Skip to main content

Covert binary communications through the application of chaos theory: Three novel approaches

Publication ,  Conference
Bradbury, KJ; Noonan, JP
Published in: Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings
December 1, 2007

Today, most covert communications systems use a spread-spectrum approach to ensure that transmissions remain clandestine. This paper expands beyond traditional spread-spectrum schemes and into chaos theory in communications by presenting a novel design for a covert noncoherent binary communication system that uses chaotic signals. Three techniques are developed, with varying performance. Each system uses two chaotic signals with antipodal attractors as the information carriers. Although the two chaotic signals used are continuously generated from random starting values without containing repetitious patterns, the receiver requires neither those initial values nor does it require synchronization with the transmitter. The chaotic signals used are both spread-spectrum in the frequency domain and undetectable using matched-filter receivers, thereby achieving a level of covertness. The signal-to-noise ratio performance is presented through simulated receiver operating characteristic (ROC) curves for a comparison to binary phase shift keying. This system provides a binary communication scheme which is not detectable by standard matched filtering techniques and has noise-like spectra, requiring a new receiver configuration and yielding security.

Duke Scholars

Published In

Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings

Publication Date

December 1, 2007

Volume

2

Start / End Page

60 / 65
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Bradbury, K. J., & Noonan, J. P. (2007). Covert binary communications through the application of chaos theory: Three novel approaches. In Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings (Vol. 2, pp. 60–65).
Bradbury, K. J., and J. P. Noonan. “Covert binary communications through the application of chaos theory: Three novel approaches.” In Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings, 2:60–65, 2007.
Bradbury KJ, Noonan JP. Covert binary communications through the application of chaos theory: Three novel approaches. In: Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings. 2007. p. 60–5.
Bradbury, K. J., and J. P. Noonan. “Covert binary communications through the application of chaos theory: Three novel approaches.” Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings, vol. 2, 2007, pp. 60–65.
Bradbury KJ, Noonan JP. Covert binary communications through the application of chaos theory: Three novel approaches. Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings. 2007. p. 60–65.

Published In

Citsa 2007 Int Conference on Cybernetics and Information Technologies Systems and Applications and Ccct 2007 Int Conference on Computing Communications and Control Technologies Proceedings

Publication Date

December 1, 2007

Volume

2

Start / End Page

60 / 65