首页作文素材好词好句历史典故写作技巧考场素材单元作文英语作文小升初作文名人故事时事论据 名言警句范文大全精美散文
小学作文
初中作文
高中作文
作文体裁

Data,encryption,based,on,a,9D,complex,chaotic,system,with,quaternion,for,smart,grid

时间:2023-07-09 08:40:20 来源:爱作文网  爱作文网手机站

Fangfang Zhang(张芳芳), Zhe Huang(黄哲), Lei Kou(寇磊),Yang Li(李扬), Maoyong Cao(曹茂永), and Fengying Ma(马凤英)

1School of Information and Automation Engineering,Qilu University of Technology(Shandong Academy of Sciences),Jinan 250353,China

2Institute of Oceanographic Instrumentation,Qilu University of Technology(Shandong Academy of Sciences),Qingdao 266000,China

3School of Electrical Engineering,Northeast Electric Power University,Jilin 132000,China

Keywords: 9-dimensional complex chaotic system,data encryption,quaternion,smart grid,real-time

Because a power system requires real-time transmission of data communication,most security applications in the computer network cannot be implemented in the power system.[1]In the smart grid, most of the critical real-time data is transmitted on the network in plain text,and real-time data encryption is not involved in real-time control. The important data is still in the form of plain text, which poses major safety hazards to the safe and stable operation of the power system.[2,3]The safe operation of power equipment is directly effected by the function of remote adjusting, remote control and remote measure in the smart grid. Especially, when the power information network is maliciously attacked,it results in data loss,tampering and seriously threatens the normal operation of the power information network and then affects the power physical network.[4,5]Finally, the malicious attack causes a chain reaction in the power network. In extreme cases, the malicious attack propagate alternately between the power information network and power physical network. Therefore,the safe and stable operation of the power grid cannot be guaranteed.For example,once the power information network is attacked and the monitor data is tampered with abnormal data. It may cause the power equipment to shut down and bring huge economic losses. For purpose of preventing malicious attackers from sending false abnormal monitor data, it is inevitable to prevent data leakage.

In addition, when encountering the suspected abnormal monitor data,it is crucial to confirm the condition of the equipment as soon as possible. The maintenance personnel should take photos of the equipment and send them to the control center. Timely reporting of the power equipment status can effectively improve the operation efficiency of the smart grid.Due to data information security,the report is forced to delay.Therefore, it is of great practical significance to study an encryption algorithm that takes into account both confidentiality and real time.

A deterministic aperiodic model was proposed by Lorenz who is a meteorologist at MIT. He was convinced that chaos[6,7]is a science that uses fractal geometry to analyze and study the nonlinear dynamics shown in phenomenons such as the butterfly effect. Grassber designed a method to reconstruct the dynamic system. It makes the chaos enter the practical application stage by introducing the Lyapunov exponent. By the end of the 20th century, chaos theory began to integrate with other subjects, such as chaotic secure communication,[8,9]chaotic cryptography,[10,11]and chaotic economics. The chaotic signal, which has inherent randomness, ergodicity and sensitivity to initial conditions, is generated by a deterministic system. These characteristics are very similar to the diffusion and scrambling properties in the Shannon classical model. Therefore, chaos theory has a wide application prospect in the field of information security.

The dynamic behavior of high-dimensional complex chaotic systems is more complicated than real chaotic systems. The real part and the imaginary part are independent in complex-valued chaotic systems,which improves the ergodicity of the chaotic system. Hence, high-dimensional complex chaotic systems can overcome the disadvantages of short period, uneven distribution of chaotic sequences and small key space. These belong to the low-dimensional chaotic system.

The basic mathematical concept of quaternion[12,13]was proposed by the famous mathematician Hamilton in 1843. He introduced a function called the complex plane function and obtained a four-dimensional space. The quaternion can be regarded as an extension of a simple complex number. The plural number is mainly composed of a real part and an international unitias an imaginary number. In the same way,quaternion can also be regarded to be composed of a real part and three imaginary unitsi,j,andk.

