1. Introduction
Chaos was formally defined by Edward Lorenz as a nonlinear dynamical system sensitive to initial conditions. H. Poincaré realized that the motion of a three-body has a very special behaviour such as that similar to how drastically different orbits would result from even a small initial condition change. The unusual and strange geometry of the chaotic attractor received the first look, while the usual attractors were periodic attractors, quasi-periodic, and stable equilibrium attractors. In the 1970s, the Belousov–Zhabotinsky reaction was presented by Anatoliy Zhabotinsky, where the basin of attraction included an unstable equilibrium point. The attractor was called “self-excited”. Simply, by the usual computation, the self-excited attractors can be easily found. Another class of attractor was observed by Gennady Leonov and Nikolay Kuznetsov, which they called the “hidden attractor” in multistable systems [
1,
2,
3].
Due to the complicated and unexpected behaviour of chaotic systems, their applications can be found in different scientific and engineering fields, including communications, image encryption [
4], robotics [
5], anti-jamming systems [
6], chemical reactors [
7], modelling and prediction, time-delayed systems [
8], and sensors [
9].
In addition, the investigations of chaotic systems with special characteristics have attracted a lot of attention from scientists, engineers, and mathematicians over the last two decades. After the discovery of the three-dimensional Lorenz system [
10], a large number of chaotic systems were presented. Some typical systems are chaotic oscillators without equilibrium [
11], with stable equilibrium [
12], and with equilibrium point located on a segmented straight line [
13,
14]. In [
15], authors investigated chaotic oscillators with balanced squares, while a chaotic oscillator with circular equilibrium was studied in [
16].
The present challenge is to provide a new chaotic oscillator with special properties. Chaotic oscillators can be divided into conservative and dissipative. A dissipative chaotic system is one in which energy or other stored quantities are continually lost and, for instance, often converted to heat by processes such as friction; see [
17]. The behaviour of the system may be unpredictable and limited to the boundaries of these attractors, and vice versa, conservative chaotic oscillators do not lose energy over time and the appearance of their orbits on the surface exhibits constant energy in the corresponding space. In this case, the orbits of these oscillators remain within conserved subspace. Conservative and dissipative chaotic oscillators are structurally stable. Recently, peculiar chaotic oscillators with no linear terms have been presented. The boundedness of this class of chaotic oscillators shows a difficulty to be determined, see [
18]. A complicated class of chaotic oscillators generated by only nonlinear terms is shown in
Table 1.
On the other hand, the study of when and how it is feasible to govern systems showing irregular, chaotic behaviour is known as control of chaos, or control of chaotic oscillators. It is the boundary field that exists between control theory and nonlinear oscillators theory. Nonlinear control and control of chaos are closely related, and chaotic oscillators can benefit from various nonlinear control techniques. Due to the complexity of chaotic oscillators generated by a large number of nonlinear terms, the control process became more complicated. Two of the most known methods of chaos control will be studied. The first is the globally stable adaptive controller based on the second method of Lyapunov, which has been introduced to control the chaotic motion. The second method is by constructing an observer for the corresponding nonlinear system, which depends on the solvability of a linear matrix related to a matrix system.
In this paper, we present an oscillator with seven pure nonlinear terms and its stability in
Section 2.
Section 3 provides a dynamic analysis. We illustrate a controller and an application of the proposed oscillator in secure communications in
Section 4 and
Section 5.
3. Dynamics of the Oscillator
Important tools to indicate the complex dynamics of nonlinear oscillators are the Lyapunov exponents and bifurcation diagram. Bifurcation analysis studies the evolution of a dynamic system’s basic properties as a parameter changes. Its main goal is to identify precise points in the parameter space where notable qualitative changes in the behaviour of the system appear. It is possible to determine possible multistable zones in the parameter space by using the forward and backward methods to generate bifurcation diagrams. It is standard procedure to conduct bifurcation analysis in the case of flow-based dynamical systems by locating the local maxima in the system’s time evolution for each unique parameter configuration. Conversely, the Lyapunov exponents analysis is a technique used to evaluate numerically the speed at which neighbouring trajectories in a dynamical oscillator either converge or spread out exponentially. This method provides insightful information about the system’s vulnerability to initial conditions. In the following, we provide the Lyapunov exponents and bifurcation analysis of the proposed oscillator (
2).
