Table of Contents Author Guidelines Submit a Manuscript

Modeling, Analysis, and Applications of Chaos-Based Security and Communication Networks

Call for Papers

Given the rapid growth in telecommunications and the Internet, there is continuous and growing need for secure data communication. Hence, numerous literatures have focused on security issues over a communication network and on the confidentiality of data. In addition, chaos theory has always attracted the interest of scientific research because it has a wide spectrum of applications including secure communication. This is due to the fact that chaotic systems exhibit aperiodic, bounded, long-time evolution and sensitive dependence on initial conditions for some ranges of parameters. For instance, chaos theory has many applications in cryptography and steganography. Chaos synchronization also works as a whole cryptosystem, where the driving system can be the transmitter and the response is the receiver. Chaotic synchronization represents a challenge because chaotic systems are sensitive to initial conditions, where two trajectories starting at slightly different initial conditions exponentially diverge from each other in the long-term evolution. Other utilizations and applications of chaos theory in secure communications are numerous.

This special issue aims at presenting the latest developments, trends, research solutions, and applications of chaos-based security and communication networks with emphasis on real-world applications.

Potential topics include but are not limited to the following:

  • Chaotic generators suitable for security purposes
  • Linear and nonlinear modeling of security networks
  • Chaotic-based communication networks
  • Chaos modeling and encryption
  • Chaos synchronization and antisynchronization
  • Chaos-based digital and secure communication
  • Chaotic neural networks, electronics, and systems
  • Circuit implementation and analysis of hyperchaotic security systems
  • Control and synchronization of complex networks
  • Analysis of communication networks
  • Integer and fractional-order chaos-based communication networks
  • Optimization of security and communication networks
  • Practical issues in experimental and simulation result
  • Software and hardware encryption/steganography applications
  • Image, speech, and video based chaotic encryption

Authors can submit their manuscripts through the Manuscript Tracking System at

Submission DeadlineFriday, 20 April 2018
Publication DateSeptember 2018

Papers are published upon acceptance, regardless of the Special Issue publication date.

Lead Guest Editor

Guest Editors