Skip to main content

ORIGINAL RESEARCH article

Front. Energy Res., 12 September 2022
Sec. Smart Grids
This article is part of the Research Topic Control, Operation and Trading Strategies of Intermittent Renewable Energy in Smart Grids View all 46 articles

Data encryption based on 7D complex chaotic system with cubic memristor for smart grid

Lei KouLei Kou1Zhe HuangZhe Huang1Cuimei Jiang
Cuimei Jiang1*Fangfang Zhang
Fangfang Zhang1*Wende KeWende Ke2Junhe WanJunhe Wan1Hailin LiuHailin Liu1Hui LiHui Li1Jinyan LuJinyan Lu3
  • 1Qilu University of Technology (Shandong Academy of Sciences), Qingdao, China
  • 2Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, China
  • 3State Grid Anhui Electric Power Company Hefei Power Supply Company, Hefei, China

The information security has an irreplaceable position in the smart grid (SG). In order to avoid the malicious attack and ensure the information security, the cryptographic techniques are essential. This paper focuses on the encryption techniques to ensure the information security of SG. Firstly, an unusual 7-dimensional complex chaotic system (7D-CCS) combined with the cubic memristor is introduced. Besides its phase portraits, Lyapunov exponent, 0–1 test, complexity, and bifurcation diagram are investigated. Then, with the proposed 7D-CCS, we design a data encryption algorithm to ensure the encryption security. Finally, the data and monitoring images in SG are encrypted by the designed encryption scheme. Besides, the encryption performance is given in detailed. The experimental results show that the proposed encryption scheme has quite good encryption performance. Therefore, it can ensure the information security of SG.

1 Introduction

The SG is a system based on communication and information technology in the generation, delivery, and consumption of energy power. It (Ferrag et al., 2018; Kimani et al., 2019) begins to involve application areas such as smart factory, traffic network and gas system (as shown in Figure 1).

FIGURE 1
www.frontiersin.org

FIGURE 1. The Block diagram of distributed power energy system.

The SG has great openness and interconnection, and there may be some potential problems in information collection and communication. The control of all infrastructure in SG relies on the internet. Therefore, the information security and privacy preservation in the SG is extraordinarily important (Li et al., 2022a). If the SG is maliciously attacked, the fact that data loss and tampering may happen (Li et al., 2019). It will seriously affect the normal operation of the SG, which will even lead to the consequences of system instability (Li et al., 2015; Li et al., 2022d). Then the safe and smooth operation of the SG is challenging to realize. As an example, remote data acquisition systems are usually installed in SG, which can be accessed without authorization and passwords. These devices are easily attacked or controlled by illegal users. Once the infrastructure has been maliciously controlled in unsupervised situation and it may bring huge economic losses. In addition, due to the inherent uncertainty of renewable energy (Li et al., 2022b; Li et al., 2022c), the safe operation of power systems with high-penetration renewables is facing greater challenges.

In sharp contrast to the important position of SG, the attention to its network and information security are still insufficient, which is also the reason for the frequent occurrence of power system accidents. Therefore, in the SG, designing an encryption algorithm to achieve information security is essential.

Many scholars have developed numerous researchs for the information security of SG. In May 2021, on the basis of the homomorphic encryption, Zhao et al. (2021) proposed a data aggregation and realtime electricity price billing scheme to reduce the computing cost. In July 2021, Singh et al. (2021) proposed a data aggregation model on the basis of the deep learning and homomorphic encryption. In May 2021, based on the partially homomorphic encryption (PHE), Wu et al. (2021) introduced a privacy-preserving distributed optimal power flow (OPF) algorithm. In January 2022, Hussain et al. (2021) preserved the privacy of customers by the homomorphic encryption in the SG.

Even though academics have studied excellent approaches for the information security of SG, there yet be two issues to be handled:

1) The homomorphic encryption contains a certain amount of operations, which is difficulity to be implemented.

2) For the sake of guaranteeing the information security, there exist a heavy computation burden caused by the homomorphic encryption.

Since the mid-1990s, many scholars have found that there is a close relationship between chaotic system and cryptography. A chaotic system has a series of features, such as sensitivity to the initial value, system parameters, ergodicity, unpredictability of orbit, and good pseudo-randomness. These characteristics can just meet the requirements of encryption. Therefore, chaos has been extensively applied in numerous realms, such as chaos control (Tian et al., 2021; Li et al., 2020), chaotic spread spectrum communication (Yuan et al., 2021; Xiao et al., 2018), secure communication (Zhao et al., 2020; He et al., 2020), chaos optimization (Shi et al., 2008) and so on. Besides, the application of chaos in cryptography is not difficulity to be realized. The algorithm exhibits great performances with fast encryption speed and large key space. These advantages make the algorithm suited for encrypting a lot of data. Then it extremely simplifies the design of traditional sequence cipher. Therefore, chaos has unique superiority in the realm of encryption and broad development prospects.

To address the issues as mentioned above, a data encryption algorithm combined with the chaotic sequence is introduced. Then an unusual 7D-CCS with cubic memristor is put forward to create pseudo-random sequences. The 7D-CCS has complex dynamic characteristics and can generate pseudorandom sequences with high pseudorandomness. The originality and contributions of this paper are summed up as follows.

1) The designed algorithm only includes scrambling and diffusion operation. It is easy to be implemented.

2) Based on the cubic memristor, the 7D-CCS is proposed to create pseudo-random sequences with good pseudorandomness to ensure the information security. Besides, the 7D-CCS is easy to generate key sequence.

The rest of this paper is organized as follows: In Section 2, the features of the 7D-CCS are introduced. In Section 3, design an encryption scheme. Besides, it is compared with that of others by some preformance indexes. In Section 4, the data and monitoring images in SG are processed by the proposed encryption scheme, and the security analysis are provided. Conclusions are given in Section 5.

2 The 7D-CCS with cubic memristor

The mathematical expression (Yang et al., 2019) of cubic nonlinear memristor is

qφ=aφ+bφ3a,b>0(1)

where a, b are the positive constants. φ is an independent variable.

Then the derivative of memristor W(φ) is defined by

Wφ=dqφ/dφ=a+3bφ2(2)

The real chaotic system with the cubic nonlinear memristor is given by

dxdt=αyx+dxWφxdydt=xy+zdzdt=rzβydφdt=x(3)

where α, β, r, d are positive constants. x, y, z are independent variables.

System 3) is extended to the complex field, where xx1jx2, yx3jx4, zx5jx6 and φx7. xi(i = 1, …, 7) are independent variables. j is the imaginary number.

In system (3), the real and imaginary parts are divided. We can get:

dx1dt=αx3x1+dx1Wx7x1dx2dt=αx4x2+dx2Wx7x2dx3dt=x1x3+x5dx4dt=x2x4+x6dx5dt=rx5βx3dx6dt=rx6βx4dx7dt=x1(4)

Finally, through the chao attractor, Lyapunov exponents, bifurcation diagram, 0–1 test, and complexity analysis, we discuss the dynamic features of the system (4).

2.1 Chaos attractor

Set α = 10, x=b ±b24ac2a, β=1007, r = 0.1, d=97, a=17, b=27. For initial conditions (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1), the attractor of 7D-CCS are showed in Figure 2.

FIGURE 2
www.frontiersin.org

FIGURE 2. Phase portraits of system (4), (A) x2 − x3 (B) x6 − x2 − x7 (C) x3 − x6 (D) x4 − x7.

The Lyapunov exponent (Sutter et al., 2021), one of the numerical features, is used to recognize chaotic motion quantitatively. If the motion in this direction is stable, the value is negative. If the motion in this direction is unstable, the value is positive. If Lyapunov exponents include positive, negative values and zero, the system is chaotic. In the system (4), the Lyapunov exponents are LE1 = 2.041, LE2 = 0.425, LE3 = 0.189, LE4 = 0, LE5 = -0.041, LE6 = -3.355, LE7 = -4.205. The Lyapunov exponents are showed in Figure 3. The Lyapunov exponent of the 7D-CCS is (+, +, +, 0, -, -, -). Hence, the 7D-CCS is chaotic.

FIGURE 3
www.frontiersin.org

FIGURE 3. The Lyapunov exponent curves of 7D-CCS.

2.2 Bifurcation diagram of the 7D-CCS

The bifurcation diagram (Marszalek and Sadecki, 2019) could distinctly show the complete process of the nonlinear system into chaos. In the bifurcation diagram, if there exist a large number of point of density caused by the infinite bifurcation, it indicates that the system is chaotic. In Figure 4, the bifurcation diagram of the 7D-CCS is shown. As shown in the Figure 4, with the change of α, the system continually forks among different states. Finally, the system 4) comes to a chaotic state.

