Literature DB >> 26366432

Exponential H ∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm.

Feng-Hsiag Hsiao1.   

Abstract

This paper presents a systematic design methodology for neural-network- (NN-) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H ∞ performance and cryptography. On the basis of the Improved Genetic Algorithm (IGA), which is demonstrated to have better performance than that of a traditional GA, a model-based fuzzy controller is then synthesized to stabilize the MTDC systems. A fuzzy controller is synthesized to not only realize the exponential synchronization, but also achieve optimal H ∞ performance by minimizing the disturbance attenuation level. Furthermore, the error of the recovered message is stated by using the n-shift cipher and key. Finally, a numerical example with simulations is given to demonstrate the effectiveness of our approach.

Entities:  

Year:  2015        PMID: 26366432      PMCID: PMC4539977          DOI: 10.1155/2015/640926

Source DB:  PubMed          Journal:  ScientificWorldJournal        ISSN: 1537-744X


1. Introduction

Stability and stabilization are particularly important factors in time-delay systems, and these factors have, to date, been the focus of many studies. Furthermore, engineering systems [1], such as the structure control of tall buildings, hydraulics, and electronic networks, often involve time delays. Notably, the introduction of a time-delay factor tends to complicate analysis. For this reason, a great deal of research has been focused on developing convenient stability checking methods. The stability criteria of time-delay systems have been traditionally approached from two main directions according to the dependence on the size of the delay. Moreover, since Mackey and Glass [2] first identified chaos phenomena in time-delay systems, time delays have received increasing interest in chaotic systems. Chaotic phenomena have been observed in numerous physical systems and can lead to irregular performance and potentially catastrophic failures [3]. Chaos is a well-known nonlinear phenomenon; it is the seemingly random behavior of a deterministic system characterized by sensitive dependence on initial conditions [4]. Because of these properties, chaos has received a great deal of interest from scientists in various research fields [5, 6]. One particular communication research field, chaotic synchronization, has been extensively investigated. The chaotic synchronization of identical systems with different initial conditions was first introduced by Pecora and Carroll in 1990 [7]; it aims to lock one chaotic system to another, so that both follow the same path. Based on this concept, various synchronization approaches have been widely developed in the past two decades. Chaotic synchronization can be applied in the vast areas of physics and engineering science and especially in secure communication [8]. The most acceptable synchronization method is the masking method which contains messages in a chaotic system and recovers the original messages from the synchronization [9]. In chaos secure communications, two identical chaotic oscillators called transmitter (master) and receiver (slave) are required. Consequently, chaotic synchronization has become a popular study [10, 11]. However, most synchronization methods are focused on synchronizing two identical chaotic systems with different initial conditions [12]. In fact, experimental and even real systems are often not fully identical; in particular, there are mismatches in the parameters of the systems [12]. In general, there will always be some noise or disturbances that may cause instability. An external disturbance will negatively affect the performance of chaotic systems. Therefore, how to reduce the effect of external disturbances in the synchronization process is an important issue for chaotic systems [13, 14]. The H    control has been conferred for synchronization in chaotic systems over the last few years [13-16], and the H    synchronization problem for time-delay chaotic systems has been extensively investigated (see, e.g., [14, 17–19]). Accordingly, the purpose of this study is to realize the exponential synchronization of identical multiple time-delay chaotic (MTDC) systems and to simultaneously attenuate the effect of external disturbances on the control performance to a minimum level. Due to the unique merits in solving complex nonlinear system identification and control problems, neural-network-based modeling has become an active research field in the past few years. Neural networks (NN) consist of simple elements operating in parallel; these elements are inspired by biological nervous systems. As in nature, the connections between elements largely determine the network function. A neural network can be trained to perform a particular function by adjusting the values of the connections (weights) between elements. Therefore, a nonlinear system can be approximated as closely as desired by an NN model via repetitive training (Figure 3). Some examples of successful applications of NN in recent years can be found in [20-25]. For instance, Limanond et al. [20] applied neural networks to optimal etch time control design for a reactive ion etching process. Enns and Si [22] advanced an NN-based approximate dynamic programming control mechanism for helicopter flight control. Despite several promising empirical results and their nonlinear mapping approximation properties, the rigorous closed-loop stability results for systems using NN-based controllers are still difficult to establish. Therefore, an LDI state-space representation was introduced to deal with the stability analysis of NN models [26].
Figure 3

An NN model.

