67 research outputs found

    Chaos-based communication scheme using proportional and proportional-integral observers

    Get PDF
    In this paper, we propose a new chaos-based communication scheme using the observers. The novelty lies in the masking procedure that is employed to hide the confidential information using the chaotic oscillator. We use a combination of the addition and inclusion methods to mask the information. The performance of two observers, the proportional observer (P-observer) and the proportional integral observer (PI-observer) is compared that are employed as receivers for the proposed communication scheme. We show that the P-observer is not suitable scheme since it imposes unpractical constraints on the messages to be transmitted. On the other hand, we show that the PI-observer is the better solution because it allows greater flexibility in choosing the gains of the observer and does not impose any unpractical restrictions on the message

    Design and Implementation of Secure Chaotic Communication Systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal

    Secure communication based on indirect coupled synchronization

    Get PDF
    In this paper, a secure communication system composed of four chaotic oscillators is proposed. Two of these oscillators are unidirectionally coupled and employed as transmitter and receiver. The other two oscillators are indirectly coupled and are employed as keystream generators. The novelty lies in the generation of the same chaotic keystream both in the transmitter and receiver side for encryption and decryption purposes. We show, in particular, that it is possible to synchronize the two keystream generators even though they are not directly coupled. So doing, an estimation of the keystream is obtained allowing decrypting the message. The main feature of the proposed communication scheme is that the keystream cannot be generated with the sole knowledge of the transmitted chaotic signal, hence making it very secure. The performance of the proposed communication scheme is shown via simulation using the Chua and Lorenz oscillators

    Implementation of a secure digital chaotic communication scheme on a DSP board

    Get PDF
    In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digital signals is proposed and which is then implemented on a Digital Signal Processor (DSP) board. The method uses the idea of indirect coupled synchronization for generating the same keystream in the transmitter and receiver side. This chaotic keystream is applied to encrypt the message signal before being modulated with a chaotic carrier generated from the transmitter. Discrete chaotic maps, 3D Henon map and Lorenz system are used as transmitter/receiver and key generators respectively. The overall system is experimentally implemented in the TMS320C6713 DSK board using code composer and Simulink showing the successful message extraction thus proving the feasibility of the system in the DSP board

    EVALUATION OF ANTIOXIDANT POTENTIAL AND QUANTITATIVE ESTIMATION OF PHENOLIC AND FLAVONOID CONTENT IN SOME SELECTED NEPALESE MEDICINAL PLANTS

    Get PDF
    Objective: The aim of this study is to evaluate the antioxidant potential, determination of total phenolic and flavonoid content in nine selected medicinal plants Spondias pinnata, Melia azedarach, Ageratina adenophora, Urtica dioica, Curcuma longa, Bauhinia variegata, Elaeocarpus angustifolius Blume, Achyranthes aspera, and Psidium guajava from Kavre district of Nepal using in vitro studies. Methods: Methanolic plant extracts were prepared by cold percolation method. The methanol extract of nine medicinal plants collected from Kavre district of Nepal, was screened for assessing bioactive phytoconstituents followed by antioxidant property, total phenolic, and flavonoid content. Different plants collected were powdered and extracted with methanol, concentrated by a rotatory evaporator and analyzed for the presence of phytochemicals. The antioxidant potential of the plant extracts was evaluated by 2,2-diphenyl-1-picrylhydrazyl (DPPH) radical scavenging assay. Results: The phytochemical analysis of methanolic extracts of all nine medicinal plants displayed the presence of various secondary metabolites such as alkaloids, flavonoids, polyphenols, saponins, and quinones. The extract of S. pinnata showed the highest percentage of radical scavenging activity up to 87.94±1.88 with 50% inhibitory concentration (IC50) 17.51±1.27 μg/mL, followed by B. variegata, 80.63±1.06 with IC50 value 26.55±2.61 μg/mL. The standard, ascorbic acid has IC50 value of 20.13±1.17 μg/mL. Further, the ethyl acetate fraction of S. pinnata showed the maximum percentage of radical scavenging (85.92±1.37) with IC50 value of 46.95±1.17 μg/mL. Moreover, S. pinnata displayed the highest total phenolic content (TPC) 48.26±1.23 mg GAE/g (milligram gallic acid equivalent per gram) extract while the highest flavonoid content was displayed by Melia azedarach 41.07±1.53 mg QE/g (milligram quercetin equivalent per gram) extract measured by the Folin–Ciocalteu reagent method and aluminum chloride colorimetric method. Conclusions: The preliminary results of this study have put forward the extract of S. pinnata showed the highest percentage of radical scavenging activity and S. pinnata displayed the highest TPC while the highest flavonoid content was displayed by Melia azedarach methanolic extracts although the further studies are needed to assess its mechanism of action

