基于级联多模混沌逻辑映射的ML-I-NOMA图像传输物理层安全性

E. Hagras, A. Zein El-Din
{"title":"基于级联多模混沌逻辑映射的ML-I-NOMA图像传输物理层安全性","authors":"E. Hagras, A. Zein El-Din","doi":"10.21608/ijt.2021.266225","DOIUrl":null,"url":null,"abstract":": In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2021-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission\",\"authors\":\"E. Hagras, A. Zein El-Din\",\"doi\":\"10.21608/ijt.2021.266225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2021.266225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2021.266225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

提出了一种新的级联多模混沌逻辑映射(CMM-CLM)。所提出的CMM-CLM的分岔图非常复杂,具有很强的混沌性。强混沌导致非常高的李雅普诺夫指数值。在提出的CMM-CLM的基础上,提出了一种基于多层概念的交错NOMA (ML-I-NOMA)迭代译码器的鲁棒物理层安全算法。对所提出的ML-I-NOMA密码系统在加密和非加密图像传输中进行了分析。本文的主要贡献是证明了不同的层效应与带宽消耗相比有轻微的性能变化。最后,仿真结果表明,所提出的MLI-NOMA在2层和4层的带宽效率分别达到50%和75%,并且在正确的检测中具有良好的视觉质量指标。此外,安全性分析表明,所提出的ML-I-NOMA密码系统具有较大的密钥空间和良好的密钥灵敏度,其熵接近思想值。因此,本文提出的基于CMM-CLM的ML-I-NOMA密码系统能够较强地抵抗传统的密码攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission
: In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
27
期刊介绍: The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics
期刊最新文献
Enhancing community interaction for the Deaf and Dumb via the design and implementation of Smart Speaking Glove (SSG) Based on Embedded System Design and Implementation of a Diagnostic Solid Propellant Fuel System Based on Laser Illuminator Interior design applications based on IoT as detection and es-timation methods Detection Attention Deficit Hyperactivity Disorder by using Convolution Neural Network Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1