Documente Academic
Documente Profesional
Documente Cultură
DOI 10.1007/s11071-015-2116-z
ORIGINAL PAPER
Abstract In this paper, we present a new scheme for by inclusion method in the chaotic discrete-time system
the secured transmission of discrete information based dynamics. By this way, the parameters used as secret
on hyperchaotic discrete dynamics. The system is a keys cannot be identied with usual techniques. Sim-
modied-Henon hyperchaotic discrete-time oscillator ulation results are presented to highlight the perfor-
considered as transmitter and a delayed step-by-step mances of the proposed method. One of the main contri-
observer used as receiver. The transmitter parameters butions of this paper is to demonstrate the feasibility of
play the role of secret keys of the transmission scheme. discrete realization of a chaotic observer-based secured
To increase the robustness of the secure data transmis- transmission scheme. Indeed, experimental implemen-
sion against known plain-text attacks, the message to be tation results using Arduino Uno board validate the pro-
sent is encrypted by additional secret keys and inserted posed approach, since it exhibits good performances of
throughput and cost in terms of resources used.
H. Hamiche (B) S. Guermah S. Djennoune
Laboratoire de Conception et Conduite des Systmes de Keywords Hyperchaotic oscillator Step-by-step
Production (L2CSP), UMMTO, BP 17 RP, 15000 observer Robustness Chaotic synchronization
Tizi-Ouzou, Algeria
e-mail: hamid.hamiche07@gmail.com
Arduino Uno board
S. Guermah
e-mail: saidguermah@yahoo.fr
1 Introduction
S. Djennoune
e-mail: s_djennoune@yahoo.fr
Synchronization of chaotic or hyperchaotic dynamics
R. Saddaoui K. Hannoun has received a lot of attention in the last decades [1,2].
Dpartement dElectronique, Facult de Gnie Electrique This interest is increased by practical applications in
et de lInformatique, UMMTO, BP 17 RP, 15000
Tizi-Ouzou, Algeria
different elds, particularly in secure/private commu-
e-mail: ryso.dylca21@yahoo.fr nications [35]. Many different methods have been
K. Hannoun
presented for the synchronization of chaotic systems
e-mail: katiahannoun@gmail.com with linear or nonlinear feedback control [6,7], adap-
tive control [8], passive control [9], impulsive control
M. Laghrouche [10] or observer approach [11]. Due to its great poten-
Laboratoire dAnalyse et Modlisation des Phnomnes
Alatoires, UMMTO, BP 17 RP, 15000 Tizi-Ouzou,
tial in secure/private communications domain, the gen-
Algeria eration of hyperchaos has recently become a focal topic
e-mail: larouche_67@yahoo.fr for research [12,13].
123
H. Hamiche et al.
It should be noted that most of the works on advantages that it offers. It exhibits good performances
the secure/private communications based on the syn- of throughput and cost in terms of resources used. In
chronization of chaotic or hyperchaotic systems have addition, the use of an Arduino simplifies the amount
been devoted to dynamical systems in continuous time of hardware and software development necessary to get
[14,15], whereas in many cases, the systems are pre- a system running. On the software side, Arduino pro-
ferred to be in real time and in discrete time. Another vides a number of libraries to make programming the
disadvantage of the classical chaotic or hyperchaotic microcontroller easier. The simplest of these are func-
systems is the use of complex electronic systems made tions to control and read the I/O pins rather than having
of analog electronic components that involve op-amps, to fiddle with the bus/bit masks normally used to inter-
resistors, capacitors and diodes. Often, this complexity face with the Atmega I/O (This is a fairly minor draw-
leads to a tedious implementation [16]. The new trend back). Also, note that, board programming microcon-
is therefore to derive discrete models which faithfully trollers are far more simpler compared to older existing
represent the dynamics of such systems. This is mainly implementations [19,20,22]. In our work, transmission
due to two reasons. The first is that, in practice, mea- scheme is constructed around two Arduino Uno boards,
surements are usually carried out at specific time inter- one of them acting as a transmitter and the other as a
vals. Secondly, digital simulations can be performed receiver. Each board is connected to an individual com-
easily and quickly either on a microcontroller [1721] puter what permits to visualize the experimental results
or on a FPGA board [22]. of the transmitter and the receiver.