FIGURE 4
www.frontiersin.org

FIGURE 4. The bifurcation diagram of 7D-CCS.

2.3 0-1 test

The 0–1 test Karimov et al. (2021) is a method which directly calculate p(n) and q(n) to judge the state of nonlinear system. The 0–1 test method is as follows:

Step 1: Let X(k)(k = 1, 2, …, N) be a test sequence.

Step 2: Calculate the sequence p(n) and q(n):

pn=j=1nXkcoskc,k=1,2,,N(5)
qn=j=1nXksinkc,k=1,2,,N(6)

where c ∈ (0, π).

If the trajectory diagram of p(n)-q(n) is represented by the Brownian motion, system is in a chaotic state The “0–1 test” diagram of 7D-CCS is exhibited in Figure 5. Then the Brownian motion can be seen. Hence, the system 4) is chaotic.

FIGURE 5
www.frontiersin.org

FIGURE 5. The 0–1 test diagram of 7D-CCS.

2.4 Complexity analysis of 7D-CCS

The SE (Yu et al., 2020) and C0 (Chen et al., 2020) algorithm, based on Fourier transform and wavelet transform, are spectral entropy algorithm until now. When the two parameters vary, the chromatogram is introduced to verify and analyze the complexity. The chromatogram of 7D-CCS is exhibited in Figure 6. The lighter the hue is, the lower the complexity is.

FIGURE 6
www.frontiersin.org

FIGURE 6. The chromatogram, (A) x1 sequence chromatogram by SE algorithm (B) x1 sequence chromatogram by C0 algorithm.

Based on these performance metrics, the nonlinear dynamic features of 7D-CCS are discussed. Set α = 10, d = 9/7, β = 100/7, r = 0.1, a = 1/7, and b = 2/7. Then the pseudo random sequences are created by the 7D-CCS. They can meet the requirements of the designed algorithm.

3 The designed algorithm and its discussion

Based on the system (4), a novel data encryption algorithm is introduced. The designed algorithm is exhibited in Figure 7. The procedures of algorithm are as follows:

FIGURE 7
www.frontiersin.org

FIGURE 7. The image algorithm flow chart.

Step1: The experiment environment is Intel (R) Core (TM) i5-9300H CPU at 2.40GHz, and the random-access memory (RAM) adopted is 8 GB. The R, G and B channel are get by separating the image channel.

Step2: Use random function to randomly transform the position of the three primary color pixel value. Call them R1, G1 and B1.

Step3: Transform the position of the three primary color pixel value according to Arnold transform. Name them R2, G2 and B2. Arnold transform is as follows:

xxn+1yyn+1=1ABAB+1xxnyynmodMN+11(7)

where M and N are the row and column of the image matrix. The pseudo-random matrices A and B with the sizes of M × N are generated from the proposed chaotic sequence. Let the coordinates of pixels in digital image be xxn,yyn0,255.

Step4: XOR the generated seven dimensional pseudo-random sequence with R2, G2 and B2 image seven times, and the order of XOR is random.

Set α = 10, β=1007, r = 0.1, d=97, a=17, b=27 in system 4, and initial condition is (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1). Standardized test “Lena” in the size of 256 × 256 is selected in the above algorithm. The encryption process is shown in Figure 8. Figure 8A is the standard test picture Lena, Figure 8B is the scrambled picture, Figure 8C is the encrypted picture and Figure 8D is the decrypted picture. Figure 8C conceals the characters of the original image and a malicious third party cannot be directly identified.

FIGURE 8
www.frontiersin.org

FIGURE 8. The diagram of experimental results, (A) Standard test picture Lena (B) Scrambled picture (C) Encrypted picture (D) Decrypted picture.

3.1 Reconstruction quality analysis

The peak signal-to-noise ratio (PSNR) is introduced to investigate the visual quality of the reconstructed image. When the PSNR is greater than 30 dB but less than 40 dB, the distortion of image is small. The PSNR method is as follows:

Step 1: Calculate the mean square deviation (MSE):

MSEf,g=1MNi=1Mj=1Nfijgij2(8)

Step 2: Calculate PSNR:

PSNRf,g=20log10255/MSEf,g(9)

where f, g are the pixel values of original image and decrypted image. M and N represent the row and column of the image matrix, respectively. Calculate the PSNR between Figure 8A and Figure 8D and it is approximately 30 dB. The distortion of Figure 8A and Figure 8A is small.

