2021
DOI: 10.1155/2021/2798534
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer‐Based Encryption for PMU Devices

Abstract: Coordination of a power system with the phasor measurement devices (PMUs) in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Instead, chaotic system-based encryption schemes have become more popular due to the good cryptological qualities of chaotic systems, such as their sensitivity to system parameters and initial conditions, nonperiodicity, mixing, and topological transitivity [16][17][18][19]. For this purpose, in the literature, there are various encryption studies based on chaotic systems [12,14,20,21], hyperchaotic systems [22][23][24][25], and chaotic maps [26][27][28]. Due to the abovementioned advantages, chaotic systems have been highly preferred and studied in the encryption of physiological biometric images [14-17, 19, 24, 29, 30].…”
Section: Introductionmentioning
confidence: 99%
“…Instead, chaotic system-based encryption schemes have become more popular due to the good cryptological qualities of chaotic systems, such as their sensitivity to system parameters and initial conditions, nonperiodicity, mixing, and topological transitivity [16][17][18][19]. For this purpose, in the literature, there are various encryption studies based on chaotic systems [12,14,20,21], hyperchaotic systems [22][23][24][25], and chaotic maps [26][27][28]. Due to the abovementioned advantages, chaotic systems have been highly preferred and studied in the encryption of physiological biometric images [14-17, 19, 24, 29, 30].…”
Section: Introductionmentioning
confidence: 99%
“…Interestingly, the application areas were promoted by the irregular dynamics of a chaotic system [14][15][16]. Recent applications include the steganography protocol [17], the substitution box [18], secure smart grids [19], the pseudo-random generator [20], communication for IoT [21], liquid mixtures [22], and Hash function realization [23].…”
Section: Introductionmentioning
confidence: 99%