Secure encryption and decryption method and system
11424906 · 2022-08-23
Assignee
Inventors
- Ubaid M. Al-Saggaf (Jeddah, SA)
- Muhammad Moinuddin (Jeddah, SA)
- Asmaa Ubaid Alsaggaf (Jeddah, SA)
- Maamar BETTAYEB (Sharjah, AE)
- Said Djennoune (Tizi-Ouzou, DZ)
Cpc classification
G09C1/00
PHYSICS
International classification
H04L9/00
ELECTRICITY
Abstract
Memristor based chaotic oscillators exhibit complex dynamics. They are often chosen for secure communication owing to their interesting feature. In chaos-based secure communication applications using the master-slave configuration, synchronization is a central issue. Most of the synchronization methods proposed in the literature are asymptotic. In practice, it is desirable that synchronization be established in a predefined time. This invention provides new developments in the design of high-gain observers with an unknown input dedicated for predefined-time synchronization of memristor based chaotic systems. The proposed predefined-time extended high gain observer is constructed on the basis of a time-dependent coordinates transformation based on modulating functions that annihilate the effect of initial conditions on the synchronization time. Both noise-free channel and noisy channel are considered. Simulations performed on a numerical example illustrated the efficiency of proposed approaches.
Claims
1. A secure encryption-decryption system comprising: an emitter comprising: an encryptor configured to generate a chaotic signal including a confidential message, and to modulate the generated chaotic signal; a single channel over which the modulated chaotic signal is communicated from the emitter; and a receiver to receive the modulated chaotic signal from the single channel, the receiver comprising: a decryptor configured to construct an unknown input high-gain observer with single-channel predefined-time synchronization to demodulate the received modulated chaotic signal to output the confidential message, wherein the emitter comprises a chaotic emitter including a memristive chaotic oscillator, and wherein the confidential message is injected into the chaotic signal in a derivative of a third state variable of the chaotic emitter.
2. The secure encryption-decryption system according to claim 1, wherein the decryptor estimates the derivative of the third state variable of the chaotic emitter in outputting the confidential message.
3. The secure encryption-decryption system according to claim 2, wherein the decryptor further executes a Runge-Kutta algorithm with a sampling step in demodulating the received modulated chaotic signal.
4. The secure encryption-decryption system according to claim 3, wherein the unknown input high-gain observer is activated to demodulate after an activation time.
5. The secure encryption-decryption system according to claim 4, wherein initial conditions of the decryptor are set to zero, and the activation time is a predetermined set time.
6. The secure encryption-decryption system according to claim 5, wherein the decryptor performs demodulation based on a selected modulation function as a positive increasing function with no zero-crossing and that implements first and second coordinate transformations.
7. The secure encryption-decryption system according to claim 6, wherein the decryptor further sets an observer gain by choosing stable poles and determining the observer gain by a pole placement procedure.
8. The secure encryption-decryption system according to claim 5, wherein the modulated chaotic signal from the encryptor includes additive noise, and the decryptor performs demodulation based on a selected modulation function as a positive increasing function with no zero-crossing and that implements first and second coordinate transformations.
9. A secure encryption-decryption method, comprising: emitting information with an emitter, the emitting comprising: generating, by an encryptor, a chaotic signal including a confidential message and modulating the generated chaotic signal; communicating, over a single channel, the modulated chaotic signal from the emitter; and receiving, at a receiver, the modulated chaotic signal from the single channel, the receiving comprising: constructing, by a decryptor, an unknown input high-gain observer with single-channel predefined-time synchronization and demodulating the received modulated chaotic signal to output the confidential message, wherein the emitter comprises a chaotic emitter including a memristive chaotic oscillator, and wherein during the generating the confidential message is injected into the chaotic signal in a derivative of a third state variable of the chaotic emitter.
10. The secure encryption-decryption method according to claim 9, wherein the constructing, in the decryptor, estimates the derivative of the third state variable of the chaotic emitter in outputting the confidential message.
11. The secure encryption-decryption method according to claim 10, wherein the constructing, in the decryptor, further executes a Runge-Kutta algorithm with a sampling step in demodulating the received modulated chaotic signal.
12. The secure encryption-decryption method according to claim 11, wherein the unknown input high-gain observer is activated to demodulate after an activation time.
13. The secure encryption-decryption method according to claim 12, wherein initial conditions of the decryptor are set to zero, and the activation time is a predetermined set time.
14. The secure encryption-decryption method according to claim 13, wherein the constructing, in the decryptor, performs demodulation based on a selected modulation function as a positive increasing function with no zero-crossing and that implements first and second coordinate transformations.
15. The secure encryption-decryption method according to claim 14, wherein the constructing, in the decryptor, further sets an observer gain by choosing stable poles and determining the observer gain by a pole placement procedure.
