 Research
 Open Access
 Published:
Design and FPGA implementation of a wireless hyperchaotic communication system for secure realtime image transmission
EURASIP Journal on Image and Video Processing volume 2013, Article number: 43 (2013)
Abstract
In this paper, we propose and demonstrate experimentally a new wireless digital encryption hyperchaotic communication system based on radio frequency (RF) communication protocols for secure realtime data or image transmission. A reconfigurable hardware architecture is developed to ensure the interconnection between two field programmable gate array development platforms through XBee RF modules. To ensure the synchronization and encryption of data between the transmitter and the receiver, a feedback masking hyperchaotic synchronization technique based on a dynamic feedback modulation has been implemented to digitally synchronize the encrypter hyperchaotic systems. The obtained experimental results show the relevance of the idea of combining XBee (Zigbee or Wireless Fidelity) protocol, known for its high noise immunity, to secure hyperchaotic communications. In fact, we have recovered the information data or image correctly after realtime encrypted data or image transmission tests at a maximum distance (indoor range) of more than 30 m and with maximum digital modulation rate of 625,000 baud allowing a wireless encrypted video transmission rate of 25 images per second with a spatial resolution of 128 × 128 pixels. The obtained performance of the communication system is suitable for secure data or image transmissions in wireless sensor networks.
Introduction
Over the past decades, the confidentiality of multimedia communications such as audio, images, and video has become increasingly important since communications of digital products over the network (wired/wireless) occur more frequently [1, 2]. Therefore, the need for secure data and transmission is increasing dramatically and defined by the required levels of security depending on the purpose of communication. To meet these requirements, a wide variety of cryptographic algorithms have been proposed.
In this context, the main challenge of stream cipher cryptography relates to the generation of long unpredictable key sequences. More precisely, the sequence has to be random, its period must be large, and the various patterns of a given length must be uniformly distributed over the sequence.
Traditional ciphers like DES, 3DES, IDEA, RSA, or AES are less efficient for realtime secure multimedia data encryption systems and exhibit some drawbacks and weakness in the high stream data encryption [3, 4]. Indeed, the increase and availability of a highpower computation machine allow a force brute attack against these ciphers. Moreover, for some applications which require a highlevel computation and where a large computational time and high computing power are needed (for example, encryption of large digital images), these cryptosystems suffer from lowlevel efficiency [5]. Consequently, these encryption schemes are not suitable for many highspeed applications due to their slow speed in realtime processing and some other issues such as in the handling of various data formatting.
Over the recent years, considerable researches have been taken to develop new chaotic or hyperchaotic systems and for their promising applications in realtime encryption and communication [6–8]. In fact, it has been shown that chaotic systems are good candidates for designing cryptosystems with desired properties [9]. The most prominent is sensitivity dependence on initial conditions and system parameters, and unpredictable trajectories.
Furthermore, chaosbased and other dynamical systembased algorithms have many important properties such as the pseudorandom properties, ergodicity and nonperiodicity. These properties meet some requirements such as sensitivity to keys, diffusion, and mixing in the cryptographic context. Therefore, chaotic dynamics is expected to provide a fast and easy way for building superior performance cryptosystems, and the properties of chaotic maps such as sensitivity to initial conditions and randomlike behavior have attracted the attention to develop data encryption algorithms suitable for secure multimedia communications. Until recently, chaotic communication has been a subject of major interest in the field of wireless communications. Many techniques based on chaos have been proposed such as additive chaos masking (ACM) [10], where the analog message signal is added to the output of the chaos generator within the transmitter. In [11], chaos shift keying is used where the binary message signal selects the carrier signal from two or more different chaotic attractors. Authors in [12] use chaotic modulation where the message information modulates a parameter of the chaotic generator. Chaos control methods [13, 14] rely on the fact that small perturbations cause the symbolic dynamics of a chaotic system to track a prescribed symbol sequence. In [15], the receiver system is designed in an inverse manner to ensure the recovery of the encryption signal. An impulsive synchronization scheme [16] is employed to synchronize chaotic transmitters and receivers. However, all of these techniques do not provide a real and practical solution to the challenging issue of chaotic communication which is based on extreme sensitivity of chaotic synchronization to both the additive channel noise and parameter mismatches. Precisely, since chaos is sensitive to small variations of its initial conditions and parameters, it is very difficult to synchronize two chaotic systems in a communication scheme. Some proposed synchronization techniques have improved the robustness to parameter mismatches as reported in [16, 17], where impulsive chaotic synchronization and an openloopclosedloopbased coupling scheme are proposed, respectively. Other authors proposed to improve the robustness of chaotic synchronization to channel noise [18], where a coupled lattice instead of coupled single maps is used to decrease the masterslave synchronization error. In [19], symbolic dynamicsbased noise reduction and coding are proposed. Some research into equalization algorithms for chaotic communication systems are also proposed [20]. For other related results in the literature, see [21–23]. However, none of them were tested through a real channel under real transmission conditions. Digital synchronization can overcome the failed attempts to realize experimentally a performed chaotic communication system. In particular, when techniques exhibit any difference between the master/transmitter and slave/receiver systems, it is due to additive information or noise channel (disturbed chaotic dynamics) which breaks the symmetry between the two systems, leading to an accurate nonrecovery of the transmitted information signal at the receiver. In [24], an original solution to the hard problem of chaotic synchronization high sensibility to channel noise has been proposed. This solution, based on a controlled digital regenerated chaotic signal at the receiver, has been tested and validated experimentally in a real channel noise environment through a realized wireless digital chaotic communication system based on zonal intercommunication globalstandard, where battery life was long, which was economical to deploy and which exhibited efficient use of resources, known as the ZigBee protocol. However, this synchronization technique becomes sensible to high channel noise from a higher transmission rate of 115 kbps, limiting the use of the ZigBee and Wireless Fidelity (WiFi) protocols which permit wireless transmissions up to 250 kbps and 65 Mbps [25, 26], respectively. Consequently, no reliable commercial chaosbased communication system is used to date to the best of our knowledge. Therefore, there are still plentiful issues to be resolved before chaosbased systems can be put into practical use. To overcome these drawbacks, we propose in this paper a digital feedback hyperchaotic synchronization and suggest the use of advanced wireless communication technologies, characterized by high noise immunity, to exploit digital hyperchaotic modulation advantages for robust secure data transmissions. In this context, as results of the rapid growth of communication technologies, in terms of reliability and resistance to channel noise, an interesting communication protocol for wireless personal area networks (WPANs, i.e., ZigBee or ZigBee Pro LowRateWPAN protocols) and wireless local area network (WLAN, i.e., WiFi protocol WLAN) is developed. These protocols are identified by the IEEE 802.15.4 and IEEE 802.11 standards and known under the name ZigBee and WiFi communication protocols, respectively [25]. These protocols are designed to communicate data through hostile Radio Frequency (RF) environments and to provide an easytouse wireless data solution characterized by secure, lowpower, and reliable wireless network architectures. These properties are very attractive for resolving the problems of chaotic communications especially the high noise immunity property. Hence, our idea is to associate chaotic communication with the WLAN or WPAN communication protocols. However, this association needs a numerical generation of the chaotic behavior since the XBee protocol is based on digital communications. In the hardware area, advanced modern digital signal processing devices, such as field programmable gate array (FPGA), have been widely used to generate numerically the chaotic dynamics or the encryption keys [27–31]. The advantage of these techniques is that the parameter mismatch problem does not exist contrary to the analog techniques. In addition, they offer a large possible integration of chaotic systems in the most recent digital communication technologies such as the ZigBee communication protocol. In this paper, a wireless hyperchaotic communication system based on dynamic feedback modulation and RF XBee protocols is investigated and realized experimentally. The transmitter and the receiver are implemented separately on two Xilinx VirtexII Pro circuits [32] and connected with the XBee RF module based on the WiFi or ZigBee protocols [26, 33]. To ensure and maintain this connection, we have developed a VHSIC (very high speed integrated circuit) hardware description language (VHDL)based hardware architecture to adapt the implemented hyperchaotic generators, at the transmitter and receiver, to the XBee communication protocol. Note that the XBee modules interface to a host device through a logiclevel asynchronous serial port. Through its serial port, the module can communicate with any logic and voltagecompatible Universal Asynchronous Receiver/Transmitter (UART) [33]. The used hyperchaotic generator is the wellknown and the most investigated hyperchaotic Lorenz system [34]. This hyperchaotic key generator is implemented on FPGA technology using an extension of the technique developed in [27–29] for threedimensional (3D) chaotic systems. This technique is optimal since it uses directly VHDL description of a numerical resolution method of continuous chaotic system models. A number of transmission tests are carried out for different distances between the transmitter and receiver. The realtime results obtained validate the proposed hardware architecture. Furthermore, it demonstrates the efficiency of the proposed solution consisting on the association of wireless protocols to hyperchaotic modulation in order to build a reliable digital encrypted data or image hyperchaotic communication system.
