsai, S.-H.; Tanaka, K.; Wang, H.O.; Wang, K.-C. A polynomial-fuzzy-model-based synchronization methodology for the multi-scroll Chen chaotic secure communication system. Eng. Appl. Artif. Intell. 2020, 87, 103251. [Google Scholar] [CrossRef]
  11. Çiçek, S.; Kocamaz, U.E.; Uyaroglu, Y. Secure communication with a chaotic system owning logic element. AEU-Int. J. Electron. Commun. 2018, 88, 52–62. [Google Scholar] [CrossRef]
  12. Pappu, C.S.; Flores, B.C.; Debroux, P.S.; Boehm, J.E. An electronic implementation of Lorenz chaotic oscillator synchronization for bistatic radar applications. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 2001–2013. [Google Scholar] [CrossRef]
  13. Mahmoud, E.E.; Higazy, M.; Althagafi, O.A. A novel strategy for complete and phase robust synchronizations of chaotic nonlinear systems. Symmetry 2020, 12, 1765. [Google Scholar] [CrossRef]
  14. Vaseghi, B.; Hashemi, S.S.; Mobayen, S.; Fekih, A. Finite time chaos synchronization in time-delay channel and its application to satellite image encryption in OFDM communication systems. IEEE Access 2021, 9, 21332–21344. [Google Scholar] [CrossRef]
  15. Zhou, M.; Wang, C. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 2020, 171, 107484. [Google Scholar] [CrossRef]
  16. Wang, X.; Gao, S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 2020, 507, 16–36. [Google Scholar] [CrossRef]
  17. Vaidyanathan, S.; Akgul, A.; Kaçar, S.; Çavuşoglu, U. A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography. Eur. Phys. J. Plus 2018, 133, 46–64. [Google Scholar] [CrossRef]
  18. Zhang, Y.-Q.; Hao, J.-L.; Wang, X.-Y. An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map. IEEE Access 2020, 8, 54175–54188. [Google Scholar] [CrossRef]
  19. Zhou, L.; Tan, F. A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks. Nonlinear Dyn. 2019, 96, 869–883. [Google Scholar] [CrossRef]
  20. Lin, H.; Wang, C.; Tan, Y. Hidden extreme multistability with hyperchaos and transient chaos in a Hopfield neural network affected by electromagnetic radiation. Nonlinear Dyn. 2020, 99, 2369–2386. [Google Scholar] [CrossRef]
  21. Fei, Z.; Guan, C.; Gao, H. Exponential synchronization of networked chaotic delayed neural network by a hybrid event trigger scheme. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 2558–2567. [Google Scholar] [CrossRef]
  22. Liu, P.; Zeng, Z.; Wang, J. Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 2358–2368. [Google Scholar] [CrossRef]
  23. Wang, J.-L.; Qin, Z.; Wu, H.-N.; Huang, T. Passivity and synchronization of coupled uncertain reaction-diffusion neural networks with multiple time delays. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 2434–2448. [Google Scholar] [CrossRef] [PubMed]
  24. Wang, Y.Y.; Karimi, H.R.; Yan, H.C. An adaptive event-triggered synchronization approach for chaotic Lur’e systems subject to aperiodic sampled data. IEEE Trans. Circuits Syst. II Exp. Briefs 2019, 66, 442–446. [Google Scholar] [CrossRef]
  25. Chang, D.; Li, Z.; Wang, M.; Zeng, Y. A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU-Int. J. Electron. Commun. 2018, 88, 20–29. [Google Scholar] [CrossRef]
  26. Giap, V.-N.; Huang, S.-C.; Nguyen, Q.D. Synchronization of 3D chaotic system based on sliding mode control: Electronic circuit implementation. In Proceedings of the 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 23–25 October 2020; pp. 156–159. [Google Scholar] [CrossRef]
  27. Wu, Z.; Zhang, X.; Zhong, X. Generalized chaos synchronization circuit simulation and asymmetric image encryption. IEEE Access 2019, 7, 37989–38008. [Google Scholar] [CrossRef]
  28. Lai, Q.; Norouzi, B.; Liu, F. Dynamic analysis, circuit realization, control design and image encryption application of an extended Lü system with coexisting attractors. Chaos Solitons Fractals 2018, 114, 230–245. [Google Scholar] [CrossRef]
  29. Lendek, Z.; Guerra, T.M.; Babuska, R.; De Schutter, B. Stability Analysis and Nonlinear Observer Design Using Takagi-Sugeno Fuzzy Models; Springer: Berlin/Heidelberg, Germany, 2011; p. 262. [Google Scholar]
  30. Takagi, T.; Sugeno, M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. B Cybern. 1985, 1, 116–132. [Google Scholar] [CrossRef]
  31. Zhong, G.; Tang, W. Circuitry implementation and synchronization of Chen’s attractor. Inter. J. Bifurcation Chaos 2002, 12, 1423–1427. [Google Scholar] [CrossRef]
  32. Tepljakov, A.; Petlenkov, E.; Belikov, J. FOMCON: Fractional-order modeling and control toolbox for MATLAB. In Fractional-Order Modeling and Control of Dynamic Systems; Springer: Cham, Switzerland, 2011; pp. 684–689. [Google Scholar]
  33. Polyakov, A. Nonlinear feedback design for fixed-time stabilization of linear control systems. IEEE Trans. Autom. Control 2012, 57, 2106–2110. [Google Scholar] [CrossRef]
  34. Giap, V.N.; Nguyen, Q.D.; Trung, N.K.; Huang, S.C. Time-varying disturbance observer based on sliding-mode observer and double phases fixed-time sliding mode control for a TS fuzzy micro-electro-mechanical system gyroscope. J. Vib. Control 2022. [Google Scholar] [CrossRef]
  35. Truc, L.N.; Vu, L.A.; Thoan, T.V.; Thanh, B.T.; Nguyen, T.L. Adaptive Sliding Mode Control Anticipating Proportional Degradation of Actuator Torque in Uncertain Serial Industrial Robots. Symmetry 2022, 14, 957. [Google Scholar] [CrossRef]
  36. Giap, V.N.; Huang, S.C. Effectiveness of fuzzy sliding mode control boundary layer based on uncertainty and disturbance compensator on suspension active magnetic bearing system. Meas. Control 2020, 53, 934–942. [Google Scholar] [CrossRef]
  37. Petráš, I. Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, Q.D.; Giap, V.N.; Tran, V.H.; Pham, D.-H.; Huang, S.-C. A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System. Symmetry 2022, 14, 1668. https://doi.org/10.3390/sym14081668

AMA Style

Nguyen QD, Giap VN, Tran VH, Pham D-H, Huang S-C. A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System. Symmetry. 2022; 14(8):1668. https://doi.org/10.3390/sym14081668

Chicago/Turabian Style

Nguyen, Quang Dich, Van Nam Giap, Van Huy Tran, Duc-Hung Pham, and Shyh-Chour Huang. 2022. "A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System" Symmetry 14, no. 8: 1668. https://doi.org/10.3390/sym14081668

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop