2022
DOI: 10.3389/fenrg.2022.980863
|View full text |Cite
|
Sign up to set email alerts
|

Data encryption based on 7D complex chaotic system with cubic memristor for smart grid

Abstract: The information security has an irreplaceable position in the smart grid (SG). In order to avoid the malicious attack and ensure the information security, the cryptographic techniques are essential. This paper focuses on the encryption techniques to ensure the information security of SG. Firstly, an unusual 7-dimensional complex chaotic system (7D-CCS) combined with the cubic memristor is introduced. Besides its phase portraits, Lyapunov exponent, 0–1 test, complexity, and bifurcation diagram are investigated.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Maintaining and securing modern power systems is essential and depends on renewable energy resources and their dynamics. An encrypted object is compared with the dynamic characteristics of the system using a 4D chaotic system together with a test image in [81] against potential cyber-attacks and maintenance purposes. Another two-dimensional logistic complex-mapping algorithm presented in [82] is capable of resisting common attacks because of the complex encoded data.…”
Section: Energy Management Systemsmentioning
confidence: 99%
“…Maintaining and securing modern power systems is essential and depends on renewable energy resources and their dynamics. An encrypted object is compared with the dynamic characteristics of the system using a 4D chaotic system together with a test image in [81] against potential cyber-attacks and maintenance purposes. Another two-dimensional logistic complex-mapping algorithm presented in [82] is capable of resisting common attacks because of the complex encoded data.…”
Section: Energy Management Systemsmentioning
confidence: 99%
“…[26,27], the attacker can obtain the identity information in the wind turbine status sensor and the regional gateway and then enter the subsequent data transmission stage. Finally, the attacker can maliciously break the authentication process and disrupt the normal operation of the system [28].…”
Section: Demand Analysis For Agile Authentication Of Wind Turbine Sta...mentioning
confidence: 99%
“…Mezatio et al [34] presented a 6D autonomous system obtained by introducing a flux-controlled memristor model into an existing 5D hyperchaotic autonomous system. Kou et al [35] introduced an unusual 7D complex chaotic system combined with the cubic memristor.…”
Section: Introductionmentioning
confidence: 99%