In the past few years, much research effort has been devoted to fuzzy control, which has attracted a great deal of attention from both the academia and industry, and it has been successfully used in wide variety of applications. For example, Wang et al. [27] presented a new measurement system that comprises a model-based fuzzy logic controller, an arterial tonometer, and a micro syringe device for the noninvasive monitoring of the continuous blood pressure wave form in the radial artery. A good tracking performance control scheme, a hybrid fuzzy neural-network control for nonlinear motor-toggle servomechanisms, was provided by Wai [28]; Hwang et al. [29] developed a network-based fuzzy decentralized sliding-mode control for the trajectory tracking of a car-like mobile robot; a hybrid fuzzy-PI speed controller for permanent magnet synchronous motors was proposed by Sant [30]; and Spatti et al. [31] introduced a fuzzy control strategy for voltage regulation in electric power distribution systems: this real-time controller would act on power transformers equipped with underload tap changers. Despite the successes of fuzzy control, it still has many basic problems that have yet to be solved. Stability analysis and systematic design are certainly among the most important issues for fuzzy control systems. Recently, significant research efforts have been devoted to these issues [32, 33]. All of these studies, however, ignored the modeling errors between nonlinear systems and fuzzy models. In fact, the existence of modeling errors may be a potential source of instability for control designs based on the assumption that the fuzzy model exactly matches the nonlinear plant [34]. In recent years, novel approaches to overcome the influence of modeling errors in the field of model-based fuzzy control for nonlinear systems have been offered by Kiriakidis [34], Chen et al. [35], and Cao and Frank [36]. The genetic algorithm (GA) is a global optimal search tool. By working with a population of solutions, the GA can seek many local minima and thus increase the likelihood of finding the global minimum [37]. The GA employs the Darwinian survival-of-the-fittest theory to yield better characteristics for the individuals in a population and to perform a random information exchange to produce superior individuals [38]. During the evolution, GAs work with a population of individuals called chromosomes represented by binary or real-numbered strings and modify the population through three genetic operations: (1) reproduction, (2) crossover, and (3) mutations. The modified new population is called offspring. The crossover operation is used to combine the information of the selected chromosomes (parents) and generate the offspring. The mutation operation is used to change the offspring genes [39]. Recently, numerous reports on the success of GA applications in control systems have appeared in the literature (see [40-42]). For instance, Navale and Nelson [41] developed an adaptive fuzzy logic controller and made use of GAs to improve the fuzzy rule matrix and fuzzy membership functions for the air handling unit in heating, ventilating, and air conditioning systems. Martínez et al. [40] developed a tracking controller for the dynamic model of a unicycle mobile robot by integrating a kinematic and a torque controller based on type-2 fuzzy logic theory and GAs. Kim and Kang [42] proposed a multiobjective optimal fuzzy control system for the building structure response reduction of a wind-excited tall building by using multiobjective GAs. In this paper, the Improved Genetic Algorithm (IGA) is adopted due to its better performance compared to that of a traditional GA [39, 43]. Cryptography has always been very important in military and business applications for maintaining the secrecy of messages and to prevent information tampering and eavesdropping. This is especially true since the number of transactions being made via the Internet continues to increase at a pace [44]. In this regard, a direct solution to protect messages is to use symmetric encryption. Symmetric encryption uses the same key for both encryption and decryption [45]. There are two basic types of symmetric encryption algorithms, the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) algorithms [46]. There have been numerous recent reports on the success of symmetric encryption [47-50]. Therefore, the security problem of master-slave systems based on chaotic circuits needs to develop a high secure communication system, which is the other subject of this study. Almost all existing research on controlling chaos has used fuzzy models to approximate chaotic systems. Although using fuzzy models to approximate the chaotic systems is simpler than using neural networks (NN), the NN models better approach the chaotic systems by iterative training and weight adjustment. That is to say, NN models will have fewer modeling errors which will be much less than fuzzy models. In addition, this study combines the concepts of chaotic synchronization and cryptography to achieve a more secure communication system. First, we use the n-shift cipher and key to the original message of transmission for encryption. The encrypted message is reencrypted using chaotic synchronization. Consequently, an effective method is proposed via a neural-network- (NN-) based technique to realize the optimal H exponential synchronization of multiple time-delay chaotic (MTDC) systems, so that the trajectories of slave systems can approach those of master systems and the effect of external disturbance on control performance is attenuated to a minimum level. The MTDC systems are first approximated by the NN model approach. Next, in terms of Lyapunov's direct method, a delay-dependent criterion is derived to guarantee the exponential stability of the error system between the master and the slave systems. Subsequently, the stability conditions are reformulated into linear matrix inequalities (LMIs). On the basis of the LMIs, a model-based fuzzy controller is then synthesized to stabilize the MTDC systems. Because of the GA capability in random search for global optimization, the lower bound and upper bound of the search space can be set so that the GA will seek better feedback gains of fuzzy controllers in order to speed up the synchronization based on the feedback gains via LMI-based approach. Furthermore, the Improved Genetic Algorithm (IGA) is adopted due to its better performance compared to that of a traditional GA. Based on the IGA, a fuzzy controller is synthesized not only to realize the exponential synchronization but also to achieve optimal H performance by minimizing the disturbance attenuation level. Finally, the error of the recovered message is stated using the n-shift cipher and key. The remainder of this paper is organized as follows. In Section 2, we establish NN models representing chaotic systems and a model-based fuzzy controller. In Section 3, a robust fuzzy control design is proposed to realize the exponential optimal H synchronization. The design algorithm is shown in Section 4. In Section 5, the effectiveness of the proposed approach is illustrated by a numerical simulation. Finally, the paper is concluded in Section 6.