16. The secure encryption-decryption method according to claim 13, wherein the modulated chaotic signal from the encryptor includes additive noise, and the constructing, in the decryptor, performs demodulation based on a selected modulation function as a positive increasing function with no zero-crossing and that implements first and second coordinate transformations.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) A more complete appreciation of this disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)
(37)
(38)
(39)
(40)
(41)
(42)
(43)
(44)
(45)
(46)
(47)
(48)
DETAILED DESCRIPTION
(49) In the drawings, like reference numerals designate identical or corresponding parts throughout the several views. Further, as used herein, the words “a,” “an” and the like generally carry a meaning of “one or more,” unless stated otherwise.
(50) Furthermore, the terms “approximately,” “approximate,” “about,” and similar terms generally refer to ranges that include the identified value within a margin of 20%, 10%, or preferably 5%, and any values therebetween.
(51) Aspects of this disclosure are directed to a system, device, and method for secure encryption and decryption based on fixed-time synchronization of memristor chaotic systems. The disclosure provides a solution to a single-channel predefined-time synchronization of memristive chaotic systems by considering a challenge of recovering a secret message and taking into account noise in a transmission channel. The disclosure provides modulating function methods and systems used as annihilators of initial conditions. Also, the disclosure provides a fixed-time extended high-gain observer that converges in a fixed time, instantaneously as a deadbeat observer. The disclosure enables choosing a settling time that can be arbitrarily chosen independently of unknown initial conditions and system parameters.
(52) A memristor (also known as memory resistor) is a non-volatile electronic memory device belonging to a fourth class of electrical circuit that combines a resistor, a capacitor, and an inductor, that exhibit their unique properties primarily at a nanoscale. Memristors are divided in two classes: voltage-controlled memristors and flux-controlled memristors. Memristor based electronic oscillators are classified as nonlinear dynamical systems called memristive systems. Memristor based chaotic oscillators exhibit more complex dynamics and are often chosen for secure communication due to their interesting features. In a memristor based Chua's system, a classical piecewise linear Chua's diode is replaced by a flux-controlled memristor to generate a chaotic behavior. A relation between the charge q and the flux φ is modeled by a following nonlinear cubic function
q(Ø)=aØ+bØ.sup.3 (1)
where a and b are positive constants. A memristance W(Ø) is obtained by:
(53)
(54)
In an aspect, introducing following state variables x.sub.1(t)=v.sub.1(t), x.sub.2(t)=v.sub.2(t), x.sub.3(t)=i.sub.L(t), and x.sub.4(t)=ϕ(t), the circuit is modeled using following nonlinear dynamical system.
{dot over (x)}.sub.1(t)=α(ξ−1)x.sub.1(t)+αx.sub.2(t)−αW(x.sub.4(t))x.sub.1(t)
{dot over (x)}.sub.2(t)=x.sub.1(t)−x.sub.2(t)−x.sub.3(t)
{dot over (x)}.sub.3(t)=−βx.sub.2(t)+γx.sub.3(t)
{dot over (x)}.sub.4(t)=x.sub.1(t); (3)
with W(x.sub.4(t))=a+3bx.sub.4.sup.2(t). Further, the numerical values of parameters are set to
(55)
For these values of parameters, the circuit of
(56) In an aspect, the chaotic behavior of the Chua's memristive chaotic oscillator is used for encrypting secret information that is sent from an emitter to a receiver. In a conventional inclusion method, a confidential message is injected in a derivative of a state variable of the chaotic emitter at the emitter side. An amplitude of the message is chosen sufficiently small so that a chaotic behavior is not required to be altered. A different state is chosen for a transmitted signal output. Also, the transmitted signal in the conventional inclusion method does not carry any information of the secret message and any information of key parameters.