The proposed oscillator (
2) displays chaotic behaviour when the parameters
and initial condition (−1.3, 1.5, 1.4). To gain a better understanding of the complexity and behaviour of the proposed oscillator, we will investigate the Lyapunov exponents. Due to the corresponding parameter values and initial conditions, the LEs are found to be
Moreover, based on the Lyapunov exponents, we will determine the Kaplan–Yorke fractional dimension (
), which is given by:
where
is the Lyapunov exponent. Therefore, the Kaplan–Yorke fractional dimension is found to be
, which shows the geometric complexity of the attractor (see
Figure 1).
To explore the dynamics of the introduced oscillator along a wide range of its two parameters
and
, the bifurcation diagram for the parameter
on the interval 0 <
≤ 1 with keeping
and bifurcation diagram for the parameter
on the interval 0 <
≤ 1 with keeping
have been plotted as shown in
Figure 2. By using the oscillator initial conditions,
. In all bifurcation diagrams, the oscillator has simulated along the time interval
where the Poincare section has been captured on
plane after the steady state reached (i.e.,
t > 300). The bifurcation diagram and the corresponding Lyapunov exponents have been plotted with the step-size
as shown in
Figure 3, while in
Figure 2 the bifurcation parameter
is discretized with the step-size
It is clear from
Figure 2 that the system performs chaotic motion as long as
> 0.1 when keeping
On the other hand,
Figure 2 demonstrates that the system oscillates chaotically for
> 0.2 when keeping
The phase portraits and time response with parameters of the system are illustrated in
Figure 2 and
Figure 4, respectively.
4. Adaptive Control of System (2)
Adaptive control, an advanced methodology adapted for dynamic systems, stands as a beacon of innovation in the realm of control theory. Providing unparalleled versatility and efficacy, adaptive control mechanisms facilitate seamless customization and optimization of control processes in response to fluctuations in system dynamics. This adaptive capability is particularly invaluable in scenarios characterized by the inherent unpredictability and complexity of chaotic systems. Given the propensity of chaotic systems to exhibit a sensitive dependence on initial conditions and nonlinear dynamics, conventional control strategies often fail to adequately regulate such systems. Researchers have directed considerable efforts towards the development and refinement of adaptive controllers specifically tailored to address the unique challenges posed by chaotic systems. By harnessing the intrinsic adaptability of adaptive control methodologies, these activities aim to imbue control systems with the resilience and responsiveness requisite for navigating the intricacies of chaotic dynamics.
In this section, we present a control study of oscillator (
2). Briefly, the control strategy is the earliest control strategy proposed to resolve the synchronization issue. The first work in this direction [
24] shows that the active control theory may synchronize the connected Lorenz system which is also confirmed by the simulation. However, Perez-Cruz et al. [
25] looked into the synchronization of a new three-dimensional chaotic system by using Lyapunov analysis to design a nonlinear controller that guaranteed the exponential convergence of the synchronization error, and the results of their numerical simulation confirmed the controller’s excellent performance.
Now, let fix some the parameters of oscillator (
2) as
and let us define the following driver system as follows
Next, let us provide the adaptive synchronization of an identical novel chaotic oscillator with parameters which are not valued. The response system is presented as
where
are the states,
are unknown system parameters and
is the adaptive controller to be determined. We consider the adaptive controller defined by
where
denote the estimated parameters of the system coefficients
, respectively, and
Substituting (
19) into (
18), we obtain the closed-loop system:
Let us denote the error estimation of the parameters as follows:
Due to (
21), the derivatives of the parameter estimation errors can be expressed as:
In the following, we reduced (
20) to
Theorem 3. If the controllers are chosen as (19) and let the parameter’s update laws is then the synchronization between the driver system (19) and the response system (18) is approached if are positive constants. Proof. We consider the Lyapunov function defined by
Differentiating the above function, we have
Taking time derivative of the above function along the trajectories of (
24), we have
which is a negative function for
. Thus, due to the Lyapunov stability theory, we find that
exponentially when
. □
Numerical Simulation
We consider the fourth-order Runge–Kutta method to numerically simulate the adaptive control for system (
18) with the adaptive control law (
19) and the parameter update law (
24). The parameters of system (
17) are selected as
In addition, we take the adaptive and update laws as
Suppose that the initial values of the estimated parameters are
and the initial values of system (
2) are taken as (1, 1, 1). When the adaptive control law (
24) and the parameter update law are used, the controlled system converges to the equilibrium
E = (0, 0, 0) exponentially, as shown in
Figure 5.
