 Research
 Open Access
 Published:
Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications
EURASIP Journal on Wireless Communications and Networking volume 2016, Article number: 134 (2016)
Abstract
In this paper, the adaptive synchronization method of three coupled identical chaos systems is proposed. New generic criteria of global chaos synchronization and strict theoretical proofs are given. The unidirectional (bidirectional) coupled system will synchronize by adding three adaptive feedback gain equations. As an example, the three Rössler chaotic systems with unidirectional coupling are given to realize the adaptive coupled synchronization; at the same time, the three Lorenz chaotic systems donate the bidirectional coupling adaptive synchronization. This paper also extends the above adaptive synchronization method to secure chaos communications through the method of chaos masking. Based on the three coupled identical Lorenz chaotic systems, a novel method of chaos encryption is proposed, and the basic idea is that after encrypting two times in two transmitters and one receiver, information signal can be recovered exactly at the receiver end. In consideration of interfering random white noise, the results of encoding and decoding are simulated and analyzed for the multistage chaos synchronized system. By analyzing the characteristics of noise, this paper presents a denoising method using wavelet transform. At last, a secure communications method for high amplitude information signal transmission based on chaotic masking is studied. With the MATLAB, the effects of signal denoising could be demonstrated.
Introduction
In recent years, the idea of synchronization of chaotic systems has received a great deal of interest among scientists from various fields [1–8]. In their seminal paper, Pecora and Carroll addressed the synchronization of chaotic system by using a driveresponse configuration. The basic idea is to use the outputs of the drive system to control the response system so that the trajectories of the response’s outputs can synchronize those of drive system. So far, many synchronization schemes have been developed such as adaptive synchronization approach [9, 10], system approach [11], and system decomposition approach [12]. More recently, many useful methods have been developed. We have also investigated chaos synchronization between two coupled identical systems, from a rigorous mathematical approach.
However, for three coupled (even more) identical systems, the stability of periodic orbit and chaos synchronization are much more complex, and there does not seem to be much result reported in the literatures about this special synchronization configuration [13–16]. In the recent work, the authors propose the simple generic criteria for realizing the chaos synchronization respectively according to the way of coupling. The generic criteria can be satisfied by choosing nine suitable coupled coefficients of three coupled chaotic systems. In the paper of Lu [17], the adaptive synchronization method for coupled system with multisystems is proposed; this method can avoid estimating too many values of coupling coefficient by adding some adaptive feedback gain equations. In this paper, we improve the adaptive synchronization method of the paper and establish the global synchronization criteria for three coupled chaotic systems via unidirectional or bidirectional linear error feedback approach. In this method, the adaptive feedback gain equations are replaced with the values of coupling coefficients. This method can avoid the difficulty of designing the adaptive feedback gain equations. At the same time, it needs estimate fewer coupling coefficients than the method in the paper [18].
Over the past decades, there has been tremendous interest in studying the behavior of chaotic system. Chaotic systems are characterized by a number of features, such as sensitive dependence on initial conditions; aperiodicity, randomlike behavior, continuous broadband power spectrum, and so on. These properties coincide with the requirements for signals applied in secure communication systems. A large variety of encryption algorithms have been proposed for realizing chaotic communication since Pecora and Carroll proposed synchronization of chaotic systems. Up to now, many chaosbased secure communication systems have been proposed, which can be roughly classified into the following categories: chaotic masking (addition method) [19], chaotic switching [20], chaotic modulation (inclusion method) [21], digital communication [22], and inverse system approach [23]. One can refer to [24] for a recent survey. In chaotic communication schemes, a chaotic system is used as transmitter and the information signal is mixed at the transmitter end to generate a chaotic transmit signal, which is then transmitted to the receiver end. The receiver is also a chaotic dynamic system constructed based on the structure of transmitter and it is able to synchronize the transmitter by receiving the transmit signal. Once synchronization is achieved, the information signal is recovered by the receiver. The main idea is that chaotic signal can be used as a carrier and transmitted together with an information signal to a receiver, and at the receiver end chaos synchronization is employed to recover the information signal. There is a problem on how to improve the security of the chaos secure system. Until now, most of the literatures are all about second order of chaos synchronized secure communication system [25–32], and only a few papers investigate the multistage chaos synchronized secure communication system [33, 34].
There are many methods [35–39] to improve the security of chaotic communication. In [40], a linear output feedback synchronization approach for chaotic Genesio system with application to secure communications is described. The sufficient condition of stable asymptotic synchronization and the boundary of feedback gain are given, based on the linear stability theorem. In [41], Chua’s chaotic synchronized systems and its main properties are investigated and a multistage chaotic synchronized systems for secure communication is proposed. It is down that the message signal hidden in chaotic carrier of the systems can be perfectly reconstructed, and the bandwidth, the characteristic of distortion, and the level of security are improved. The chaos masking method based on multistage chaotic synchronization system for secure communications, to some extent, enhances the degree of security, as the message is not only just added to the chaotic carrier signal twice but is also decrypted twice. For example, in [42], a new method of global chaos synchronization among three different structures of chaotic systems is proposed under the framework of driveresponse systems based on Lyapunov stabilization theorem; then, this method is applied to secure communication through chaotic masking. At last, it analyzes the characteristics of noise and then presents a denoising method using wavelet transform. With the MATLAB, the effects of signal denoising could be demonstrated.
