Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2016
License: CC BY NC ND
Data sources: Datacite
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2016
License: CC BY NC ND
Data sources: ZENODO
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 3 versions
addClaim

Design Of Chaotic Mobile Communication System Using Arduino

Authors: ABDULRAHMAN, Brwa A.; Atan, Özkan; Almalı, Mehmet Nuri;

Design Of Chaotic Mobile Communication System Using Arduino

Abstract

{"references": ["[1]\tLarger, L. and Goedgebuer, J.P., \u201cEncryption using chaotic dynamics for optical telecommunications,\u201d ComptesRendus Physique, Vol .5(6), 2004, pp. 609-611.", "[2]\tChen, C.K. and Lin, C.L., \u201cText encryption using ECG sig-nals with chaotic Logistic map,\u201d 5th IEEE Conference in Industrial Electronics and Applications (ICIEA), pp. 1741-1746. June 2010, doi: 10.1109/ICIEA.2010.5515285.", "[3]\tKennedy, Michael, Riccardo Rovatti, and Gianluca Setti, eds., \u201cChaotic electronics in telecommunications,\u201d CRC press, 2000.", "[4]\tBender, W., Gruhl, D., Morimoto, N. and Lu, A., \u201cTechniques for data hiding,\u201d IBM systems journal, Vol .35(3.4), 1996, pp. 313-336.", "[5]\tKocarev, L. and Jakimoski, G., \u201cLogistic map as a block en-cryption algorithm,\u201d Physics Letters A, Vol. 289(4), 2001, pp. 199-206.", "[6]\tPecora, L.M. and Carroll, T.L., \u201cSynchronization in chaotic systems,\u201d Physical review letters, Vol.64 (8), 1990, pp. 821.", "[7]\tPecora, L.M. and Carroll, T.L., \u201cDriving systems with chaotic signals,\u201d Physical Review A, Vol. 44(4), 1991, pp. 2374.", "[8]\tKocarev, L., Halle, K.S., Eckert, K., Chua, L.O. and Parlitz, U., \u201cExperimental demonstration of secure communications via chaotic synchronization,\u201d International Journal of Bi-furcation and Chaos, Vol. 2(03), 1992, pp. 709-713.", "[9]\tCuomo, K.M. and Oppenheim, A.V., \u201cCircuit implementa-tion of synchronized chaos with applications to communica-tions,\u201d Physical review letters, Vol. 71(1) , 1993, pp.65-68.", "[10]\tPehlivan, I. and Uyaroglu, Y., \u201cRikitake attractor and its synchronization application for secure communication sys-tems,\u201d Journal of Applied Sciences, Vol.7 (2), 2007, pp.232-236.", "[11]\tUyaro\u011flu, Y.andPehlivan, I., \u201cSimplified chaotic diffusion-less Lorentz attractor and its application to secure communi-cation systems,\u201d Communications, IET, Vol.1 (5), 2007, pp. 1015-1022.", "[12]\tAlvarez, G. and Li, S., \u201cSome basic cryptographic require-ments for chaos-based cryptosystems,\u201d International Jour-nal of Bifurcation and Chaos, Vol. 16(8), 2006, pp. 2129-2151.", "[13]\tBoccaletti, S., Kurths, J., Osipov, G., Valladares, D.L. and Zhou, C.S., \u201cThe synchronization of chaotic sys-tems,\u201d Physics reports, Vol.366 (1), 2002, pp. 1-101.", "[14]\tKHAREL, R., \u201cdesign and implementation of secure chaotic communication systems,\u201d PhD dissertation, Dept. of Compu-ting, Engineering and Information Sciences, Northumbria University, Newcastle, United Kingdom, 2011.", "[15]\tYang, S.G., Li, C.X. and Sun, S.H., \u201cText information hiding method based on chaotic map and BCH code in DWT do-main of a carrier image,\u201d International Conference on Wave-let Analysis and Pattern Recognition, pp. 1754-1758, Nov. 2007, doi: 10.1109/ICWAPR.2007.4421737.", "[16]\tSukhraliya, V., Chaudhary, S. and Solanki, S., \u201cEncryption and Decryption Algorithm using ASCII values with substitu-tion array Approach,\u201d International Journal of Advanced Research in Computer and Communication Engineering, Vol .2(8), 2013, pp. 3094-3097.", "[17]\tCuomo, K.M., Oppenheim, A.V. and Strogatz, S.H., \u201cSyn-chronization of Lorenz-based chaotic circuits with applica-tions to communications,\u201d IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, Vol. 40, no.10, pp. 626-633, Oct 1993, dio: 10.1109/82.246163.", "[18]\tAbel, A. and Schwarz, W.,\u201d Chaos communications princi-ples, schemes, and system analysis,\u201d Proc. IEEE, Vol 90, pp. 691-710, May 2002, doi: 10.1109/JPROC.2002.1015002.", "[19]\tJ M blackledge, \"Cryptography using chaos,\" Warsaw Uni-versity of Technology Development Programme, 2010.", "[20]\tElsherbeny, Mohamed Nageb, and M. Raha., \"Pseudo\u2013Random Number Generator Using Deterministic Chaotic System,\" International Journal of Scientific and Technology Research 1.9 (2012)."]}

Security and secrecy are some of the significant concerns in the communications world. In the last years, several encryption techniques had been proposed to improve the secrecy of the information transition. Chaos-based encryption techniques are being exceedingly studied as part of the because of the random-look nature and very unpredictable of the chaotic signals. In this study, a digital-based mobile communication system was proposed that uses chaotic encryption code, Arduino platforms was utilized for this work because it possess an open-source prototyping platform, software and hardware very accessible and extremely flexible to be customized and extended. The ASCII code of input message signal was encrypted using a Chaotic Random Number Generator it will send to the receiver side through mobile GSM system. In the receiver side, the ASCII coded message was decrypted using the same Chaotic Random Number Generator code for decryption. The target of this system is to make a more security based on the mobile communication system, the obtained results of this study confirm a secure system for sending and receiving SMS-based on the mobile communication system.

Country
Turkey
Related Organizations
Keywords

Chaos, cryptography, chaotic number generator, chaotic mobil communication.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 8
    download downloads 5
  • 8
    views
    5
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
0
Average
Average
Average
8
5
Green