(57)
{dot over (x)}(t)=f(x(t))+Bm(t)
y(t)=h(x); (4)
where x(t)=[x.sub.1(t) x.sub.2(t) x.sub.3(t) x.sub.4(t)].sup.T∈.sup.n, n=4, with initial condition x.sub.0=x(t.sub.0) and B=[0 0 1 0].sup.T, h(x)=x.sub.4(t),
f(x)=[α(ξ−1)x.sub.1+αx.sub.2−αW(x.sub.4)x.sub.1x.sub.1−x.sub.2+x.sub.3−βx.sub.2+γx.sub.3x.sub.1].sup.T; (5)
(58) In a non-ideal or practical environment, there is an additive noise w(t) 310 (referred to as noise signal) in the channel 308 connecting the emitter 304 (master) to a receiver 314 (slave). Due to the additive noise, y(t) gets corrupted and becomes y.sub.m(t)=y(t)+w(t). In an ideal case of having a noiseless channel, the signal transmitted to the receiver 314 is y.sub.m(t)=y(t). The modulated chaotic signal (corrupted signal or non-corrupted signal) is transmitted to the receiver 314. In an implementation, the receiver 314 is a fixed-time extended high gain observer. The receiver 314 is configured to receive the modulated chaotic signal from the single channel 308. The receiver 314 includes a decryptor 316 configured to construct an unknown input high-gain observer with single-channel predefined-time synchronization to demodulate the received modulated chaotic signal to output the confidential message m(t) 302. The decryptor 316 performs demodulation based on a selected modulation function as a positive increasing function with no zero-crossing and that implements first and second coordinate transformations. In an aspect, the decryptor 316 estimates the derivative of the third state variable of the emitter 304 to output the confidential message m(t) 302. In an aspect, the decryptor 316 executes a Runge-Kutta algorithm with a sampling step h in demodulating the received modulated chaotic signal (explained in detail below). Some definitions on finite-time, fixed-time and predefined-time stability used in the disclosure are provided below.
(59) Definition 1: In a system:
{dot over (X)}(t)=f(X(t)); (6)
where X(t)∈.sup.n denotes the system state with the initial condition X.sub.0=X(t.sub.0). An origin is assumed to at an equilibrium, i.e., f(0)=0. The origin is globally finite-time stable if it is globally asymptotically stable and if, for every initial condition X.sub.0∈
.sup.n, the solution X(t, X.sub.0) of (6) reaches the origin at some finite-time moment, i.e., X(t, X.sub.0)=0 ∀t≥T(X.sub.0) where T(X.sub.0):
.sup.n.fwdarw.
.sub.+ is called the settling time function.
(60) Definition 2. The origin of (6) is globally fixed-time stable if it is globally finite-time stable and if a settling time T(X.sub.0) is bounded, that is, there exists T.sub.max>t.sub.0 such that, for every initial condition X.sub.0∈.sup.n, T(X.sub.0)≤T.sub.max.
(61) Definition 3. The origin of (6) is globally predefined-time stable if it is globally fixed-time stable and if for a predefined time T.sub.p chosen in advance, the settling time is such that: T(X.sub.0)≤T.sub.p, ∀X.sub.0∈.sup.n. A concept of finite-time boundedness is an extension of finite-time stability of the system subject to an external input.
(62) Definition 4: A nonlinear system (4) is considered which represents a master system (or the emitter 304). A slave system (or receiver) corresponding to the master system can be described by as a following observer:
{circumflex over ({dot over (x)})}(t)=F({circumflex over (x)}(t),{circumflex over (m)}(t),y.sub.m(t),ŷ(t))
ŷ(t)=H({circumflex over (x)}(t))
{circumflex over (m)}(t)=G({circumflex over (x)}(t),y.sub.m(t)); (7)
(63) Then the master system (4) and the slave system (7) are said to be predefined-time synchronized with a preassigned synchronization settling time t.sub.a, if an estimation error e.sub.x(t)=x(t)−{circumflex over (x)}(t) is predefined-time stable, i.e. ∥e.sub.x(t)∥=0, ∀t≥t.sub.a for any initial conditions x.sub.0=x(t.sub.0) and {circumflex over (x)}.sub.0={circumflex over (x)}(t.sub.0) such that {circumflex over (x)}.sub.0≠x.sub.0. Systems based (4) and (7) are said to be predefined-time synchronized if there exists a positive constant such that the estimation error e.sub.x satisfies:
∥e.sub.x(t)∥=∥x(t)−{circumflex over (x)}(t)∥≤ϵ.sub.x,∀t≥t.sub.a; (8)
(64) Described below is a high-gain observer with classical linear action to achieve single channel predefined-time synchronization. The following lemmas are defined and used in the disclosure.
(65) Lemma 1. Consider a following linear system
ė(t)=A.sub.ee(t)+B.sub.ed(t); (9)
where e(t)∈.sup.n, e.sub.0=e(t.sub.0) is an initial condition, d(t) is a bounded disturbance such that |d(t)|≤D. The matrix A.sub.e as provided is a Hurwitz matrix. The Hurwitz matrix is a structured real square matrix constructed with coefficients of a real polynomial. Let V=e.sup.T(t)Pe(t) be a Lyapunov function where P is a positive definite matrix satisfying the Lyapunov equation:
A.sub.e.sup.TP+PA.sub.e=−I.sub.n (10)
where I.sub.n denotes the n×n identity matrix. Then there exist positive constants ρ.sub.i, i=0, 1, 2 such that e(t) is bounded as follows:
∥e.sub.x(t)∥≤max{ρ.sub.0e.sup.−ρ.sup.
