999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Data encryption based on a 9D complex chaotic system with quaternion for smart grid

2023-02-20 13:14:24FangfangZhang張芳芳ZheHuang黃哲LeiKou寇磊YangLi李揚(yáng)MaoyongCao曹茂永andFengyingMa馬鳳英
Chinese Physics B 2023年1期

Fangfang Zhang(張芳芳), Zhe Huang(黃哲), Lei Kou(寇磊),Yang Li(李揚(yáng)), Maoyong Cao(曹茂永), and Fengying Ma(馬鳳英)

1School of Information and Automation Engineering,Qilu University of Technology(Shandong Academy of Sciences),Jinan 250353,China

2Institute of Oceanographic Instrumentation,Qilu University of Technology(Shandong Academy of Sciences),Qingdao 266000,China

3School of Electrical Engineering,Northeast Electric Power University,Jilin 132000,China

Keywords: 9-dimensional complex chaotic system,data encryption,quaternion,smart grid,real-time

1. Introduction

Because a power system requires real-time transmission of data communication,most security applications in the computer network cannot be implemented in the power system.[1]In the smart grid, most of the critical real-time data is transmitted on the network in plain text,and real-time data encryption is not involved in real-time control. The important data is still in the form of plain text, which poses major safety hazards to the safe and stable operation of the power system.[2,3]The safe operation of power equipment is directly effected by the function of remote adjusting, remote control and remote measure in the smart grid. Especially, when the power information network is maliciously attacked,it results in data loss,tampering and seriously threatens the normal operation of the power information network and then affects the power physical network.[4,5]Finally, the malicious attack causes a chain reaction in the power network. In extreme cases, the malicious attack propagate alternately between the power information network and power physical network. Therefore,the safe and stable operation of the power grid cannot be guaranteed.For example,once the power information network is attacked and the monitor data is tampered with abnormal data. It may cause the power equipment to shut down and bring huge economic losses. For purpose of preventing malicious attackers from sending false abnormal monitor data, it is inevitable to prevent data leakage.

In addition, when encountering the suspected abnormal monitor data,it is crucial to confirm the condition of the equipment as soon as possible. The maintenance personnel should take photos of the equipment and send them to the control center. Timely reporting of the power equipment status can effectively improve the operation efficiency of the smart grid.Due to data information security,the report is forced to delay.Therefore, it is of great practical significance to study an encryption algorithm that takes into account both confidentiality and real time.

A deterministic aperiodic model was proposed by Lorenz who is a meteorologist at MIT. He was convinced that chaos[6,7]is a science that uses fractal geometry to analyze and study the nonlinear dynamics shown in phenomenons such as the butterfly effect. Grassber designed a method to reconstruct the dynamic system. It makes the chaos enter the practical application stage by introducing the Lyapunov exponent. By the end of the 20th century, chaos theory began to integrate with other subjects, such as chaotic secure communication,[8,9]chaotic cryptography,[10,11]and chaotic economics. The chaotic signal, which has inherent randomness, ergodicity and sensitivity to initial conditions, is generated by a deterministic system. These characteristics are very similar to the diffusion and scrambling properties in the Shannon classical model. Therefore, chaos theory has a wide application prospect in the field of information security.

The dynamic behavior of high-dimensional complex chaotic systems is more complicated than real chaotic systems. The real part and the imaginary part are independent in complex-valued chaotic systems,which improves the ergodicity of the chaotic system. Hence, high-dimensional complex chaotic systems can overcome the disadvantages of short period, uneven distribution of chaotic sequences and small key space. These belong to the low-dimensional chaotic system.

The basic mathematical concept of quaternion[12,13]was proposed by the famous mathematician Hamilton in 1843. He introduced a function called the complex plane function and obtained a four-dimensional space. The quaternion can be regarded as an extension of a simple complex number. The plural number is mainly composed of a real part and an international unitias an imaginary number. In the same way,quaternion can also be regarded to be composed of a real part and three imaginary unitsi,j,andk.

Many researchers have developed a great number of encryption schemes for the smart grid. In February 2016, Liuet al.[14]proposed a lightweight authenticated communication scheme for the smart grid, which ensures a secure two-way communication between the smart meters and the neighborhood gateway. In June 2017, Saxena and Grijalva[15]proposed a novel scheme based on dynamic secrets and encryption with secret keys. The scheme generates a series of dynamic secrets over the communication network, which are used to generate secret keys for data encryption. In June 2019,Gope and Sikdar[16]proposed a lightweight and privacyfriendly masking-based spatial data aggregation scheme for secure forecasting of power demand in smart grids. In March 2020, Songet al.[17]designed a dynamic membership data aggregation scheme by the homomorphic encryption and IDbased signature. It reduces the complexity on a new user’s joining and an old user’s quitting. In May 2021, Qianet al.[18]proposed a lightweightt-times homomorphic encryption scheme,which can reduce the computational cost of smart devices further and resist quantum attacks.