The remainder of this paper is organized as follows: the ‘Hyperchaotic synchronization and encryption technique’ section proposes an adapted feedback hyperchaotic synchronization based on a dynamic feedback modulation. This section details the proposed synchronization and data masking principle by considering hyperchaotic systems. The ‘FPGA implementation of hyperchaotic Lorenz generator’ section briefly introduces continuous Lorenz hyperchaotic system, which is used as key stream generators of the proposed digital encryption hyperchaotic modulation. This section then details the hardware architecture used for implementing the Lorenz hyperchaotic generator. A register transfer level (RTL) architecture for embedded hardware implementation of the considered key stream generator is also given in this section. The ‘Experimental framework’ section presents our experimental framework used to realize and validate the wireless hyperchaotic communication scheme. This section gives details of the transmitter and the receiver blocks with a short description of the XBee RF modules. The ‘Wireless realtime data or image transmission tests and results’ section presents different realtime results proving that the proposed system is suitable for efficient secure realtime data or image transmissions of wireless sensor networks. Performance analysis through real wireless data transmission tests is also discussed in this section. The ‘Security analysis’ section gives the statistical analysis of the proposed image encryption scheme, which increases the complexity of the random bit generation and hence making it difficult for an intruder to extract information about the proposed encryption/decryption hyperchaotic modulation. Finally, the ‘Conclusions’ section draws appropriate conclusions.
Hyperchaotic synchronization and encryption technique
Contrary to a triggerbased slave/receiver chaotic synchronization by the transmitted chaotic masking signal, which limits the performance of the rate synchronization transmission [24], we propose a digital feedback hyperchaotic synchronization (FHS). More precisely, we investigate a new scheme for the secured transmission of information based on masterslave synchronization of hyperchaotic systems, using unknown input observers. The proposed digital communication system is based on the FHS through a dynamic feedback modulation (DFM) technique between two Lorenz hyperchaotic generators. The proposed FHSDFM technique used for chaotic masking communications is depicted in Figure 1. This technique is an extension and improvement of the one developed in [35] for synchronizing two 3D continuous chaotic systems in the case of a wired connection. The proposed digital feedback communication scheme synchronizes the master/transmitter and the slave/receiver by the injection of the transmitted masking signal in the hyperchaotic dynamics of the slave/receiver. The basic idea of the FHS is to transmit a hyperchaotic drive signal S(t) after additive masking with a hyperchaotic signal x(t) of the master (transmitter) system (x,y,z,w). Hyperchaotic drive signal is then injected both in the three subsystems (y,z,w) and (y _{ r }, z _{ r }, w _{ r }). The subscript r represents the slave or receiver system (x _{ r }, y _{ r }, z _{ r }, and w _{ r }). At the receiver, the slave system regenerates the chaotic signal x _{ r }(t) and a synchronization is obtained between two trajectories x(t) and x _{ r }(t) if
This technique can be applied to chaotic modulation. In our case, it is used for generating hyperchaotic keys for stream cipher communications, where the synchronization between the encrypter and the decrypter is very important. Therefore, at the transmitter, the transmitted signal after the additive hyperchaos masking (digital modulation) is
where d(t) is the information signal and x(t) is the hyperchaotic carrier. At the receiver, after synchronization of the regenerated hyperchaotic signal x _{ r }(t) with the received signal S _{ r }(t) and the demodulation operation, we can recover the information signal d(t) correctly as follows:
Therefore, the slave/receiver will generate a hyperchaotic behavior identical to that of the master/transmitter allowing to recover correctly the information signal after the demodulation operation. The advantage of this technique is that the information signal d(t) does not perturb the hyperchaotic generator dynamics, contrary to the ACMbased techniques of [10] and [36], because d(t) is injected at both the master/transmitter and slave/receiver after the additive hyperchaotic masking (Figure 1). Thus, for small values of information magnitude [35], the information will be recovered correctly. It should be noted that we have already confirmed this advantage by testing experimentally the HSDFM technique performances for synchronizing hyperchaotic systems (fourdimensional (4D) continuous chaotic systems) in the case of wired connection between two VirtexII Pro development platforms. After many experimental tests and from the obtained realtime results, we concluded that the HSDFM is very suitable for wired digital chaotic communication systems. However, in the present work, one of the objectives is to test and study the performances of the HSDFM technique in the presence of channel noise through realtime wireless communication tests as it is shown in Figure 1. To perform the proposed approach, a digital implementation of the master and slave hyperchaotic systems is required. Therefore, we investigate the hardware implementation of the proposed FHSDFM technique between two Lorenz hyperchaotic generators using FPGA. To achieve this objective, we propose the following details of the proposed architecture.
FPGA implementation of hyperchaotic Lorenz generator
System model and numerical resolution
In general, autonomous continuous hyperchaotic systems are modeled by the following four nonlinear differential equation systems:
where F, G, Q, and P are nonlinear equations and x, y, z, and w are the four state variables of the dynamical system. For computing the solutions of the system (4), we use the fourth order RungeKutta (RK4) numerical method for resolving the continuous chaotic system models because it produces a more accurate estimate of the solution [27–29]. The flowchart of this method for resolving system (4) is illustrated in Figure 2, where x _{0}, y _{0}, z _{0}, and w _{0} are the initial conditions, h is the iteration step, and k _{ i }, m _{ i }, l _{ i }, and p _{ i } (i = 0 to 3) are the intermediate slopes.
In this work, we are interested in the hyperchaotic Lorenz system modeled as follows [34]:
In [34], it has been proven that this 4D lorenz system exhibits hyperchaotic behaviors and presents a twodimensional bifurcation diagram for the following parameter conditions : a = 10, c = 8/3, 0 < b < 30, and 0 < f < 15. Therefore, the system preserves its hyperchaotic behavior and bifurcation diagram for the following considered parameter values a = 10, b = 28, c = 8/3, and f = 5 and with the initial conditions x _{0} = y _{0} = z _{0} = w _{0} = 10. The Matlab simulation result, using the presented RK4 method, of the (xy) hyperchaotic Lorenz attractor is given in Figure 3.
Hardware architecture
To implement the hyperchaotic Lorenz generator, we use an optimal VHDL hardware structural description of the RK4 method described by the flowchart in Figure 2. Indeed, contrary to the use of automatic codebased design approach which leads to nonoptimal VHDL codes (for instance, the Simulink/Matlab automatic code generation tool associated to Xilinx System Generator design tool), the lowlevel aspect of our digital chaos implementation keeps the user very close from realities of the physical implementation (lowlevel architecture). Therefore, the results in terms of performance and density of resources used remain within the designer’s reach. As to logic exploration architecture, one proposed RTL architecture of the 4D Lorenz hyperchaotic system (Lorenz_Generator block) is depicted in Figure 4. The four outputs S _{0}, S _{1}, S _{2}, and S _{3} are the hyperchaotic signals, encoded on 32bit (16Q16) fixedpoint data format [27–29]. Note that the architecture depends on the four bifurcation parameters a, b, c, and f and is based on the structural feedback of the four main blocks: F, G, H, and Q. These four functional units realize the nonlinear functions of the equation set (5). These units correspond to logic assignments composed of adder, subtractor, and multiplier logic arithmetic operators in accordance with the set of equations (5) and the RK4 resolution method. This proposed hardware description also includes two inputs, clk and reset, which are the clock and reset signals, respectively. This datapath architecture is controlled by a specific finitestate machine in order that this structure performs the RK4 resolution method. Precisely, the developed hardware architecture is based on the Moore state machine (MSM) presented in Figure 5 where ten states (ST0 to ST9) are used.
The operating principle of the developed MSM (Figure 5) is as follows:

ST0. In the initial state, all outputs are initialized to 0, and the state variables are initialized by the initial condition values x = x _{0}, y = y _{0}, z = z _{0}, and w = w _{0}. The process then passes unconditionally to the next state ST1.

ST1. Compute the initial slopes k _{0}, m _{0}, l _{0}, and p _{0}, and the first intermediate points u _{1}, v _{1}, r _{1}, and e _{1} defined by the following equations (see Figure 2):
$$\begin{array}{l}{u}_{1}={x}_{j1}+{k}_{0}/2\end{array}$$(6)$$\begin{array}{l}{v}_{1}={y}_{j1}+{m}_{0}/2\end{array}$$(7)$$\begin{array}{l}{r}_{1}={z}_{j1}+{l}_{0}/2\end{array}$$(8)$$\begin{array}{l}{e}_{1}={w}_{j1}+{p}_{0}/2\end{array}$$(9)At the next clock cycle, the machine passes unconditionally to the next state, ST2.

ST2. Assign the values of the first intermediate points u _{1}, v _{1}, r _{1}, and e _{1} to the variables α, β, γ, and θ, respectively. The use of these variables permits to optimize our architecture. Indeed, we use the same module to calculate all the slopes of the RK4 method, and the same module is used for the calculation of the intermediate points. At the next clock cycle, the machine passes unconditionally to the next state, ST3.

ST3. Compute the slopes k _{1}, m _{1}, l _{1}, and p _{1} and the second intermediate points u _{2}, v _{2}, r _{2}, and e _{2}.
$${u}_{2}={x}_{j1}+{k}_{1}/2$$(10)$${v}_{2}={y}_{j1}+{m}_{1}/2$$(11)$${r}_{2}={z}_{j1}+{l}_{1}/2$$(12)$${e}_{2}={w}_{j1}+{p}_{1}/2$$(13)At the next clock cycle, the machine passes unconditionally to the next state, ST4.

ST4, ST6. Use the same instructions as stated in ST2; update the variables α, β, γ, and θ, and at the next clock cycle, the process passes unconditionally to the next state.

ST5. Compute the slopes k _{2}, m _{2}, l _{2}, and p _{2} and the last intermediate points u _{3}, v _{3}, r _{3}, and e _{3} defined by the following equations:
$${u}_{3}={x}_{j1}+{k}_{2}$$(14)$${v}_{3}={y}_{j1}+{m}_{2}$$(15)$${r}_{3}={z}_{j1}+{l}_{2}$$(16)$${e}_{3}={w}_{j1}+{p}_{2}$$(17)At the next clock cycle, the process passes unconditionally to the following state.

ST7. Compute the slopes k _{3}, m _{3}, l _{3}, and p _{3} and then the solutions x, y, z, and w (see Figure 2).

ST8. Assign the hyperchaotic solution values x, y, z, and w to the outputs S _{0}, S _{1}, S _{2}, and S _{3}, respectively. At the next clock cycle, the process passes unconditionally to the final state, ST9.