Lemma 2: Consider matrices A∈.sup.n×n, C∈
.sup.1×n, for any given dimension n, defined in a Brunowski form as follows:
(66)
(67) Considering σ.sub.1 and σ.sub.2 be two fixed positive real numbers, and considering the following matrix:
(68)
where =diag{L.sub.i, i=
are Hurwitz matrices.
(69) In an aspect, modulating functions may be used to minimize or nullify an effect of initial conditions on estimation of state variables. The modulating function is defined as follows:
(70) Definition 5: Consider the positive real-valued function μ(t)∈C.sup.i−1: .sub.+.fwdarw.
.sub.+. Assume that μ(t) and its derivatives
(71)
satisfy vanishing conditions:
μ.sup.j(t.sub.0)=0 ∀j=0,1, . . . i−1
μ.sup.j(t)≠0 for t>t.sub.0, ∀j=0,1, . . . i−1, (14)
(72) It may be assumed that μ(t) and its derivatives μ.sup.j(t), j=0, 1, . . . , i are bounded. Based on the assumption, there may be positive constants M.sub.j, j=0, 1, 2, . . . , i such that |μ.sup.j(t)|≤M.sub.j, j=0, 1, 2, . . . , i, ∀t≥0, then μ(t) is called an −i-th order modulating function. The modulating function μ(t) is chosen as a positive increasing function so that μ(t.sub.0)=0 and t.fwdarw.∞μ(t)=A.sub.μ, where A.sub.μ denotes a finite constant. Besides, for all t>t.sub.0, modulating functions μ(t) have no zero-crossing. An example of such function is μ(t)=A.sub.μ(1−e.sup.−λ(t-t.sup.
(73) The system based on (4) with m(t) as the input and and the output y(t) has a relative degree r equal to its dimension, i.e., r=n=4. Considering the following coordinates transformation:
z.sub.i(t)=L.sub.f.sup.i−1h(x)=Φ.sub.i(x), i=1,2,3,4; (15)
where L.sub.f.sup.jh(x) denotes the j-th Lie derivative of the scalar function h(x) along the vector field f(x) defined as:
(74)
(75) The following is obtained:
Φ.sub.1(x)=x.sub.4
Φ.sub.2(x)=x.sub.1
Φ.sub.3(x)=α(ξ−1)x.sub.1+αx.sub.2−αW(x.sub.4)x.sub.1
Φ.sub.4(x)=α{1+α(ξ−1−W(x.sub.4)).sup.2}x.sub.1+αx.sub.3+α{α(ξ−1−W(x.sub.4))−1}x.sub.2−6αbx.sub.4x.sub.1.sup.2; (17)
(76) The Lie derivative is a function that evaluates a change of a tensor field along a flow defined by another vector field. Further, defining z=Φ(x), where Φ(x)=[Φ.sub.1(x) Φ.sub.2(x) Φ.sub.3(x) Φ.sub.4(x)].sup.T and z=[z.sub.1 z.sub.2 z.sub.3 z.sub.4].sup.T. Since
(77)
defines a global diffeomorphism in .sup.4. It is implied that inverse of z, that is x=Φ.sup.−1(z) exists everywhere in
.sup.4. The inverse mapping is given by:
(78)
where W(z.sub.1)=a+3bz.sub.1.sup.2. In the new coordinates, the system is provided in normal form as given by:
ż.sub..Math.(t)=z.sub.i+1(t), i=1,2,3
ż.sub.4(t)=ω(z)+αm(t)
y(t)=z.sub.1(t); (19)
where
ω(x)=α.sup.2{1+α(ξ−1−W(x.sub.4)).sup.2−12bx.sub.4x.sub.1}{(ξ−1.sub.w(x.sub.4))x.sub.1+x.sub.2}−12bα.sup.2(ξ−1−W(x.sub.4))x.sub.4x.sub.1.sup.2−6α.sup.2bx.sub.4x.sub.1x.sub.2−αβx.sub.2−6αβx.sub.1.sup.3+αγx.sub.3+α{α{ξ−1−W(x.sub.4)−1}}{x.sub.1−x.sub.2+x.sub.3}; (20)
and ω(z)=ω(Φ.sup.−1(z)). The following assumptions are used.
(79) Assumption 1: The map Φ(x) and its inverse Φ.sup.−1(z) are uniformly Lipschitz in a compact set ⊂
.sup.4, and in
.sub.z≡Φ(
), respectively, as a result, there exist positive constants L.sub.Φ and L.sub.Φ.sub.