This work, inspired by previous works, improves the security of the chaos secure system by adding the second order of chaos synchronized secure communication system to multistage ones, that is, it proposes a novel method of chaos encryption using three coupled identical systems. After encrypting in the first two coupled systems, encryption is done again in the later two coupled systems. This system designs simpler than the ones designed in [43, 44] and can employ more states easily. More significantly, this method can be extended to four or even more order chaos synchronized secure communication system. Due to the uniqueness of the three coupled chaos synchronization secure communication system, the possibility for an interceptor to extract the information from the transmitted signal is therefore greatly reduced.
Considering the noise in existence in the chaotic systems, we study the random white noise perturbing for the signal. In addition, eliminate the noise using wavelet transform. In order to maintain synchronization between the transmitter and receiver, the ratio of the power of the chaotic carrier to the information signal should be greater than approximately 30 dB to guarantee a fairly small distortion on the chaotic attractor. In [45, 46], Li proposes a secure communication method for highamplitude information signal transmission based on chaotic masking. The degree of security is enhanced because the amplitude of information signal is equivalent to that of chaotic signal. At the receiving end, an adaline is adopted to maintain the chaotic synchronization of transmitting and receiving systems and simultaneously recovers the information signal. For a definite chaos system, the lower the frequency of information signal, the smaller the error of the recovered signal and original signal. Besides, Chua’s circuit is considered as an illustrative example to demonstrate the effectiveness of the proposed method. This paper improves the above method, designs an adaptive controller by using two attenuation factor, and adjusts the amplitude significantly. As the change of attenuation factor, the information signal can be selected within a relatively big range. Recently, Xu et al. [47–49] proposed a crowdsensingbased wireless communication data processing methods. In [50], Zheng deals with the problem of secure communication based on multiinput multioutput (MIMO) chaotic systems. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitudeindependent one. This paper improves the method in [51] and transmits a highamplitude discrete signal using two attenuation factors. At the receiving end, it restores the information signal by decrypting twice. Well effect has been acquired in the experiment.
This paper is organized as follows. In Section 2, we show the adaptive synchronization of three Rössler systems with unidirectional coupling. In Section 3, adaptive synchronization of three Lorenz systems with bidirectional coupling is discussed. In Section 4, the secure communication theory and multistage chaos synchronized system for secure communications are shown. The noise resistance effects for the transmitter of a signals and wavelet denoise are shown in Section 5. In Section 6, we show the transmission of a highamplitude discrete signal. Finally, conclusions are drawn.
Adaptive synchronization of three Rössler systems with unidirectional coupling
With respect to two coupled chaotic systems, by unidirectional coupling we mean that the behavior of response system is dependent on the behavior of another identical drive system, but the second one is not influenced by the behavior of the first. But the situation is very different to consider the synchronization of three chaotic systems with unidirectional coupling.
Consider the classical Rössler chaotic system
where x _{ i } (i = 1, 2, 3) are the state variables and a, b, c are positive real constants, where a = 0.2, b = 0.2, and c = 5.7, so that the Rössler system has chaotic attractors. Here, we consider the unidirectional coupling among three identical Rössler chaotic systems
Selecting the synchronization errors as follows:
And we have e _{31} = − e _{11} − e _{21}, e _{32} = − e _{12} − e _{22}, e _{33} = − e _{13} − e _{23}.
Assuming that
According to formulas (2) and (3), the dynamical error system is written as follows:
Theorem 1
The coupled system (1) will synchronize for any initial values (x _{1}(0), x _{2}(0), x _{3}(0)); (y _{1}(0), y _{2}(0), y _{3}(0)); (z _{1}(0), z _{2}(0), z _{3}(0)); d _{1}(0); d _{2}(0); d _{3}(0). That is, e _{ ij } → 0 as t → ∞, (i, j = 1, 2, 3).
Proof
We construct a Lyapunov function
where \( {d}_1^{\ast },{d}_2^{\ast },{d}_3^{\ast }>0 \) are to be determined. Since the Rössler system is chaotic, we assume x _{1}, y _{1} ≤ M _{1}, y _{3}, z _{3} ≤ M _{3}, where M _{1}, M _{3} are positive constants. The time derivative of V along the orbits of the system (1) is
where
The symmetrical matrix P will be positive definite if positive constants \( {d}_1^{\ast } \), \( {d}_2^{\ast } \), and \( {d}_3^{\ast } \) satisfy the following inequalities
Obviously, (6) holds if \( {d}_1^{\ast } \), \( {d}_2^{\ast } \), and \( {d}_3^{\ast } \) are large enough. That is, \( \overset{.}{V} \) is negative semidefinite for e _{11}, e _{12}, e _{13}, e _{21}, e _{22}, e _{23}, d _{1}, d _{2}, and d _{3}. Thus, \( {e}_{11},\;{e}_{12},\;{e}_{13},\;{e}_{21},\;{e}_{22},\;{e}_{23},{d}_1{d}_1^{\ast },{d}_2{d}_2^{\ast },{d}_3{d}_3^{\ast}\in {L}_{\infty } \).