Many researchers have developed a great number of encryption schemes for the smart grid. In February 2016, Liuet al.[14]proposed a lightweight authenticated communication scheme for the smart grid, which ensures a secure two-way communication between the smart meters and the neighborhood gateway. In June 2017, Saxena and Grijalva[15]proposed a novel scheme based on dynamic secrets and encryption with secret keys. The scheme generates a series of dynamic secrets over the communication network, which are used to generate secret keys for data encryption. In June 2019,Gope and Sikdar[16]proposed a lightweight and privacyfriendly masking-based spatial data aggregation scheme for secure forecasting of power demand in smart grids. In March 2020, Songet al.[17]designed a dynamic membership data aggregation scheme by the homomorphic encryption and IDbased signature. It reduces the complexity on a new user’s joining and an old user’s quitting. In May 2021, Qianet al.[18]proposed a lightweightt-times homomorphic encryption scheme,which can reduce the computational cost of smart devices further and resist quantum attacks.

Although scholars have proposed good encryption schemes for smart grid, there still exist two problems to be solved:

(1)There is no discussion on image transmission encryption for smart grid. Compared with traditional text information,digital image contains more data.

(2)The encryption and decryption time are not discussed.

In order to overcome the above shortcomings,a new complex chaotic system with quaternion is proposed in this paper.This new chaotic system is 9-dimensional and has good encryption performances. The novelty and contributions of this paper are summarized as follows:

(i) A novel complex chaotic system with quaternion is proposed. The dynamic characteristics are discussed. At the same time,there are a few studies on the chaotic system with quaternion.

(ii)In order to ensure real-time transmission in the smart grid,an encryption algorithm based on the novel chaotic system is proposed. The image and the check code, which are encryted by the encryption algorithm,can be sent in time.

(iii)Moreover,it can also protect information from being tampered. The control center can identify the correct information and will not be misled to turn off the equipment for no reason. Therefore,economic losses are avoided.

The specific content is arranged as follows:The dynamics characteristics of the proposed chaotic system are discussed in Section 2. An encryption algorithm is expounded and compared with other algorithms by the usage of some security performances in Section 3. In Section 4,the proposed encryption scheme is verified with data and images in the smart grid,and the security analysis is provided. The main work of this paper is summarized in Section 5.

Fig.1. The smart grid applications.

The mathematical expression of complex Chen chaotic system[19]is

wherea,bare positive constants; andx1,x2,x3are independent variables.

Then the mathematical expression of the quaternion is given as follows:

whereui(i=1,2,...,9)are independent variables;andi,j,kare imaginary units.

System(1)is extended to the quaternion field,and substitute Eq.(2)into Eq.(1). Finally we can separate the real part from the imaginary part and obtain

wherea,b,care positive constants.Next,the dynamic characteristics of the system are intuitively analyzed from the chaos attractor,bifurcation diagram,0–1 test,and complexity analysis.

2.1. Chaos attractor

Seta=27,b=23,c=1. For initial conditions(0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1),the phase portraits of attractor are depicted in Fig.2.

Lyapunov exponent[18]is a numerical characteristic representing the average exponential divergence rate of adjacent trajectories in phase space. It is an important index to analyze the dynamic characteristics. Only when there are positive, negative values and zero, the system is chaotic.The Lyapunov exponents of system (3) are LE1=2.028,LE2=1.913, LE3=1.863, LE4=1.502, LE5=0.000, LE6=-0.316, LE7=-5.380, LE8=-5.524, LE9=-5.809. The corresponding Lyapunov exponents are depicted in Fig.3.The Lyapunov exponent of the proposed 9-dimensionol system is(+,+,+,+,0,-,-,-,-). Therefore,the system is chaotic.

Fig.2. Phase portraits of system(3):(a)x1-x5,(b)x1-x9,(c)x5-x9,(d)x1-x5-x9.

Fig.3. The Lyapunov exponent spectrum of system(3).

2.2. Bifurcation diagram

With different values of system parameters,the dynamic motion state of the system will change. This phenomenon is called bifurcation.[19]When there is only one point in the bifurcation diagram,it shows that the system is in a steady state within this parameter range.

Fig.4. The bifurcation of system(3).

On the contrary,when there are countless points in the bifurcation diagram, it means that the system is chaotic within this parameter range. Therefore,the bifurcation diagram varying with parameters can be used to analyze the performance characteristics of the system. The bifurcation diagram of variablex1varying with parameterαis shown in Fig.4. According to Fig.4,the system ceaselessly branches between diverse states with the change ofα,and the system comes to a chaotic state lastly.