(80)
(81) Chaotic systems are bounded in a compact invariant set ⊂
.sup.4. If the input m(t) is chosen sufficiently small so that the System defined (4) keeps its chaotic behavior, then its solutions x.sub.i(t), i=1, 2, 3, 4 ultimately converge towards an attractive set (strange attractor). An evaluation of the Lipschitz constant L.sub.Φ can be determined from (17) as follows. Since
(82)
denotes the Lipschitz constant of Φ.sub.i(x). The gradient
(83)
may be obtained from the expression of Φ.sub.i(x) given by (17). In some examples, constants L.sub.Φ.sub.
(84) Now, introduce the second coordinates transformation based on the modulating functions as follows:
ζ.sub.1(t)=α.sub.10μ(t)z.sub.1(t)
ζ.sub.2(t)=α.sub.21μ.sup.(1)(t)z.sub.1(t)+α.sub.20μ(t)z.sub.2(t)
ζ.sub.3(t)=α.sub.32μ.sup.(2)(t)z.sub.1(t)+α.sub.31μ.sup.(1)(t)z.sub.2(t)+α.sub.30μ(t)z.sub.3(t)
ζ.sub.4(t)=α.sub.43μ.sup.(3)(t)z.sub.1(t)+α.sub.42μ.sup.(2)(t)z.sub.2(t)+α.sub.41μ.sup.(1)(t)z.sub.3(t)+α.sub.40μ(t)z.sub.4(t); (22)
where α.sub.ji, j=
(85) The above transformation is provided by:
(86)
where ζ=[ζ.sub.1 ζ.sub.2 ζ.sub.3 ζ.sub.4].sup.T. Following the definition of the 4-th order modulating function μ(t), it can be observed that the inverse transformation z(t)=T.sup.−1(μ(t))ζ(t) always exists for all t>t.sub.0 and does not exist only for t=t.sub.0. Assume that the coefficients α.sub.ji satisfy the following relations:
(87)
(88) In a sequel, without loss of generality, a coefficient is given by: α.sub.j0=1, j=
{dot over (ζ)}.sub.1(t)=ζ.sub.2(t)+(1−α.sub.21)μ.sup.(1)(t)y(t)
{dot over (ζ)}.sub.2(t)=ζ.sub.3(t)+(α.sub.21−α.sub.32)μ.sup.(2)(t)y(t)
{dot over (ζ)}.sub.3(t)=ζ.sub.4(t)+(α.sub.32−α.sub.43)μ.sup.(3)(t)y(t)
{dot over (ζ)}.sub.4(t)=η(t)+α.sub.43μ.sup.(4)(t)y(t); (25)
where η(t)=μ(t)(ω(t)+αm(t)). From the above, initial conditions of variables ζ.sub.i, are forced to zero and therefore are known, i.e., ζ(t.sub.0)=0. The aforementioned property enables designing an observer with fixed-time convergence. In an aspect, the current approach involves designing a high-gain observer in ζ-coordinates that provides the estimate {circumflex over (ζ)} of the state ζ, and estimating {circumflex over (x)}(t) of the original state system x(t) as:
{circumflex over (x)}(t)=Φ.sup.−1(T.sup.−1(μ(t)){circumflex over (ζ)}(t)),∀t>t.sub.0; (26)
(89) Since, the matrix T(μ(t)) is not invertible only at t=t.sub.0, then, the observer works for t>t.sub.0. However, to avoid numerical singularities during the inversion of the matrix T(μ(t)), the unknown input high-gain observer may be activated after a delay that corresponds to an activation time. Otherwise, the observer approach includes considering the term η(t), commonly called as a total disturbance, as an additional state variable. Besides, following assumptions are considered.
(90) Assumption 2: The input m(t) and its first derivative are bounded, i.e., |m(t)|≤
(91)
The amplitude of m(t) is sufficiently small so that the chaotic behavior of the memristive system is maintained. The bounding and having a small amplitude for m(t) enables the encryption security.
(92) Assumption 3: The nonlinear function ω(x) is uniformly Lipschitz in ∈
.sup.4, i.e. |ω(x)−ω({circumflex over (x)})|≤L.sub.ω|x−{circumflex over (x)}|. From the expression of ω(x) given above, the Lipschitz constant L.sub.ω is evaluated as
(93)
An estimate of L.sub.ω can be obtained by numerical simulations.
(94) Assumption 4: The total disturbance (t) and its first derivative
(95)
are bounded and given by:
(96)
(97) For many conventional chaotic systems Assumption 4 is generally satisfied because the responses of chaotic systems are continuously differentiable and bounded. This assumption 4 is also valid for the memristor based chaotic system (4). Thus the term ω(x) is bounded in the compact domain ∈
.sup.4 in which system trajectories evolve. Furthermore, Assumption 2 is maintained and satisfied for functioning. Also, the Assumption 4 may not appear as a restriction for most of the practical applications. Further, the time derivative of η(t) depends on the state x(t), the input m(t) and on
(98)
In addition, the total disturbance η(t) is considered as an additional state variable to be estimated. The assumption that the derivative of η(t) is bounded, is considered in the extended observers design.