Since \( \overset{.}{V}\le {e}^{\mathrm{T}}\mathbf{P}e \) and P is positive definite, one has
where λ _{min}(P) is the minimum eigenvalue of the symmetrical positive definite matrix P. It follows that e _{11}, e _{12}, e _{13}, e _{21}, e _{22}, e _{23} ∈ L _{2}. We have \( {\overset{.}{e}}_{11},\;{\overset{.}{e}}_{12},\;{\overset{.}{e}}_{13},\;{\overset{.}{e}}_{21},\;{\overset{.}{e}}_{22},\;{\overset{.}{e}}_{23}\in {L}_{\infty } \) from error system (4). Therefore, by Barbalat’s lemma, e _{11}, e _{12}, e _{13}, e _{21}, e _{22}, e _{23} → 0 as t → ∞.
In numerical simulations for coupled system with Rössler systems, Fig. 1 shows the synchronization errors of the coupled system with three Rössler systems for k _{1} = 0.1, k _{2} = 0.3, and k _{3} = 0.5. The initial states of three coupled systems are the following: x _{1}(0) = 0.1, x _{2}(0) = 0.1, x _{3}(0) = 0.1; y _{1}(0) = 0.2, y _{2}(0) = 0.2, y _{3}(0) = 0.2; z _{1}(0) = 0.3, z _{2}(0) = 0.3, z _{3}(0) = 0.3; d _{1}(0) = 0.5, d _{2}(0) = 0.4, d _{3}(0) = 0.3.
From Fig. 1, we can see that the three coupled Rössler chaotic systems realize synchronization in a short amount of time, so the above generic criteria of global chaos synchronization are effective.
Adaptive synchronization of three Lorenz systems with bidirectional coupling
Next, the synchronization of three chaotic systems with bidirectional coupling is studied. In this section, we select one adaptive feedback gain equation to reach for the goal.
Consider the classical Lorenz chaotic system
where a = 10, b = 8/3, and c = 28, so that the Lorenz system has chaotic attractors.
The three Lorenz systems using bidirectional coupling can be written as
where a = 10, b = 8/3, and c = 28, so that the Lorenz system has chaotic attractors.
Selecting the synchronization errors as follows:
and we have e _{7} = − e _{1} − e _{4}, e _{8} = − e _{2} − e _{5}, and e _{9} = − e _{3} − e _{6}.
Assuming that
According to formulas (8) and (9), the dynamical error system is written as follows:
Theorem 2
The coupled system (7) will synchronize for any initial values (x _{1}(0), x _{2}(0), x _{3}(0)); (y _{1}(0), y _{2}(0), y _{3}(0)); (z _{1}(0), z _{2}(0), z _{3}(0)); d(0). That is, e _{ i } → 0 as t → ∞, (i = 1, 2, ⋯, 9).
Proof
Construct a Lyapunov function
where d ^{*} > 0 is to be determined. Since the Lorenz system is chaotic, we assume y _{2}, z _{2} ≤ M _{2}, y _{3}, z _{3} ≤ M _{3}, where M _{2}, M _{3} are positive constants. The time derivative of V along the orbits of system (7) is
where
The matrix P will be positive definite if positive constants \( {d}^{\ast }>\frac{M_2^2}{4b}+\frac{{\left(a+c+{M}_3\right)}^2}{4}a \), because with this condition, all the principal minor determinants of matrix P are positive. Similar to the proof of Theorem 1, we obtain \( {e}_1,{e}_2,{e}_3,{e}_4,{e}_5,{e}_6,{\overset{.}{e}}_1,{\overset{.}{e}}_2,{\overset{.}{e}}_3,{\overset{.}{e}}_4,{\overset{.}{e}}_5,{\overset{.}{e}}_6,d\in {L}_{\infty } \), e _{1}, e _{2}, e _{3}, e _{4}, e _{5}, e _{6} ∈ L _{2}. By Barbalat’s lemma, e _{1}, e _{2}, e _{3}, e _{4}, e _{5}, e _{6} → 0 as t → ∞, then
In numerical simulations for coupled system with Lorenz systems, Fig. 2 shows the synchronization errors of the coupled system with three Lorenz systems for k = 0.1. The initial states of three coupled systems are x _{1}(0) = 0.1, x _{2}(0) = 0.1, x _{3}(0) = 0.1; y _{1}(0) = 0.2, y _{2}(0) = 0.2, y _{3}(0) = 0.2; z _{1}(0) = 0.3, z _{2}(0) = 0.3, z _{3}(0) = 0.3; d _{1}(0) = 0.5.