In secure/private domain, it is known that, for the The work is organized as follows: In Sect. 2, the
chaos-based cryptosystem, the keys are usually the principle of the proposed method is presented by study-
chaotic system parameters. So, from a control theory ing the transmitter and the receiver of the transmission
point of view, the possibility to reconstruct the keys for system. In Sect. 3, we expose the simulation results.
chaos-based cryptosystem is equivalent to the possibil- In Sect. 4, we study the robustness of the proposed
ity to identify the parameters of the chaotic system [4]. transmission scheme. Section 5 exposes the experi-
Consequently, a robust and reliable chaos-based cryp- mental results of the proposed transmission scheme
tosystem should be designed such that its parameters be into Arduino board. Finally, we give some concluding
not identifiable. In this paper, solutions are provided to remarks.
propose an new robust secure data transmission based
on hyperchaotic synchronization. Here, the transmit- 2 Description of the private transmission chain
ter is a discrete hyperchaotic modified-Henon system
and the receiver is a discrete step-by-step observer. In this work, a communication system based on the
At the level of transmitter, the states of the discrete- hyperchaotic digital dynamical system is designed. The
time hyperchaotic system are added to the message to global scheme of the proposed system for private digi-
be transmitted. Then, the embedded message is intro- tal communications is shown in Fig. 1. The developed
duced by the inclusion method in the dynamics of the method is presented as follows:
discrete-time system to make its structure more com-
plex. By using this strategy, the number of parame- 2.1 Presentation of the transmitter
ters is increased. Therefore, the system becomes robust
against known-plaintext attacks. The discrete-time hyperchaotic system is the modified-
In this work, we have chosen to show the experimen- Henons map (see for example [23]). A simplified ver-
tal feasibility of our approach. Here, we have realized sion of the discrete system that we propose is:
an implementation of a secure digital data transmis-
sion system based on the synchronization of chaotic x1 (k + 1) = a x22 (k) bx3 (k)
systems using two Arduino Uno boards. To the best x2 (k + 1) = x1 (k) (1)
of our knowledge, in the discrete case, this type of x3 (k + 1) = x2 (k)
implementation has not been done in the literature;
there are only implementations of chaotic oscillators where x = [x1 x2 x3 ]T R3 denotes the state vector.
using microcontrollers [19,20], and FPGAs [22]. The Chaotic behavior of System (1) is obtained with para-
choice of the Arduino Uno board is motivated by the meters values a = 1.76 and b = 0.1. Initial conditions
123
Analysis and implementation of a novel robust transmission scheme
Transmitter Receiver
1
x1
1
Key
2
0 0.1 0.2 0.3 0.4 0.5
Time(s)
Hyperchaotic discrete y(k) Discrete
system Observer
Fig. 3 State x1 response of modified-Henon system
Transmission
2
channel
1
Fig. 1 Transmission chain
2 0
x2 1
1
2
0 0.1 0.2 0.3 0.4 0.5
0
x3
Time(s)
2
2 1.5 1 0.5 0 0.5 1 1.5 2 1
x
1
0
x3
x1 (k + 1) = a x22 (k) bx3 (k) chosen with special care. In our case, we must respect
x (k + 1) = x1 (k) (2) the following values: c 0.01, d 0.01, e 0.01,
2 f 0.01, g 0.01 and h 0.01.
x3 (k + 1) = x2 (k) + m c (k)
123
H. Hamiche et al.
2.2 Presentation of the receiver All states and the message m(k) of the System (2)
are bounded. This ensures that Assumption A1 is
In this part, System (2) with output y(k) = x2 (k) is con- verified.
sidered. For the reception, based on the works of Bel- Observability of System (2)
mouhoub et al. [24] and Djema et al. [25], we design a We study the weak local observability of System
delayed discrete observer for System (2) with sampling (2). We calculate the observability matrix in the
period T . In the following, some results on a delayed neighborhood of the equilibrium point (0, 0, 0) of
discrete observer are given. System (2) as below:
2.2.1 Some results of the observability matching dh 0 1 0
condition and left invertibility property O = d( f h) = 1 0 0 (5)
d( f h)
2 0 2x2 b
Consider the following nonlinear system: Since b = 0, we find that rank(O) = 3. This
means that System (2) is locally weakly observ-
x(k + 1) = f (x(k)) + p(x(k))w(k) able. Assumption A2 is verified. Then, the observer
(4)
y(k) = h(x(k)) given below allows to reconstruct all states of Sys-
tem (2). This motivates the choice of output y(k) =
where w(k) represents an unknown input, which can be x2 (k).
