Using a Chaotic Digital System to Generate Random Numbers for Secure Communication on 5G Networks


  • Haider Th. Salim Alrikabi Department of Electrical Engineering, College of Engineering, University of Wasit, Iraq
  • Ibtisam A. Aljazaery Department of Electrical Engineering, College of Engineering, University of Babylon, Iraq
  • Abdul Hadi Mohammed Alaidi Department of Programming, Computer Science and Information Technology College, University of Wasit, Iraq
Volume: 14 | Issue: 2 | Pages: 13598-13603 | April 2024 |


There are several encryption system applications in 5G networks where rapid response is needed, particularly in the military, health sector, traffic, and vehicular movement. This article presents a proposed data security system for 5G networks that fortifies the security of the network through the use of synchronized chaotic systems to produce pseudo-random numbers. The technique by which random numbers are generated during the encryption procedures is closely associated with 5G network security. Many synchronized chaotic systems are used to produce chaotic random models which are used as encryption bases for a wide variety of data. In this study, the encryption was carried out using a variety of data, including two and three-dimensional color images and audio signals of varying lengths, in addition to the use of Fast Fourier Transform (FFT) for encryption of the ingredient energy wave. The results revealed that the algorithm deployed in the process of encryption performed well. Simulations were performed in MATLAB.


synchronized chaotic systems, data security, FFT , 5G networks, Pseudo-Random Number Generator (PRNG)


Download data is not yet available.

Author Biography

Ibtisam A. Aljazaery, Department of Electrical Engineering, College of Engineering, University of Babylon, Iraq




A. A. A. El-Latif, B. Abd-El-Atty, W. Mazurczyk, C. Fung, and S. E. Venegas-Andraca, "Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario," IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 118–131, Mar. 2020.

M. K. Abdul-Hussein and H. T. S. ALRikabi, "Secured Transfer and Storage Image Data for Cloud Communications," International Journal of Online and Biomedical Engineering (iJOE), vol. 19, no. 06, pp. 4–17, May 2023.

A. H. M. Alaidi, R. M. Al_airaji, H. T. S. Alrikabi, I. A. Aljazaery, and S. H. Abbood, "Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques," International Journal of Interactive Mobile Technologies (iJIM), vol. 16, no. 10, pp. 122–139, May 2022.

H. T. S. Alrikabi and H. T. Hazim, "Secure Chaos of 5G Wireless Communication System Based on IOT Applications," International Journal of Online and Biomedical Engineering (iJOE), vol. 18, no. 12, pp. 89–105, Sep. 2022.

M. Gafsi, N. Abbassi, R. Amdouni, M. A. Hajjaji, and A. Mtibaa, "Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption," in 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, Feb. 2022, pp. 510–515.

M. Tuna, "A novel secure chaos-based pseudo random number generator based on ANN-based chaotic and ring oscillator: design and its FPGA implementation," Analog Integrated Circuits and Signal Processing, vol. 105, no. 2, pp. 167–181, Nov. 2020.

M. Eisenbarth et al., "Toward Smart Vehicle-to-Everything-Connected Powertrains: Driving Real Component Test Benches in a Fully Interactive Virtual Smart City," IEEE Vehicular Technology Magazine, vol. 16, no. 1, pp. 75–82, Mar. 2021.

M. P. Kennedy and G. Kolumbán, "Digital communications using chaos," Signal Processing, vol. 80, no. 7, pp. 1307–1320, Jul. 2000.

S. Banerjee, Ed., Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption, 1st ed. Hershey, PA, USA: Information Science Reference, 2010.

M. Roy et al., "Data Security Techniques Based on DNA Encryption," in Proceedings of International Ethical Hacking Conference 2019, Singapore, 2020, pp. 239–249.

K. M. Cuomo and A. V. Oppenheim, "Chaotic signals and systems for communications," in 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing, Minneapolis, MN, USA, Apr. 1993, vol. 3, pp. 137–140 vol.3.

M. J. M. Ameen and S. S. Hreshee, "Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition," International Journal of Intelligent Engineering and Systems, vol. 15, no. 5, pp. 579–591, Oct. 2022.

B. Bordel, R. Alcarria, T. Robles, and M. S. Iglesias, "Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking," IEEE Access, vol. 9, pp. 22378–22398, 2021.

M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, Jun. 2019.

A. H. Alaidi, C. Soong Der, and Y. Weng Leong, "Increased Efficiency of the Artificial Bee Colony Algorithm Using the Pheromone Technique," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9732–9736, Dec. 2022.

A. H. Alaidi, S. D. Chen, and Υ. Weng Leong, "Artificial Bee Colony with Crossover Operations for Discrete Problems," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9510–9514, Dec. 2022.

W. Jinqiu, Q. Gang, and K. Pengbin, "Emerging 5G Multicarrier Chaotic Sequence Spread Spectrum Technology for Underwater Acoustic Communication," Complexity, vol. 2018, Oct. 2018, Art. no. e3790529.

B. Jovic, "Chaotic Signals and Their Use in Secure Communications," in Synchronization Techniques for Chaotic Communication Systems, B. Jovic, Ed. Berlin, Heidelberg, Germany: Springer, 2011, pp. 31–47.

H. B. Meitei and M. Kumar, "FPGA Implementation of a Wireless Communication System for Secure IR Sensor Data Transmission using TRNG," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 220–237, 2022.

K. Lee, S.-Y. Lee, C. Seo, and K. Yim, "TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network," IEEE Access, vol. 6, pp. 12838–12847, 2018.

J. S. Teh, A. Samsudin, M. Al-Mazrooie, and A. Akhavan, "GPUs and chaos: a new true random number generator," Nonlinear Dynamics, vol. 82, no. 4, pp. 1913–1922, Dec. 2015.


How to Cite

H. T. S. Alrikabi, I. A. Aljazaery, and A. H. M. Alaidi, “Using a Chaotic Digital System to Generate Random Numbers for Secure Communication on 5G Networks”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 2, pp. 13598–13603, Apr. 2024.


Abstract Views: 93
PDF Downloads: 85

Metrics Information