From Fig. 2, like in Section 2, we can see that the three coupled Rössler chaotic systems realize synchronization in a short amount of time, so the above generic criteria of global chaos synchronization is effective.
The secure communication theory and multistage chaos synchronized system for secure communications
In this section, the multistage chaos synchronized system scheme proposed above is applied to chaotic secure communications system. Secure communication has been an interesting field of application of chaotic synchronization since the last decade. Due to their unpredictability and broadband spectrum, chaotic signals have been used to encode information by simple masking (addition) or using modulation. These chaotic characters of sensitive dependence on initial conditions and randomlike behavior make the chaos signal be fit for applying in secure communication. In chaotic communication schemes, a chaotic system is used as transmitter and the information signal is mixed at the transmitter end to generate a chaotic transmit signal, which is then transmitted to the receiver end. The receiver is also a chaotic dynamic system constructed based on the structure of transmitter and it is able to synchronize the transmitter by receiving the transmit signal. Once synchronization is achieved, the information signal is recovered by the receiver. It should be noted that the power of the information signal is required to be sufficiently lower than that of the chaotic carrier.
However, the recent researches show that even with chaotic dynamics completely hidden most of known models of chaotic communication are insecure. They are insecure against some very weak attacks, including nonlinear dynamics forecasting and reconstructing. Apart from this, slow encryption speed and weakness in resistance to channel noise are also the serious inherent drawbacks of chaotic cryptosystems. For the reason given above, we have to explore the algorithm with higher security.
Based on above discussion and analysis, within the driveresponse configuration, this paper presents a method about twice encryption based on multistage chaos synchronized system for secure communications. Figure 3 illustrates the proposed secure communication system consisting of two transmitters (or drive systems) at the sending end and one receiver (or response systems) at the receiving end. As it is shown in Fig. 1, x _{ i } (i = 1, 2, ⋯ n) and y _{ i } (i = 1, 2, ⋯ n) are the two drive chaotic systems, z _{ i } (i = 1, 2, ⋯ n) is the response chaotic systems. Firstly, the transmitted signal s(t) is the sum of the information signal i(t) and the output variables x _{1} (or x _{2}, x _{3}) of the first chaotic transmitter at the sending end. Then, the mixed signal is transmitted to the second transmitter y _{ i } (i = 1, 2, ⋯ n), as is seen in Fig. 3. Add the transmitted mixed signal to the output variables y _{1} (or y _{2}, y _{3}) to be the pretend of the chaos signal \( \overset{.}{s}(t) \), which will be transmitted to the receiver end. At the receiver end, when the synchronization occurrence among three identical chaos systems, the original information signal i(t) can be recovered from the mixed ï(t). In this method, the original information signal i(t) has two encryption processes, one is x _{ i } (i = 1, 2, ⋯ n) and one is y _{ i } (i = 1, 2, ⋯ n), so if one wants to obtain the original information signal i(t), he has to decrypt the transmitted mixed signal \( \ddot{s}(t) \) twice. Considering chaos signal depending on initial values, obviously, by comparison with the original chaos masking mode, this method has higher security.
The noise resistance effect for the transmitter of a discrete signal and wavelet denoise
The sensitivity of noise is also an important research area for chaos communication. However, to the best of our knowledge, few profound and general results have been reported in the literature so far because of the complexity.
Analyzing the discrete signal with random white noise perturbation
The channel constitutes an absolutely necessary part of communication system, and noise in the channel is unavoidable. Noise and information signal existed in the same process of radio communications. The existence of the noise is more or less inevitable. In the secure communication, the transforming information signal is easy to mask by noise. However, in certain nonlinear systems, including electronic circuits and biological sensory systems, the presence of noise can enhance the diction of weak signal.
In order to analyze the noise resistance effect for the signal, we consider the random white noise, as is shown in Fig. 4.
When the signalnoise ratio is 5 dB, we analyze its effect for the transmitter of discrete signal. Suppose m(t) is the discrete signal, let the transmit signal be s(t) = m(t) + x _{1}(t) + n(t), n(t) be random white noise. From Fig. 3, we have \( \overset{.}{s}(t)=s(t)+{y}_1(t) \), \( \ddot{s}(t)=\overset{.}{s}(t)+{z}_1(t) \). Suppose \( \overset{.}{m}(t) \) is the first recovery of information signal and \( \ddot{m}(t) \) is the second one. According to Fig. 3 and system (7), let the transmitters be
and
And let the receiver be
Numerical simulation was done by the MATLAB environment. Figure 5 depicts the numerical results. From Fig. 5a, b, we can see the time series of x _{1} and x _{1} + y _{1}. The information signal m(t) is shown in Fig. 5c; obviously, the power of the information signal m(t) is lower than that of the chaotic carrier x _{1} and x _{1} + y _{1}. The transmitted signal s(t) and the second transmitted signal \( \overset{.}{s}(t) \) with noise perturbation are shown in Fig. 5d, e; The first recovery of information noisedsignal \( \overset{.}{m}(t) \) and the second recovery of information noisedsignal \( \ddot{m}(t) \) are shown in Fig. 5f, g. Figure 5h shows the error of the information signal \( \ddot{m}(t)m(t) \). Obviously, it is easy to find that the information signal is recovered after a short transmission. This method of secondary encryptionbased chaos synchronization of three identical systems has two encryptions; compared to traditional chaos masking mode, it can additionally enhance the security of communication and is harder to decode.
