Efficient Multidimensional Pipelined Chaotic Bulk-Codewords-Encryption for Cloud Control Systems
Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an efficient encryption mechanism configured for securing the physical layer communication in these systems while transmitting data over optica...
Uložené v:
| Vydané v: | IEEE transactions on cybernetics Ročník 55; číslo 10; s. 5014 - 5026 |
|---|---|
| Hlavní autori: | , , , , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
United States
IEEE
01.10.2025
|
| Predmet: | |
| ISSN: | 2168-2267, 2168-2275, 2168-2275 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an efficient encryption mechanism configured for securing the physical layer communication in these systems while transmitting data over optical fiber networks using orthogonal frequency division multiplexing active optical networks. The proposed scheme takes advantage of the hypersensitive chaotic properties of the Lorenz map to provide robust multidimensional encryption and confidentiality. The encryption process involves arranging bulk encoded codewords in a table structure shape, with each column representing individual codewords encoded by pipelined successive cancellation polar encoding. A Lorenz map is then utilized to generate three distinct chaotic keys, which are employed to reindex the rows and columns of the table structured codeword along with the subcarrier remapping in the constellation map. This reindexing operation provides an additional layer of security against potential brute-force attacks. Performance metrics such as computational efficiency, security robustness, and resistance to various noise and distortion sources are being evaluated. The experimental results demonstrate promising levels of security and resilience against potential threats on the physical layer of communications. The scheme's compatibility with the technical environment ensures seamless integration into existing CCSs infrastructure, making it a resilient solution for securing critical physical layer transmissions. |
|---|---|
| AbstractList | Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an efficient encryption mechanism configured for securing the physical layer communication in these systems while transmitting data over optical fiber networks using orthogonal frequency division multiplexing active optical networks. The proposed scheme takes advantage of the hypersensitive chaotic properties of the Lorenz map to provide robust multidimensional encryption and confidentiality. The encryption process involves arranging bulk encoded codewords in a table structure shape, with each column representing individual codewords encoded by pipelined successive cancellation polar encoding. A Lorenz map is then utilized to generate three distinct chaotic keys, which are employed to reindex the rows and columns of the table structured codeword along with the subcarrier remapping in the constellation map. This reindexing operation provides an additional layer of security against potential brute-force attacks. Performance metrics such as computational efficiency, security robustness, and resistance to various noise and distortion sources are being evaluated. The experimental results demonstrate promising levels of security and resilience against potential threats on the physical layer of communications. The scheme's compatibility with the technical environment ensures seamless integration into existing CCSs infrastructure, making it a resilient solution for securing critical physical layer transmissions.Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an efficient encryption mechanism configured for securing the physical layer communication in these systems while transmitting data over optical fiber networks using orthogonal frequency division multiplexing active optical networks. The proposed scheme takes advantage of the hypersensitive chaotic properties of the Lorenz map to provide robust multidimensional encryption and confidentiality. The encryption process involves arranging bulk encoded codewords in a table structure shape, with each column representing individual codewords encoded by pipelined successive cancellation polar encoding. A Lorenz map is then utilized to generate three distinct chaotic keys, which are employed to reindex the rows and columns of the table structured codeword along with the subcarrier remapping in the constellation map. This reindexing operation provides an additional layer of security against potential brute-force attacks. Performance metrics such as computational efficiency, security robustness, and resistance to various noise and distortion sources are being evaluated. The experimental results demonstrate promising levels of security and resilience against potential threats on the physical layer of communications. The scheme's compatibility with the technical environment ensures seamless integration into existing CCSs infrastructure, making it a resilient solution for securing critical physical layer transmissions. Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an efficient encryption mechanism configured for securing the physical layer communication in these systems while transmitting data over optical fiber networks using orthogonal frequency division multiplexing active optical networks. The proposed scheme takes advantage of the hypersensitive chaotic properties of the Lorenz map to provide robust multidimensional encryption and confidentiality. The encryption process involves arranging bulk encoded codewords in a table structure shape, with each column representing individual codewords encoded by pipelined successive cancellation polar encoding. A Lorenz map is then utilized to generate three distinct chaotic keys, which are employed to reindex the rows and columns of the table structured codeword along with the subcarrier remapping in the constellation map. This reindexing operation provides an additional layer of security against potential brute-force attacks. Performance metrics such as computational efficiency, security robustness, and resistance to various noise and distortion sources are being evaluated. The experimental results demonstrate promising levels of security and resilience against potential threats on the physical layer of communications. The scheme's compatibility with the technical environment ensures seamless integration into existing CCSs infrastructure, making it a resilient solution for securing critical physical layer transmissions. |
| Author | Ali, Yasir Yan, Chenhang Ma, Ruifeng Wang, Taiqi Xia, Yuanqing Yang, Huan You, Lijie Manzoor, Tayyab |
| Author_xml | – sequence: 1 givenname: Yasir orcidid: 0000-0003-3998-9218 surname: Ali fullname: Ali, Yasir email: yasiralibit@gmail.com organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 2 givenname: Tayyab orcidid: 0000-0003-3932-0506 surname: Manzoor fullname: Manzoor, Tayyab email: tm.engcst@gmail.com organization: School of Automation and Electrical Engineering, Zhongyuan University of Technology, Zhengzhou, Henan, China – sequence: 3 givenname: Huan orcidid: 0000-0001-8539-7104 surname: Yang fullname: Yang, Huan email: yanghuanysu@163.com organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 4 givenname: Lijie orcidid: 0000-0003-0724-8861 surname: You fullname: You, Lijie email: youlijie2802@163.com organization: School of Automation and Electrical Engineering, Zhongyuan University of Technology, Zhengzhou, Henan, China – sequence: 5 givenname: Ruifeng orcidid: 0000-0001-8937-9122 surname: Ma fullname: Ma, Ruifeng email: ma.rui-feng@qq.com organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 6 givenname: Chenhang orcidid: 0000-0002-0885-8787 surname: Yan fullname: Yan, Chenhang email: chenhangyan_mail@163.com organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 7 givenname: Taiqi orcidid: 0009-0002-8502-3043 surname: Wang fullname: Wang, Taiqi email: taiqi_wang@bit.edu.cn organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 8 givenname: Yuanqing orcidid: 0000-0002-5977-4911 surname: Xia fullname: Xia, Yuanqing email: xia_yuanqing@bit.edu.cn organization: Zhongyuan University of Technology, Zhengzhou, Henan, China |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/40601450$$D View this record in MEDLINE/PubMed |