2. Problem Formulation

Consider two multiple time-delay chaotic (MTDC) systems in master-slave configuration. The dynamics of the master system (N ) and slave system (N ) are described as follows: where f(·), , H (·), and are the nonlinear vector-valued functions, τ (k = 1,2,…, g) are the time delays, U(t) is the control output, and D(t) denotes the external disturbance. In this section, we first use the n-shift cipher and key to the original message of transmission for encryption. The encrypted message is reencrypted by using chaotic synchronization. A neural network (NN) model is then established to approximate the MTDC system. The dynamics of the NN model are then converted into a linear differential inclusion (LDI) state-space representation. Finally, based on the LDI state-space representation, a fuzzy controller is synthesized to realize the synchronization of the MTDC systems.

2.1. Chaotic Cryptosystem

A chaotic synchronization cryptosystem is shown in Figure 1. It consists of the encrypter (the master system and an encryption function ζ(·)) and decrypter (the slave system and a decryption function π(·)). First, the message s(t) and encryption key ϑ(t) form an encrypted message ι(t) via an encryption function. The encrypted message ι(t) is then combined in the master system. When the chaotic systems are synchronized in the decrypter and encrypter, we can obtain the message in the encrypter. Next, the message can be decrypted by decryption key ϑ(t) in the decryption function π(·). A decryption function is then used to reveal the message.
Figure 1

Block diagram of the chaotic synchronization cryptosystem.

We use an n-shift cipher for encryption [47]. The n-shift cipher is defined bywhere h is chosen such that message s(t) and encryption key ϑ(t) lie within (−h, h). Here, ι(t) denotes the encrypted signal, and F(·) is the following nonlinear function:This function is shown in Figure 2.
Figure 2

Nonlinear function used in continuous shift cipher.

The corresponding decryption function is the same as the encryption functionwhere is the recovered decryption signal, and π(·) is the decryption function. In the n-shift cipher, the key signal ϑ(t) is used n times to encrypt the plain signal. The encrypted message ι(t) is then combined in the master system. The dynamics of the master system (N ) and slave system (N ) are then described as follows:

2.2. Neural-Network (NN) Model

The MTDC system can be approximated by an NN model, as shown in Figure 1, that has S layers with J (σ = 1,2,…, S) neurons for each layer, in which x 1(t) ~ x (t) are the state variables and x 1(t − τ 1) ~ x 1(t − τ ), x 2(t − τ 1) ~ x (t − τ ) are the state variables with delays. Superscripts are used to distinguish the layers and the number of the layers as a superscript to the names for each of these variables. Thus, the weight matrix for the σth layer is written as W . Moreover, it is assumed that v (t)  (ς = 1,2,…, J ; σ = 1,2,…, S) is the net input and T(v (t)) is the transfer function of the neuron. Subsequently, the transfer function vector of the σth layer is defined aswhere T(v (t))  (ς = 1,2,…, J ) is the transfer function of the ςth neuron. The final output of NN model can then be inferred as follows:where with

2.3. Linear Differential Inclusion (LDI)

To deal with the synchronization problem of MTDC systems, this study establishes the following LDI state-space representation for the dynamics of the NN model, described as [26, 51]where ϕ is a positive integer, a(t) is a vector signifying the dependence of h (·) on its elements, are constant matrices, and O(t) = [o 1(t) o 2(t) ⋯ o (t)]. Furthermore, it is assumed that h (a(t)) ≥ 0 and ∑ h (a(t)) = 1. Based on the properties of LDI, without loss of generality, we can use h (t) instead of h (a(t)). The following procedure represents the dynamics of the NN model (4) by LDI state-space representation [26]. First, the output T(v (t)) satisfieswhere g and g denote the minimum and the maximum of the derivative of T(v (t)), respectively, and are given in the following:Then, the min-max matrix G of the σth layer is defined as follows:Based on the interpolation method, the transfer function T(v (t)) can be represented as follows [26]:where the interpolation coefficients h (t)∈[0,1] and ∑ 1 h (t) = 1. Equations (8) and (16) show thatTherefore, the final output of the NN model (9) can be reformulated as follows:whereand b , n , and p (ς = 1,2,…, J ) represent the variables φ of the ςth neuron of the first, second, and the Sth layer, respectively. Finally, according to (12), the dynamics of the NN model (18) can be rewritten as the following LDI state-space representation:where h (t) ≥ 0, ∑ h (t) = 1, ϕ is a positive integer, and C is a constant matrix with appropriate dimension associated with C . Moreover, the LDI state-space representation (20) can be rearranged as follows:where A and are the partitions of C corresponding to the partitions of Λ(t).