ST9. In the final state, the actual solution values x, y, z, and w are assigned to the variables α, β, γ, and θ, respectively, to compute the next hyperchaotic solution values. At the next clock cycle, if the counter value, cp, is equal to a defined integer value N, the process goes back again to the first state, ST1, and then the process is revived again for calculating the next solution values. Otherwise, the process stays waiting at state ST9. The value of N is chosen to ensure synchronization between the embedded hyperchaotic generator and an external connected device, permitting the control of the throughput of the embedded hyperchaotic generator.
Synthesis results and performance analysis
The synthesis results after the place and route of the implemented architecture on the Xilinx VirtexII (Pro XC2VP30), Virtex V, VI, and VII FPGAs [32, 37–39] are detailed in Table 1. Herein, the maximum frequency and the hardware resource’s consumption in terms of slices, digital signal processing (DSP) blocks and multipliers required are specified. The results demonstrate that the proposed hyperchaotic Lorenz generator can be easy and efficiently implemented on FPGA technologies by providing realtime hyperchaotic signals and attractors. It can be stated that an attractive tradeoff between high speed and low logic resources is achieved. Indeed, our implementation on a Xilinx VirtexII Pro device uses only 2067 CLBSlices (15% of the size circuit), 36 multipliers (26%) and no block RAMs is used under the maximum frequency of 25.364 MHz. Similarly, our implementation on a Xilinx Virtex V device uses 4721 CLBSlices, 20 DSP blocks under the maximum frequency of 36.271 MHz. We note that the use of DSP blocks with most recent devices improves the performance.
To evaluate the performance of the proposed hardware implementation, the throughput rate and time latency metrics are used. In our case, the throughput rate (defined as the number of bits per unit of time) corresponds to 32 bits of wordlength for ten operating clock cycles (for number of MSM states, see Figure 5) after the initialization phase at the output of the FPGA circuit.
Latency is defined as the time required to generate one single wordlength signal after the start of the generator. Therefore, a minimum and maximum throughput of 81.16 and 116 Mbps with a maximum and minimum time latency of 394.25 and 275.7 ns are obtained for Virtex II and Virtex V technologies, respectively. The results prove that our hardware architecture can be implemented in the recent FPGA devices with a significant amelioration of its performances in terms of throughput and logic area cost.
Experimental framework
To test and validate the proposed approach, we have realized the experimental framework depicted in Figure 6. For this purpose, we consider the available XUP Xilinx VirtexII Pro development embedded platforms for physical hardware implementations [32]. The XUP System consists of a highperformance VirtexII Pro FPGA (XCV2PFF8967) surrounded by peripheral components that can be used to create a complex hardware system. Note that an audio CODEC (AC97) and stereo power amplifier are included on the XUP platform so as to provide complete analog functionality, allowing the external generation of chaotic signals in analog form for real measurements [40]. Both the transmitter and the receiver are mounted on a VirtexII Pro Development System [32] connected to an XBee module based on Zigbee or WiFi communication protocols [26, 33]. The experimental transmission test consists of transmitting a binary information data, encoded on a 32bit fixedpoint data format, and masked (secured) by the master hyperchaotic samples (Figure 1), encoded also on a 32bit fixedpoint data format. At the receiver, we verify, after the demodulation operation (unmasking), the correct recovery of the transmitted data information. To view the result on a digital oscilloscope, a constant value is used as information data to test the feasibility of the proposed wireless communication system based on the association of the hyperchaotic communication with the ZigBee communication technology.
XBee RF modules
XBee modules offer the advantage to interface to a host device through a wellknown logiclevel asynchronous serial port. In fact, devices having a UART interface can connect directly to the pins of the RF modules [26, 33]. In our experiment, we use the XBee modules in their transparent mode with the minimum connections VCC, GND, T _{ x }, and R _{ x } as showed in Figure 7. When operating in this mode, the modules act as a serial line replacement, i.e., all UART data, consisting of a start bit (low), eight data bits (least significant bit first), and a stop bit (high), received through the R _{ x } pin queued up for RF transmission. When RF data is received, the data is sent out the T _{ x } pin.
Transmitter architecture
The transmitter architecture implemented on the first FPGA circuit is presented in Figure 8. It is composed mainly of three modules : Clock_Generator, Lorenz_Generator, and parallel input/serial output (PISO). The details of the functioning of each module are as follows :

Clock_Generator. This module generates and provides the clock (clk_out) and reset signals to the two other modules. The frequency of the clock signal is imposed either by the serial interface data rate of the XBee modules (see Table 2) or the implemented logic blocks in the FPGA. Depending on the maximum data rate allowed, the clk_out signal frequency is defined for driving the transmitter architecture. To obtain this frequency, we have implemented a clock divider architecture to derive it from the frequency of the 100 MHz global clock signal (clk_sys) provide by the Xilinx VirtexII Pro XC2VP30 FPGA.

Lorenz_Generator. This module represents the main module of the proposed transmitter architecture. It is based on the hardware architecture already detailed and presented in the ‘FPGA implementation of hyperchaotic Lorenz generator’ section for implementing the hyperchaotic Lorenz system but with some modifications introduced in the MSM of Figure 5 in order to adapt with the hyperchaotic generator data output S to the XBee module data input R _{ x }. The adaptation includes introducing a 2bit control signal (cmd) in the hyperchaotic generator architecture which will control the operation of the parallel/serial converter module (PISO) to provide data frames according to the XBee communication protocols (Zigbee or WiFi) [26, 33]. Therefore, the changes in the Lorenz_Generator architecture are as follows :
At the initial state ST0, we set cmd = ‘11’, and the process follows the same steps as in the ‘FPGA implementation of hyperchaotic Lorenz generator’ section until reaching state ST7. However, to realize our solution, we have added an 11th state to the MSM, and then from the state ST8, the next steps are as follows:

ST8. We realize the modulation operation using additive chaos masking of [10] and [36], i.e., the information signal samples d are masked by those of the hyperchaotic signal x and then the result is assigned to the output of the module S _{0} = x + d. At the same time, we put cmd = ‘10’, and the process passes unconditionally to state ST9.

ST9. At this state, we realize the dynamic feedback operation, used by the FHSDFM technique, by assigning the additive hyperchaos masking results S _{0} to the variable α. Hence, the actual sample S _{0} is injected to the master dynamics, and it is used to generate the next hyperchaotic sample x. We put cmd =‘00’, and the passage to the next state, ST10, is controlled by the parameter value T of the counter ct. More details are given in the next paragraph.

ST10. This tenth state is added to control the eventual distance between two successive data frames which can imposed by the XBee communication protocols [26, 33]. This is ensured by the parameter value N of the counter cp as shown in Figure 9. In this last state, cmd is set to the value 11.