(99) Considering an ideal case of a noiseless or noise-free channel, a main result is given by the following theorem.
(100) Theorem 1: Consider the memristor chaotic system (4) meeting the Assumptions 1-4. A modulating function μ(t) satisfying conditions of Definition 5 is provided. An assumption is considered that μ(t) is a strictly increasing function with no zero crossing for t>t.sub.0. A predefined activation time t.sub.a is chosen such that the coordinates transformation T(μ(t)) given in (23) is sufficiently far from singularity for t≥t.sub.a. Considering the following extended high-gain observer:
(101)
where {circumflex over (ζ)}(t)=[{circumflex over (ζ)}.sub.1(t) {circumflex over (ζ)}.sub.2(t) {circumflex over (ζ)}.sub.3(t) {circumflex over (ζ)}.sub.4(t)].sup.T. The initial conditions of (28) are fixed to zero, i.e., {circumflex over (ζ)}.sub.1(t.sub.0)=0, i=
s.sup.5+k.sub.1s.sup.5+k.sub.2s.sup.3+k.sub.3s.sup.2+k.sub.4s+k.sub.5. (31)
(102) There exist ϵ*∈(0 1] and some positive constants ρ.sub.x>0, ρ.sub.m>0, such that for 0<ϵ<ϵ*, the estimation errors e.sub.x(t)=x(t)−{circumflex over (x)}(t), and e.sub.m(t)=m(t)−{circumflex over (m)}(t) provided by the extended high-gain observer are immediately bounded in the predefined time t.sub.a, that is:
∥e.sub.x(t)∥≤ϵ.sup.2ρ.sub.x, ∀t>t.sub.a
|e.sub.m(t)|≤ϵρ.sub.m, ∀t>t.sub.a; (32)
(103) The estimation error obtained by classical conventional high-gain observer, is ultimate bounded. In contrast, the estimation error obtained by the fixed-time extended high-gain observer of the disclosure is immediately bounded after the activation time t.sub.a. In other words, the fixed-time extended high-gain observer acts as a deadbeat observer. State variables are estimated with an error bounded by ϵ.sup.2ρ.sub.x. By Definition 4, System as described in (4) and the fixed-time extended high-gain observer are Ex predefined-time synchronized with the settling time t.sub.a where ϵ.sub.x=ϵ.sup.2ρ.sub.x.
(104) In the synchronization schemes based on the master-slave configuration, the presence of noise generated by the transmission channel is natural and expected. This noise affects the performance of the observer and can obliterate the synchronization process. The major drawback of the high-gain observer is its sensitivity to noise. Even if the conventional standard high-gain observer has to be Input State Stable (ISS) with respect to measurement noise, the estimation error due the noise w(t) is proportional to
(105)
So, a small value needed to attenuate the uncertainties and external disturbances yields to large estimation errors. A filtered high-gain observer design is disclosed to improve robustness of the observer against output measurement noise. The high-gain observer design is based on the implementation of two cascade n-dimensional systems. Further, a filtered fixed-time extended high-gain observer is described in the disclosure. An assumption is made that the transmitted output is corrupted by an additive noise signal that is y.sub.m(t)=y(t)+w(t).
(106) Assumption 5: The noise signal w(t) is bounded, |w(t)|≤D.sub.w.
(107) The proposed new filtered fixed-time extended high-gain observer is given by the following theorem.
(108) Theorem 2: Consider the memristor chaotic system (4) meeting the Assumptions 1-5. A modulating function μ(t) satisfying conditions of Definition 5 is provided. An assumption is considered that μ(t) is a strictly increasing function with no zero crossing for t>t.sub.0. A predefined activation time t.sub.a is chosen such that the coordinates transformation T(μ(t)) given in (23) is sufficiently far from singularity for t≥t.sub.a. Consider the following filtered extended high-gain observer.
