Open Access
ARTICLE
Secure Communication Scheme based on A New Hyperchaotic System
1 Non Destructive Testing Laboratory, Automatic Department, Jijel University, BP. 98, 18000, Jijel, Algeria
2 Department of Mechanical Engineering, Universitas Muhammadiyah Tasikmalaya, Tasikmalaya, West Java, 46196, Indonesia
3 School of Quantitative Sciences, College of Art and Sciences, Universiti Utara Malaysia, Sintok, 06010, Kedah, Malaysia
4 Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut Campus, 22200, Kuala Besut, Terengganu, Malaysia
5 Department of Mathematics, College of Arts and Sciences, Prince Sattam bin Abdulaziz University, Wadi Aldawaser, 11991, Saudi Arabia
* Corresponding Author: Kottakkaran Sooppy Nisar. Email:
Computers, Materials & Continua 2022, 73(1), 1019-1035. https://doi.org/10.32604/cmc.2022.025836
Received 06 December 2021; Accepted 16 February 2022; Issue published 18 May 2022
Abstract
This study introduces a new continuous time differential system, which contains ten terms with three quadratic nonlinearities. The new system can demonstrate hyperchaotic, chaotic, quasi-periodic, and periodic behaviors for its different parameter values. All theoretical and numerical analysis are investigated to confirm the complex hyperchaotic behavior of our proposed model using many tools that include Kaplan-Yorke dimension, equilibrium points stability, bifurcation diagrams, and Lyapunov exponents. By means of Multisim software, the authors also designed an electronic circuit to confirm our proposed systems’ physical feasibility. MATLAB and Multisim simulation results excellently agree with each other, which validate the feasibility of our new ten terms hyperchaotic system and make it very desirable to use in different domains especially in chaotic-based communication. Furthermore, by employing the drive response synchronisation, we developed a secure communication strategy for the proposed system. Findings from the proposed scheme show that the proposed approach was successful in completing the encryption and decryption procedure.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.