PISO. This module is a binary parallel/serial converter. Under the command signal cmd, the module converts the parallel data samples S _{0} (coded in 32 bits), received from the Lorenz_Generator module after the modulation operation, to a serial data. The command signal values are presented in Table 3. The transmitted data frame is formed by four successive data frames of 8 bits that started and ended by a start bit (‘0’) and a stop bit (‘1’), respectively. Therefore, the data frame wordlength is T = 40 bits. Note that this data format is imposed by the XBee RF module’s communication protocols [26, 33].
Receiver architecture
The receiver architecture is presented in Figure 10. It is composed of four modules : Clock_Generator, Lorenz_Generator, PISO, and serial input/parallel output (SIPO). The first three modules are similar to those of the transmitter but with an adjustment to the receiver. The details of the functioning of each module are as follows:

SIPO. This module is a binary serialtoparallel converter. Once the start bit is detected at the receiver by the SIPO module, the serial/parallel conversion of the received data begins. At the same time, the module generates a clock signal (clk_lz) at the same frequency as the clk_out clock signal generated by the Clock_Generator module. This means that the generation of the clk_lz clock signal is triggered at each start bit detection. This constitutes our interesting solution to overcome the problem of shifting data frames at the XBee RF module output (T _{ x }). Indeed, this solution permits to adapt and to synchronize the execution of the implemented receiver architecture to the cadence of the XBee RF module data output (T _{ x }). However, to synchronize the SIPO and the Lorenz_Generator modules, we use a 1bit command signal (cm). Initially, this last one is set to ‘0’, and it is set to ‘1’ during one clock period only when the converted 32bit parallel data S _{ r } are available at the output of the SIPO module, i.e., the serialtoparallel conversion is finished.

Lorenz_Generator. This module is similar to the hyperchaotic Lorenz generator used at the transmitter. This means that it generates the hyperchaotic keys with the same values of the parameters and initial conditions at the transmitter in order to allow the hyperchaotic synchronization as proposed in the ‘Hyperchaotic synchronization and encryption technique’ section. Under the command signal cm and the rhythm of the clk_lz clock signal, the module regenerates identical hyperchaotic samples (x _{ r }) to that of the transmitter. It synchronizes them with the received and parallel converted data samples S _{ r } and recovers the information data d after a demodulation operation based on the arithmetic subtraction. Finally, it controls the paralleltoserial conversion operation of the PISO module using the 2bit command signal cd. The cd commands are the same as those of cmd command signal presented in Table 3. As the transmitter architecture, the Lorenz_Generator module uses the same state machine presented in Figure 5, but with the modifications introduced and presented in Figure 11.
At the first clk_lz clock cycle, the module starts the execution of the state machine instructions from ST0 to ST7. Therefore,

At the synchronization step ST8, we assign the generated hyperchaotic samples x to the output x _{ r } and the received and parallel converted data S _{ r } to the output S _{ r } (Figure 11). Note that we have used the same parameter name S _{ r } for the parallel converted data at the input and the output of the Lorenz_Generator module because no change is made for this data at this module. Therefore, if the command signal cm is set to 1, i.e., the received data S _{ r } are available at the output of the SIPO module, then the process passes to the next state, ST9. Otherwise, it stays waiting at the current state.

At the demodulation step ST9, after the synchronization of the x _{ r } and S _{ r } samples at the previous state, the information data d is recovered using the subtraction arithmetic operation d = S _{ r }  x _{ r }, and then the command signal cd takes the value 10. Finally, the process passes unconditionally to the next state, ST10.

At the last state ST10, the command signal cd takes the value 00, and the received data sample S _{ r } is assigned to the parameter α, which is used to generate the next hyperchaotic sample x, instead of the actual generated hyperchaotic sample x. This instruction permits to realize the hyperchaotic synchronization principle presented in Figure 6, in which the received signal S(t) is injected to the dynamic of the hyperchaotic generator of the receiver. Finally, after N clock cycles, the process passes to state ST1. The value of N is fixed by the time needed by the PISO module to finish the paralleltoserial conversion of the hyperchaotic samples x _{ r }. Then, in our experiments, N = 33 clock cycles, considering that the samples x _{ r } are encoded on 32 bits.

PISO. This module is similar to that in the transmitter block. Under the command signal cd, it converts the 32bit parallel outputs of the Lorenz_Generator module, i.e., the regenerated hyperchaotic samples x _{ r }, the received data samples S _{ r }, and the recovered data information d, to 32bit serial frames. This module is introduced in the architecture just for validating the proposed approach by realtime viewing and comparing these serial data frames on a digital oscilloscope.

