2020
DOI: 10.1587/elex.17.20200389
|View full text |Cite
|
Sign up to set email alerts
|

A dual dynamic key chaotic encryption system for industrial cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…ere are also many difficulties to be overcome. For example, many chaotic systems are difficult to realize, and the short period response will reduce the reliability of chaotic encryption systems; however, with the development of science and technology, these problems will be overcome one by one, so that the chaotic encryption system can serve the public more [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…ere are also many difficulties to be overcome. For example, many chaotic systems are difficult to realize, and the short period response will reduce the reliability of chaotic encryption systems; however, with the development of science and technology, these problems will be overcome one by one, so that the chaotic encryption system can serve the public more [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In equation (10), the x n interval is [−1,1], and the y n interval is obtained as [0, 2c]. If the y n values are all integers, then c � 2 L−1 , and the y n interval is [0, 2 L ].…”
Section: Basic Methodsmentioning
confidence: 99%
“…e above studies show that chaotic algorithm is widely used in the field of data transmission [8][9][10][11][12][13][14][15][16][17]. erefore, this study proposes an improved chaos-based encryption algorithm for wireless networks based on the characteristics of chaos algorithm and verifies the feasibility of the proposed algorithm.…”
Section: Introductionmentioning
confidence: 91%
“…Security aspects of IIoT systems in InX applications could be carried out by incorporating appropriate security and encryption with the support of blockchains [303], which provide secure and trustworthy services. Also, the usage of dual dynamic key [304], and lightweight searchable encryption protocols [305] enhances the reliability in the transmission of IIoT data.…”
Section: ) Potential Security Solutionsmentioning
confidence: 99%