Although scholars have proposed good encryption schemes for smart grid, there still exist two problems to be solved:

(1)There is no discussion on image transmission encryption for smart grid. Compared with traditional text information,digital image contains more data.

(2)The encryption and decryption time are not discussed.

In order to overcome the above shortcomings,a new complex chaotic system with quaternion is proposed in this paper.This new chaotic system is 9-dimensional and has good encryption performances. The novelty and contributions of this paper are summarized as follows:

(i) A novel complex chaotic system with quaternion is proposed. The dynamic characteristics are discussed. At the same time,there are a few studies on the chaotic system with quaternion.

(ii)In order to ensure real-time transmission in the smart grid,an encryption algorithm based on the novel chaotic system is proposed. The image and the check code, which are encryted by the encryption algorithm,can be sent in time.

(iii)Moreover,it can also protect information from being tampered. The control center can identify the correct information and will not be misled to turn off the equipment for no reason. Therefore,economic losses are avoided.

The specific content is arranged as follows:The dynamics characteristics of the proposed chaotic system are discussed in Section 2. An encryption algorithm is expounded and compared with other algorithms by the usage of some security performances in Section 3. In Section 4,the proposed encryption scheme is verified with data and images in the smart grid,and the security analysis is provided. The main work of this paper is summarized in Section 5.

Fig.1. The smart grid applications.

2. Complex chaotic system with quaternion

The mathematical expression of complex Chen chaotic system[19]is

wherea,bare positive constants; andx1,x2,x3are independent variables.

Then the mathematical expression of the quaternion is given as follows:

whereui(i=1,2,...,9)are independent variables;andi,j,kare imaginary units.

System(1)is extended to the quaternion field,and substitute Eq.(2)into Eq.(1). Finally we can separate the real part from the imaginary part and obtain

wherea,b,care positive constants.Next,the dynamic characteristics of the system are intuitively analyzed from the chaos attractor,bifurcation diagram,0–1 test,and complexity analysis.

2.1. Chaos attractor

Seta=27,b=23,c=1. For initial conditions(0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1),the phase portraits of attractor are depicted in Fig.2.

Lyapunov exponent[18]is a numerical characteristic representing the average exponential divergence rate of adjacent trajectories in phase space. It is an important index to analyze the dynamic characteristics. Only when there are positive, negative values and zero, the system is chaotic.The Lyapunov exponents of system (3) are LE1=2.028,LE2=1.913, LE3=1.863, LE4=1.502, LE5=0.000, LE6=-0.316, LE7=-5.380, LE8=-5.524, LE9=-5.809. The corresponding Lyapunov exponents are depicted in Fig.3.The Lyapunov exponent of the proposed 9-dimensionol system is(+,+,+,+,0,-,-,-,-). Therefore,the system is chaotic.

Fig.2. Phase portraits of system(3):(a)x1-x5,(b)x1-x9,(c)x5-x9,(d)x1-x5-x9.

Fig.3. The Lyapunov exponent spectrum of system(3).

2.2. Bifurcation diagram

With different values of system parameters,the dynamic motion state of the system will change. This phenomenon is called bifurcation.[19]When there is only one point in the bifurcation diagram,it shows that the system is in a steady state within this parameter range.

Fig.4. The bifurcation of system(3).

On the contrary,when there are countless points in the bifurcation diagram, it means that the system is chaotic within this parameter range. Therefore,the bifurcation diagram varying with parameters can be used to analyze the performance characteristics of the system. The bifurcation diagram of variablex1varying with parameterαis shown in Fig.4. According to Fig.4,the system ceaselessly branches between diverse states with the change ofα,and the system comes to a chaotic state lastly.

2.3. The 0–1 test

By calculating the transformation variables of the sequences(n)andp(n),the system state is judged. This method is called 0–1 test.

wherec ∈(0,π),x(j)(j=1,2,...,N)is the test sequence.

Next,we verify the trajectory ofp(n)–s(n). If the trajectory shows the Brownian motion,the test sequence is chaotic.The “0–1 test” diagram of system (3) is shown in Fig. 5. It can be seen that the system (3) shows the Brownian motion.Therefore,it is chaotic.

