Complexity

Nonlinear Dynamical System-based Cybersecurity


Publishing date
01 Mar 2022
Status
Closed
Submission deadline
15 Oct 2021

1Menoufia University, Menoufia, Egypt

2Aristotle University of Thessaloniki, Thessaloniki, Greece

3University of Tunis El Manar, Tunis, Tunisia

4SASTRA Deemed University, Thanjavur, India

This issue is now closed for submissions.

Nonlinear Dynamical System-based Cybersecurity

This issue is now closed for submissions.

Description

Although chaotic sequences are generated by a deterministic process, recent studies have shown that they can be considered for the realization of stochastic processes. Under certain assumptions, a chaotic system corresponds to an invariant measure that allows us to proceed with many analytical computations of statistics related to chaotic time series. Chaotic sequences have many properties similar to those of random sequences. It encourages researchers to exploit these properties in various domains of cybersecurity, such as communications, hiding information, and cryptography. Especially, in spread-spectrum communication systems, chaotic sequences have been considered as multiple-access spreading codes. In most cases where the statistics of interferences between users were computed, it has been supposed that these sequences are independent.

In recent years, there has been increasing interest in a new classification of nonlinear dynamical systems. This includes two kinds of attractors: self-excited attractors and hidden attractors. Self-excited attractors can be clearly localized by applying a standard computational procedure. With hidden attractors, we have to develop a specific computational procedure in order to identify the hidden attractors because the equilibrium points do not help with localization. Systems with hidden attractors could play a vital role in the design of new advanced chaotic cryptosystems. Furthermore, cybersecurity, which is the practice of protecting systems, networks, and programs from digital attacks is becoming more and more prevalent. Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Therefore, the need of implementing effective cybersecurity measures is particularly challenging because of the increasing possibility of devices used for cyberattacks. Moreover, cyber attackers are becoming more innovative in their approaches.

The aim of this Special Issue is to bring together original research articles and review articles highlighting theoretical and fundamental research on the potential and limitations of chaotic dynamical systems for contemporary cybersecurity. We hope that this Special Issue explores how to achieve secure communication in the presence of new technologies, such as cloud mobile/ubiquitous computing, Internet of Things, big data analytics, artificial intelligence, and privacy-aware computing. Technologies considered for this Special Issue also include hybrid human-machine computing, blockchain, and distributed ledger technology.

Potential topics include but are not limited to the following:

  • Design of new discrete or continuous chaotic systems
  • Analysis, control, and synchronization of chaotic/hyperchaotic systems
  • Investigating statistical aspects of chaotic systems
  • Chaos-based joint encryption and compression schemes
  • Chaos-based secure communication schemes
  • Chaos-based secure substitution boxes (S-boxes)
  • Chaos-based pseudo-random number generators
  • Chaos-based cryptanalysis
  • Chaotic watermarking for forensic analysis in digital images
  • Chaos-based multibiometric template security

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5193618
  • - Research Article

Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption

Zhuo Liu | Jin Yuan Liu | ... | Xiao Feng Gong
  • Special Issue
  • - Volume 2022
  • - Article ID 3676265
  • - Research Article

Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System

Nehal Abd El-Salam Mohamed | Aliaa Youssif | Hala Abdel-Galil El-Sayed
  • Special Issue
  • - Volume 2022
  • - Article ID 8495451
  • - Research Article

Fixed Point Results of Dynamic Process through -Contractions with Applications

Amjad Ali | Eskandar Ameer | ... | Mustafa Mudhesh
  • Special Issue
  • - Volume 2022
  • - Article ID 3865820
  • - Research Article

A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process

Adélaïde Nicole Kengnou Telem | Cyrille Feudjio | ... | Karthikeyan Rajagopal
  • Special Issue
  • - Volume 2021
  • - Article ID 1898998
  • - Research Article

A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps

Wei Feng | Jing Zhang | Zhentao Qin
  • Special Issue
  • - Volume 2021
  • - Article ID 2036466
  • - Research Article

Industrial Printing Image Defect Detection Using Multi-Edge Feature Fusion Algorithm

Bangchao Liu | Youping Chen | ... | Bing Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 2594965
  • - Research Article

A Novel Megastable Oscillator with a Strange Structure of Coexisting Attractors: Design, Analysis, and FPGA Implementation

Kui Zhang | M. D. Vijayakumar | ... | Iqtadar Hussain
Complexity
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision120 days
Acceptance to publication21 days
CiteScore4.400
Journal Citation Indicator0.720
Impact Factor2.3
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.