2.4. Fuzzy Controller

On the basis of the state-feedback control scheme, a model-based fuzzy controller is able to ensure that the slave system can synchronize with the master system. The output error is defined as and the fuzzy controller is in the following form:where l = 1,2,…, m, and m is the number of IF-THEN rules of the fuzzy controller, and M (η = 1,2,…, δ) are the fuzzy sets. Therefore, the final output of this fuzzy controller can be inferred as follows:with w (t) ≡ ∏ M (e (t)), and M (e (t)) is the grade of membership of e (t) in M . Furthermore, and for all t. In the past, solving the feedback gains K (l = 1,2,…, m) was based on experience and the trial and error. It will therefore be advantageous to develop a powerful tool for solving suitable K (l = 1,2,…, m). Hence, the solving algorithm is constructed by GA in this paper [43]. From the above, the NN models of the master and slave chaotic systems are described by the following LDI state-space representation and a model-based fuzzy controller is designed by the state-feedback control scheme. Therefore, the master and slave chaotic systems can be rewritten as follows, respectively:

2.5. Improved Genetic Algorithm

To obtain a better performance of the proposed method, for the GA-based control gain design, this paper adopts the IGA whose superiority over standard GAs has been proposed and verified in [39, 43]. The key point of the IGA is that the chromosomes after crossover are averagely arranged in the central and boundary regions of the search domain. This crossover gives the next generation more potential to find the global optimal solution. The improved crossover is stated as follows [43, 52]: in whichos 1 ~ os 4 are the chromosomes of the next generation, P 1 and P 2 are the two chromosomes chosen from the parent, and max(P 1, P 2) and min(P 1, P 2) are the new chromosomes in which the genes are the maximum and minimum, respectively, of the genes in the two chromosomes P 1 and P 2. para max , para min are the upper bound and lower bound of the ϑth genes, respectively, in the search space. The parameter w ∈ [0,1] is arbitrarily chosen. Equations (26) and (29) produce two new chromosomes distributed in the central region of the search domain, whereas (27) and (28) produce two new chromosomes distributed in the boundary region. The fitness function for the application in this paper is defined as follows:in which Fit(Λ) is the fitness value of the Λth chromosome in a population, e Λ(t) is the error of the Λth chromosome in a population, andwhere s Λ is a variable for evaluating the stability of the systems and pv is a punishing value and will be set in the experiment. The mutation operation is to change the genes of the chromosomes. Consequently, the features of the chromosomes inherited from their parents can be changed [43]. Three new offspring will be generated by the mutation operation:where b , i = 1, 2, 3,…, no_vars, can only take the value of 0 or 1; Δnos, i = 1,2, 3,…, no_vars, are randomly generated numbers such that para min ≤ os + Δnos ≤ para max . These three new offspring will then be evaluated using the fitness function of (31). A real number will be generated randomly and compared with a user-defined number . If the real number is smaller than p , the one with the largest fitness value among the three new offspring will replace the chromosome with the smallest fitness f in the population. If the real number is larger than p , the first offspring nos1 will replace the chromosome with the smallest fitness value f in the population if f(nos1) > f ; the second and the third offspring will do the same. p is effectively the probability of accepting a bad offspring in order to reduce the chance of converging to a local optimum.

3. Stability Analysis and Chaotic Synchronization via Fuzzy Control

In this section, the synchronization of multiple time-delay chaotic (MTDC) systems is examined under the influence of modeling error. The exponential synchronization scheme of the MTDC systems is described below.

3.1. Error Systems

From (1) and (2), the dynamics of the error system under the fuzzy control (5) can be described as follows:wherewith Suppose that there exists a bounding matrix ΘR such thatfor the trajectory E(t), and the bounding matrix ΘR can be described as follows:where R is the specified structured bounding matrix and ‖ε ‖ ≤ 1, for i = 1,2,…, ϕ; l = 1,2,…, m. Equations (37) and (38) show thatNamely, Φ(t) is bounded by the specified structured bounding matrix R.

