Applications and Optimization of Chaotic Maps In Next-G Secure Wireless Communications

Recently, the applications of chaotic maps have received an increased attention especially in communication systems. In this paper, we present some applications of chaotic maps in secure communication systems. In particular, design of chaotic random number generators with specific invariant PDF, optimum generation of chaotic binary spreading codes for DS-CDMA systems and the use of chaotic maps as pseudorandom bit generators. The considered problems have direct applications in Next-G secure wireless multimedia communication systems

[1]  S.E. El-Khamy,et al.  Optimization of chaotic spreading codes for asynchronous DS-CDMA applications using genetic algorithms , 2005, Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005..

[2]  Hartmut Jürgens,et al.  Chaos and Fractals: New Frontiers of Science , 1992 .

[3]  Zbigniew Kotulski,et al.  ON CONSTRUCTIVE APPROACH TO CHAOTIC PSEUDORANDOM NUMBER GENERATORS , 2000 .

[4]  A. Mirzaee,et al.  Design of a new class of spreading sequence using chaotic dynamical systems for asynchronous DS-CDMA applications , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[5]  M. Pursley,et al.  Performance Evaluation for Phase-Coded Spread-Spectrum Multiple-Access Communication - Part II: Code Sequence Analysis , 1977, IEEE Transactions on Communications.

[6]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[7]  G. Mazzini,et al.  Corrections to "Chaotic Complex Spreading Sequences for Asynchronous DS-CDMA—Part I: System Modeling and Results" 1 , 1998 .

[8]  Randy L. Haupt,et al.  Practical Genetic Algorithms , 1998 .

[9]  S.E. El-Khamy,et al.  New trends in wireless multimedia communications based on chaos and fractals , 2004, Proceedings of the Twenty-First National Radio Science Conference, 2004. NRSC 2004..

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  G. Mazzini,et al.  Statistical modeling of discrete-time chaotic processes-basic finite-dimensional tools and applications , 2002, The IEEE International Symposium on Circuits and Systems, 2003. Tutorial Guide: ISCAS 2003..