2.3. The 0–1 test

By calculating the transformation variables of the sequences(n)andp(n),the system state is judged. This method is called 0–1 test.

wherec ∈(0,π),x(j)(j=1,2,...,N)is the test sequence.

Next,we verify the trajectory ofp(n)–s(n). If the trajectory shows the Brownian motion,the test sequence is chaotic.The “0–1 test” diagram of system (3) is shown in Fig. 5. It can be seen that the system (3) shows the Brownian motion.Therefore,it is chaotic.

Fig.5. The 0–1 test diagram.

2.4. Complexity analysis

The Shannon entropy (SE) algorithm and the chromatogram (C0) algorithm are used to verify and analyze the complexity of chaotic systems when the two parameters change. The SE algorithm obtains the spectral entropy from the Shannon entropy algorithm. TheC0algorithm divides the sequence into regular and irregular parts.Then it calculates the proportion of irregular parts in the whole sequence. The chromatogram of parameterαvarying with parametercis shown in Fig.6. The darker the color is,the higher the complexity is.

Through the above indexes, the dynamic characteristics of the system (3) are analyzed. Whena=1/7,b=2/7 andc=1,the system(3)has complex dynamic behavior,inherent randomness and unpredictability. Then it can generate pseudo random sequences required by the proposed algorithm.

Fig.6. The chromatogram of x1 sequence: (a) SE algorithm, (b) C0 algorithm.

Generally speaking, encrypted data will not be partially selected to ensure the integrity of data. However, when the equipment network breaks down, in order to ensure the realtime reporting of fault data, we can select partial sensitive or important information as the encryption region to decrease the encryption time.

It is of great importance to protect the sensitive information in the image,such as faces or devices. There is no need to keep the rest of the background area of the image confidential.Therefore, partial areas are only encrypted to ensure the real time.

In Section 2, the dynamic characteristics of chaotic system (3) are analyzed. The quasi random sequence with good pseudorandomness, low correlation and high complexity is generated by the chaotic system (3). Taking the pseudorandom sequence as the key sequence can ensure the security of encryption.

The flow chart of the proposed encryption algorithm is shown in Fig.7.

Fig.7. The flow chart of image encryption algorithm.

Fig.8. The flow chart of experimental results.

The steps of the image encryption algorithm are as follows:

Step 1Partially select image.Separate the image channel and change it into R,G and B channels. Then fill the remaining part in zero pixel value.

Step 2Select the gray value of each channel and its combination as the key. Then the image is divided into 4×4 subblocks. Call it A1.

Step 3Randomly select six sequences from the system (3). Then name them asA,X,Y,H,V,Msequences.Change theAsequence into a matrix of the same image size.It is divided into 4×4 subblocks. Name it as A2.

Step 4Encode A1 and A2 using the DNA coding scheme. The coding rule is determined by theXandYsequences,respectively. Name them B1 and B2.

Step 5Encode B1 and B2 using the DNA computing scheme. The computing scheme is determined by theHsequence. Call it C1.

Step 6Decoding C1 using the DNA coding scheme. Replace the row and column. The row and column replacement orders are determined byVandMsequences,respectively. Finally,the zero filling part is removed.

Seta=27,b=23,c=1 in system (3) and initial condition is the pixel average value of original image. In this encryption algorithm, the “Lena” image is an encrypted object.Select the area to be encrypted in the Lena image.The selected area should correspond to sensitive information that can identify an individual,such as a face. The rest is not encrypted.

The encryption process is depicted in Fig. 8, where Fig. 8(a) is the original image, Fig. 8(b) is the encrypted image,Fig.8(c)is the decrypted image,and Fig.8(d)is the partial image. The original features and information are masked in Fig.8(e).

3.1. Reconstruction quality analysis

In order to measure the distortion of the decrypted image,structural similarity(SSIM)is introduced. SSIM contains three independent components:luminance,contrast and structure. The SSIM can be expressed as follows:

wherekXandkYare the mean of imagesXandY;nXandnYare the variance of imagesXandY;nXYis the covariance of imagesXandY.D1andD2are two constants with small value when the denominator is up to zero;D3=D1/2.U(X,Y) is the luminance,O(X,Y) denotes contrast,T(X,Y) represents structure. The SSIM of Figs.8(a)and 8(c)is 1 by calculation.