Remark 1 (see [35]).

The following simple example describes the procedures for determining ε and R. First, assume that the possible bounds for all elements in ΘR are where −r ≤ Θr ≤ r for some r with q, s = 1,2, 3; i = 1,2,…, ϕ, and l = 1,2,…, m. A possible description for the bounding matrix ΘR is where −1 ≤ ε ≤ 1 for q = 1,2, 3. Notice that ε can be chosen by other forms as long as ‖ε ‖ ≤ 1. The validity of (37) is then checked in the simulation. If it is not satisfied, we can expand the bounds for all elements in ΘR and repeat the design procedure until (37) holds.

3.2. Delay-Dependent Stability Criterion for Exponential H Synchronization

In this subsection, a delay-dependent criterion is proposed to guarantee the exponential stability of the error system described in (34). Moreover, in general, there will always be some noise or disturbances that may cause instability. The effect of the external disturbance D(t) will negatively affect the performance of chaotic systems. To reduce the effect of the external disturbance, an optimal H scheme is used to design a fuzzy control such that the effect of the external disturbance on control performance can be attenuated to a minimum level. In other words, the fuzzy controller (5) simultaneously realizes exponential synchronization and achieves the optimal H control performance in this study. Before examining the stability of the error system, some definitions and lemma are given below.

Lemma 2 (see [53]).

For the real matrices A and B with appropriate dimension,where ƛ is a positive constant.

Definition 3 (see [54]).

The slave system (2) can exponentially synchronize with the master system (1) (i.e., the error system (38) is exponentially stable) if there exist two positive numbers α and β so that the synchronization error satisfieswhere the positive number β is called the exponential convergence rate.

Definition 4 (see [13–16]).

The master system (1) and slave system (2) are said to be in exponential H synchronization if the following conditions are satisfied:where the parameter ρ is called the H -norm bound or the disturbance attenuation level. If the minimum ρ is found to satisfy the above conditions (i.e., the error system can reject the external disturbance as strongly as possible), the fuzzy controller (5) is an optimal H synchronizer [14]. With zero disturbance (i.e., D(t) = 0), the error system (34) with the fuzzy controller (5) is exponentially stable. Under the zero initial conditions (i.e., E(t) = 0 for t ∈ [−τ max, 0], in which τ max is the maximal value of τ 's) and a given constant ρ > 0, the following condition holds:

Theorem 5 .

For given positive constants a and n, if there exist two symmetric positive definite matrices P and ψ , as well as two positive constants ξ and ρ, so that the following inequalities hold, then the exponential H synchronization with the disturbance attenuation ρ is guaranteed via the fuzzy controller (5): where G ≡ A − BCK , for i = 1,2,…, ϕ; k = 1,2,…, g, and l = 1,2,…, m.

Proof

Let the Lyapunov function for the error system (34) be defined as where the weighting matrices P = P > 0 and ψ = ψ > 0. We then evaluate the time derivative of V(t) on the trajectories of (34) to obtainAccording to Lemma 2 and (47), we have From (50), we havewhere Integrating (51) from t = 0 to t = ∞, the following inequality is obtained:With zero initial conditions, (i.e., E(t) ≡ 0 for t ∈ [−τ max, 0]), we haveThat is (44) and the H control performance is achieved with a prescribed attenuation ρ. Sincewe can get the following inequality from (51):Then, we can obtainwhere . Equations (46) and (57) show thatThat is, . Therefore, we conclude thatHence, on the basis of Definition 3, the error system (34) with the fuzzy controller (5) is exponentially stable for D(t) = 0.

Corollary 6 .

Equations (45a) and (45b) can be reformulated into LMIs via the following procedure. By introducing the new variables, Q = P −1, F = K Q and , (45a) and (45b) can be rewritten as follows: for i = 1,2,…, ϕ; k = 1,2,…, g, and l = 1,2,…, m. According to Schur's complement [26], it is easy to show that the linear matrix inequalities in (60a) and (60b) are equivalent to the following LMIs in (61a) and (61b): where Thus, Theorem 5 can be transformed into an LMI problem, and efficient interior-point algorithms are now available in Matlab LMI Solver to solve this problem.

Corollary 7 (see [55]).