5. Secure Communication Application
In the contemporary information age, the escalating concern for security within information systems is palpable and ever-growing. This heightened apprehension is principally propelled by the exponential surge in news dissemination and data generation, necessitating the proliferation and refinement of sophisticated information systems. The imperative to exchange and transmit information seamlessly in our interconnected world catalyzes the inception and evolution of advanced information systems, amplifying the importance of fortifying their security measures. Addressing the security challenges confronting both individuals and organizations within information systems has become imperative in contemporary times. Indeed, the imperative of secure information systems has become paramount in today’s digital landscape, wherein the repercussions of breaches and cyber attacks can be profound and far-reaching. As such, the development and implementation of robust security mechanisms within information systems are indispensable. Traditional security techniques have long served as the cornerstone of information security efforts, offering protection against a myriad of threats ranging from unauthorized access to data breaches. However, the burgeoning sophistication of cyber threats necessitates a continuous evolution in security strategies and methodologies.
One such evolutionary stride in the realm of information security involves the advent of secure information systems predicated on the principles of chaotic systems. Leveraging the dynamic characteristics inherent in chaotic systems engenders a novel paradigm for ensuring the security of information systems. Chaotic systems, characterized by sensitive dependence on initial conditions and deterministic unpredictability, offer a fertile ground for devising innovative encryption and authentication mechanisms. The inherent complexity and nonlinearity of chaotic systems furnish a formidable barrier against adversarial intrusion, thereby augmenting the resilience of secure information systems.
The exploration of secure information systems, underpinned by chaotic dynamics, represents a burgeoning frontier in information security research. The attempt to harness the intricate dynamics of chaotic systems for fortifying information systems against cyber threats holds immense promise and potential. Ongoing research activities in this domain are poised to yield novel breakthroughs, bolstering the efficacy and robustness of secure information systems.
The quest for enhancing the security of information systems encompasses a multifaceted approach, encompassing both theoretical investigations and practical implementations. Fundamental research activities delve into elucidating the underlying principles governing the dynamics of chaotic systems, discerning patterns amidst apparent randomness, and devising algorithms capable of harnessing chaotic dynamics for cryptographic purposes. Concurrently, applied research actions focus on integrating chaotic encryption techniques into real-world information systems, evaluating their efficacy, scalability, and compatibility with existing infrastructure.
The burgeoning proliferation of interconnected devices and the advent of the Internet of Things (IoT) further accentuate the exigency of secure information systems. As the fabric of our digital ecosystem becomes increasingly intricate and interconnected, the vulnerability surface susceptible to exploitation by malicious actors commensurately expands. In this context, the integration of chaotic encryption techniques offers a salient avenue for bolstering the security posture of IoT devices and networks, mitigating the risks associated with cyber attacks and unauthorized access.
In this section, an application to the proposed oscillator will be considered, especially to secure communications problems. Before we begin, we need to provide a brief introduction to
- Banach spaces. Let
f be a continuous function, the norm of
g is given by
The function
is said to satisfy the Lipschitz condition if there exists a positive integer
such that for every
we have
Because the oscillator (
2) has no linear term, we inject the linear term
which is the transmitted signal. As a result, we consider the following system:
where
,
the measurable output,
are the coefficients of the transmitted signal. The matrices
and
are appropriate dimensions. In order to successfully estimate the input signal and proceed with synchronization, we reformulate the system as follows:
and
with
The state
is estimated by an observer constructed for the system (
27). Thus, we can achieve synchronization and input estimation.
In order to continue the process, we assume the following:
Let n be the number of columns of matrix M, rank Therefore, due to the form of matrix M, it is equivalent to .
The non-linear parts satisfy the Lipschitz condition
where
is positive integer number.
Note that assumption (B) includes a broad spectrum of systems; even for ones not satisfying Lipschitz’s condition “globally”, the constant
can be obtained for systems which are satisfying the Lipschitz condition “locally”. Due to the mentioned assumptions, our aim here is to design an observer for system (
27), which is given by:
and
where
are the matrices computed via
such that
We apply the method in [
26] to obtain the observer matrices:
The matrix
K computation can be carried out by the procedure shown in [
26];
Compute the matrices
and
by
considering the solvability of the LMI
for
If
W is solvable, then the matrices of the observer are:
This way, the observer (
29) can synchronize with system (
26).
Theorem 4. Let The necessary condition for the solvability of W is Proof. To satisfy Theorem 4, it easy to check that it is based on the structure of we need to counteract the lack of linear terms by adding more outputs. □
Simulation Study
For implementing the simulation, we take
and
,
and
Assume that the initial conditions are:
and
Again, we assume that
is the transmitted signal.
Figure 6 shows the simulation results starting from an equilibrium point. It is evident that the observer is able to accurately assess the incoming signal and states. The simulation is carried out by the Matlab 2019 platform codes in [
27].