Paper
28 October 2022 Anti leakage method of power information communication data based on chaotic mapping
Sixiao Guo, Minglei Huang, Huaming Ling, Xiaoying Huang
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 1245309 (2022) https://doi.org/10.1117/12.2660697
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
Power information communication contains sensitive and private data, which may be illegally stolen and tampered after being leaked, posing a threat to the data security of power enterprises and users. Aiming at the problem of limited key space, a data leakage prevention method for power information communication based on chaotic mapping is proposed. The physical layer of power communication includes power data produced and distributed by power equipment, and the information layer includes operation, monitoring and dispatching data. There is an association between the two data. The dispatch and control center uses the association relationship to establish access rights for users and generate access private keys for trusted users. According to the user authority, the communication data is encrypted and decrypted by chaotic mapping, so that the two adjacent components of the reconstructed key space are relatively independent, and the properties of the chaotic sequence are maintained. The test results show that the proposed method can effectively reduce the computing and communication overhead of the power data encryption process and improve the encryption efficiency.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sixiao Guo, Minglei Huang, Huaming Ling, and Xiaoying Huang "Anti leakage method of power information communication data based on chaotic mapping", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 1245309 (28 October 2022); https://doi.org/10.1117/12.2660697
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data communications

Associative arrays

Computer security

Data centers

Telecommunications

Network security

Data storage

Back to Top