From Fig. 5a–h, with the random white noise perturbing, although the information signal m(t) can recover after decoding, distortion occurs at the top of the signal, and the curve is not as smooth as before. This is because the error becomes large with the random white noise perturbation. But the distorted information signal is less useful in specific areas, and we should seek to the method to mend the information signal for realizing its precision of application.
Security analysis
There are many methods to improve the security of chaotic communication; the chaos masking method based on multistage chaos synchronized secure communication system is a simple and effective technique. For the first time, chaos synchronization of three identical chaotic systems is applied to secure communication through the method of chaotic masking. In the proposed method, it can enhance the security of information signal transmission; the reasons will be illustrated in the following. In this scheme, information signal can be transmitted in a form of any function predesigned between a sender and a receiver and recovered exactly, since the function is arbitrary and the scaling factor in the above synchronization method is unpredictable.
For the above multistage chaos synchronized system for secure communications, the main advantage of using synchronization of three identical systems is that it is very difficult for an eavesdropper to predict the stochastic output of the chaotic transmitter. The proposed chaotic communication scheme is totally different from the traditional cryptosystems, due to employing three chaos states for synchronization and encryption. If the eavesdropper wants to receive the information signal m(t), one must use the state x _{ i }(t), (i = 1, 2, ⋯, n) to predict the system (y _{1}, y _{2}, ⋯, y _{ n }), but the error is existent [52]. Then, he uses the prediction information in which error exists to predict the system (z _{1}, z _{2}, ⋯, z _{ n }); obviously, this is difficult and, at the same time, the error will be magnified. So, the chaos synchronization of three identical systems method can enhance the security of signal transmission and also improve the vulnerable points of chaotic masking.
In other things, every chaotic system has a different state, and we can select a different state. For example, the information signal m(t) can be added to the state x _{ i }(t) and can be also added to the state x _{ j }(t), (i ≠ j). In the same way, there are different state y _{ i }(t) that can be selected to carry the transmitted mixed \( \overset{.}{s}(t) \); and at the receiving end, the transmitted mixed \( \ddot{s}(t) \) can be transmitted to the different state z _{ i }(t). In the mentioned cases, if the eavesdropper wants to get the information signal m(t), he must detect the correct state x _{ i }(t), y _{ i }(t), and z _{ i }(t), but that is very difficult or even impossible; he can only get the inaccurate information signal. And again, we can select different chaotic systems as the transmitters (or drive systems) at the sending end and one receiver (or response systems), and they may be hyperchaotic systems, or even different order, which will be more difficult for the eavesdropper to detect. So the proposed multistage chaos synchronized secure communication system has important theoretical and experimental value.
Wavelet denosing
Wavelet transform makes the decomposition of the original signal into detailed signal and approximate signal, which implements by translation and expansion of wavelet mother function. Although the wavelet transforms (WTs) are being used to process fault signals of power system widely, wavelet transforms can only filter white noises and are useless to filter colored noises.
The expression of wavelet function is defined as follows
where a is the scale parameter and b is the time parameter. Wavelet function (12) shows an expansion.
When the parameter b varies, wavelet function activates with timeline. A cluster wavelet functions format when parameter a and b change at the same time. Signal f(t) can make decomposition by the cluster wavelet functions.
Considering the arbitrary signal f(t), the wavelet function can be defined as follows
The steps of threshold denoising method based on usual wavelet transform are briefly described as

(1)
Obtaining wavelet coefficients W by selecting suitable wavelet and making decomposition of the original signal.

(2)
Calculating wavelet threshold and selecting suitable threshold method then choosing wavelet coefficients in order to get new wavelet coefficient W _{ δ }.

(3)
Obtaining signal after denoising by making inverse wavelet transform to wavelet coefficient W _{ δ }.
Process the noisedsignal as mentioned above. Simulated by MATLAB numerical value method, the effects of donoising could be analyzed. After threshold denosing, reconstruct the denoising signal in order to highlight the trend of original signal and keep up its smooth and similarity. Figure 6 presents the recovered discrete signals after wavelet denoising; obviously, they are much smoother than that of Fig. 5g. Simulation results show that the algorithm is effective to reduce the impacts of random noise.
