Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication

被引:21
作者
Gan, Qiuye [1 ]
Yu, Simin [1 ]
Li, Chengqing [2 ]
Lue, Jinhu [3 ]
Lin, Zhuosheng [1 ]
Chen, Ping [1 ]
机构
[1] Guangdong Univ Technol, Coll Automat, Guangzhou, Guangdong, Peoples R China
[2] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Hunan, Peoples R China
[3] Chinese Acad Sci, Acad Math & Syst Sci, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
ARM-embedded implementation; multicast-multiuser; chaotic map; secure communication; speech; Wi-Fi; IMAGE ENCRYPTION SCHEME; MULTIAGENT SYSTEMS; CRYPTANALYSIS; PERMUTATION; CONSENSUS;
D O I
10.1002/cta.2300
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a chaotic map-based multicast scheme for multiuser speech wireless communication and implements it in an ARM platform. The scheme compresses the digital audio signal decoded by a sound card and then encrypts it with a three-level chaotic encryption scheme. First, the position of every bit of the compressed data is permuted randomly with a pseudo-random number sequence (PRNS) generated by a 6-D chaotic map. Then, the obtained data are further permuted in the level of byte with a PRNS generated by a 7-D chaotic map. Finally, it is operated with a multiround chaotic stream cipher. The whole system owns the following merits: the redundancy in the original audio file is reduced effectively and the corresponding unicity distance is increased; the balancing point between a high security level of the system and real-time conduction speed is achieved well. In the ARM implementation, the framework of communication of multicast-multiuser in a subnet and the Internet Group Manage Protocol is adopted to obtain the function of communication between one client and other ones. Comprehensive test results were provided to show the feasibility and security performance of the whole system. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1849 / 1872
页数:24
相关论文
共 29 条
[1]   Novel public key encryption technique based on multiple chaotic systems [J].
Bose, R .
PHYSICAL REVIEW LETTERS, 2005, 95 (09)
[2]   Secure synchronization of a class of chaotic systems from a nonlinear observer approach [J].
Celikovsky, S ;
Chen, GR .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2005, 50 (01) :76-82
[3]   ADAPTIVE QUANTIZATION IN DIFFERENTIAL PCM CODING OF SPEECH [J].
CUMMISKEY, P ;
JAYANT, NS ;
FLANAGAN, JL .
BELL SYSTEM TECHNICAL JOURNAL, 1973, 52 (07) :1105-1118
[4]   Bluetooth and Wi-Fi wireless protocols:: A survey and a comparison [J].
Ferro, E ;
Potortì, F .
IEEE WIRELESS COMMUNICATIONS, 2005, 12 (01) :12-26
[5]   DESIGN AND CRYPTANALYSIS OF TRANSFORM-BASED ANALOG SPEECH SCRAMBLERS [J].
GOLDBURG, B ;
SRIDHARAN, S ;
DAWSON, E .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :735-744
[6]   SPEECH ENCRYPTION USING WAVEFORM SCRAMBLING [J].
KAK, SC ;
JAYANT, NS .
BELL SYSTEM TECHNICAL JOURNAL, 1977, 56 (05) :781-808
[7]   Cracking a hierarchical chaotic image encryption algorithm based on permutation [J].
Li, Chengqing .
SIGNAL PROCESSING, 2016, 118 :203-210
[8]   Breaking a novel image encryption scheme based on improved hyperchaotic sequences [J].
Li, Chengqing ;
Liu, Yuansheng ;
Xie, Tao ;
Chen, Michael Z. Q. .
NONLINEAR DYNAMICS, 2013, 73 (03) :2083-2089
[9]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954
[10]   Cryptanalyzing an encryption scheme based on blind source separation [J].
Li, Shujun ;
Li, Chengqing ;
Lo, Kwok-Tung ;
Chen, Guanrong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2008, 55 (04) :1055-1063