a perturbation, a fault, or in our case, a message. The Observability matching condition of System (2)
vector fields f, p : U Rn Rn and h : U Rn In our case, we have:
R are assumed to be real-analytic. The output of System
0
(4) is transmitted to the receiver, which should generate p(x) = 0 (6)
an output vector that converges asymptotically toward 1
the input vector of the transmitter. This constitutes the
left inversion problem. It is possible to design a delayed Now, we calculate O. p as below
discrete observer for System (4). For this, it is necessary 0 1 0 0
to satisfy some assumptions which are given below: O p(x) = 1 0 0 0
0 2x2 b 1
Assumption 1 A1 The states and the unknown per-
turbation are bounded, 0
A2 span {dh, d( f h), ..., d( f n1 h)} is of rank n, O p(x) = 0 (7)
A3 ((dh)T , d( f h)T , ..., d( f n1 h)T ). p = (0, ..., = b
0, )T
Note that the value of is not equal to zero.
where is a nonzero function almost everywhere in Then, the observability matching condition given in
U Rn R. Assumption A3 is called observability Assumption A3 is verified. This explains the choice
matching condition, it guaranties the left invertibility of inserting method of the message m(k) into the
property, i.e., the possibility of recovering all the states third dynamics of System (2). Then, the proposed
and the message w(k) from y(k) and its iterations (see delayed discrete-time observer with a sampling
[25] for more details). time T given below allows to reconstruct all states
In the following, we study the choice of the out- and the transmitted message m(k) of System (2).
put signal in order to guaranty the observability of the Reconstruction of state x1 :
system. Then, we explain that the message inclusion From the second equation of System (2), we have:
verifies the left invertibility of System (2). x2 (k + 1) = x1 (k)
2.2.2 The proposed delayed discrete observer By applying one step delay on the output, we
deduce state x1 as it follows:
Let us consider System (2) which can be rewritten in
x1 (k 1) = y(k) = x1o (k 1) (8)
the form of System (4). In what follows, we check the
validity of Assumptions A1, A2 and A3. Reconstruction of state x3 :
123
Analysis and implementation of a novel robust transmission scheme
2
From the first equation of System (2), we have also: x
1
1.5
a x1 (k + 1) x22 (k) x
1O
x3 (k) = 1
b
Now, let us apply two steps delays on the output. 0.5
a y(k) y 2 (k 2) 0.5
x3 (k 2) = = x3 o(k 2)
b 1
(9)
1.5
0 0.2 0.4 0.6 0.8 1
Reconstruction of message m(k): Time(s)
From the third equation of System (2), we have:
Fig. 6 States time responses: x1 (transmitter) and x10 (receiver)
m(k) = x3 (k + 1) x2 (k) c x1 (k)
d x3 (k) e x12 (k) f x32 (k)
1
g x1 (k)x3 (k) h x12 (k)x3 (k) (10)
0.8
Using Eqs. (810) and by applying three steps
delay, we obtain:
0.6
a y(k) y 2 (k 2) e
1
3) =
m(k 0.4
b
y(k 3) cy(k 2)
0.2
a y(k 1) y 2 (k 3)
d ey 2 (k 2) 0
b 0 0.2 0.4 0.6 0.8 1
2 Time(s)
a y(k 1) y 2 (k 3)
f
b Fig. 7 Synchronization error on the state x1
a y(k 1) y 2 (k 3)
gy(k 2)
b 8
x
3
a y(k 1) y 2 (k 3) 6 x 3O
hy (k 2)
2
b
4
= m 0 (k 3) (11)
2
Subsequently, the observer equations are given by Eqs.
(811). 0
3 Simulation results 4
0 0.2 0.4 0.6 0.8 1
Time(s)
In the following, we present the simulation results
for the synchronization of System (2) exposed in Fig. 8 States time responses: x3 (transmitter) and x3o (receiver)
Sect. 2.1 and its observer exposed in Sect. 2.2. The
additional parameters c, d, e, f, g and h of the trans-
mission scheme are chosen as: c = d = e = f = g = give the synchronization errors (between transmitter
h = 0.001, and the message to send is a square signal and receiver) on states x1 , x3 and message m, respec-
with amplitude equal to 0.1. In our simulation, we have tively. As explained before, the reconstruction of the
chosen the period T equal to 0.04 s. two states is shown step-by-step, i.e., the first recon-
Simulation results for recovering the two states structed state is x1 and the second one is x3 . Finally,
x1 , x3 and the message m of the transmitter are shown the message signal m is reconstructed after synchro-
in Figs. 6, 8 and 10, respectively. Figures 7, 9 and 11 nization of these states.