Fig.5. The 0–1 test diagram.

2.4. Complexity analysis

The Shannon entropy (SE) algorithm and the chromatogram (C0) algorithm are used to verify and analyze the complexity of chaotic systems when the two parameters change. The SE algorithm obtains the spectral entropy from the Shannon entropy algorithm. TheC0algorithm divides the sequence into regular and irregular parts.Then it calculates the proportion of irregular parts in the whole sequence. The chromatogram of parameterαvarying with parametercis shown in Fig.6. The darker the color is,the higher the complexity is.

Through the above indexes, the dynamic characteristics of the system (3) are analyzed. Whena=1/7,b=2/7 andc=1,the system(3)has complex dynamic behavior,inherent randomness and unpredictability. Then it can generate pseudo random sequences required by the proposed algorithm.

Fig.6. The chromatogram of x1 sequence: (a) SE algorithm, (b) C0 algorithm.

3. The encryption algorithm and its comparison

Generally speaking, encrypted data will not be partially selected to ensure the integrity of data. However, when the equipment network breaks down, in order to ensure the realtime reporting of fault data, we can select partial sensitive or important information as the encryption region to decrease the encryption time.

It is of great importance to protect the sensitive information in the image,such as faces or devices. There is no need to keep the rest of the background area of the image confidential.Therefore, partial areas are only encrypted to ensure the real time.

In Section 2, the dynamic characteristics of chaotic system (3) are analyzed. The quasi random sequence with good pseudorandomness, low correlation and high complexity is generated by the chaotic system (3). Taking the pseudorandom sequence as the key sequence can ensure the security of encryption.

The flow chart of the proposed encryption algorithm is shown in Fig.7.

Fig.7. The flow chart of image encryption algorithm.

Fig.8. The flow chart of experimental results.

The steps of the image encryption algorithm are as follows:

Step 1Partially select image.Separate the image channel and change it into R,G and B channels. Then fill the remaining part in zero pixel value.

Step 2Select the gray value of each channel and its combination as the key. Then the image is divided into 4×4 subblocks. Call it A1.

Step 3Randomly select six sequences from the system (3). Then name them asA,X,Y,H,V,Msequences.Change theAsequence into a matrix of the same image size.It is divided into 4×4 subblocks. Name it as A2.

Step 4Encode A1 and A2 using the DNA coding scheme. The coding rule is determined by theXandYsequences,respectively. Name them B1 and B2.

Step 5Encode B1 and B2 using the DNA computing scheme. The computing scheme is determined by theHsequence. Call it C1.

Step 6Decoding C1 using the DNA coding scheme. Replace the row and column. The row and column replacement orders are determined byVandMsequences,respectively. Finally,the zero filling part is removed.

Seta=27,b=23,c=1 in system (3) and initial condition is the pixel average value of original image. In this encryption algorithm, the “Lena” image is an encrypted object.Select the area to be encrypted in the Lena image.The selected area should correspond to sensitive information that can identify an individual,such as a face. The rest is not encrypted.

The encryption process is depicted in Fig. 8, where Fig. 8(a) is the original image, Fig. 8(b) is the encrypted image,Fig.8(c)is the decrypted image,and Fig.8(d)is the partial image. The original features and information are masked in Fig.8(e).

3.1. Reconstruction quality analysis

In order to measure the distortion of the decrypted image,structural similarity(SSIM)is introduced. SSIM contains three independent components:luminance,contrast and structure. The SSIM can be expressed as follows:

wherekXandkYare the mean of imagesXandY;nXandnYare the variance of imagesXandY;nXYis the covariance of imagesXandY.D1andD2are two constants with small value when the denominator is up to zero;D3=D1/2.U(X,Y) is the luminance,O(X,Y) denotes contrast,T(X,Y) represents structure. The SSIM of Figs.8(a)and 8(c)is 1 by calculation.

Next,subtract the pixel value of the original image from each pixel value of the decrypted image. The result of this calculation is zero, which indicates that the image pixel value is restored to normal.

3.2. Correlation coefficient

In the horizontal,vertical and diagonal directions,the adjacent pixel values of plaintext and ciphertext images are randomly selected. Calculate the correlation coefficient between two adjacent pixels.The numerical range of correlation coefficient of adjacent pixels is[-1,1].If the value is close to 1,the adjacent pixels are strong related. Contrarily,the adjacent pixels are weak related.The formula of the correlation coefficientruvbetweenuiandviis given as follows:

whereEindicates the average pixel value,Dand Cov represent the variance and the covariance of pixels,respectively;ruvis the correlation coefficient;Nis the number of pixels;ui,vi(i=1,...,N) are pixels. As listed in Tables 1 and 2, though compared with other algorithms,the confidentiality is slightly inferior,this algorithm has an advantage in shortening the encryption and decryption time.