The structural similarity (SSIM) is another quota to estimate the similarity of two images. The formula is as follows:

LX,Y=2uXuY+C1uX2+uY2+C1CX,Y=2σXσY+C2σX2+σY2+C2SX,Y=σXY+C3σXσY+C3SSIM=LX,YCX,YSX,Y(10)

where ux is the mean of image X. uy is the mean of image Y. σX is the variance of image X. σY is the variance of image Y. σXY is the covariance of images X and Y. In order to avoid instability, when denominator is up to zero, C1 and C2 are two constants with small value. C3=12C1. L(X, Y) is the luminance, C(X, Y) denotes the contrast, S(X, Y) represents the structure.

The scope of SSIM is [0, 1]. When the value approaches to 1, it represents the good resemblance between the two images When the value approaches to 0, it indicates less resemblance. Calculate the SSIM between Figure 8A and Figure 8D and it is 1. The calculation results show that the structure of the Figure 8D is the same as that of the Figure 8A.

3.2 Correlation coefficient

In order to prevent the original information from being cracked through the similarity between pixels, it is very necessary to remove the correlation between adjacent pixels. Firstly, choose N pairs of pixels in the original image randomly. Then noted them as(ui, vi), i ∈ [1, N]. The formula of the correlation coefficient is shown as follows:

Eu=1Ni=1Nui(11)
Du=1Ni=1NuiEu2(12)
Covu,v=1Ni=1NuiEuviEv(13)
ruv=Covu,vDu Dv(14)

where E is the mean value of pixel. D is the variance of pixels. Cov is the covariance of pixels ruv is the correlation coefficient.

In plaintext and ciphertext images, 8,000 pairs of adjacent pixel values are haphazardly choose from the horizontal, vertical and diagonal directions. The correlation coefficient between two adjacent pixels is calculated. The value of the correlation coefficient of adjacent pixels is from -1 to 1. If the value is approach to 1, the correlation is high. Correspondingly, the adjacent pixels are basically uncorrelated if the value is close to -1. From the Table 1, we can know that the correlation coefficient of the designed algorithm is lower than that of other algorithms.

TABLE 1
www.frontiersin.org

TABLE 1. Adjacent pixels correlation comparison.

It shows that the designed algorithm can almost break the correlation between pixels.

3.3 Histogram

In digital image, the distribution of each gray level can be counted by the histogram. The Figure 9 shows that the pixel distribution of each pixel level of the three primary color matrixes. Figure 9A, Figure 9B and Figure 9C show fluctuates greatly, and the peak and trough values differ extremely. The frequency of some pixel values is large, while that of others is very small. After encryption, as shown in Figures 9D–F, the pixel distribution of each pixel level of the three primary color matrices is relatively uniform, and the value frequency of each pixel value is basically the same, which well conceals the distribution law of the original image.

FIGURE 9
www.frontiersin.org

FIGURE 9. The histogram of “Lena”, (A) R channel in plain image (B) G channel in plain image (C) B channel in plain image (D) R channel in cipher image (E) G channel in cipher image (F) B channel in cipher image.

3.4 Information entropy

To the pixel values, the mean uncertainty can be reflected by the information entropy. The formula is exhibited as follows:

H=i=1255pxilog2pxi(15)

where p(xi) is the probability of gray value. The larger the image information entropy is (the maximum value is 8), the more equivalent the distribution of pixels is. The nonrandom distribution of image pixels indicates that the encryption effect is quite good. As shown in Table 2, in this algorithm, compared with other algorithms, the information entropy of encrypted image is more approach to 8. We could know that the proposed method has enough ability to withstand differential attacks.

TABLE 2
www.frontiersin.org

TABLE 2. The information entropy of picture.

3.5 Security key space

Assume the accuracy of the computer memory is 1015, then the size of the key space of each key is 1015. There are 7 variable values and 6 system parameter values in system 4) and the key space can reach 101513=101952650. Hence, the key space of the designed algorithm is greatly ample. With a sufficient security level, the algorithm is able to resist differential cryptanalysis.