123
H. Hamiche et al.
4
With regard to the obtained results, we can high-
2 light the advantage of delayed step-by-step observer.
The major advantage of this observer is the exact recon-
0
struction after a short delay, without any error, of the
2
3
4
should be noted that other observers undergo the disad-
vantages of reconstruction errors. Moreover, the con-
6
vergence of the latter observers is asymptotic [13,26].
8
0 0.2 0.4 0.6 0.8 1
Time(s)
4 Performances of the proposed transmission
Fig. 9 Synchronization error on the state x3 scheme
2
This last value of SNR is chosen since in Alvarez et al.
4
[26], it is mentioned that for a practically viable chaotic
6 0.3
0 0.2 0.4 0.6 0.8 1
m
Time(s) m
O
0.2
123
Analysis and implementation of a novel robust transmission scheme
0.15 2
m
mO 1.5
0.1 1
0.5
0.05 0
0.5
0 1
x with p =1.76
1 1
1.5 15
x with p =1.76+10
1 1
0.05 2
4 5 6 7 8 0 2 4 6 8 10
Time(s) Time(s)
Fig. 13 Original message and decrypted message in the presence Fig. 15 State x1 of the modified-Henon system for small
of noise for SNR = 30 dB changes (1015 ) of parameter p1 = a
0.15
m 2
m
O
0.1
1
I
0.05
0
0
1 x with p =0.001
1 4
14
x with p =0.001+10
1 4
0.05
0 2 4 6 8 10 2
Time(s)
0 2 4 6 8 10
Time(s)
Fig. 14 Original message and decrypted message in the presence
of noise for SNR = 40 dB Fig. 16 State x1 of the modified-Henon system for small
changes (1015 ) of parameter p4 = d
123
H. Hamiche et al.
Table 1 Sensitivity to
System Parameters Pi Sensitivity Si (Ni = s Si1 )
parameters
Transmitter: p1 = 1.76 S1 = 1015 N1 = 1014
Modified-Henon
p2 = 0.1 S2 = 1014 N2 = 1013
p3 = 0.001 S3 = 1015 N3 = 1014
p4 = 0.001 S4 = 1015 N4 = 1014
p5 = 0.001 S5 = 1015 N5 = 1014
p6 = 0.001 S6 = 1015 N6 = 1014
p7 = 0.001 S7 = 1015 N7 = 1014
p8 = 0.001 S8 = 1015 N8 = 1014
8
r= (Ni ) = 10(714)+(113) = 10111 .
i=1
5 Experimental results
123
Analysis and implementation of a novel robust transmission scheme
float xout,yout = 0;
char inByte;
int rec = 0;
float s;
float x[15];
float y[15];
float z[15];
float m = 0.4;
const int buttonPin = 2; //Passage en mode daffichage
du signal
int buttonState = 0;
boolean flag = 0;
Transmission const int buttonPin0=3; //Passage en mode daffichage
channel
du signal
int buttonState0=0;
Transmitter Receiver boolean flag0 = 0;
const int analogInPin = A0;
Fig. 18 Photo of the experimental setting for hardware imple- int sensorValue = 0;
mentation and measurements of the modified-Henons hyper-
chaotic signals int outputValue = 0;
x[1] = 1.0;
y[1] = 0.1;
z[1] = 0.1;
m[1] = 0,4;
if (stringComplete) // Serial.println(inputString);
// clear the string:
while(1) function();
void function() for (int i = 1;i<=10;i++) if (i==10)
i = 1;
x[1] = x[10];
y[1] = y[10];
z[1] = z[10];
m[1] = m[10];
mc[i+1] = m[i] + c*x[i] + d*z[i] + e*pow(x[i],2)
Fig. 19 The connection of the Arduino Uno board + f*pow(z[i],2) + g*x[i]*z[i]
+ h*pow(x[i],2)*z[i];
Begin x[i+1] = a-pow(y[i],2)-(b*z[i]);
float a = 1.7600004; y[i+1] = x[i] ;
float b = 0.100000; z[i+1] = y[i] + mc[i]; // z = oldy + mc;
float c = 0.100000; s = y[i];
float d = 0.100000; xout = -30 + (294*z[i]);
float e = 0.100000; yout = 106 + (2650*y[i]);
float f= 0.100000; xout = 1000*x[i];
float g = 0.100000; yout = 1000*z[i];
float h = 0.100000; analogWrite(XoutPin, xout);
float s1,d; analogWrite(YoutPin, yout);
int Partie Entiere; sensorValue = analogRead(analogInPin);
int tab[15]; outputValue = map(sensorValue, 0, 1023, 0, 255);
int XoutPin = 5; m = sensorValue/10000.0;
int YoutPin = 6; end.
