Using a Chaotic Digital System to Generate Random Numbers for Secure Communication on 5G Networks
Received: 21 January 2024 | Revised: 23 February 2024 | Accepted: 24 February 2024 | Online: 2 April 2024
Corresponding author: Abdul Hadi Mohammed Alaidi
Abstract
There are several encryption system applications in 5G networks where rapid response is needed, particularly in the military, health sector, traffic, and vehicular movement. This article presents a proposed data security system for 5G networks that fortifies the security of the network through the use of synchronized chaotic systems to produce pseudo-random numbers. The technique by which random numbers are generated during the encryption procedures is closely associated with 5G network security. Many synchronized chaotic systems are used to produce chaotic random models which are used as encryption bases for a wide variety of data. In this study, the encryption was carried out using a variety of data, including two and three-dimensional color images and audio signals of varying lengths, in addition to the use of Fast Fourier Transform (FFT) for encryption of the ingredient energy wave. The results revealed that the algorithm deployed in the process of encryption performed well. Simulations were performed in MATLAB.
Keywords:
synchronized chaotic systems, data security, FFT , 5G networks, Pseudo-Random Number Generator (PRNG)Downloads
References
A. A. A. El-Latif, B. Abd-El-Atty, W. Mazurczyk, C. Fung, and S. E. Venegas-Andraca, "Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario," IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 118–131, Mar. 2020.
M. K. Abdul-Hussein and H. T. S. ALRikabi, "Secured Transfer and Storage Image Data for Cloud Communications," International Journal of Online and Biomedical Engineering (iJOE), vol. 19, no. 06, pp. 4–17, May 2023.
A. H. M. Alaidi, R. M. Al_airaji, H. T. S. Alrikabi, I. A. Aljazaery, and S. H. Abbood, "Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques," International Journal of Interactive Mobile Technologies (iJIM), vol. 16, no. 10, pp. 122–139, May 2022.
H. T. S. Alrikabi and H. T. Hazim, "Secure Chaos of 5G Wireless Communication System Based on IOT Applications," International Journal of Online and Biomedical Engineering (iJOE), vol. 18, no. 12, pp. 89–105, Sep. 2022.
M. Gafsi, N. Abbassi, R. Amdouni, M. A. Hajjaji, and A. Mtibaa, "Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption," in 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, Feb. 2022, pp. 510–515.
M. Tuna, "A novel secure chaos-based pseudo random number generator based on ANN-based chaotic and ring oscillator: design and its FPGA implementation," Analog Integrated Circuits and Signal Processing, vol. 105, no. 2, pp. 167–181, Nov. 2020.
M. Eisenbarth et al., "Toward Smart Vehicle-to-Everything-Connected Powertrains: Driving Real Component Test Benches in a Fully Interactive Virtual Smart City," IEEE Vehicular Technology Magazine, vol. 16, no. 1, pp. 75–82, Mar. 2021.
M. P. Kennedy and G. Kolumbán, "Digital communications using chaos," Signal Processing, vol. 80, no. 7, pp. 1307–1320, Jul. 2000.
S. Banerjee, Ed., Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption, 1st ed. Hershey, PA, USA: Information Science Reference, 2010.
M. Roy et al., "Data Security Techniques Based on DNA Encryption," in Proceedings of International Ethical Hacking Conference 2019, Singapore, 2020, pp. 239–249.
K. M. Cuomo and A. V. Oppenheim, "Chaotic signals and systems for communications," in 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing, Minneapolis, MN, USA, Apr. 1993, vol. 3, pp. 137–140 vol.3.
M. J. M. Ameen and S. S. Hreshee, "Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition," International Journal of Intelligent Engineering and Systems, vol. 15, no. 5, pp. 579–591, Oct. 2022.
B. Bordel, R. Alcarria, T. Robles, and M. S. Iglesias, "Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking," IEEE Access, vol. 9, pp. 22378–22398, 2021.
M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, Jun. 2019.
A. H. Alaidi, C. Soong Der, and Y. Weng Leong, "Increased Efficiency of the Artificial Bee Colony Algorithm Using the Pheromone Technique," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9732–9736, Dec. 2022.
A. H. Alaidi, S. D. Chen, and Υ. Weng Leong, "Artificial Bee Colony with Crossover Operations for Discrete Problems," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9510–9514, Dec. 2022.
W. Jinqiu, Q. Gang, and K. Pengbin, "Emerging 5G Multicarrier Chaotic Sequence Spread Spectrum Technology for Underwater Acoustic Communication," Complexity, vol. 2018, Oct. 2018, Art. no. e3790529.
B. Jovic, "Chaotic Signals and Their Use in Secure Communications," in Synchronization Techniques for Chaotic Communication Systems, B. Jovic, Ed. Berlin, Heidelberg, Germany: Springer, 2011, pp. 31–47.
H. B. Meitei and M. Kumar, "FPGA Implementation of a Wireless Communication System for Secure IR Sensor Data Transmission using TRNG," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 220–237, 2022.
K. Lee, S.-Y. Lee, C. Seo, and K. Yim, "TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network," IEEE Access, vol. 6, pp. 12838–12847, 2018.
J. S. Teh, A. Samsudin, M. Al-Mazrooie, and A. Akhavan, "GPUs and chaos: a new true random number generator," Nonlinear Dynamics, vol. 82, no. 4, pp. 1913–1922, Dec. 2015.
Downloads
How to Cite
License
Copyright (c) 2024 Haider Th. Salim Alrikabi, Ibtisam A. Aljazaery, Abdul Hadi Mohammed Alaidi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.