    Smart street lighting over narrowband PLC in a smart city: The Triangulum case study

    Get PDF
    As municipalities continue to embrace digital revolution in a bid to become smarter cities, the unique intersection between ICT and development road map is inspiring new innovative applications. While this quest for smart city continues, the transformation of street lighting has become a topical issue. As part of ongoing investigation in Triangulum smart city project, this paper presents some simulation results on the use of narrowband powerline communication (NPLC) for street lights monitoring and control. The results show that, with low power, NPLC can support a 3.5km network of street lights without using a relay. It is also shown that, when the data packet size quadruples, latency degrades by up to 22.63% (242.03ms) in the worst case

    A novel chaotic encryption technique for secure communication

    Get PDF
    Abstract: In this work, a novel chaotic encryption technique is proposed to realize a secure communication system. In the proposed method, the message signal to be transmitted is first encrypted using a chaotic keystream and then masked with a chaotic signal. At the receiver end, the received chaotic signal is used for synchronization and to recover the encrypted signal. After applying the same keystream used in transmitter side, the message signal could be decrypted back. The main contribution of this work is generation of the keystream which is not part of the transmitter chaotic oscillator but is produced using an oscillator of different structure

    Design and implementation of secure chaotic communication systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Mapping cyber-enabled roles to CyBOK knowledge areas through cooperative inquiry (mapping booklet)

    Get PDF
    The Cyber Security Body of Knowledge (CyBOK) is a valuable resource that aims to structure established knowledge related to Cyber Security. In this funded Outreach, Adoption, and Awareness project, we aimed to map cyber-enabled roles to the CyBOK using participatory methods. This booklet presents summarised findings from a funded Outreach, Adoption, and Awareness project for version 1.1 of the CyBOK. The project was titled 'Mapping cyber-enabled roles to CyBOK knowledge areas through cooperative inquiry' and involved the delivery of mapping workshops and the development of resources based on the findings of these workshops. Cyber-enabled roles in the context of this booklet means anyone who uses digital technologies in their work. The term is derived from the 2022 Cyber Skills in the UK Labour Market government report. Though we did adopt a slightly broader definition in this project to avoid discouraging anyone from participating. A mapping workshop was held at the University of Central Lancashire in Preston. This workshop was inspired by participatory arts-based research. In the workshop, participants formed groups based on their roles, and then mapped these joint roles to CyBOK knowledge areas

    Mapping cyber-enabled roles to CyBOK knowledge areas through cooperative inquiry

    Get PDF
    Background: The UK Cyber Skills Gap stifles economic growth and amplifies the risk of cyber-attacks. The gap is known to be an issue for cyber-enabled practitioners – whose primary responsibilities are not related to Cyber Security – as well as practitioners whose primary responsibilities are related to Cyber Security. Objective: We aim to map cyber-enabled job roles to knowledge areas within the Cyber Security Body of Knowledge (CyBOK). In doing so, we aim to raise awareness and adoption of the CyBOK amongst cyber-enabled practitioners, which will help to address the UK Cyber Skills Gap. Method: We held a mapping workshop with cyber-enabled practitioners and worked together to map their job roles to the CyBOK. After the workshop, we created resources and held a showcase event to disseminate the mappings to a wider audience of cyber-enabled practitioners. Results: We present the mappings as results alongside an evaluation of the mapping workshop we held. Together, these results demonstrate the value of holding further mapping workshops (using session plans and supplementary resources we have created). Conclusion: Further work is needed to build upon the preliminary mappings presented in this report. We recommend that the workshop resources we have developed and trialed are used to co-produce mappings with a greater quantity and variety of cyber-enabled practitioners
    corecore