123
H. Hamiche et al.
begin
float a = 1.760000;
float b = 0.100000;
float c = 0.100000;
float d = 0.100000;
float e = 0.100000;
float f = 0.100000;
3
x
float g = 0.100000;
float h = 0.1000004;
int value[15];
float x[15];
float y[15];
float z[15];
x1
float mr[15];
int j = 1;
Fig. 20 Experimental result of the chaotic attractor of modified-
Henon system boolean flag = 0;
float s,r1,r2,r3,r4,r5,r6,r7,r8;
char inbyte;
for (int i = 2; i<=6;i++)
value[i] = ((value[i] * 0.1)+value[i-1]);
//fin de for
r6 = value[6];
x ,x ,x ,m
r1 = value[1];
1 2 3
r2 = value[2]*0.1 + r1;
r3 = value[3]*0.01 + r2;
r4 = value[4]*0.001 + r3;
r5 = value[5]*0.0001 + r4;
r6 = value[6]*0.00001 + r5;
r7 = value[7]*0.000001 + r6;
r8 = value[8]*0.0000001 + r7;
if (flag == 0)r8 = r8;
Time else if (flag == 1 ) r8 = (0.0 r8);
// xr[1] = 0.15;
Fig. 21 Experimental results of the states and the transmitted
message at the level of the transmitter // zr[1] = 0.1;
// mr[1] = 0.1;
y[j] = r8;
Figures 20 and 21 exhibit the experimental results if(j >=1)
of the chaotic attractor and the states responses, respec- x[j-1] = y[j];
tively, of the modified-Henon system. z[j-2] = (1/b)*(a-y[j]-pow(y[j-2],2));
mr[j-3] = (1/b)*(a-y[j]-pow(y[j-2],2)-b*y[j-3])
- y[j-3]-c*y[j-2]
5.3 Experimental results of the receiver - d*(1/b)*(a-y[j-1]-pow(y[j-3],2)-e*pow(y[j-2],2))
- f*(1/b)*(a-y[j-1]-pow(y[j-3],2))
In what follows, we assume that the channel is perfect - g*y[j-2]*(1/b)*(a-y[j-1]-pow(y[j-3],2))
and that no distortion of the transmission message has - h*pow(y[j-2],2)*(1/b)*(a-y[j-1]-pow(y[j-3],2))
taken place. if (j==10)
The principle part of the program implementation j = 4;
of the observer (see Eqs. 811) into Arduino board is y[4] = y[10];
given below: y[3] = y[9];
123
Analysis and implementation of a novel robust transmission scheme
O
,m
3O
x 2O
,x
2O
,x
1O
x
Time x
2
Fig. 22 Experimental results of the states and the reconstructed Fig. 24 Experimental result of the phase portrait x2o versus x2
message at the level of the receiver
3O
x
x 1O
x
3
123
H. Hamiche et al.
Note that the real-time implementation of the trans- 13. Filali, R.L., Benrejeb, M., Borne, P.: On observer-based
mission scheme signals obtained is almost identical in secure communication design using discrete-time hyper-
chaotic systems. Commun. Nonlinear Sci. Num. Simul.
shape to those of the simulations ones and then vali- 19(5), 14241432 (2014)
dated. In addition, the implemented solution exhibits 14. Blakely, J.N., Eskridge, M.B., Corron, N.J.: A simple
good performances of throughput and cost in terms of Lorenz circuit and its radio frequency implementation.
resources consumptions. In future works, we plan to Chaos 17(2), 023112 (2007)
15. Qi, G., Chen, G.: Analysis and circuit implementation of a
exploit our transmission scheme in order to transmit a new 4D chaotic system. Phys. Lett. A 352(45), 386397
digital image. (2006)
16. Huang, C.K., Tsay, S.C., Wu, Y.R.: Implementation of
chaotic secure communication systems based on OPA
References circuits. Chaos Solitons Fractals 23(2), 589600 (2005)
17. Mora-Gonzalez, M.: Implementation of a chaotic oscillator
into a simple microcontroller. International. Conference.