The transmission of a highamplitude discrete signal
One of the drawbacks of secure communication using synchronization of chaotic system is the limitation of the amplitude of the confidential messages. Usually, they have to be small enough in order to be masked by the chaotic signal (addition method) or in order to preserve the chaotic behavior (inclusion method). This constraint obviously limits the ratio of the transferred information with respect to the channel signal.
In this section, we use the threegrade chaos synchronization system for secure communication to transmit a highamplitude discrete signal. In the transmitter, an adaptive controller is adopted to pick up the change of highamplitude discrete signal, and to inject the controller's error into the transmitting system. At the same time, the information is directly added to the chaotic signal in transmission to drive the receiving system. In the receiver, another adaptive controller is used to maintain chaotic synchronization of the transmitting and receiving systems and to recover the information signal. Since the synchronization error is independent from the information signal and, at the same time, we adopt two attenuation factors, the power of the information signal can be equivalent to that of the chaotic signal, even much lower. So the frequency of the information signal can be set within the range of the principal frequencies of the chaotic signal.
According to Fig. 3 and system (7), let Lorenz chaotic systems be the transmitters
and
Let the receiver be
where d is the control gain, and we can select it appropriately to get the synchronization of three chaotic systems with bidirectional coupling. h(t) is the information signal with a high amplitude 100, as be shown in the Fig. 7. m, n are attenuation factors, which will make the information signal be transmitted successfully. Hence, the power of the information signal can be equivalent to that of the chaotic signal and the frequency of the information signal can be set within the principal frequencies of the chaotic oscillation. w _{1}, w _{2}, w _{3} are adaptive controllers for trace the signal at the transmitter and receiver end.
Without the attenuation factors, transmitter systems will lose original chaos characteristic when they mask the highamplitude signal h(t). Conversely, the high amplitude has no effect on the chaotic system if it is treated by attenuation factor m = 0.2, n = 0.1, as shown in Fig. 8a, b. The experiment results show that phase phenomena are probably caused while the amplitude of input signal increase to some extent. Obviously, the fundamental frequency of the information signal is required within the center frequency band of the chaotic signal.
This is because that the error of information signal h(t) and controller w _{1} is added into transmitters, rather than the information signal h(t) is added into transmitters directly, therefore, the system still keep chaotic state even if the amplitude of h(t) is high.
Numerical simulation was done by the MATLAB environment. The information signal h(t) is transmitted at the receiving end by masking it into the chaotic signals x _{2} and y _{2}, as been shown in Fig. 9a. Suppose h _{1}(t) is the first recovered signal, h _{2}(t) is the latter two recovered signal, as shown in Fig. 9b, c. From Fig. 9b, c, processed signal h(t) by the two attenuation factor can recover rapidly. This method not only expands the scope of transmitted signal but it also has stronger practicability.
The results of theoretical analysis and numerical simulation show that the presented method not only enhances the degree of security of lowdimensional chaotic systems but also significantly improves the signaltonoise ratio at the receiving end.
Conclusions
The paper studies an adaptive synchronization scheme of three coupled identical systems. Strict theoretical proofs are given to the method for three unidirectional coupled Rössler system and bidirectional Lorenz system. From Figs. 1 and 2, we can see that the two generic criteria of global chaos synchronization are effective; at the same time, the three coupled (even more) identical chaotic systems can be a foundation for chaos secure communication.
Meanwhile, almost all the methods of breaking ciphers are aiming mainly at second order of chaos synchronized secure communication system based on chaos masking but very few methods at multistage chaotic systems. So in the framework of multistage chaotic synchronization systems, we show that the above scheme could be applied in secure communication. We have provided an example to illustrate the implementation of the scheme for transmitting an information signal disturbed by random white noise. The information signal transmitted between two senders and one receiver can be recovered through simple operation. In addition, we reconstruct the original signal using wavelet denosing. Both theoretical analysis and numerical simulations demonstrate that the proposed system is of better security and high precision for recovered source signals even when channel noise is very high. Moreover, the highamplitude signal transmitted between two senders and one receiver can be recovered through simple operation. Numerical results show the successfulness in transmitting the information signal through chaotic carriers.
Besides, this paper mainly researches the synchronization among three same order chaotic systems and the application in secure communication. Furthermore, we can seek the new methods to realize the global synchronization among three different order chaotic systems and their application in secure communication. The realization of secure communication systems based on three different order chaotic systems can enlarge the range of usable chaotic systems and increase the difficulty of information signal decryption. So, it has practical significance on the development and application of chaotic synchronization technology.
It is worth noting that the sensitivity of multistage chaotic system synchronization to initial parameter and noise is also an important research area for chaos communication. However, to the best of our knowledge, few profound and general results have been reported in the literature so far because of the complexity. Besides, in traditional schemes, the amplitude of the messages has to be smaller than that of the chaotic system’s signal. In other words, the message’s power spectrum should be buried into that of the chaotic signal. Therefore, in order to maintain synchronization between the transmitter and the receiver, and to ensure that the chaotic signal masks the messages, the dynamic range of the messages has to be significantly smaller than that of the chaotic scalar. In this paper, the amplitude of information signal should be smaller than that of the chaotic signal in order not to destroy the system chaotic behavior.
