Energy internet communication security system and method based on chaotic system array

A technology of energy Internet and chaotic system, which is applied in the direction of secure communication, transmission system, and digital transmission system through chaotic signals, which can solve the problems of low complexity of chaotic sequences, complex nonlinear behavior, and large key space, and achieve processing Strong data capability, rich key space, and safe and reliable system

Active Publication Date: 2018-08-03
国网河南省电力公司潢川县供电公司
View PDF16 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the low-dimensional chaotic system has the advantage of short calculation time due to its simple form, its key space is small and the complexity of the chaotic sequence is not high, resulting in low security of the cryptographic system and difficulty in resisting exhaustive attacks.
The high-dimensional chaotic system, especially the hyperchaotic system, has more than two Lyapunov exponents, and its nonlinear behavior is more complex and difficult to predict; in addition, the hyperchaotic system has more than 4 state variables, and the key space is larger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy internet communication security system and method based on chaotic system array
  • Energy internet communication security system and method based on chaotic system array
  • Energy internet communication security system and method based on chaotic system array

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0049] 1) In this example, according to the design principles of typical digital systems, the appropriate method will be selected as To implement, provide an implementation example that simply uses a difference equation, namely:

[0050] x(k+1)=(Ax(n)+gx(n)) dt+x(n)

[0051] The realized system forms a chaotic array according to certain principles. The present invention selects Chua's circuit system, Lorentz system, Chen's system and Lu's system to form an m*n chaotic array.

[0052]

[0053] In the formula, i and j represent the row and column coordinates of the array, respectively.

[0054] 3) In order to realize the control of the chaotic system array, the present invention adopts the method of controlling the system structure parameters and system initial values ​​of the chaotic units. The system structural parameters can be generated in the following ways, but not limited to, the parameter library is obtained by perturbing the typical structural parameters

[0055...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an energy internet communication security system and method based on a chaotic system array. The method comprises the following steps: 1) construction of the chaotic system array: constructing the chaotic system array with a chaotic system as a basic unit; 2) generation of a chaotic signal: solving a nonlinear differential equation of the basic unit in the chaotic system array to generate the chaotic signal required for secure communication; 3) processing of the chaotic signal: performing signal processing on the multi-channel chaotic signal generated by the chaotic array system to construct a new high-dimensional hyperchaotic signal as a key signal; and 4) encryption/decryption of information: performing encryption/decryption processing on the original/encrypted signal by using an output signal of the processed chaotic system array according to a given data encryption/decryption principle. The communication security method designed by the method provided by theinvention can be used for processing different kinds of information such as texts, waveforms, voice, images and the like, has the advantages of high data processing capability and wide type; and theenergy internet communication security system and method are flexible to expand, safe and reliable and are easy to implement.

Description

technical field [0001] The invention relates to cryptographic technology, in particular to an energy internet communication security system and method based on a chaotic system array. Background technique [0002] With the widespread application of energy Internet technology, energy network data is increasingly widely disseminated and stored on the Internet. Therefore, in order to effectively protect user information from being used by illegal persons, the fundamental measure taken is information confidentiality transmission and storage. There are many types of data in the Energy Internet, and the data volume is large. Most of the traditional encryption algorithms are designed for one-dimensional data flow. When traditional encryption algorithms are used for encryption, the encryption efficiency is low, and the encrypted data is vulnerable to attacks. [0003] Chaos refers to a random-like behavior generated by a nonlinear deterministic system, which has the characteristics ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/001H04L63/0428Y04S40/20
Inventor 张海洋李金龙万峰
Owner 国网河南省电力公司潢川县供电公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products