| BookMark | eNpF0E1LwzAYwPEgitPpBxBEevTSmZcmaY9a5gtMFNSDp9omTzGaJjNpkX17OzY1l4SH35PD_xDtOu8AoROCZ4Tg4uK5fL2aUUz5jHFZYCZ20AElIk8plXz37y3kBB3H-IHHk4-jIt9HkwwLTDKOD9DbvG2NMuD65H6wvdGmAxeNd7VNHs0SrHGgk_K99r1RydVgP9PSa_j2Qcd07lRYLftRJ60PSWn9MFrv-uBt8rSKPXTxCO21tY1wvL2n6OV6_lzepouHm7vycpEqKkWfFg2TqtWa1YBVTmUjJc9pI3SDBagWMNCM1YTzQtA8IxSE5qLhGWMKoCEZm6Lzzb_L4L8GiH3VmajA2tqBH2LF1ikI45kY6dmWDk0HuloG09VhVf1WGQHZABV8jAHaP0JwtY5freNX6_jVNv64c7rZMQDw7wkWVOY5-wFT6oA5 |
| CODEN | ITCEB8 |
| Cites_doi | 10.1109/jsac.2025.3574587 10.1109/TWC.2022.3151188 10.1109/TPWRS.2024.3361442 10.1109/TCSII.2022.3178975 10.1109/TCYB.2023.3332079 10.1109/LPT.2011.2149512 10.1109/JIOT.2022.3194945 10.1109/TCYB.2023.3234295 10.1109/TWC.2021.3108042 10.1109/ACCESS.2019.2919598 10.1016/j.optcom.2018.10.015 10.1109/TCYB.2024.3350331 10.1109/TCSVT.2024.3405558 10.1109/TSP.2022.3173154 10.1109/TCSI.2016.2525020 10.1109/ACCESS.2018.2888883 10.1109/TNNLS.2024.3422401 10.1109/TCOMM.2023.3262834 10.1109/JPHOT.2023.3307548 10.1109/TII.2023.3316217 10.1007/s11276-022-03127-1 10.1109/TIFS.2024.3356809 10.1109/TII.2024.3395631 10.1109/TIT.2022.3173152 10.1109/TSP.2020.2981766 10.1109/ACCESS.2024.3364384 10.1109/TII.2024.3476516 10.1109/TVT.2021.3075232 10.1007/s11768-018-8002-8 10.1109/TCOMM.2024.3374355 10.23919/JCC.2023.03.013 10.1109/TSMC.2025.3560404 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION NPM 7X8 |
| DOI | 10.1109/TCYB.2025.3579036 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef PubMed MEDLINE - Academic |
| DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 2168-2275 |
| EndPage | 5026 |
| ExternalDocumentID | 40601450 10_1109_TCYB_2025_3579036 11062788 |
| Genre | orig-research Journal Article |
| GrantInformation_xml | – fundername: Open Foundation of Key Laboratory of Autonomous Systems and Networked Control (South China University of Technology), Ministry of Education grantid: 2024A02 funderid: 10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61836001 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION AARMG NPM 7X8 |
| ID | FETCH-LOGICAL-c276t-9b37cfdd3ae0c827b77582b6db06ecfe0e243a1559628412e6d56b5433ceeb143 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001522963100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2168-2267 2168-2275 |
| IngestDate | Thu Oct 02 22:29:05 EDT 2025 Fri Sep 19 01:51:07 EDT 2025 Sat Nov 29 06:55:33 EST 2025 Wed Nov 19 08:27:08 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c276t-9b37cfdd3ae0c827b77582b6db06ecfe0e243a1559628412e6d56b5433ceeb143 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0002-5977-4911 0000-0001-8539-7104 0000-0001-8937-9122 0000-0003-0724-8861 0009-0002-8502-3043 0000-0003-3998-9218 0000-0003-3932-0506 0000-0002-0885-8787 |
| PMID | 40601450 |
| PQID | 3226713546 |
| PQPubID | 23479 |
| PageCount | 13 |
| ParticipantIDs | proquest_miscellaneous_3226713546 pubmed_primary_40601450 crossref_primary_10_1109_TCYB_2025_3579036 ieee_primary_11062788 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-10-01 |
| PublicationDateYYYYMMDD | 2025-10-01 |
| PublicationDate_xml | – month: 10 year: 2025 text: 2025-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States |
| PublicationTitle | IEEE transactions on cybernetics |
| PublicationTitleAbbrev | TCYB |
