Loading web-font TeX/Main/Regular
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System | IEEE Journals & Magazine | IEEE Xplore

Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System


Abstract:

This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. ...Show More

Abstract:

This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. A low-complexity variant of the 3-D chaos system is proposed to accomplish internal chaos-encryption-based polar coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS. Internal encryption is achieved by disrupting the correlation of the information bits index and frozen bits index along with the subcarrier by the three chaotic behavioral sequences obtained by Chua's system while encoding polar code. The method is tested on the fiber optic channel between the cloud computing and a local controller placed at a significant distance, thoroughly connected through the fiber optic cable network, and utilizing a 16 quadrature amplitude modulation-OFDM (QAM-OFDM) signal transmission. Our experimental results and performance analysis demonstrate that the proposed encryption scheme produces a 2.5-dB gain in sensitivity on the local controller end at a bit error rate (BER) of 10^{-3} compared to the conventional QAM-OFDM. Furthermore, the spacing window for the key distribution is 10^{75}, which can be regarded as a protection degree against any brute-force attack from unauthorized optical network units that act as local controllers. Considering the BER enhancement, reliability, and security, the proposed QAM-OFDM-based chaos encryption polar encoding can be ranked as a suitable choice for the NOCCSs data transmission and protection against any brute-force or differential attacks.
Published in: IEEE Transactions on Industrial Informatics ( Volume: 20, Issue: 3, March 2024)
Page(s): 3935 - 3947
Date of Publication: 03 October 2023

ISSN Information:

Funding Agency:


References

References is not available for this document.