Table 1. Adjacent pixels and time comparison.

Table 2. Encryption and decryption time.

3.3. Histogram

The frequency of all gray values can be intuitively seen from the histogram. The pixel distributions of each pixel level can be seen in Figs.9(a)–9(c)with the histograms of the plaintext image. Figures 9(d)–9(f)are the histograms of the ciphertext image. The pixel distribution of the plaintext image is uneven. After encryption, the histogram of ciphertext image is almost uniform and is quietly different from those of the plaintext image. The results verify that the proposed encryption algorithm is resistant to statistical attacks.

Fig.9. Histograms:(a)R channel in plain image,(b)G channel in plain image,(c)B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

3.4. Information entropy

As a quantitative standard,information entropy is the relative complexity of the image information. The image information entropy with average gray value distribution is relatively close to 8. The formula ofFis given as follows:

whereTis the maximum gray value 255,ande(xi)is the gray value probability. As shown in Table 3, the information entropy of the proposed algorithm is slightly smaller,but the encryption time is greatly shortened. This means that this algorithm can effectively shorten the encryption time.

Table 3. The information entropy.

4. The encryption scheme in the smart grid

4.1. Image encryption

Two actual pictures of the distribution network are selected as the encryption objects. Their sizes are,respectively,256×256 and 512×512. Call them image 1 and image 2.

Fig.10. The flow chart of experimental results.

Select the area to be encrypted in image 1 and image 2. The selected area should correspond to sensitive information that can identify the physical status of equipments.Therefore,the central area containing distribution network equipments is selected.

Fig.11. The flow chart of experimental results.

The encryption process of image 1 is shown in Fig. 10,where Fig. 10(a) is the original image 1, Fig. 10(b) is the encrypted image 1, Fig. 10(c) is the decrypted image 1, and Fig.10(d)is the partial image 1. The original features and information are masked in Fig.10(e). Figure 11 shows the same encryption process of image 2.

Then,the encrypted image is analyzed by the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality.

4.1.1. Histogram

According to Figs.12 and 13,the histogram after encryption is evenly distributed,which can effectively resist statistical attacks.

Fig.13. Histograms of the original image 2 and the encrypted image 2: (a) R channel in plain image, (b) G channel in plain image, (c) B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

4.1.2. Correlation coefficient

According to Tables 4 and 5, the strong correlation between the pixels of the original image after a short time of encryption is weakened.

Table 4. Adjacent pixels comparison.

Table 5. Encryption and decryption time.

4.1.3. Information entropy

According to Table 6, the information entropy of encrypted images with a short encryption time is close to the maximum. It means that this encryption algorithm takes into account both confidentiality and real time.

Table 6. The information entropy of image.

4.1.4. Sensitivity of key

Under the initial conditions(0.10002, 0.10002, 0.10002,0.10002, 0.10002, 0.10002, 0.10002, 0.10002, 0.10002), the values of other parameters in system (3) remain unchanged.The generated sequences are used to decrypt the cipher images 1 and 2. According to Fig. 14, these sequences fail to decrypt the cipher images 1 and 2. The proposed encryption algorithm is sensitive to the key.

Fig.14. The decryption results of wrong key: (a)the decryption results of cipher image 1,(b)the decryption results of cipher image 2.

4.1.5. Reconstruction quality analysis

According to Table 7, the reconstruction qualities of images 1 and 2 are excellent.

From the correlation coefficient, histogram, information entropy,sensitivity of key and reconstruction quality,the proposed encryption algorithm has good confidentiality and real time in the image transmission of the smart grid.

Table 7. Reconstruction quality analysis.

4.2. Data encryption

Modbus protocol is adopted in the process of transmitting monitor data. The composition of Modbus protocol is as follows:

Fig.15. The message frame composition in modbus RTU mode.

Fig.16. The flow chart of the data encryption algorithm.

The cyclic redundant check(CRC)code is calculated by the transmitting device and placed at the end of the transmitted information frame. The receiving device recalculates the CRC of the received information and compares whether the calculated CRC is consistent with the received CRC. If they are inconsistent,it is considered that the data is abnormal. Therefore, CRC is selected for encryption in this paper. The flow chart of the data encryption algorithm is shown in Fig.16.This encryption step is similar to the above image encryption step.