Next,subtract the pixel value of the original image from each pixel value of the decrypted image. The result of this calculation is zero, which indicates that the image pixel value is restored to normal.

3.2. Correlation coefficient

In the horizontal,vertical and diagonal directions,the adjacent pixel values of plaintext and ciphertext images are randomly selected. Calculate the correlation coefficient between two adjacent pixels.The numerical range of correlation coefficient of adjacent pixels is[-1,1].If the value is close to 1,the adjacent pixels are strong related. Contrarily,the adjacent pixels are weak related.The formula of the correlation coefficientruvbetweenuiandviis given as follows:

whereEindicates the average pixel value,Dand Cov represent the variance and the covariance of pixels,respectively;ruvis the correlation coefficient;Nis the number of pixels;ui,vi(i=1,...,N) are pixels. As listed in Tables 1 and 2, though compared with other algorithms,the confidentiality is slightly inferior,this algorithm has an advantage in shortening the encryption and decryption time.

Table 1. Adjacent pixels and time comparison.

Table 2. Encryption and decryption time.

3.3. Histogram

The frequency of all gray values can be intuitively seen from the histogram. The pixel distributions of each pixel level can be seen in Figs.9(a)–9(c)with the histograms of the plaintext image. Figures 9(d)–9(f)are the histograms of the ciphertext image. The pixel distribution of the plaintext image is uneven. After encryption, the histogram of ciphertext image is almost uniform and is quietly different from those of the plaintext image. The results verify that the proposed encryption algorithm is resistant to statistical attacks.

Fig.9. Histograms:(a)R channel in plain image,(b)G channel in plain image,(c)B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

3.4. Information entropy

As a quantitative standard,information entropy is the relative complexity of the image information. The image information entropy with average gray value distribution is relatively close to 8. The formula ofFis given as follows:

whereTis the maximum gray value 255,ande(xi)is the gray value probability. As shown in Table 3, the information entropy of the proposed algorithm is slightly smaller,but the encryption time is greatly shortened. This means that this algorithm can effectively shorten the encryption time.

Table 3. The information entropy.

4.1. Image encryption

Two actual pictures of the distribution network are selected as the encryption objects. Their sizes are,respectively,256×256 and 512×512. Call them image 1 and image 2.

Fig.10. The flow chart of experimental results.

Select the area to be encrypted in image 1 and image 2. The selected area should correspond to sensitive information that can identify the physical status of equipments.Therefore,the central area containing distribution network equipments is selected.

Fig.11. The flow chart of experimental results.

The encryption process of image 1 is shown in Fig. 10,where Fig. 10(a) is the original image 1, Fig. 10(b) is the encrypted image 1, Fig. 10(c) is the decrypted image 1, and Fig.10(d)is the partial image 1. The original features and information are masked in Fig.10(e). Figure 11 shows the same encryption process of image 2.

Then,the encrypted image is analyzed by the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality.

4.1.1. Histogram

According to Figs.12 and 13,the histogram after encryption is evenly distributed,which can effectively resist statistical attacks.

Fig.13. Histograms of the original image 2 and the encrypted image 2: (a) R channel in plain image, (b) G channel in plain image, (c) B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

4.1.2. Correlation coefficient

According to Tables 4 and 5, the strong correlation between the pixels of the original image after a short time of encryption is weakened.

Table 4. Adjacent pixels comparison.

Table 5. Encryption and decryption time.

4.1.3. Information entropy

According to Table 6, the information entropy of encrypted images with a short encryption time is close to the maximum. It means that this encryption algorithm takes into account both confidentiality and real time.

Table 6. The information entropy of image.

4.1.4. Sensitivity of key

Under the initial conditions(0.10002, 0.10002, 0.10002,0.10002, 0.10002, 0.10002, 0.10002, 0.10002, 0.10002), the values of other parameters in system (3) remain unchanged.The generated sequences are used to decrypt the cipher images 1 and 2. According to Fig. 14, these sequences fail to decrypt the cipher images 1 and 2. The proposed encryption algorithm is sensitive to the key.

Fig.14. The decryption results of wrong key: (a)the decryption results of cipher image 1,(b)the decryption results of cipher image 2.