In order to verify the feasibility of solving the inequalities in (61a) and (61b) using the LMI Solver (Matlab), interior-point optimization techniques are utilized to compute feasible solutions. These techniques require that the LMI systems are constrained to be strictly feasible; that is, the feasible set has a nonempty interior. For feasibility problems, the LMI Solver by feasp (feasp is the syntax used to test the feasibility of a system of LMIs in MATLAB) is shown as follows:(in this study, (63a) can be represented as (61a) and (61b)) as where L(x) is symmetric matrix and I is identity matrix. From the above, the LMI constraint is always strictly feasible in x, t and the original LMI (63a) is feasible if and only if the global minimum t min (the global minimum t min is the scalar value returned as the output argument by feasp) of (63b) satisfies t min < 0. In other words, if t min < 0 will satisfy (61a) and (61b), then the stability conditions (45a) and (45b) in Theorem 5 can be met. The obtained fuzzy controller (5) can then exponentially stabilize the error system, and the H control performance is achieved at the same time.

Corollary 8 .

In order to achieve exponential optimal H synchronization, the fuzzy control design is formulated as the following constrained optimization problem: More details on searching for the minimum ρ are given as follows: the positive constant ξ is minimized by the mincx function of Matlab LMI Toolbox. Therefore, the minimum disturbance attenuation level can be obtained.

Remark 9 .

In order to reduce the computational burden, this study sets the positive constants a and n as unity.

Remark 10 .

It is important to reduce the effect of external disturbances in the synchronization process. The H -norm bound ρ is generally chosen as a positive small value less than unity for the attenuation of the disturbance. A smaller ρ is desirable as this yields better performance. However, a smaller ρ will result in a smaller ξ, making stability condition (45a) more difficult to satisfy.

Remark 11 .

According to (37), Φ(t) is assumed to be bounded by the specified structured bounding matrix R, and a larger Φ(t) results in a larger R. Since the matrices Δ must be negative definite to meet stability condition (45a), a larger R will make Theorem 5 more difficult to satisfy.

Remark 12 .

Since inequality (60a) must be negative definite to meet the stability condition, the larger delay τ will make Theorem 5 more difficult to satisfy.

4. Algorithm

The complete design procedure can be summarized as follows.

Problem 1 .

Given two multiple time-delay chaotic systems with different initial conditions and cryptography, the problem is centered on how to synthesize a fuzzy controller to realize the exponential optimal H synchronization and achieve a more secure communication system. We can solve this problem based on the following steps. Step 1. The input message (plaintext) and encryption key form an encrypted signal via an n-shift cipher. Step 2. The encrypted message is then combined in the master system. Step 3. Construct the neural network (NN) models of the master system (6) and the slave system (7), respectively. On the basis of the interpolation method, the NN models are then converted into LDI state-space representations. Step 4. On the basis of the state-feedback control scheme, the feedback gains of the model-based fuzzy controller (23) are synthesized to exponentially stabilize the error system by the Matlab LMI Toolbox. Step 5. Based on IGA process shown in Section 2.5, obtain the feedback gains to stabilize the MTDC systems. Step 6. Define the synchronization error , and the dynamics of the error system (34) can then be obtained. Step 7. Based on Corollary 8, the positive constant ξ is minimized by the mincx function of Matlab LMI Toolbox; we then have the minimum disturbance attenuation level. Step 8. The matrices Q, F , and can be obtained with the minimum disturbance attenuation ρ min. Step 9. Based on the decryption function, we can then retrieve the original message from the encryption signal.

5. Numerical Example

The following example is given to illustrate the effectiveness of the proposed algorithm.

Problem 2 .

The purpose of this example is to synthesize a fuzzy controller and cryptography to achieve optimal H exponential synchronization and a more secure communication system. Consider a pair of modified multiple time-delay Chen's chaotic systems in master-slave configuration, described as follows (Figure 4): where [x 1(t) x 2(t) x 3(t)] and are the state vectors of master and slave systems, respectively. Let the different initial conditions of master and slave systems be [x 1(0) = −0.7 x 2(0) = 4 x 3(0) = 1] and , respectively, and let the external disturbance be D(t) = 0.1sin⁡(1.3t).
Figure 4

(a) Chaotic behavior of the master system (65). (b) Chaotic behavior of the slave system (66) without control.

Solution.  We can solve the above problem according to the following steps (Figure 5).
Figure 5

(a) Original signal s(t). (b) Encrypted signal ι(t).

Step 1. Assuming a 6-shift cipher, the ciphertext is defined bywhere s(t) = 0.3sin⁡(2t) is the input message, ϑ   (t) = 6 is the encryption key, and Step 2. The encrypted message is then combined in the master system (65): Figure 6 shows the chaotic behaviors of the master system (69) with encrypted signal.
Figure 6

Chaotic behavior of the master system (69).