Wireless realtime data or image transmission tests and results
The main considered application is the security of wireless sensor networks (WSNs) which are becoming more and more important, and they can gain advantage of reconfigurable technology, in terms of flexibility, energy consumption, and sensor lifetime. This is particularly true for the networks of data diffusion based on embedded systems, which can be used for the protocol communication. Indeed, a WSN provides different aspects in the sharing of information by deploying a system that is able to execute wireless exchange of data, image, or video [41] according to transmission rate performance. Subsequently, we considered the wireless data or image transmission with the Zigbee and WiFi protocols in a WSN context.
The ciphered data or image is transmitted through a public and unsecure channel. Using selfsynchronization technique at the receiver side [32], the key can be recovered at the receiver and the decryption operation from the transmitted scrambled image with the regenerated key, allowing us to recover the plain image.
In the experimental transmission tests, we use binary data encoded on 32bit fixedpoint format with hexadecimal representation as information signal. At the transmitter, these information data are masked by the hyperchaotic samples x of the Lorenz_generator encoded also on 32bit fixedpoint data format. The encrypted signal samples S _{ i }(t) are then converted to serial data format by the PISO module, sent to its associate XBee Pro RF module according to the considered protocol (Zigbee or WiFi), and then transmitted to the receiver. At the receiver, the associated XBee Pro RF module transmits the received data to the SIPO module according to the asynchronous serial communication protocol to regenerate the received encrypted signal sample format S _{ r }(t), allowing for the hyperchaotic synchronization and recovery of the masked information d(t) according the proposed scheme depicted in Figure 1.
Table 2 summarizes experimentally the performance and results in terms of digital transmission rate (symbol rate or modulation rate), maximum distance, and frequency modulation according to the considered wireless protocols by the Xbee RF modules and Virtex II technology. For these measurements, we have placed the transmitter and the receiver at two neighboring rooms at the distance about 20 m with a received signal strength indicator (RSSI) of 2 dBm. With this disposition, we obtain a packet error rate (PER) of 0% at the receiver. The maximum distance that we can obtain experimentally between the transmitter and the receiver (indoor range) is more than 30 and 32 m for Zigbee and WiFi protocols, respectively. Therefore, the indoor/urban ranges of the XBee RF modules used are up to 30 m (see Table 2), and the sensitivity of the XBee RF module receivers reaches 92 dBm with a PER of 1% [33]. The XBee modules offer the advantage to realize a wireless communication application without errors (PER = 0%) according to environment application, distance, disposition, and channel chosen as is shown in [42].
The maximum bit rate of the proposed system is limited either by the RF modules or implemented hardware logic blocks. Indeed, the hardware FPGA implementations allow parallel/serial and serial/parallel converters with minimum and maximum rates of 25.36 and 36.27 Mbps obtained with Virtex II and Virtex V technologies, respectively (see Table 1). However, for the considered Zigbee protocol, the maximum bit rate of the proposed system is limited by the RF modules. The hardware FPGA implementation performance (for working clock frequency, see Table 1) of the proposed system (at the transmitter and receiver) is considered, and it is larger than the serial interface data rate and better than the bit rate, which is allowed by the considered Zigbee RF modules. Consequently, the limitation is imposed by the transmission rate of the parallel/serial and serial/parallel converters toward Zigbee Xbee RF modules while FPGA implementations allow to provide transmission rates to at least 25 Mbps. Thereby, for a null distance frame value (N = 0), the obtained data bit rate of the serial communication is 250 kbps (corresponding to a modulation rate of 625 symbols per second or baud, due to the maximum serial interface data rate of the Zigbee protocol based XBee Pro modules [33], and with an operating frequency modulation of 2.4 GHz. In the case of the WiFi protocol, the maximum bit rate of the proposed system is limited by the work frequency of the implemented hardware modules. Although the FPGA implementation of the Lorenz generator allows to provide a throughput of 80 Mbps (maximal frequency of 25 MHz is allowed by the considered Virtex II platform with an encoded 32bit encrypted data), the maximum transmission bit rate of the proposed system is limited by the hyperchaotic key generators up to 25 Mbps (for N = 0) and by a corresponding modulation rate of 625,000 baud. Therefore, the parallel/serial and serial/parallel converters to WiFi Xbee RF modules limit the transmission rate up to the maximum work frequency, depending on the considered FPGA technology. Indeed, each symbol of the data transmission system carries 40 bits according to the data frame wordlength allowed by the serial interface Xbee modules. This digital modulation rate operates with a frequency modulation range between 2.4 and 2.5 GHz [26]. In summary, considering a synchronous system at the maximum work frequency allowed between the key stream generators and parallel/serial or serial/parallel converters, the limitations with respect to 54Mbps and 25kbps bit rates of the WiFi and Zigbee RF modules are due to the work frequencies of hyperchaotic Lorenz generators and the serial interface data rate, respectively.
An example of realtime data results obtained for a constant value of ‘00009999’ is shown in Figures 12 and 13. These figures give snapshots of the realtime digital modulation in the case of the transmission data rate of 250 kbps (the maximum serial interface data rate of the XBee Pro modules [18] allowed with a clk_out signal frequency equal to 250 kHz) with a distance frame value of N = 500 clock cycles, allowing signal captures. In Figure 12, we present the results of the transmission test for RSSI at 2 dBm with PER = 0%, and Figure 13 presents the transmission test results for RSSI at 70 dBm with PER ≈ 1%. Figure 12a,b presents the (xy) hyperchaotic attractor and the hyperchaotic carrier signal x, respectively. An example of the transmitted serial masked data frames with the corresponding clock signal is presented in Figure 12c. Figure 12d shows the distance between the transmitted data frames, and Figure 12e presents an example of the received data frame at the output of the XBee module of the receiver with the corresponding clock signal clk_lz. Finally, the recovered information data (only for the constant value 00009999) is shown in Figure 12f. Note that the transmitted masked data frame presented in Figure 12c shows the robustness security of the information data, in the proposed wireless communication system, by the additive hyperchaos masking principle. In fact, the information data are totally hidden by the hyperchaotic ones. The results of Figure 12e validate our proposed solution for adapting and synchronizing the implemented receiver architecture and the XBee RF module. Indeed, from the results, we note that the clock signal clk_lz is triggered at the start bit detection of the received data frame. Finally, the results presented in Figure 12f validate the principle of the proposed wireless hyperchaotic communication system and then the relevant idea based on associating the hyperchaos communication principle with the ZigBee technology. In fact, from this figure, we see that the information data are recovered correctly without any error at a distance of 20 m because PER = 0%.