4 The encryption scheme of smart grid

4.1 The simulation of image encryption

In the SG, in order to confirm the operation status of the equipment, the remote data acquisition system should transmit the monitoring image to the control center. When the control center finds the equipment failure, it will shut down the equipment for maintenance.

However, in the remote data acquisition system, the monitoring images are easy to be obtained by illegal users because it do not need authorization and password. When the equipment is in normal operation, the illegal user transmits the monitoring image of equipment failure to the control center, resulting in the shutdown of the equipment. Then it will bring huge economic losses.

Therefore, in the remote data acquisition system, it is of practical significance to encrypt the monitoring image in real time, and they can be encrypted and transmitted immediately. Then the illegal user can not obtain the monitoring image.

The “Picture 1” and “Picture 2” transmitted in SG will be encrypted by using the above algorithm. The size of “Picture 1” is 660 × 783. The size of “Picture 2″ is 456 × 639. The encryption process of “Picture 1” is exhibited in Figure 10. Figure 10A is the original “Picture 1”. Figure 10B is the scrambled “Picture 1”. Figure 10C is the encrypted “Picture 1”. The characters in the original image cannot be identified directly from this image and Figure 10D is the decrypted “Picture 1”.

FIGURE 10
www.frontiersin.org

FIGURE 10. The diagram of experimental results, (A) Electronic equipment Picture 1 (B) Scrambled Picture 1 (C) Encrypted Picture 1 (D) Decrypted Picture 1.

The encryption of “picture 2” is similar to that of “picture 1”, which is shown in the Figure 11. Figure 11A is the original “Picture 2”. Figure 11B is the scrambled “Picture 2”. Figure 11C is the encrypted “Picture 2”. The characters in the original image cannot be identified directly from this image and Figure 11D is the derypted “Picture 2”.

FIGURE 11
www.frontiersin.org

FIGURE 11. The diagram of experimental results, (A) Electronic equipment Picture 2 (B) Scrambled Picture 2 (C) Encrypted Picture 2 (D) Decrypted Picture 2.

Then the metrics mentioned in Section 3 are used to analyze them.

4.1.1 Histogram

According to the Figure 12 and Figure 13, after encryption, the pixel distribution of each pixel level of the three primary color matrices is relatively uniform.

FIGURE 12
www.frontiersin.org

FIGURE 12. The histogram of the “picture 1”, (A) R channel in plain picture 1 (B) G channel in plain picture 1 (C) B channel in plain picture 1 (D) R channel in cipher picture 1 (E) G channel in cipher picture 1 (F) B channel in cipher picture 1.

FIGURE 13
www.frontiersin.org

FIGURE 13. The histogram of the “picture 2”, (A) R channel in plain picture 2 (B) G channel in plain picture 2 (C) B channel in plain picture 2 (D) R channel in cipher picture 2 (E) G channel in cipher picture 2 (F) B channel in cipher picture 2

4.1.2 Correlation coefficient

Compare the cipher image with the original image, the adjacent pixels have almost no correlation, even negative correlation. That can be known in the Table 3.

TABLE 3
www.frontiersin.org

TABLE 3. Adjacent pixels correlation of pictures.

4.1.3 Information entropy

In the Table 4, the information entropy is close to 8 (max is 8). The results show that encrypted images are resistant to differential cryptanalysis.

TABLE 4
www.frontiersin.org

TABLE 4. The information entropy of picture.

4.1.4 Sensitivity of key

The initial conditions is (0.10001, 0.10001, 0.10001, 0.10001, 0.10001, 0.10001, 0.10001). In system (3), the value of system parameters remain unchanged. The cipher picture 1 and 2 are decrypted by the generated key which is in the above initial conditions. The Figure 14 is the decryption result of the wrong key. According to the Figure 14, with small change of key, it cannot successfully decrypt the picture 1 and 2. We could know that the proposed algorithm has great sensitivity to the key.

FIGURE 14
www.frontiersin.org

FIGURE 14. The results of wrong key, (A) Wrong key with picture 1 (B) Wrong key with picture 2.

4.1.5 Reconstructed image quality

According to the Table 5, the quality loss of reconstructed images is relatively small. They are the same as the original images.

TABLE 5
www.frontiersin.org

TABLE 5. Reconstruction quality analysis.