Next, the randomness of the sequence is analyzed by the NIST test. It is a recognized standard in the encryption field that can be used to evaluate the performance of pseudo-random sequences. Most scholars convince that it is a very common and effective method to test pseudo-random sequences. For convenience’s sake, 10000000 real numbers,generated by system (3), are converted to binary sequences.Adopt them directly as the experimental data of the NIST test suit. If every single item in the NIST test exceeds 0.01(maximum is 1), it indicates that this test is passed. At the same time, the larger the value is, the stronger the random characteristic of the test sequence is.

As shown in Table 8, the chaotic sequence generated by system(3)has good random performance and can effectively cover up the information of encrypted data.

Table 8. NIST test.

5. Conclusion

A new 9D complex chaotic system with quaternion is proposed in this paper. Firstly, it is derived from the complex Chen system and quaternion. The expansion of variables from real field to complex field is realized. Secondly,to analyze the performances of the new chaotic system,Lyapunov exponent,phase diagrams, bifurcation diagram, 0–1 test and complexity are introduced. Finally,with the DNA code,an encryption algorithm is proposed based on system (3). The transmitted images and data are encrypted in the verification experiments.

To analyze the image encryption,we have introduced the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality. The data encryption is analyzed by the NIST test. The experimental results show that the proposed algorithm improves the real-time performance on the basis of confidentiality. It can be applied to the smart grid.

Acknowledgements

Project supported by the International Collaborative Research Project of Qilu University of Technology (Grant No. QLUTGJHZ2018020), the Project of Youth Innovation and Technology Support Plan for Colleges and Universities in Shandong Province, China (Grant No. 2021KJ025), the Major Scientific and Technological Innovation Projects of Shandong Province,China(Grant Nos.2019JZZY010731 and 2020CXGC010901).

主站蜘蛛池模板: 青青草91视频| 激情午夜婷婷| 国产日韩精品一区在线不卡| 国产美女在线免费观看| 国产一二三区在线| 欧美日韩一区二区在线播放| 欧美精品亚洲日韩a| aa级毛片毛片免费观看久| 亚洲国产第一区二区香蕉| 六月婷婷激情综合| 高清不卡毛片| 三级欧美在线| 日韩大乳视频中文字幕| 色成人亚洲| 日韩美一区二区| 99re精彩视频| 免费无码网站| 日韩AV无码免费一二三区| 日本a∨在线观看| 久久久久亚洲精品无码网站| 日韩精品一区二区深田咏美| 91无码视频在线观看| 视频二区亚洲精品| 久久精品66| 片在线无码观看| 欧美成人亚洲综合精品欧美激情| 久久婷婷六月| 日本精品αv中文字幕| 毛片久久久| 伊人AV天堂| 99在线视频免费观看| 伊人久久影视| 国内精品九九久久久精品| 亚洲精品中文字幕午夜| 欧美日韩亚洲国产| 色综合热无码热国产| 第一区免费在线观看| 91日本在线观看亚洲精品| 99精品热视频这里只有精品7 | 国产区在线观看视频| 日本一区二区不卡视频| 久久国产拍爱| 久久精品日日躁夜夜躁欧美| 日本草草视频在线观看| 久久精品欧美一区二区| 99er精品视频| 国产福利在线免费观看| 亚洲首页在线观看| 91久久国产成人免费观看| 国产乱人伦偷精品视频AAA| 夜夜爽免费视频| 日韩欧美高清视频| 国产精品久久久免费视频| 亚洲乱码精品久久久久..| 亚洲视频免| 亚洲三级影院| 国产女人18水真多毛片18精品| 国产白浆一区二区三区视频在线| 女同国产精品一区二区| 国产精品私拍在线爆乳| 欧美区一区| 国产麻豆精品在线观看| 成色7777精品在线| 午夜一级做a爰片久久毛片| 国产一国产一有一级毛片视频| 依依成人精品无v国产| 国产成人超碰无码| 色老头综合网| aaa国产一级毛片| 国产亚洲欧美日韩在线一区二区三区| 亚洲国产精品VA在线看黑人| 成人自拍视频在线观看| 26uuu国产精品视频| 婷婷综合亚洲| 午夜性刺激在线观看免费| 国产在线小视频| 亚洲伊人天堂| 亚洲国产成人在线| 无码aⅴ精品一区二区三区| 亚洲美女AV免费一区| 91www在线观看| 亚洲男人的天堂网|