References
 1.
LM Pecora, TL Carroll, Synchronization in chaotic systems. Phys. Rev. Lett. 64, 821–824 (1990)
 2.
DY Chen, R Zhang, XY Ma, S Liu, Chaotic synchronization and antisynchronization for a novel class of multiple chaotic systems via a sliding mode control scheme. Nonlinear. Dynam. 69, 35–55 (2012)
 3.
DY Chen, C Wu, CF Liu, XY Ma, Synchronization and circuit simulation of a new doublewing chaos. Nonlinear. Dynam. 67, 1481–1504 (2012)
 4.
DY Chen, R Zhang, JC Sprott, Synchronization between integerorder chaotic systems and a class of fractionalorder chaotic systems via sliding mode control. Chaos 22, 023130 (2012)
 5.
MF Hu, YQ Yang, ZY Xu, LX Guo, Hybrid projective synchronization in a chaotic complex nonlinear system. Math. Comput. Simulat. 79, 449–457 (2008)
 6.
S Gakkhar, RK Naji, Order and chaos in a food web consisting of a predator and two independent preys. Commun. Nonlinear. Sci. Numer. Simul. 10, 105–120 (2005)
 7.
XS Zhao, ZB Li, S Li, Synchronization of a chaotic finance system. Appl. Math. Comput. 217, 6031–6039 (2011)
 8.
S Gakkhar, B Singh, Dynamics of modified Leslie–Gowertype prey–predator model with seasonally varying parameters. Chaos, Solitons & Fractals. 27, 1239–1255 (2006)
 9.
S Teerawat, K Suwat, Adaptive synchronization of hyperchaotic systems via passivity feedback control with timevarying gains. J. Sound Vib. 329, 2490–2496 (2010)
 10.
JJ Yan, ML Hung, TL Liao, Adaptive sliding mode control for synchronization of chaotic gyros with fully unknown parameters. J. Sound Vib. 298, 298–306 (2006)
 11.
G Grassi, S Mascolo, Nonlinear observer design to synchronize hyperchaotic systems via a scalar signal. IEEE Trans. Circ. Syst. I. 44, 1011–1014 (1997)
 12.
L Kocarev, U Parlitz, General approach for chaotic synchronization with application to communication. Phys. Rev. Lett. 74, 5028–5031 (1995)
 13.
I Kyprianidis, I Stouboulos, Chaotic synchronization of three coupled oscillators with ring connection. Chaos, Solitons & Fractals. 17, 327–336 (2003)
 14.
T Zhou, JH Lü, GR Chen, Synchronization stability of three chaotic systems with linear coupling. Phys Lett A. 301, 231–240 (2002)
 15.
J Song, Global chaos synchronization or there coupled diffusionless Lorenz systems. Da xue shu xue. 23, 54–58 (2007)
 16.
XL An, JN Yu, YD Chu, Global chaos synchronization of three coupled nonlinear autonomous systems and a novel method of chaos encryption. Chaos, Solitons & Fractals. 42, 865–873 (2009)
 17.
JA Lu, XP Han, YT Li, Adaptive coupled synchronization among multiLorenz systems family. Chaos, Solitons & Fractals. 31, 866–878 (2007)
 18.
YG Yu, SC Zhang, Global synchronization of three coupled chaotic systems with ring connection. Chaos, Solitons & Fractals. 24, 1233–1242 (2005)
 19.
L Kovarev, KS Eckert, LO Chua et al., Experimental demonstration of secure communications via chaotic synchronization. Int. J. Bifurcat. Chaos. 2, 709–713 (1992)
 20.
U Parlitz, LO Chua et al., Transmission of digital signals by chaotic synchronization. Int. J. Bifurcat. Chaos. 2, 973–977 (1992)
 21.
CW Wu, LO Chua, A simple way to synchronize chaotic systems with applications to secure communications systems. Int. J. Bifurcat. Chaos. 3, 1619–1627 (1993)
 22.
M Feki, B Robert, G Gelle et al., Secure digital communication using discretetime chaos synchronization. Chaos, Solitons & Fractals. 18, 881–890 (2003)
 23.
U Feldmann, M Hasler, W Schwarz, Communication by chaotic signals: the inverse system approach. Int J Cricuit Theory Appl. 24, 551–576 (1996)
 24.
T Yang, A survey of chaotic secure communication systems. Int. J. Comp. Cognit. 2, 81–130 (2004)
 25.
KM Cuomo, AV Oppenheim, Circuit implementation of synchronized chaos with applications to communications. Phys. Rev. Lett. 71, 65–68 (1993)
 26.
JG Lu, YG Xi, Chaos communication based on synchronization of discretetime chaotic systems. Chin Phys. 14, 274–278 (2005)
 27.
