Secure point-to-point communication using chaos
نویسندگان
چکیده
منابع مشابه
A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملPoint-to-Point versus Mobile Wireless Communication Channels 1.1 BANDPASS MODEL FOR POINT-TO-POINT COMMUNICATIONS
Most point-to-point communication links (e.g., the telephone line channel, fixed microwave channels, etc.) are well-modeled using a bandpass additive noise system model of the form shown in Figure 1.1. All the signals in this model are written with “tildas” which will be dropped in the complex baseband representation of the following section. A more detailed description of the link model is as ...
متن کاملRound-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poor round complexity when compiled for a point-to-point network due to the high overhead of emulating each invocation of broadcast. This problem is compounded when broadcast is used in more than one round of the origina...
متن کاملFood chain chaos due to transcritical point.
Chaotic dynamics of a classical prey-predator-superpredator ecological model are considered. Although much is known about the behavior of the model numerically, very few results have been proven analytically. A new analytical result is obtained. It is demonstrated that there exists a subset on which a singular Poincare map generated by the model is conjugate to the shift map on two symbols. The...
متن کاملSecure and Efficient Communication Method in Rogue Access Point Environments
WiFi networks, which have been widely used along with the explosive increases in the supply of smartphones, can provide high network speeds but cannot prevent user information spills though rogue Access Points (APs). Therefore, the present paper proposes a method to exchange SSL session keys through more secure 3G networks to be used in WiFi networks in order to prevent such spills. In the prop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DYNA
سال: 2016
ISSN: 2346-2183,0012-7353
DOI: 10.15446/dyna.v83n197.53506