(109)
where {circumflex over (ζ)}(t)=[{circumflex over (ζ)}.sub.1(t) {circumflex over (ζ)}.sub.2(t) {circumflex over (ζ)}.sub.3(t) {circumflex over (ζ)}.sub.4(t)].sup.T. The initial conditions of (33) are fixed to zero, i.e., {circumflex over (ζ)}.sub.1(t.sub.0)=0, i=
∥e.sub.x(t)∥≤{tilde over (ρ)}.sub.x1D.sub.w+{tilde over (ρ)}.sub.x2D.sub.1, ∀t>t.sub.a
|e.sub.m(t)|≤{tilde over (ρ)}.sub.m1D.sub.w+{tilde over (ρ)}.sub.m2D.sub.1, t>t.sub.a; (36)
(110) According to the definition of the modulating function μ(t), the derivatives μ.sup.j(t), j=1, 2, . . . tend towards zero as t goes to infinity while μ(t) asymptotically tends to a constant. More precisely, after the activation time t.sub.a, the derivatives of the modulating function become very small. Furthermore, the parameter k is chosen sufficiently large, (k>>1). In other words, only the dominant multiplicative term of the noise in .sub.N is kσ.sub.2μ(t) can be made small by an adequate choice of the parameter σ.sub.2. Increasing the gain k enables reduction of the influence of the total disturbance η(t). In the presence of noise, the steady state estimation error provided by the unfiltered standard high-gain observer is proportional to
(111)
In this case, there is no means for simultaneously attenuating the effect of noise and that of the total disturbance. On the other hand, the filtered observer offers a way to assure an adjustable bounded estimation error in the presence of both noise and total disturbance. This is possible by properly adjusting the observer gains, k, σ.sub.1, and σ.sub.2.
(112) In an aspect, the secure chaos-based encryption-decryption protocol in the noisy channel case is summarized by the following steps. For the noise free channel case, the fixed-time filtered extended high-gain observer is replaced by a fixed-time extended high-gain observer with appropriate parameters in the following steps. Otherwise, the procedure is the same for both cases.
(113) Encryption Steps (Emitter Side)
(114) Step 1: Given the secrete message m(t) and all parameters α, β, γ, ξ, a, b of the memristor chaotic system (4) with initial condition, x.sub.i(t.sub.0), i=1, 2, 3, 4.
(115) Step 2: Solve the memristor based chaotic system (4) with the Runge-Kutta method with a sampling step h. Runge-Kutta method is a technique for solving initial value problems of differential equations.
(116) Step 3: Generate the encryption signal y(t)=x.sub.4(t).
(117) Step 4: Send y(t) through the public channel.
(118) Decryption Steps (Receiver Side)
(119) Step 1: Select the modulating function (t) and the coefficients α.sub.ji, j=
(120) Step 2: Selection of the observer parameters: Choose any σ.sub.1, σ.sub.2>0. Choose stable poles λ.sub.ji, i=
(121) Step 3: Initialize the values of ζ.sub.i(t.sub.0) and κ.sub.1(t.sub.0)=0, i=
(122) Step 4: Once the measurement y.sub.m(t) is received, solve the filtered fixed-time extended high-gain observer (33) by the Runge-Kutta method with the sampling step h.
(123) Step 5: Compute {circumflex over (x)}(t) and {circumflex over (m)}(t) by (34) and (35), respectively.
(124) Runge-Kutta method with the sampling step h (or referred to as fourth-order Runge-Kutta method) is given by:
(125)
(126) Preliminary Results:
(127) All numerical simulations are carried out using the fourth-order Runge-Kutta method with adaptive step size. The initial time is set to zero, t.sub.0=0. In an example, the secret message signal m(t) is taken as m(t)=Σ.sub.j=1.sup.6a.sub.i cos(ω.sub.it+θ.sub.i) with (a.sub.1, ω.sub.1, θ.sub.1)=(0.01, 5, 4), (a.sub.i2, ω.sub.2, θ.sub.2)=(0.03, 8, 6), (a.sub.3, ω.sub.3, θ.sub.3)=(0.01, 10, 8), (a.sub.4, ω.sub.4, θ.sub.4)=(0.02, 12, 5), (a.sub.5, ω.sub.5, θ.sub.5)=(0.05, 15, 6), (a.sub.6, ω.sub.6, θ.sub.6)=(0.01, 20, 7). This m(t) signal is plotted in
(128) Noise Free Case:
(129) The initial conditions of the drive (master) system are x(0)=[10.sup.−10 0 0 −0.515].sup.T while those of the response (slave) system are set at zero. The activation time is fixed as t.sub.a=0.5 s. The zeros of the polynomial (31) are chosen all equal to −1 which implies that k.sub.1=k.sub.4=5, k.sub.2=k.sub.3=10, k.sub.5=1. The parameter ϵ is chosen as ϵ=0.001. The synchronization of the state x(t) of a drive system and the state {circumflex over (x)}(t) of the response system is depicted in
(130)
(131)
(132)
where N denotes the number of samples. This small error value means that the decrypted signal is substantially proximate to the original signal. The activation time may be arbitrary chosen to be sufficiently small. The only condition which the choice of the activation time t.sub.a is to avoid numerical singularities in the inversion of the matrix T(μ(t)). Simulation results for short activation time, namely t.sub.a=0.1 s, are illustrated in
(133) To highlight the efficiency of the observer of the disclosure,
(134) The synchronization achieved by the observer of the disclosure is almost instantaneous without the presence of transient response, whatever the initial estimation errors are relatively large as depicted in
(135) To highlight the merit of the proposed predefined-time synchronization method, a comparison to the recent published predefined-time synchronization approach based on conventional Active Control Lyapunov Function (ACLF) is performed.