4.1.5. Reconstruction quality analysis

According to Table 7, the reconstruction qualities of images 1 and 2 are excellent.

From the correlation coefficient, histogram, information entropy,sensitivity of key and reconstruction quality,the proposed encryption algorithm has good confidentiality and real time in the image transmission of the smart grid.

Table 7. Reconstruction quality analysis.

4.2. Data encryption

Modbus protocol is adopted in the process of transmitting monitor data. The composition of Modbus protocol is as follows:

Fig.15. The message frame composition in modbus RTU mode.

Fig.16. The flow chart of the data encryption algorithm.

The cyclic redundant check(CRC)code is calculated by the transmitting device and placed at the end of the transmitted information frame. The receiving device recalculates the CRC of the received information and compares whether the calculated CRC is consistent with the received CRC. If they are inconsistent,it is considered that the data is abnormal. Therefore, CRC is selected for encryption in this paper. The flow chart of the data encryption algorithm is shown in Fig.16.This encryption step is similar to the above image encryption step.

Next, the randomness of the sequence is analyzed by the NIST test. It is a recognized standard in the encryption field that can be used to evaluate the performance of pseudo-random sequences. Most scholars convince that it is a very common and effective method to test pseudo-random sequences. For convenience’s sake, 10000000 real numbers,generated by system (3), are converted to binary sequences.Adopt them directly as the experimental data of the NIST test suit. If every single item in the NIST test exceeds 0.01(maximum is 1), it indicates that this test is passed. At the same time, the larger the value is, the stronger the random characteristic of the test sequence is.

As shown in Table 8, the chaotic sequence generated by system(3)has good random performance and can effectively cover up the information of encrypted data.

Table 8. NIST test.

A new 9D complex chaotic system with quaternion is proposed in this paper. Firstly, it is derived from the complex Chen system and quaternion. The expansion of variables from real field to complex field is realized. Secondly,to analyze the performances of the new chaotic system,Lyapunov exponent,phase diagrams, bifurcation diagram, 0–1 test and complexity are introduced. Finally,with the DNA code,an encryption algorithm is proposed based on system (3). The transmitted images and data are encrypted in the verification experiments.

To analyze the image encryption,we have introduced the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality. The data encryption is analyzed by the NIST test. The experimental results show that the proposed algorithm improves the real-time performance on the basis of confidentiality. It can be applied to the smart grid.

Acknowledgements

Project supported by the International Collaborative Research Project of Qilu University of Technology (Grant No. QLUTGJHZ2018020), the Project of Youth Innovation and Technology Support Plan for Colleges and Universities in Shandong Province, China (Grant No. 2021KJ025), the Major Scientific and Technological Innovation Projects of Shandong Province,China(Grant Nos.2019JZZY010731 and 2020CXGC010901).

猜你喜欢李扬Data-driven modeling of a four-dimensional stochastic projectile systemChinese Physics B(2022年7期)2022-08-01十七楼限定期之恋中外文摘(2022年8期)2022-05-17十七楼限定期之恋女友(2022年2期)2022-02-16喜糖礼盒包装设计喜剧世界·中旬刊(2020年9期)2020-09-10墨菲定律金山(2020年6期)2020-07-09就当扶贫户民间文学(2020年12期)2020-01-14特殊聘用关系下的工伤理赔纠纷检察风云(2019年20期)2019-11-06套牢小小说月刊·下半月(2019年2期)2019-03-18送信男生女生(金版)(2016年1期)2016-04-20挖掘自己的长处作文评点报·作文素材初中版(2016年5期)2016-03-11

推荐访问:based complex data

版权声明:

1、本网站发布的作文《Data,encryption,based,on,a,9D,complex,chaotic,system,with,quaternion,for,smart,grid》为爱作文网注册网友原创或整理,版权归原作者所有,转载请注明出处!

2、本网站作文/文章《Data,encryption,based,on,a,9D,complex,chaotic,system,with,quaternion,for,smart,grid》仅代表作者本人的观点,与本网站立场无关,作者文责自负。

3、本网站一直无私为全国中小学生提供大量优秀作文范文,免费帮同学们审核作文,评改作文。对于不当转载或引用本网内容而引起的民事纷争、行政处理或其他损失,本网不承担责任。

热门专题