1,686 research outputs found

    Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA

    Get PDF
    Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons. The contribution is focused on finding suitable coefficient values of the neurons to generate robust random binary sequences that can be used in image encryption. This task is performed by evaluating the bifurcation diagrams from which one chooses appropriate coefficient values of the mathematical models that produce high positive Lyapunov exponent and Kaplan–Yorke dimension values, which are computed using TISEAN. The randomness of both the Hopfield and the Hindmarsh–Rose neurons is evaluated from chaotic time series data by performing National Institute of Standard and Technology (NIST) tests. The implementation of both neurons is done using field-programmable gate arrays whose architectures are used to develop an encryption system for RGB images. The success of the encryption system is confirmed by performing correlation, histogram, variance, entropy, and Number of Pixel Change Rate (NPCR) tests

    Application of observer-based chaotic synchronization and identifiability to original CSK model for secure information transmission

    Get PDF
    International audienceThe modified Lozi system is analyzed as chaotic PRNG and synchronized via observers. The objective of the study is to investigate chaotic-based encryption method that preserves CSK model advantages, but improves the security level. The CSK model have been discussed to message encryption because it implies better resistance against noise, but there are many evidences of the model weaknesses. The investigation provides the original CSK model analyses of secure message transmission over the communication channel by examining identifiability and observability; switched regimes detection; sensitivity to initial conditions and session key; NIST tests of the encrypted signal; correlation between wrong decrypted messages; system ergodicity. The proposed model has a significant effect on the security level of the transmitted signal that successfully passed chaotic and randomness tests. The results suggest that the original CSK model can be used for information security applications

    Chaotic Encryption Applied to Optical Ethernet in Industrial Control Systems

    Get PDF
    In the past decades, Ethernet has become an alternative technology for the field buses traditionally used in industrial control systems and distributed measurement systems. Among different transmission media in Ethernet standards, optical fiber provides the best bandwidth, excellent immunity to electromagnetic interference, and less signal loses than other wired media. Due to the absence of a standard that provides security at the physical layer of optical Ethernet links, the main motivation of this paper is to propose and implement the necessary modifications to introduce encryption in Ethernet 1000Base-X standard. This has consisted of symmetric streaming encryption of the 8b10b symbols flow at physical coding sublayer level, thanks to a keystream generator based on chaotic algorithm. The overall system has been implemented and tested in an field programmable gate array and Ethernet traffic has been encrypted and transmitted over an optical link. The experimental results show that it is possible to cipher traffic at this level and hide the complete Ethernet traffic pattern from passive eavesdroppers. In addition, no space overhead is introduced in data frames during encryption, achieving the maximum throughput

    Chaotic Encryption Applied to Optical Ethernet in Industrial Control Systems

    Full text link
    In the past decades, Ethernet has become an alternative technology for the field buses traditionally used in industrial control systems and distributed measurement systems. Among different transmission media in Ethernet standards, optical fiber provides the best bandwidth, excellent immunity to electromagnetic interference, and less signal loses than other wired media. Due to the absence of a standard that provides security at the physical layer of optical Ethernet links, the main motivation of this paper is to propose and implement the necessary modifications to introduce encryption in Ethernet 1000Base-X standard. This has consisted of symmetric streaming encryption of the 8b10b symbols flow at physical coding sublayer level, thanks to a keystream generator based on chaotic algorithm. The overall system has been implemented and tested in an field programmable gate array and Ethernet traffic has been encrypted and transmitted over an optical link. The experimental results show that it is possible to cipher traffic at this level and hide the complete Ethernet traffic pattern from passive eavesdroppers. In addition, no space overhead is introduced in data frames during encryption, achieving the maximum throughput

    Low-Cost Inventions and Patents

    Get PDF
    Inventions have led to the technological advances of mankind. There are inventions of all kinds, some of which have lasted hundreds of years or even longer. Low-cost technologies are expected to be easy to build, have little or no energy consumption, and be easy to maintain and operate. The use of sustainable technologies is essential in order to move towards a greater global coverage of technology, and therefore to improve human quality of life. Low-cost products always respond to a specific need, even if no in-depth analysis of the situation or possible solutions has been carried out. It is a consensus in all industrialized countries that patents have a decisive influence on the organization of the economy, as they are a key element in promoting technological innovation. Patents must aim to promote the technological development of countries, starting from their industrial situations

    Engineering Emergence: A Survey on Control in the World of Complex Networks

    Get PDF
    Complex networks make an enticing research topic that has been increasingly attracting researchers from control systems and various other domains over the last two decades. The aim of this paper was to survey the interest in control related to complex networks research over time since 2000 and to identify recent trends that may generate new research directions. The survey was performed for Web of Science, Scopus, and IEEEXplore publications related to complex networks. Based on our findings, we raised several questions and highlighted ongoing interests in the control of complex networks.publishedVersio

    Design and implementation of application-specific medium access control protocol for scalable smart home embedded systems

    Get PDF
    Thesis (M.S.) University of Alaska Fairbanks, 2016By incorporating electrical devices, appliances and house features in a system that is controlled and monitored either remotely or on-site, smart home technologies have recently gained an increasing popularity. There are several smart home systems already available, ranging from simple on-site home monitoring to self-learning and Wi-Fi enabled systems. However, current systems do not fully make use of recent technological advancement and synergy among a variable number of sensors for improved data collection. For a synergistic system to be provident it needs to be modular and scalable to match exact user needs (type of applications and adequate number of sensors for each application). With an increased number of sensors intelligently placed to optimize the data collection, a wireless network is indispensable for a flexible and inexpensive installation. Such a network requires an efficient medium access control protocol to sustain a reliable system, provide flexibility in design and to achieve lower power consumption. This thesis brings to light practical ways to improve current smart home systems. As the main contribution of this work, we introduce a novel application-specific medium access control protocol able to support suggested improvements. In addition, a smart home prototype system is implemented to evaluate the protocol performance and prove concepts of recommended advances. This thesis covers the design of the proposed novel medium access protocol and the software/hardware implementation of the prototype system focusing on the monitoring and data analysis side, while providing inputs for the control side of the system. The smart home system prototype is Wi-Fi and Web connected, designed and implemented to emphasize system usability and energy efficiency
    • …
    corecore