4.2 Data encryption

The dataset used to check the security of above algorithm is the temperature data in the SG. The Modbus Protocol is used to transmit temperature data. In the Modbus protocol, the data is as follows:0x13 0x04 0x00 0x00 0x00 0x01 0x32 0xB8

Where is 8 bytes and hexadecimal.

The flow chart of data encryption algorithm is shown in Figure 15. The steps are as follows.

FIGURE 15
www.frontiersin.org

FIGURE 15. The data algorithm flow chart.

Step1: Use random function to randomly change the position of the temperature data. Name it Data 1.

Step2: Change the position of Data 1 according to Arnold transform. Name it Data 2.

Step3: XOR the generated seven dimensional pseudo-random sequence with Data 2 seven times, and the order of XOR is random.

The ciphertext data composition is as follows: 0xFC 0xCF 0xFC 0xFC 0xFC 0xFC 0xF8 0xF8 where is 8 bytes and hexadecimal.

After decryption, the data composition is the same as the initial data. The security of cipher text mainly depends on whether the key is random. If the key is random and variable, the security of ciphertext can be guaranteed. Next, from the NIST test to analyze the randomness of the key.

The NIST statistical test suit is composed of 15 statistical tests, which can detect the randomness of the sequences created by the 7D-CCS. Generally speaking, the statistical test is successful when the test result is between 0.01 and 1. Bsides, the test sequence has excellent randomness if the value is large. For simplicity, 20, 000, 000 real numbers, created by the 7D-CCS, are adopted as the test data in the NIST test. The NIST test results are shown in Table 6, which are between 0.01 and 1. It means that the statistical tests are successful. Then it also verified that the key has quite good randomness.

TABLE 6
www.frontiersin.org

TABLE 6. NIST test.

5 Conclusions

Based on the 7D-CCS, a data process scheme is introduced. First of all, the 7D-CCS with memristor is proposed, which is derived from the real 4D chaotic system with the cubic nonlinear memristor. Secondly, the dynamic characteristics are analyzed by some performance indexs. Thirdly, the standard test image Lena is selected as encrypted object. Then compare it with others. Finally, the temperature data and monitoring images are encrypted in the verification experiments.

Simulations include PSNR, SSIM, histogram analysis, information entropy analysis, correlation analysis, sensitivity of key analysis, key space analysis and NIST test.

The experimental results indicate that the designed algorithm has excellent security performance. Therefore, the designed algorithm is suitable for SG in which the high security is required.

Besides, there are many tasks needed to be further studied.

1) At present, only the security of the designed algorithm is analyzed. The field experiments need to be carried out.

2) In the research of SG, the efficiency of data encryption is also critical. The encryption time should be considered in the future research work.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding authors.

Author contributions

Conceptualization, LK and ZH; methodology, LK, ZH, and CJ; software, ZH; validation, ZH and CJ; formal analysis, FZ and ZH; investigation, HuL and HaL; resources, WK and JL; data curation, WK and JW.

Funding

This work is funded by Major scientific and technological innovation projects of Shandong Province (Nos. 2019JZZY010731 and 2020CXGC010901), the project of “Youth Innovation and technology support plan” for colleges and universities in Shandong Province (2021KJ025), International Collaborative Research Project of Qilu University of Technology (No. QLUTGJHZ2018020).

Conflict of interest

JL is employed by the Company State Grid Anhui Electric Power Company Hefei Power Supply Company.

The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Chen, H., He, S., Pano Azucena, A. D., Yousefpour, A., Jahanshahi, H., López, M. A., et al. (2020). A multistable chaotic jerk system with coexisting and hidden attractors: Dynamical and complexity analysis, fpga-based realization, and chaos stabilization using a robust controller. Symmetry 12, 569. doi:10.3390/sym12040569

CrossRef Full Text | Google Scholar

Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., and Shu, L. (2018). A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain. Cities Soc. 38, 806–835. doi:10.1016/j.scs.2017.12.041

CrossRef Full Text | Google Scholar

He, W., Luo, T., Tang, Y., Du, W., Tian, Y.-C., and Qian, F. (2020). Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy. IEEE Trans. Neural Netw. Learn. Syst. 31, 3334–3345. doi:10.1109/TNNLS.2019.2943548

PubMed Abstract | CrossRef Full Text | Google Scholar

Hosseinzadeh, R., Zarebnia, M., and Parvaz, R. (2019). Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral. Opt. Laser Technol. 120, 105698. doi:10.1016/j.optlastec.2019.105698

