Nonlinear Dynamical System-based Cybersecurity
1Menoufia University, Menoufia, Egypt
2Aristotle University of Thessaloniki, Thessaloniki, Greece
3University of Tunis El Manar, Tunis, Tunisia
4SASTRA Deemed University, Thanjavur, India
Nonlinear Dynamical System-based Cybersecurity
Description
Although chaotic sequences are generated by a deterministic process, recent studies have shown that they can be considered for the realization of stochastic processes. Under certain assumptions, a chaotic system corresponds to an invariant measure that allows us to proceed with many analytical computations of statistics related to chaotic time series. Chaotic sequences have many properties similar to those of random sequences. It encourages researchers to exploit these properties in various domains of cybersecurity, such as communications, hiding information, and cryptography. Especially, in spread-spectrum communication systems, chaotic sequences have been considered as multiple-access spreading codes. In most cases where the statistics of interferences between users were computed, it has been supposed that these sequences are independent.
In recent years, there has been increasing interest in a new classification of nonlinear dynamical systems. This includes two kinds of attractors: self-excited attractors and hidden attractors. Self-excited attractors can be clearly localized by applying a standard computational procedure. With hidden attractors, we have to develop a specific computational procedure in order to identify the hidden attractors because the equilibrium points do not help with localization. Systems with hidden attractors could play a vital role in the design of new advanced chaotic cryptosystems. Furthermore, cybersecurity, which is the practice of protecting systems, networks, and programs from digital attacks is becoming more and more prevalent. Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Therefore, the need of implementing effective cybersecurity measures is particularly challenging because of the increasing possibility of devices used for cyberattacks. Moreover, cyber attackers are becoming more innovative in their approaches.
The aim of this Special Issue is to bring together original research articles and review articles highlighting theoretical and fundamental research on the potential and limitations of chaotic dynamical systems for contemporary cybersecurity. We hope that this Special Issue explores how to achieve secure communication in the presence of new technologies, such as cloud mobile/ubiquitous computing, Internet of Things, big data analytics, artificial intelligence, and privacy-aware computing. Technologies considered for this Special Issue also include hybrid human-machine computing, blockchain, and distributed ledger technology.
Potential topics include but are not limited to the following:
- Design of new discrete or continuous chaotic systems
- Analysis, control, and synchronization of chaotic/hyperchaotic systems
- Investigating statistical aspects of chaotic systems
- Chaos-based joint encryption and compression schemes
- Chaos-based secure communication schemes
- Chaos-based secure substitution boxes (S-boxes)
- Chaos-based pseudo-random number generators
- Chaos-based cryptanalysis
- Chaotic watermarking for forensic analysis in digital images
- Chaos-based multibiometric template security