(136) For a noisy channel case, the additive noise w(t) is modeled as w(t)=0: 0001 sin(1800 t). The eigenvalues of (A−LC) are selected as {−2.5±i1; −3±i1; −4}, and =diag(15; 91: 25; 282: 5; 446: 5; 290) is obtained. The parameter σ.sub.1, σ.sub.2 and k are chosen as: 1=0: 53, 2=0: 02 and k=1200. It can be checked numerically that the eigenvalues of
are complex conjugate with negative real part and moreover the real part X.sub.i and imaginary part Y.sub.i, i=
(137)
(138) Synchronization results in the presence of the noise in the transmitted signal are depicted by
(139) To emphasis this feature, simulations have been performed with the unfiltered extended high-gain observer given by Equations (28), (29), and (30) for ϵ=0.01, in the presence of the noise signal w(t). The obtained synchronization results are reported in
(140) As mentioned above, the choice of the activation time ta depends on the numerical inversion of the transformation matrix T(μ(t)). It is desired that ta be small as possible. However, for small enough of t.sub.a, numerical irregularities were observed in the simulations. In practical implementation, t.sub.a can be tuned in accordance to the computational software and hardware capabilities. For the fixed-time extended high-gain observer (28)-(30), the gains k.sub.i are chosen such that the matrix F is Hurwitz. The choice of eigenvalues of F does not have much incidence. The important parameter that is to be chosen is ϵ. As it has been underlined in several works, this parameter is to be chosen small enough in order to increase the robustness. For standard high-gain observer, in the absence of noise, large gains injection due to small values of ϵ introduces two major issues. First, undesirable peaks appear in the transient response. Second, the numerical implementation of the high-gain observer becomes very hard. The first drawback is eliminated with the use of modulating functions. The uncertainty
(141)
is bounded by D.sub.1. Thus, ϵ is to be fixed to ensure the convergence of the estimation error in the presence of uncertainties. In addition, note that the estimation error is bounded by ϵ.sup.2ρ.sub.x. By simulations, D.sub.1 is estimated about D.sub.1=1.16. To compromise between estimation accuracy and numerical implementation, the parameter ϵ is the set at ϵ=0.001 based on the heuristic try and error tuning procedure. In the case of noisy channel case, first the gain k is chosen sufficiently large with respect to the bounds of the total disturbance. However, a large value of k yields to large estimation error due to the noise. The high-gain parameter k of the filtered extended high-gain observer is powered up to two (2) independently of the dimension n of the system. In contrary, for the unfiltered high-gain observer, the gain injection is powered up to n. In order to get a reduced estimation error due to the noise for large value of k, σ.sub.2 is chosen small enough to reduce .sub.N. Eigenvalues of (A−LC) are arbitrary chosen stable and L is determined by pole placement procedure. Finally, the parameter σ.sub.2 is fixed to a value such that the eigen-values of (A−LC) satisfy the sector inclusion condition. Again, here, the trial and error tuning procedure is used to set the values of these parameters.
(142) The method of the disclosure uses a single channel synchronization protocol with a single output channel being used. All state variables of the master system are assumed to be unknown, whereas, in most other conventional methods, control laws require the availability of all state variables, which are sent through the public channel. This is a major drawback for the design of secure transmission schemes in the conventional methods since it introduces channel overload. The method of the disclosure deals with recovering the secret message, considered an unknown input, while conventional methods are limited to estimating the state variables only. Further method of the disclosure, the secret message is also hidden by inclusion in the chaotic dynamics, which significantly improves the security level. Contrary to fixed-time synchronization methods based on Lyapunov functions or on sliding mode techniques, the method of the disclosure enables to obtain an instantaneous convergence, without a transient response, in a predefined time chosen independently from initial conditions and system parameters (deadbeat observer). The observer (modified high-gain observer) of the disclosure uses a simple linear Luenberger-like action. Further in the design of synchronization schemes based on master-slave configuration, additive noise in the link between master and slave remains a challenging problem. The corruption of the output control signal transmitted from the master to the slave by the noise channel gives rise to unsatisfactory performance and can destroy the synchronization process. In the method of the disclosure, a new predefined-time filtered high-gain observer is developed to ensure the success of the synchronization in the presence of the channel noise.
(143) Obviously, numerous modifications and variations of the present disclosure are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.