CrossRef Full Text | Google Scholar

Huang, L., Cai, S., Xiong, X., and Xiao, M. (2018). On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 115, 7–20. doi:10.1016/j.optlaseng.2018.11.015

CrossRef Full Text | Google Scholar

Hussain, I., Samara, G., Ullah, I., and Khan, N. (2021). “Encryption for end-user privacy: A cyber-secure smart energy management system,” in 2021 22nd International Arab Conference on Information Technology (ACIT), 1. doi:10.1109/ACIT53391.2021.9677341

CrossRef Full Text | Google Scholar

Karimov, T. I., Druzhina, O. S., Karimov, A. I., Kolev, G. Y., and Butusov, D. N. (2021). “Comparison of bifurcation diagrams for numerical and analog chaotic systems,” in 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), 124. doi:10.1109/ElConRus51938.2021.9396558

CrossRef Full Text | Google Scholar

Kimani, K., Oduol, V., and Langat, K. (2019). Cyber security challenges for iot-based smart grid networks. Int. J. Crit. Infrastructure Prot. 25, 36–49. doi:10.1016/j.ijcip.2019.01.001

CrossRef Full Text | Google Scholar

Kumar Patro, K. A., and Acharya, B. (2019). An efficient colour image encryption scheme based on 1-d chaotic maps. J. Inf. Secur. Appl. 46, 23–41. doi:10.1016/j.jisa.2019.02.006

CrossRef Full Text | Google Scholar

Li, G., Wang, Z., Han, Z., and Bai, X. (2015). A multifeature fusion approach for power system transient stability assessment using pmu data. Math. Problems Eng., 1–10. doi:10.1155/2015/786396

CrossRef Full Text | Google Scholar

Li, Y., Li, J., and Wang, Y. (2022a). Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach. IEEE Trans. Ind. Inf. 18, 2310–2320. doi:10.1109/TII.2021.3098259

CrossRef Full Text | Google Scholar

Li, Y., Li, K., Yang, Z., Yu, Y., Xu, R., and Yang, M. (2022b). Stochastic optimal scheduling of demand response-enabled microgrids with renewable generations: An analytical-heuristic approach. J. Clean. Prod. 330, 129840. doi:10.1016/j.jclepro.2021.129840

CrossRef Full Text | Google Scholar

Li, Y., Wang, B., Yang, Z., Li, J., and Li, G. (2022c). Optimal scheduling of integrated demand response-enabled community-integrated energy systems in uncertain environments. IEEE Trans. Ind. Appl. 58, 2640–2651. doi:10.1109/TIA.2021.3106573

CrossRef Full Text | Google Scholar

Li, Y., Zhang, M., and Chen, C. (2022d). A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems. Appl. Energy 308, 118347. doi:10.1016/j.apenergy.2021.118347

CrossRef Full Text | Google Scholar

Li, Y., Li, Z., and Chen, L. (2019). Dynamic state estimation of generators under cyber attacks. IEEE Access 7, 125253–125267. doi:10.1109/ACCESS.2019.2939055

CrossRef Full Text | Google Scholar

Li, Z., Yuan, Y., and Wang, H.-N. (2020). “Fuzzy adaptive time-delay feedback controlling chaos in buck converter,” in 2020 Chinese Control And Decision Conference (CCDC), 4732–4737. doi:10.1109/CCDC49329.2020.9164013

CrossRef Full Text | Google Scholar

Marszalek, W., and Sadecki, J. (2019). Complex two-parameter bifurcation diagrams of a simple oscillating circuit. IEEE Trans. Circuits Syst. Ii. 66, 687–691. doi:10.1109/TCSII.2018.2871063

CrossRef Full Text | Google Scholar

Pak, C., An, K., Jang, P., Kim, J., and Kim, S. (2019). A novel bit-level color image encryption using improved 1d chaotic map. Multimed. Tools Appl. 78, 12027–12042. doi:10.1007/s11042-018-6739-1

CrossRef Full Text | Google Scholar

Shi, Z.-B., Yu, T., Zhao, Q., Li, Y., and bin Lan, Y. (2008). Comparison of algorithms for an electronic nose in identifying liquors. J. Bionic Eng. 5, 253–257. doi:10.1016/S1672-6529(08)60032-3