| PublicationTitleAlternate | IEEE Trans Cybern |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref12 ref15 ref14 ref31 ref30 ref11 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref4 doi: 10.1109/jsac.2025.3574587 – ident: ref26 doi: 10.1109/TWC.2022.3151188 – ident: ref27 doi: 10.1109/TPWRS.2024.3361442 – ident: ref3 doi: 10.1109/TCSII.2022.3178975 – ident: ref1 doi: 10.1109/TCYB.2023.3332079 – ident: ref22 doi: 10.1109/LPT.2011.2149512 – ident: ref28 doi: 10.1109/JIOT.2022.3194945 – ident: ref2 doi: 10.1109/TCYB.2023.3234295 – ident: ref7 doi: 10.1109/TWC.2021.3108042 – ident: ref13 doi: 10.1109/ACCESS.2019.2919598 – ident: ref15 doi: 10.1016/j.optcom.2018.10.015 – ident: ref30 doi: 10.1109/TCYB.2024.3350331 – ident: ref17 doi: 10.1109/TCSVT.2024.3405558 – ident: ref8 doi: 10.1109/TSP.2022.3173154 – ident: ref20 doi: 10.1109/TCSI.2016.2525020 – ident: ref12 doi: 10.1109/ACCESS.2018.2888883 – ident: ref31 doi: 10.1109/TNNLS.2024.3422401 – ident: ref11 doi: 10.1109/TCOMM.2023.3262834 – ident: ref24 doi: 10.1109/JPHOT.2023.3307548 – ident: ref10 doi: 10.1109/TII.2023.3316217 – ident: ref23 doi: 10.1007/s11276-022-03127-1 – ident: ref5 doi: 10.1109/TIFS.2024.3356809 – ident: ref14 doi: 10.1109/TII.2024.3395631 – ident: ref32 doi: 10.1109/TIT.2022.3173152 – ident: ref9 doi: 10.1109/TSP.2020.2981766 – ident: ref21 doi: 10.1109/ACCESS.2024.3364384 – ident: ref16 doi: 10.1109/TII.2024.3476516 – ident: ref18 doi: 10.1109/TVT.2021.3075232 – ident: ref29 doi: 10.1007/s11768-018-8002-8 – ident: ref25 doi: 10.1109/TCOMM.2024.3374355 – ident: ref19 doi: 10.23919/JCC.2023.03.013 – ident: ref6 doi: 10.1109/TSMC.2025.3560404 |
| SSID | ssj0000816898 |
| Score | 2.406909 |
| Snippet | Cloud control systems (CCSs) are evolving rapidly, requiring secure communication channels to protect critical remote control tasks. This article introduces an... |
| SourceID | proquest pubmed crossref ieee |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 5014 |
| SubjectTerms | Adaptive optics Bit error rate Bulk chaotic internal encryption Chaotic communication Control systems Decoding Encoding Encryption Optical network units physical layer security pipelined polar coding Polar codes secure polar codes |
| Title | Efficient Multidimensional Pipelined Chaotic Bulk-Codewords-Encryption for Cloud Control Systems |
| URI | https://ieeexplore.ieee.org/document/11062788 https://www.ncbi.nlm.nih.gov/pubmed/40601450 https://www.proquest.com/docview/3226713546 |
| Volume | 55 |
| WOSCitedRecordID | wos001522963100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore customDbUrl: eissn: 2168-2275 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816898 issn: 2168-2267 databaseCode: RIE dateStart: 20130101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB7RCqFegEKB5VEZiQMguU1sx94cabQVB1T1UNByCn5M1IoqqXY3SPx7xo63cOmBmw-2E3nG8_DMfAPwztbCS7SWS-cdV9p6Xleh5GXlOtWVyobUM_LbF3N2Nl8u6_NcrJ5qYRAxJZ_hURymWH4Y_Bifyo5JVWlBPtsO7Bijp2Kt2weV1EEi9b4VNOBkVpgcxSyL-vii-X5C3qCojmRlahLbe_BARSwSFSvu_1FJqcfK3eZmUjunj_7zhx_Dw2xfsk8TQ-zDPeyfwH6-wWv2PsNMf3gKPxYJPYI2YKkKN0Sc_wmjg51f3cQ6dQysubQDbcVOxuufvBlCTOQKa77o_ep3kjaMrF7WXA8jzZ3S3llGQT-Ar6eLi-Yzz_0WuBdGb3jtpPFdCNJi4efCOEPOhHA6uEKj77BAoaSNcUxNSq0UqEOlXaWkJE3ryPB6Brv90OMLYOSmFB3JBksiQaGP1bkygQFKWTp0dgYft0fe3kywGm1yR4q6jaRqI6naTKoZHMSj_Tsxn-oM3m6p1NKliJEO2-MwrlsZqV_KStHa5xP5bldvqf7yjl1fwV78-JSw9xp2N6sR38B9_2tztV4dEuct54eJ8_4AjKPTBQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB5BqaAXoKXA8nSlHgDJbWI7SXOk0VZFLKsetlV7Sv2YiIoqqXY3SPx7xo639NIDNx_skeWx5-GZ-QZgV5fCStSaS2MNV7m2vMxcytPMNKpJlXahZ-TZpJhOD87Py5NYrB5qYRAxJJ_hnh-GWL7rbO-_yvZJVeWCfLaH8Mi3zorlWrdfKqGHROh-K2jAybAoYhwzTcr9WXVxSP6gyPZkVpQkuDfgsfJoJMrX3N9RSqHLyv0GZ1A8R8_-c8vP4Wm0MNnX4UpswgNst2AzvuEF-xSBpj-_gMtxwI8gAizU4TqP9D-gdLCTqxtfqY6OVT91R6TYYX_9i1ed86lcbsHHrZ3_CfKGkd3Lquuup7lD4juLOOjbcHo0nlXHPHZc4FYU-ZKXRha2cU5qTOyBKExB7oQwuTNJjrbBBIWS2kcyc1JrqcDcZbnJlJSkaw2ZXi9hre1afA2MHJWkIemgSSgotL4-VwY4QClTg0aP4MvqyOubAVijDg5JUtaeVbVnVR1ZNYJtf7T_JsZTHcHOiks1PQsf69Atdv2ilp77qcwUrX01sO929Yrrb-6h-hGeHM9-TOrJt-n3t7DhNzKk772DteW8x_ewbn8vrxbzD-H-_QW9P9Vm |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+Multidimensional+Pipelined+Chaotic+Bulk-Codewords-Encryption+for+Cloud+Control+Systems&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Ali%2C+Yasir&rft.au=Manzoor%2C+Tayyab&rft.au=Yang%2C+Huan&rft.au=You%2C+Lijie&rft.date=2025-10-01&rft.issn=2168-2275&rft.eissn=2168-2275&rft.volume=PP&rft_id=info:doi/10.1109%2FTCYB.2025.3579036&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon |