Design of Power Grid Data Security Transmission System Based on Chaotic Encryption

Wang Haoran, Zhou Zeyuan, Ban Qiucheng

Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (4) : 16-19.

PDF(1238 KB)
PDF(1238 KB)
Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (4) : 16-19.
TECHNOLOGY TOPIC

Design of Power Grid Data Security Transmission System Based on Chaotic Encryption

  • Wang Haoran, Zhou Zeyuan, Ban Qiucheng
Author information +
History +

Abstract

With the development of power grid scale,the power grid data increases massively.At present,due to the backward data encryption technology and poor processing effect of massive data,the power grid data security transmission system has low anti attack sensitivity.Therefore,a power grid data security transmission system based on chaotic encryption is designed.In the system hardware design,the embedded controller and information storage circuit are optimized to provide the basis for software optimization.In the software design,with the help of four-dimensional Chen discrete processing technology and chaotic dynamics theory,the power grid data encryption module is designed,and the weighted residual is used to detect the data intersection process,build the power grid data network attack detection module,and complete the design of power grid data security transmission system.The experiment results show that the anti attack sensitivity and encryption time of the system designed in this paper are better than the current system,and can be applied to practical work.

Key words

chaotic encryption algorithm / grid data encryption / network abnormality / network attack / network security

Cite this article

Download Citations
Wang Haoran, Zhou Zeyuan, Ban Qiucheng. Design of Power Grid Data Security Transmission System Based on Chaotic Encryption[J]. Integrated Circuits and Embedded Systems. 2022, 22(4): 16-19

References

[1] 简淦杨,蔡田田,习伟,等.基于异步传输的IPSEC安全加密芯片应用[J].电子器件,2020,43(2):239-244.
[2] 刘鑫蕊,吴泽群.面向智能电网的空间隐蔽型恶性数据注入攻击在线防御研究[J].中国电机工程学报,2020,40(8):2546-2559.
[3] 习伟,杜之波,吴震,等.一种基于国密算法和物理不克隆函数的安全并行总线[J].南方电网技术,2020,14(1):46-51.
[4] 高建,陈文彬,庞建民,等.基于组合密钥的智能电网多源数据安全保护[J].电信科学,2020,36(1):134-138.
[5] 陈思光,杨熠,黄黎明,等.基于雾计算的智能电网安全与隐私保护数据聚合研究[J].南京邮电大学学报(自然科学版),2019,39(6):62-72.
[6] 康守强,王金龙,王玉静,等.基于ZigBee与混沌加密的智慧实验室系统设计[J].哈尔滨理工大学学报,2019,24(5):81-87.
[7] 鲜永菊,谢世杰,涂艳丽.基于超混沌系统的多图加密算法[J].重庆邮电大学学报(自然科学版),2020,32(6):1065-1074.
[8] 徐光宪,王栋.基于混沌加密对抗窃听的安全网络编码方案[J].计算机应用,2019,39(5):1374-1377.
[9] 黄天恩,郭庆来,孙宏斌,等.模型-数据混合驱动的电网安全特征选择和知识发现关键技术与工程应用[J].电力系统自动化,2019,43(1):95-101,208.
[10] 高翔,陈贵凤,赵宏雷.基于数据挖掘的电力信息系统网络安全态势评估[J].电测与仪表,2019,56(19):102-106.
[11] 李永攀,门锟,吴俊阳.基于低秩模型的电力状态数据异常检测[J].计算机工程与应用,2019,55(16):255-258,264.
[12] 班多晗,吕鑫,王鑫元.基于一维混沌映射的高效图像加密算法[J].计算机科学,2020,47(4):278-284.
[13] 李增本,方文英.光纤网络系统中的数据加密技术研究[J].激光杂志,2019,40(5):158-162.
PDF(1238 KB)

Accesses

Citation

Detail

Sections
Recommended

/