Step 3. Establish the NN models for master and slave systems via backpropagation algorithm, respectively. First, the NN model to approximate the master chaotic system is constructed by 10-3, and the transfer functions of all hidden neurons are chosen as follows: On the other hand, the transfer functions of all output neurons are chosen as follows: After training, we can obtain the following connection weights (the indices in W state that the weight of the σth layer in the NN model represents the connection to the ςth neuron from the ϑth source): Then, the net inputs of the σth (σ = 1,2) layer are (the symbol v denotes the net input of the ςth neuron of the σth layer in the NN model, and the indices σ and ς shown in h (φ = 1,2) indicate the same thing) as follows: According to (14), the minimum and the maximum of the derivative of each transfer function shown in (70) and (71) can be obtained as follows: To simplify the notation, we let g 1 = g 0 1, g 1 = g 1 1, g 2 = g 0 2, and g 2 = g 1 2. Then, based on the interpolation method, we have Based on (15), letand then, Plugging (73a)–(73b) into (76) leads towhere Next, by renumbering the matrices shown in (79), the NN model of the master system can be rewritten as the following LDI state-space representation: where τ 1 = 0.15, τ 2 = 0.01, Similarly, the connection weights of the NN model for the slave system are obtained as follows: Step 4. The procedures of constructing the NN model for the slave system are similar to those of for that the master system, and we then have the NN model of the slave systemwith τ 1 = 0.15, τ 2 = 0.01, and B is a identity matrix. The responses of and for the original systems and the NN models are shown in Figures 7(a) and 7(b).
Figure 7

(a) The responses of for original system and NN model. (b) The responses of for original system and NN model.

Step 5. To synchronize the master and slave systems, a fuzzy controller is synthesized as follows: where M 1 and M 2 are the membership functions for each e 1 (see Figure 8):
Figure 8

Membership functions of the fuzzy controller.

According to (18), we have the overall fuzzy controller:with w (t) ≡ M (e 1(t)),  . According to (34), the dynamics of the error system is obtained as follows:where D ≡ A − BCK , with U(t) = −∑ 2 h (t)K Y (t), Γ ≡ f(X(t)) + ∑ 2 H (X(t − τ )), . Step 6. Design the feedback gains. Based on IGA, obtain the performance of the feedback gains in this paper. The Improved GA (IGA) is adopted for its better performance over traditional GA [39, 43]. Before executing the search process of the IGA, some specifications are given in Table 1. Note that parameters w and P are determined by repeating the experiments with various w and P as shown in Table 2. The values of w and P with best fitness value are selected.
Table 1

Specifications for IGA.

Population size32

Number of generations500

Coding of chromosomeReal-numbered string

Fitness functionEquation (31) with t f = 600, s k = L(x) in (63a), and pv = −10

Method of reproductionRoulette wheel selection

Method of crossoverImproved crossover equations (26)–(29) with w = 0.3

Probability of mutation (P m)0.08
Table 2

IGA experiments with various w and P .

w P m
0.010.020.030.040.050.060.070.080.090.1
0.90.66310.66390.66450.6230.66260.6630.66280.66260.66190.663
0.80.65980.66330.66470.66410.66350.66430.66310.66330.6590.6611
0.70.6640.66430.66360.6620.66380.66310.65990.66280.66270.6625
0.60.66230.66380.66170.66230.66190.66330.65950.6610.66120.6592
0.50.65990.66310.66420.66320.66270.66210.66230.66340.66350.6633
0.40.66130.66250.65950.66440.66370.66290.66180.65930.66310.6614
0.30.66210.66430.66230.66340.66430.66350.66350.66440.66290.6618
0.20.66440.66370.66170.66130.66270.66430.66280.66180.65990.6628
0.10.66230.66440.66280.6610.66110.6620.65980.66210.66110.6635
After executing the IGA search process, the resulting feedback gains are obtained as follows: Evolution of the fitness values are shown in Figure 9.
Figure 9

Fitness value of IGA.

Step 7. Based on (75) and (79)–(90), the LMI in (61a) and (61b) can be solved via Matlab LMI Toolbox. In accordance with Remark 1, the specified structured bounding matrices Y and κ are set to be and  . Based on Corollary 8, the positive constant c is minimized by the mincx function of Matlab LMI Toolbox: ξ min = 1.315 × 10−2; we then have the minimum disturbance attenuation level ρ min = 0.11467. Step 8. The common solutions, P, F 1, F 2, , and , of stability conditions (45b) and (45c) can be obtained with the best value t min of LMI Solver (Matlab) as −8.68953 × 10−7: Figure 10 displays the state responses of both the master and slave systems. The chaotic behaviors of the master and slave systems are shown in Figure 11. Moreover, Figure 12 illustrates the synchronization errors (e 1, e 2 and e 3) which converge to zero. Furthermore, the assumption of ‖Φ(t)‖ ≤ ‖∑ 8192∑ 2 h (t)h (t)ΔR E(t)‖ is satisfied from the illustration shown in Figure 13.
Figure 10

State responses of both master and slave systems.