CrossRef Full Text | Google Scholar

Singh, P., Masud, M., Hossain, M. S., and Kaur, A. (2021). Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Comput. Electr. Eng. 93, 107209. doi:10.1016/j.compeleceng.2021.107209

CrossRef Full Text | Google Scholar

Sutter, D., Fawzi, O., and Renner, R. (2021). Bounds on lyapunov exponents via entropy accumulation. IEEE Trans. Inf. Theory 67, 10–24. doi:10.1109/TIT.2020.3026959

CrossRef Full Text | Google Scholar

Tian, K., Grebogi, C., and Ren, H.-P. (2021). Chaos generation with impulse control: Application to non-chaotic systems and circuit design. IEEE Trans. Circuits Syst. I. 68, 3012–3022. doi:10.1109/TCSI.2021.3075550

CrossRef Full Text | Google Scholar

Wu, T., Zhao, C., and Zhang, Y.-J. A. (2021). Privacy-preserving distributed optimal power flow with partially homomorphic encryption. IEEE Trans. Smart Grid 12, 4506–4521. doi:10.1109/TSG.2021.3084934

CrossRef Full Text | Google Scholar

Xiao, L., Xuan, G., and Wu, Y. (2018). “Research on an improved chaotic spread spectrum sequence,” in 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 420–423. doi:10.1109/ICCCBDA.2018.8386553

CrossRef Full Text | Google Scholar

Yang, N., Xu, C., Wu, C., Jia, R., and Liu, C. (2019). Fractional-order cubic nonlinear flux-controlled memristor: Theoretical analysis, numerical calculation and circuit simulation. Nonlinear Dyn. 97, 33–44. doi:10.1007/s11071-019-04920-y

CrossRef Full Text | Google Scholar

Yu, F., Liu, L., Shen, H., Zhang, Z., Huang, Y., Shi, C., et al. (2020). Dynamic analysis, circuit design, and synchronization of a novel 6d memristive four-wing hyperchaotic system with multiple coexisting attractors. Complexity, 1–17. doi:10.1155/2020/5904607

CrossRef Full Text | Google Scholar

Yuan, G., Chen, Z., Gao, X., and Zhang, Y. (2021). Enhancing the security of chaotic direct sequence spread spectrum communication through wfrft. IEEE Commun. Lett. 25, 2834–2838. doi:10.1109/LCOMM.2021.3096388

CrossRef Full Text | Google Scholar

Zhao, Y., Yang, Q., Li, D., and An, D. (2021). “A data aggregation and real-time electricity billing scheme based on homomorphic encryption in smart grid,” in 2021 33rd Chinese Control and Decision Conference (CCDC), 2545–2550. doi:10.1109/CCDC52312.2021.9601443

CrossRef Full Text | Google Scholar

Zhao, Y., Zhang, W., Su, H., and Yang, J. (2020). Observer-based synchronization of chaotic systems satisfying incremental quadratic constraints and its application in secure communication. IEEE Trans. Syst. Man. Cybern. Syst. 50, 5221–5232. doi:10.1109/TSMC.2018.2868482

CrossRef Full Text | Google Scholar

Zhou, J., Zhou, N.-R., and Gong, L.-H. (2020). Fast color image encryption scheme based on 3d orthogonal Latin squares and matching matrix. Opt. Laser Technol. 131, 106437. doi:10.1016/j.optlastec.2020.106437

CrossRef Full Text | Google Scholar

Keywords: smart grid, chaotic system, data encryption, memristor, information security

Citation: Kou L, Huang Z, Jiang C, Zhang F, Ke W, Wan J, Liu H, Li H and Lu J (2022) Data encryption based on 7D complex chaotic system with cubic memristor for smart grid. Front. Energy Res. 10:980863. doi: 10.3389/fenrg.2022.980863

Received: 29 June 2022; Accepted: 22 July 2022;
Published: 12 September 2022.

Edited by:

Dan Lu, Alfred University, United States

Reviewed by:

Guoliang Ye, Dongguan University of Technology, China
Jiyu Cheng, Shandong University, China
Xinmiao Ding, Shandong Institute of Business and Technology, China

Copyright © 2022 Kou, Huang, Jiang, Zhang, Ke, Wan, Liu, Li and Lu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Cuimei Jiang, Jiangcuimei2004@163.com; Fangfang Zhang, zhff4u@163.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.