KM Cuomo, AV Oppenheim, SH Strogatz, Robustness and signal recovery in a synchronized chaotic system. Int. J. Bifurcat. Chaos. 3, 1629–1638 (1993)
 28.
J GarciaOjalvo, R Roy, Spatiotemporal communication with synchronized optical chaos. Phys. Rev. Lett. 86, 5204–5207 (2001)
 29.
S Boccaletti, A Farini, FT Arecchi, Adaptive synchronization of chaos for secure communication. Phys Rev E. 55, 4979–4981 (1997)
 30.
AA Minai, T Anand, Synchronization of chaotic maps through a noisy coupling channel with application to digital communication. Phys Rev E. 59, 312–320 (1999)
 31.
M Feki, B Robert, G Gelle, Secure digital communication using discretetime chaos synchronization. Chaos, Solitons & ractals. 18, 881–890 (2003)
 32.
E Konstantinos, JC Sprott, A comparison of correlation and Lyapunov dimensions. Physica D. 200, 156–164 (2005)
 33.
JB He, JP Cai, J LiN, Synchronization of hyperchaotic systems with multiple unknown parameters and its application in secure communication. Optik 127, 2502–2508 (2016)
 34.
LF Zhang, XL An, JG Zhang, A new chaos synchronization scheme and its application to secure communications. Nonlinear. Dyn. 73, 705–722 (2013)
 35.
XL An, L Zhang, JN Yu, Study on a new multistage chaos synchronized secure communication system. J. Sichuan University. 49, 1087–1094 (2012)
 36.
C Xiao, SG Lian, LF Wang et al., A speedadaptive media encryption scheme for realtime recording and playback system. EURASIP J. Wirel. Commun. Netw. 1–9, 371513 (2010)
 37.
HL Chen, W Lou, X Sun et al., A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 1–11, 627039 (2010)
 38.
HL Chen, W Lou, Z Wang, A novel secure localization approach in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 1–12, 981280 (2010)
 39.
H Li, H Liu, S Vafi, Bipolar chaotic pulse position modulation communication system based on cyclic LDPC. EURASIP J. Wirel. Commun. Netw. 4, 1–9 (2014)
 40.
F Liu, XL Chen, L Mu ZH et al., Feedback synchronization of chaotic system with application to secure communications. Acta Electronica Sinica. 28, 46–48 (2000)
 41.
JY Kuang, LQ Pei, XJ Tang, A multistage chaotic synchronized system for secure communications. Acta Electronica Sinica. 27, 23–268 (1999)
 42.
XL An, JN Yu, YZ Li, YD Chu, Design of a new multistage chaos synchronized system for secure communications and study on noise perturbation. Math Comput Model 54, 7–18 (2011)
 43.
JY Kuang, LQ Pei, XJ Tang, RH Huang, A multistage chaos synchronized system for secure communications. Acta electronica. 27, 23–26 (1999)
 44.
XP Guan, ZP Fan, HP Peng, LJ Li, A new multistage chaotic system and its application to secure communication. J. Yanshan University 25, 287–289 (2001)
 45.
JF Li, N Li, A new chaotic masking method for secure communications based on Chua’s circuit. Syst Eng Electron 24, 41–43 (2002)
 46.
JF Li, N Li, A secure communication method for a highpower information signal based on chaotic masking. Chin Phys 11(11), 1124–1127 (2002)
 47.
Z. Xu et al. Crowdsourcing based description of urban emergency events using social media big data. IEEE Transactions on Cloud Computing, 10.1109/TCC.2016.2517638
 48.
Z. Xu et al. Crowdsourcing based social media data analysis of urban emergency events. Multimedia Tools and Applications, 10.1007/s1104201527311
 49.
Z Xu et al., Participatory sensing based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J. Wirel. Commun. Netw. 2016, 44 (2016)
 50.
G Zheng, D Boutat, T Floquet, JP Barbot, Secure communication based on multiinput multioutput chaotic system with large message amplitude. Chaos, Solitons & Fractals. 41, 1510–1517 (2009)
 51.
N Li, JF Li, Generalized projective synchronization of chaotic system based on a single driving variable and its application in secure communication. Acta Physica Sinica 57, 6093–6098(2008) (2008)
 52.
KM Short, Steps toward unmasking secure communications. Int J Bifurcat Chaos. 4, 959–977 (1994)
Acknowledgements
The authors gratefully acknowledge the support from the National Natural Science Foundation (No. 61364001), Science and Technology Program of Gansu Province (No. 144GKCA018), and Lanzhou Jiaotong University Yong Scientific Research Fund Project (No. 2014024), China.
Author information
Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Zhang, J., Zhang, L., An, X. et al. Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications. J Wireless Com Network 2016, 134 (2016). https://doi.org/10.1186/s1363801606304
Received:
Accepted:
Published:
Keywords
 Coupled synchronization
 Secure communication
 Chaos encryption
 Signal denoising
 Wavelet transform