Figure 11

The chaotic behaviors of the master and the slave systems.

Figure 12

State responses of the error system.

Figure 13

Plots of ‖Φ(t)‖ (blue line) and ‖∑ 8192∑ 2 h (t)h (t)ΔR E(t)‖ (red line).

Step 9. When the slave system synchronizes with the master system, we can retrieve the original message (Figure 13) from the output error signal and the decryption function. The corresponding decryption function is the same as the encryption function:where is the output message (output error Y (t)), ϑ(t) = 6 is the decryption key, and Figure 15 illustrates recovered error of the message s(t). Finally, the simulation results demonstrate that the exponential H synchronization of MTDC secure communication systems can recover the transmitted message by the designed fuzzy controller.
Figure 15

Recovered error of the message s(t).

6. Conclusion

In this paper, exponential synchronization multiple time-delay chaotic (MTDC) systems with optimal H performance and cryptography were combined to achieve a more secure communication system. First, we applied the n-shift cipher and key to the original message of transmission for encryption. The encrypted message is reencrypted using chaotic synchronization. The MTDC systems were then approximated using an NN model-based approach. Next, a robust model-based fuzzy control design was proposed to overcome the effect of modeling error between the MTDC systems and the NN models. In terms of Lyapunov's direct method, a delay-dependent stability criterion was derived to ensure that the slave system was able to exponentially synchronize with the master system. Subsequently, the stability conditions of this criterion were reformulated into linear matrix inequalities (LMIs). On the basis of the LMIs, a model-based fuzzy controller was then synthesized to stabilize the MTDC systems. Due to the capability of GA in random search for global optimization, the lower bound and upper bound of the search space can be set so that the GA will seek better feedback gains of fuzzy controllers in order to speed up the synchronization based on the feedback gains via LMI-based approach. Furthermore, according to the IGA which is demonstrated to have better performance than that of a traditional GA, we synthesized a fuzzy controller to realize the exponential H synchronization of the chaotic master-slave systems and reduce the H -norm from disturbance to synchronization error at the lowest level. On the other hand, the output error of the recovered message was stated using the n-shift cipher and key (Figure 14). Finally, the simulation results demonstrated that the exponential H synchronization of two different MTDC systems can be achieved by the designed fuzzy controller.
Figure 14

Recovered message .

  12 in total

1.  Synchronization in chaotic systems.

Authors: 
Journal:  Phys Rev Lett       Date:  1990-02-19       Impact factor: 9.161

2.  Exponential H(infinity) synchronization of general discrete-time chaotic neural networks with or without time delays.

Authors:  Donglian Qi; Meiqin Liu; Meikang Qiu; Senlin Zhang
Journal:  IEEE Trans Neural Netw       Date:  2010-07-01

3.  Model-based synthetic fuzzy logic controller for indirect blood pressure measurement.

Authors:  Jia-Jung Wang; Chin-Teng Lin; Shing-Hong Liu; Zu-Chi Wen
Journal:  IEEE Trans Syst Man Cybern B Cybern       Date:  2002

4.  Tuning of the structure and parameters of a neural network using an improved genetic algorithm.

Authors:  F F Leung; H K Lam; S H Ling; P S Tam
Journal:  IEEE Trans Neural Netw       Date:  2003

5.  Helicopter trimming and tracking control using direct neural dynamic programming.

Authors:  R Enns; Jennie Si
Journal:  IEEE Trans Neural Netw       Date:  2003

6.  Neural network-based control design: an LMI approach.

Authors:  S Limanond; J Si
Journal:  IEEE Trans Neural Netw       Date:  1998

7.  Optimal exponential synchronization of general chaotic delayed neural networks: an LMI approach.

Authors:  Meiqin Liu
Journal:  Neural Netw       Date:  2009-04-22

8.  Robust neural network motion tracking control of piezoelectric actuation systems for micro/nanomanipulation.

Authors:  Hwee Choo Liaw; Bijan Shirinzadeh; Julian Smith
Journal:  IEEE Trans Neural Netw       Date:  2009-01-13

9.  New delay-dependent exponential H(infinity) synchronization for uncertain neural networks with mixed time delays.

Authors:  Hamid Reza Karimi; Huijun Gao
Journal:  IEEE Trans Syst Man Cybern B Cybern       Date:  2009-07-28

10.  Stability analysis of interval type-2 fuzzy-model-based control systems.

Authors:  H K Lam; Lakmal D Seneviratne
Journal:  IEEE Trans Syst Man Cybern B Cybern       Date:  2008-06
View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.