Authenticity and privacy of a team of mini-UAVs by means of nonlinear recursive shuffling

We have developed a real-time EOIR video counter-jittering sub-pixel image correction algorithm for a single mini- Unmanned Air Vehicle (m-UAV) for surveillance and communication (Szu et al. SPIE Proc. V 5439 5439, pp.183-197, April 12, 2004). In this paper, we wish to plan and execute the next challenge---- a team of m-UAVs. The minimum unit for a robust chain saw communication must have the connectivity of five second-nearest-neighbor members with a sliding, arbitrary center. The team members require an authenticity check (AC) among a unit of five, in order to carry out a jittering mosaic image processing (JMIP) on-board for every m-UAV without gimbals. The JMIP does not use any NSA security protocol ("cardinal rule: no-man, no-NSA codec"). Besides team flight dynamics (Szu et al "Nanotech applied to aerospace and aeronautics: swarming,' AIAA 2005-6933 Sept 26-29 2005), several new modules: AOA, AAM, DSK, AC, FPGA are designed, and the JMIP must develop their own control, command and communication system, safeguarded by the authenticity and privacy checks presented in this paper. We propose a Nonlinear Invertible (deck of card) Shuffler (NIS) algorithm, which has a Feistel structure similar to the Data Encryption Standard (DES) developed by Feistel et. al. at IBM in the 1970's; but DES is modified here by a set of chaotic dynamical shuffler Key (DSK), as re-computable lookup tables generated by every on-board Chaotic Neural Network (CNN). The initializations of CNN are periodically provided by the private version of RSA from the ground control to team members to avoid any inadvertent failure of broken chain among m-UAVs. Efficient utilization of communication bandwidth is necessary for a constantly moving and jittering m-UAV platform, e.g. the wireless LAN protocol wastes the bandwidth due to a constant need of hand-shaking procedures (as demonstrated by NRL; though sensible for PCs and 3rd gen. mobile phones). Thus, the chaotic DSK must be embedded in a fault-tolerant Neural Network Associative Memory for the error-resilientconcealment mosaic image chip re-sent. However, the RSA public and private keys, chaos typing and initial value are given on set or sent to each m-UAV so that each platform knows only its private key. AC among 5 team members are possible using a reverse RSA protocol. A hashed image chip is coded by the sender's private key and nobody else knows in order to send to it to neighbors and the receiver can check the content by using the senders public key and compared the decrypted result with on-board image chips. We discover a fundamental problem of digital chaos approach in a finite state machine, of which a fallacy test of a discrete version is needed for a finite number of bits, as James Yorke advocated early. Thus, our proposed chaotic NIS for bits stream protection becomes desirable to further mixing the digital CNN outputs. The fault tolerance and the parallelism of Artificial Neural Network Associative Memory are necessary attributes for the neighborhood smoothness image restoration. The associated computational cost of O(N2) deems to be worthy, because the Chaotic version CNN of N-D can further provide the privacy only for the lost image chip (N=8x8) re-sent requested by its neighbors and the result is better performed than a simple 1-D logistic map. We gave a preliminary design of low end of FPGA firmware that to compute all on board seemed to be possible.

[1]  Jiantao Zhou,et al.  Intelligent Network Computing Augmented by Chaotic Neural Networks, Blind Sources Separation and Digital Watermarks , 2004, Int. J. Inf. Acquis..

[2]  Wolfgang Kinzel,et al.  Public channel cryptography by synchronization of neural networks and chaotic maps. , 2003, Physical review letters.

[3]  Steven Noel,et al.  Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination , 2003, Neural Networks.

[4]  Harold H. Szu,et al.  Neural network adaptive wavelets for signal representation and classification , 1992 .

[5]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[6]  H. Szu,et al.  Single neuron chaos , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[7]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[8]  Jr. G. Forney,et al.  The viterbi algorithm , 1973 .

[9]  Harold H. Szu,et al.  Meanfield chaos dynamics with changing chaos threshold value , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[10]  Di He,et al.  Chaotic characteristics of a one-dimensional iterative map with infinite collapses , 2001 .

[11]  Harold H. Szu,et al.  Subpixel jitter video restoration on board of micro-UAV , 2004, SPIE Defense + Commercial Sensing.

[12]  M. Feigenbaum Presentation functions, fixed points, and a theory of scaling function dynamics , 1988 .

[13]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[14]  Kazuyuki Aihara,et al.  Cryptosystems based on space-discretization of chaotic maps , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).

[15]  Tohru Kohda,et al.  Chaotic bit sequences for stream cipher cryptography and their correlation functions , 1995, Optics East.

[16]  M. Hénon A two-dimensional mapping with a strange attractor , 1976 .

[17]  S. Grossmann,et al.  Invariant Distributions and Stationary Correlation Functions of One-Dimensional Discrete Processes , 1977 .

[18]  Brian A. Telfer,et al.  Wavelet transforms and neural networks for compression and recognition , 1996, Neural Networks.

[19]  Mona E. Zaghloul,et al.  Chaotic neuron models and their VLSI circuit implementations , 1996, IEEE Trans. Neural Networks.

[20]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[21]  Mona E. Zaghloul,et al.  Image wavelet transforms implemented by discrete wavelet chips , 1994 .

[22]  Henry Leung,et al.  Design of piecewise maps for chaotic spread-spectrum communications using genetic programming , 2002 .

[23]  Di He,et al.  A chaotic map with infinite collapses , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[24]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[25]  James A. Yorke,et al.  Dynamics: Numerical Explorations , 1994 .

[26]  Enrico Del Re,et al.  Stream cipher system based on chaotic maps , 2000, SPIE Optics + Photonics.