1. Pecora, L.M., Carroll, T.L.: Synchronization in chaotic Electronic. Engineering. Computer. Science., IERI Procedia
Systems. Phys. Rev. Lett. 64(8), 821824 (1990) 4, 247252 (2013)
2. Kocarev, L., Parlitz, U.: General approach for chaotic 18. Volos, C.K.: Chaotic random bit generator realized with a
synchronization with application to communication. Phys. microcontroller. J. Comput. Model. 3(4), 115136 (2013)
Rev. Lett. 74(25), 502831 (1995) 19. Zuppa, L.A.: Chaotic logistic map implementation in the
3. Hamiche, H., Ghanes, M., Barbot, J.P., Kemih, K., Djen- PIC12F629 microcontroller unit. 10th IFAC Workshop on
noune, S.: Hybrid dynamical systems for private digital Programmable Devices and Embedded Systems, 10(1),
communications. Int. J. Model. Identif. Control. 20(2), Poland, (2010)
99113 (2013) 20. Aboul-Seoud, A.K., El-Badawy, E.-S.A., Mokhtar, A.,
4. Dimassi, H., Loria, A., Belghith, S.: A new secured El-Masry, W., El-Barbry, M.: A simple 8-bit digital micro-
scheme based on chaotic synchronization via smooth controller implementation for chaotic sequence generation.
adaptive unknown-input observe. Commun. Nonlinear Sci. Radio Sci. Conf. 19 (2011)
Numer. Simul. 17(9), 37273739 (2012) 21. Ponomarenko, V.I., Prokhorov, M.D., karavaev, A.S.,
5. Djema, M., Barbot, J.P., Boutat, D.: New type of data Kulminskiy, D.D.: An experimental digital communication
transmission using a synchronization of chaotic systems. scheme based on chaotic time delay system. Nonlinear
Int. J. Bifurc. Chaos (15)(1), 207223 (2005) Dyn. 74(4), 10131020 (2013)
6. Wang, H., Han, Z.Z., MoCommun, Z.: Synchronization 22. Koyuncu, I., Ozcerit, A.T., Pehlivan, I.: Implementation of
of hyperchaotic systems via linear control. Commun. FPGA-based real time novel chaotic oscillator. Nonlinear
Nonlinear. Sci. Numer. Simul. 15(7), 19101920 (2010) Dyn. 77(12), 4959 (2014)
7. Park, JuH: Chaos synchronization of a chaotic system via 23. Veselyand, K., Podolsky, J.: Chaos in a modified Henon
nonlinear control. Chaos Solitons Fractals 25(3), 579584 Heiles system describing geodesics in gravitational waves.
(2005) Tech. Phys. Lett A 271, 368371 (2000)
8. Han, X., Lu, J.A., Wu, X.: Adaptive feedback synchroniza- 24. Belmouhoub, I., Djema, M., Barbot, J.P.: Observability
tion of L? system. Chaos Soliton Fractals 22(1), 221227 quadratic Normal Form for Discrete-Time systems. IEEE.
(2004) Trans. Autom. Control. 50, (2005)
9. Hamiche, H., Kemih, K., Ghanes, M., Zhang, G., Djen- 25. Djema, M., Barbot, J.P., Belmouhoub, I.: Discrete-time
noune, S.: Passive and impulsive synchronization of a new normal form for left invertibility problem. Eur. J. Control
four-dimensional chaotic system. Nonlinear Anal. Theory 15, 194204 (2009)
Methods Appl. 74(4), 11461154 (2011) 26. Kharel, R., Busawon, K., Ghassemlooy, Z.: A novel chaotic
10. Yang, T., Chua, L.O.: Impulsive stabilization for control and encryption technique for secure communication. 2nd IFAC
synchronization of chaotic systems: theory and application Conference on Analysis and Control of Chaotic Systems
to secure communication. IEEE. Trans. Circuits Syst. I (2009)
Fundam. Theory. Appl. 44(10), 976978 (1997) 27. Arduino. www.arduino.cc
11. Nijijmeiyer, H., Marrels, Iven M.Y.: An observation looks 28. Datasheet ATMega328. www.alldatasheet.com
at synchronization. IEEE. Trans. Circuits Syst. I Fundam.
Theory. Appl. 44(10), 882890 (1999)
12. Gao, T., Chen, G., Yuan, Y.Z., Chen, G.: A hyperchaos
generated from Chens system. Int. J. Modern Phys. C.
17(4), 471 (2006)
123