In Figure 13, we present the first three successive recovered information data frames for an RSSI of 70 dBm and a PER of about 1%. These results show that the information data are totally lost because of the PER of 1%. This confirms the extreme sensibility of chaotic synchronization to small channel perturbation.
For secure realtime video transmission in the WSN, we consider an encrypted video transmission rate of 25 images per second with a spatial resolution of 128x128 gray level pixels coded at 8 bits. Each pixel value is extended to 40 bits according to the wordlength data frame format of the encryption process and serial transmission [26, 33]. Consequently, we deduce a time constraint of 40 ms by image to assure that the realtime wireless transmission rate corresponds to a minimum bit rate of 16,384 kbps or modulation rate of 409,600 baud. Therefore, the proposed system based on WiFi XBee modules, which can be performed up to the maximum modulation rate of 625,000 baud, achieves a wireless realtime encrypted transmission suitable for the WSN context. Figure 14 gives a snapshot of a wireless realtime image transmission, showing the feasibility and efficiency of the proposed digital encryption modulation system.
Security analysis
To test the robustness of the proposed scheme, security analysis including statistical analysis and differential analysis was performed. This evaluation of the quality of randomness is carried out to demonstrate the satisfactory security of the new proposed chaosbased cryptosystem.
NIST statistical analysis
A large number of statistical tests and whole test suites have been proposed to assess the statistical properties of random number generations. Statistical tests of the generated 128bit encryption keys are commonly performed using the standard NIST SP 80022 statistical test suite [43]. In this subsection, we present the performance test results of the proposed chaosbased key stream generator. Eighteen statistical tests are commonly used to determine whether one binary sequence possesses some specific characteristics that a truly random sequence would be likely to exhibit. Table 4 summarizes the results of NIST tests. Each one was performed 300 times on 1Mbit substrings. A single test is considered as passed if the P value is above the significant level of 0.01 or below 0.99 [43]. The results of Table 4 show the measured values of P value T, knowing that if P value T ≥ 0.0001, then the sequences can be considered to be uniformly distributed. Similarly, the minimum pass rate for each statistical test with the exception of the random excursion (variant) test is approximately 0.972766 for a sample size equal to 300 binary sequences (for more details, see the reference [43]). Figure 15 gives the Matlab simulation result of the (x  y  z) phase space and confirms these statistical results. Indeed, this phase space is occupied by random trajectories proving that the sequences are really uniformly distributed. Consequently, we can conclude that the proposed chaosbased key stream generator successfully passes all the NIST tests and provides good randomness keys. Therefore, these results demonstrate that the proposed chaosbased key stream is very useful for the consideration of reducing negative dynamic degradation influence due to the finite precision of the digital hardware implementation.
Histogram and differential analysis
To demonstrate the effectiveness of confusion and diffusion proprieties, a histogram test is carried out and shown. Since an image histogram illustrates how pixels in an image are distributed by plotting the number of pixels at each grayscale intensity level. By selecting several 256 grayscale images with a resolution of 256x256 with different image contents, their histograms were calculated. The typical example (cameramen image) among them is shown in Figure 16. The obtained histogram of the ciphered image is fairly uniform and significantly different from that of the original image showing then the sensitivity to the plain image.
To avoid the knownplaintext attack and the chosenplaintext attack, the changes in the ciphered image should be significant even with a small change in the original one. According to the proposed encryption process, this small difference should be diffused to the whole ciphered data, with respect to diffusion and confusion. Consequently, this differential attack would become very inefficient and practically useless. Generally, the differential analysis can be reflected by the number of pixels’ change rate (NPCR) and unified average changing intensity (UACI) evaluations [44]. NPCR stands for the number of pixels’ change rate while one pixel of plain image changed. The more NPCR gets close to 100%, the more sensitive the cryptosystem to the changing of plain image is and then the more effective for the cryptosystem to resist plaintext attack. UACI measures the average intensity of differences between two encrypted images. Currently, the bigger the UACI, the more effective is the cryptosystem to resist at a differential attack.
The plain cameraman image is used in the test. The first image is the original plain image, and the second is obtained by changing the first pixel grayscale value (for the cameraman image, the change was from ’28’ to ’29’). Therefore, the two images are encrypted with the same key to generate the corresponding cipher images C1 and C2 (encrypted images before and after one pixel of the plain image is changed). We obtain the results by simulating experiments which are shown in Table 5. We can find that the NPCR and the UACI are over 99% and 33%, respectively. These results show that the proposed encrypted algorithm is very sensitive to tiny changes in the plain image, even if there is only one different bit between the two plain images. Consequently, the decrypted images will be strongly different, showing the robustness of the proposed encryption scheme against one differential attack.
In summary, this security analysis proves that encrypted and synchronized generated signal is nonperiodic and has a flat spectrum which is suitable for encryption image scheme by showing a robustness against plaintext attacks.
Conclusions
This paper proposes an experimental demonstration of a wireless hyperchaotic communication based on wireless communication protocols suitable for secure realtime data or image transmissions in wireless sensor networks. We have proposed a new digital synchronized modulation based on FHS through a DFM technique between two hyperchaotic generators. The choice of a DFM principle for implementing the FHS between two identical hyperchaotic systems of Lorenz in FPGA shows more robustness than the classic chaotic masking while allowing high transmission rates. In practice, we have associated and adapted the hyperchaotic communication principle with the XBee RF modules by developing a reconfigurable VHDLbased hardware architecture implemented on FPGA technology. Indeed, the proposed system can be used as hard key generator in a hyperchaotic synchronized data or image stream cipher/decipher, and it can be used for synchronizing any fourdimensional continuous chaotic system (such as hyperchaotic Lorenz system) where the master chaotic system is embedded in the proposed FPGA transmitter side and the slave chaotic system is embedded in the FPGA receiver side. Many realtime transmission tests are carried out between two distanced Virtex IIPro Xilinx FPGA platforms. The obtained realtime results show the efficiency of the proposed idea consisting on associating the hyperchaotic communication, and the ZigBee or WiFi communication protocols characterized by high immunity against channel noise. Indeed, we could recover correctly the information data on the distance about 20 m using the XBee RF modules at 2 dBm with a PER of 0%. Note that these performances can be improved using the most recent XBee modules. Experimental results applied to image encryption have demonstrated that our approach exhibits attractive performances and is useful in the field of realtime secure wireless data communications. The proposed technique may make it more applicable in such field (video, image, internet, etc.) and for all type of wireless network. Indeed, thorough experimental tests have been carried out with detailed numerical analysis, demonstrating the high security of the new data or image encryption scheme. More precisely, the proposed approach used to design a secure symmetric image encryption increases its resistance to various attacks such as statistical and key analysis attacks and can avoid the hidden security attacks in realtime applications. Finally, our perspective for the presented work consists on developing and realizing a secure wireless hyperchaotic communication network using the proposed modulation system.
