DESIGN OF CHAOTIC MOBILE COMMUNICATION SYSTEM USING ARDUINO
Security and secrecy are some of the significant concerns in the communications world. In the last years, several encryption techniques had been proposed to improve the secrecy of the information transition. Chaos-based encryption techniques are being exceedingly studied as part of the because of the random-look nature and very unpredictable of the chaotic signals. In this study, a digital-based mobile communication system was proposed that uses chaotic encryption code, Arduino platforms was utilized for this work because it possess an open-source prototyping platform, software and hardware very accessible and extremely flexible to be customized and extended. The ASCII code of input message signal was encrypted using a Chaotic Random Number Generator it will send to the receiver side through mobile GSM system. In the receiver side, the ASCII coded message was decrypted using the same Chaotic Random Number Generator code for decryption. The target of this system is to make a more security based on the mobile communication system, the obtained results of this study confirm a secure system for sending and receiving SMS-based on the mobile communication system.
.M. and Carroll, T.L., “Driving systems with chaotic signals,” Physical Review A, Vol. 44(4), 1991, pp. 2374.
Kocarev, L., Halle, K.S., Eckert, K., Chua, L.O. and Parlitz, U., “Experimental demonstration of secure communications via chaotic synchronization,” International Journal of Bi-furcation and Chaos, Vol. 2(03), 1992, pp. 709-713.
Cuomo, K.M. and Oppenheim, A.V., “Circuit implementa-tion of synchronized chaos with applications to communica-tions,” Physical review letters, Vol. 71(1) , 1993, pp.65-68.
Pehlivan, I. and Uyaroglu, Y., “Rikitake attractor and its synchronization application for secure communication sys-tems,” Journal of Applied Sciences, Vol.7 (2), 2007, pp.232-236.
Uyaroğlu, Y.andPehlivan, I., “Simplified chaotic diffusion-less Lorentz attractor and its application to secure communi-cation systems,” Communications, IET, Vol.1 (5), 2007, pp. 1015-1022.
Alvarez, G. and Li, S., “Some basic cryptographic require-ments for chaos-based cryptosystems,” International Jour-nal of Bifurcation and Chaos, Vol. 16(8), 2006, pp. 2129-2151.
Boccaletti, S., Kurths, J., Osipov, G., Valladares, D.L. and Zhou, C.S., “The synchronization of chaotic sys-tems,” Physics reports, Vol.366 (1), 2002, pp. 1-101.
KHAREL, R., “design and implementation of secure chaotic communication systems,” PhD dissertation, Dept. of Compu-ting, Engineering and Information Sciences, Northumbria University, Newcastle, United Kingdom, 2011.
Yang, S.G., Li, C.X. and Sun, S.H., “Text information hiding method based on chaotic map and BCH code in DWT do-main of a carrier image,” International Conference on Wave-let Analysis and Pattern Recognition, pp. 1754-1758, Nov. 2007, doi: 10.1109/ICWAPR.2007.4421737.
Sukhraliya, V., Chaudhary, S. and Solanki, S., “Encryption and Decryption Algorithm using ASCII values with substitu-tion array Approach,” International Journal of Advanced Research in Computer and Communication Engineering, Vol .2(8), 2013, pp. 3094-3097.
Cuomo, K.M., Oppenheim, A.V. and Strogatz, S.H., “Syn-chronization of Lorenz-based chaotic circuits with applica-tions to communications,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, Vol. 40, no.10, pp. 626-633, Oct 1993, dio: 10.1109/82.246163.
Abel, A. and Schwarz, W.,” Chaos communications princi-ples, schemes, and system analysis,” Proc. IEEE, Vol 90, pp. 691-710, May 2002, doi: 10.1109/JPROC.2002.1015002.
J M blackledge, "Cryptography using chaos," Warsaw Uni-versity of Technology Development Programme, 2010.
Elsherbeny, Mohamed Nageb, and M. Raha., "Pseudo–Random Number Generator Using Deterministic Chaotic System," International Journal of Scientific and Technology Research 1.9 (2012).