References
 1.
Spanos GA, Maples TB: Performance study of a selective encryption scheme for the security of networked, realtime video. In Proceedings of the 4th International Conference on Computer Communications and Networks, Las Vegas, 2023 Sept 1995. IEEE, Piscataway; 1995:210.
 2.
Yang T: A survey of chaotic secure communication systems. Int. J. Comput. Cogn 2004, 2(2):81130.
 3.
Schneier B: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley & Sons, New York; 1996.
 4.
Zambreno J, Nguyen D, Choudhary AN: Exploring area/delay tradeoffs in an AES FPGA implementation. Field Programmable Logic and Applications, ed. by J Becker, M Platzner, S Vernalde. Proceedings of the 14th International Conference, FPL 2004, Leuven, 30 August1 September 2004. Lecture Notes in Computer Science, vol. 3203. (Springer, Heidelberg, 2004), pp. 575–585
 5.
Yi X, Tan CH, SC K, Syed MR: Fast encryption for multimedia. IEEE Trans. Consum. Electron 2001, 47(1):101107. 10.1109/30.920426
 6.
Kennedy MP, Kolumban G: Digital communication using chaos. Signal Process 2000, 80: 13071320. 10.1016/S01651684(00)000384
 7.
Alvarez G, Li S: Some basic cryptographic requirements for chaosbased cryptosystems. Int. J. Bifurcation Chaos 2006, 44: 21292151.
 8.
Lin JS, Liao TL, Huang CF, Yan J: Design and implementation of digital secure communication based on synchronized chaotic systems. Digit. Signal Process 2010, 20: 229237. 10.1016/j.dsp.2009.04.006
 9.
Chang W: Digital secure communication via chaotic systems. Digit. Signal Process 2008, 19: 693699.
 10.
Cuomo KM, Oppenheim AV, Trogatz SHS: Synchronization of Lorenzbased chaotic circuits with applications to communications. IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process 1993, 40(10):626633. 10.1109/82.246163
 11.
Dedieu H, Kennedy MP, Hasler M: Chaos shift keying: modulation and demodulation of a chaotic carrier using selfsynchronizing Chua’s circuits. IEEE Trans. Circuits Syst. II: (Special Issue on Chaos in Nonlinear Electronic Circuits Part C: Applications) 1993, 40: 634642.
 12.
Halle KS, Wah WC, Itoh M, Chua LO: Spread spectrum communication through modulation of chaos. Int. J. Bifurcation Chaos 1993, 3: 469477. 10.1142/S0218127493000374
 13.
Hayes S, Grebogi C, Ott E: Communicating with chaos. Phys. Rev. Lett 1993, 70: 30313034. 10.1103/PhysRevLett.70.3031
 14.
Lai YC, Bollt E, Grebogi C: Communicating with chaos using twodimensional symbolic dynamics. Phys. Lett. A 1999, 255: 7581. 10.1016/S03759601(99)001759
 15.
Feldmann U, Hasler M, Schwarz W: Communication by chaotic signals: the inverse system approach. Int. J. Circuit Theory Appl 1996, 24: 551579. 10.1002/(SICI)1097007X(199609/10)24:5<551::AIDCTA936>3.0.CO;2H
 16.
Yang T: A survey of chaotic secure communication systems. Int. J. Comput. Cogn 2004, 2(2):81130.
 17.
Grosu I, Padmanaban E, Roy PK, Dana SK: Designing coupling for synchronization and amplification of chaos. Phy. Rev. Lett 2008, 100: 234102.
 18.
Eisencraft M, Batista AM: Discretetime chaotic systems synchronization performance under additive noise. IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process 2011, 91: 21272131.
 19.
Schweizer J, Schimming T: Symbolic dynamics for processing chaotic signalsI: noise reduction of chaotic sequences. IEEE Trans. Circuits Syst. I 2001, 48: 12691282. 10.1109/81.964416
 20.
Ciftci M, Williams DB: Optimal estimation sequential channel equalization algorithms for chaotic communications systems. EURASIP J. Appl. Signal Process 2001, 4: 249256.
 21.
Wang X, Wang Z: A robust demodulation application communication using chaotic signals. Int. J. Bifurcation Chaos 2003, 13: 227231. 10.1142/S0218127403006479
 22.
Murali K: Heterogeneous chaotic systems based cryptography. Phys. Lett. A 2000, 272: 184192. 10.1016/S03759601(00)004205
 23.
Li S, Alvarez G, Chen G, Mou X: Breaking a chaosnoisebased secure communication scheme. Chaos 2005, 15: 013703. 10.1063/1.1856711
 24.
Sadoudi S, Tanougast C, Azzaz MS: First experimental solution for channel noise sensibility in digital chaotic communications. Prog. Electromagnetics Res. C 2012, 32: 181196.
 25.
Ergen SC: ZigBee/IEEE 802.15.4 Summary. IEEE, Piscataway; 2004.
 26.
Digi International Inc: XBee WiFi RF module, Product Manual v1.xEx  802.11 Protocol. Digi International Inc., Minnetonka; 2011.
 27.
Sadoudi S, Tanougast C, Azzaz MS, Dandache A, Bouridane A: Embedded GenesioTesi chaotic generator for ciphering communications. 7th International Symposium on Communication Systems Networks and Digital Signal Processing (CSNDSP), Newcastle, 2123 July 2010. IEEE, Piscataway; 2010.
 28.
Sadoudi S, Tanougast C, Azzaz MS, Dandache A, Bouridane A: Realtime FPGA implementation of Lü’s chaotic generator for cipher embedded system. International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, 910 July 2009. IEEE, Piscataway; 2009.
 29.
Sadoudi S, Azzaz MS, Djeddou M, Bensalah M: An FPGA realtime implementation of the Chen’s chaotic system for chaotic communications. Int. J. Nonlinear Sci 2009, 7(4):467474.
 30.
Sobhy MI, Aseeri MA, Shehata AER: Real time implementation of continuous (Chua and Lorenz) chaotic generator models using digital hardware. In Proceedings of the Third International Symposium on Communication System Networks and Digital Processing (CSNDSP), Staffordshire, 1517 July 2002. IEEE, Piscataway; 2002:3841.
 31.
Indrusiak LS, Junior ECDS, Glesner M: Advantages of the LinzSprott weak nonlinearity on the FPGA implementation of chaotic systems: a comparative analysis. Proceedings of the Int. Symp. Signals, Circuits and Sys 2005, 2: 753756.
 32.
Xilinx Inc.: Xilinx University Program VirtexII Pro Development System, UG69 (v1.1). Xilinx Inc., San Jose; 2008.
 33.
Digi International Inc: Product Manual v1.xEx  802.15.4 Protocol. Digi International Inc., Minnetonka; 2009.
 34.
Barboza R: Dynamics of a hyperchaotic Lorenz system. Int. J. Bifurcation Chaos 2007, 17(12):42854294. 10.1142/S0218127407019950
 35.
Milanovic V, Zaghloul ME: Improved masking algorithm for chaotic communications systems. Elec. Lett 1996, 32: 1112. 10.1049/el:19960004
 36.
Kocarev KML, Halle KS, Eckert K, Chua LO: Experimental demonstration of secure communications via chaotic synchronization. Int. J. Bifurcation Chaos 1992, 2: 709713. 10.1142/S0218127492000823
 37.
Xilinx Inc: Virtex 5 FPGAs datasheet. Xilinx Inc., San Jose; 2008.
 38.
Xilinx Inc: Virtex 6 series fpgas configurable logic block. Xilinx Inc., San Jose; 2012.
 39.
Xilinx Inc: Virtex 7 FPGAs datasheet. Xilinx Inc., San Jose; 2013.
 40.
Analog Devices: AC’97 SoundMAX Codec, AD1881A datasheet. Analog Devices, Norwood; 2000.
 41.
Yick J, Mukherjee B, Ghosal D: Wireless sensor network survey. Comput. Netw 2008, 52(12):22922330. 10.1016/j.comnet.2008.04.002
 42.
Centeno A, Alford N: Measurement of ZigBee wireless communications in modestirred and modetuned reverberation chamber. Prog. Electromagnetics Res. M 2011, 18: 171178.
 43.
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, NIST Spec. Publication 80022 Revision 1a, NIST, Gaithersburg, 2010
 44.
Wu Y, Noonan J, Agaian S: NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J. Selected Areas Telecommunications 2011, 1(4):April 2011 Edition, 3138.
Author information
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
About this article
Received
Accepted
Published
DOI
Keywords
 Clock Cycle
 Field Programmable Gate Array
 Receive Signal Strength Indicator
 Packet Error Rate
 Plain Image