Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System
This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. A low-complexity variant of the 3-D chaos system is proposed to accomplish internal chaos-encryption-based polar coding for orthog...
Uložené v:
| Vydané v: | IEEE transactions on industrial informatics Ročník 20; číslo 3; s. 3935 - 3947 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Piscataway
IEEE
01.03.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 1551-3203, 1941-0050 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. A low-complexity variant of the 3-D chaos system is proposed to accomplish internal chaos-encryption-based polar coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS. Internal encryption is achieved by disrupting the correlation of the information bits index and frozen bits index along with the subcarrier by the three chaotic behavioral sequences obtained by Chua's system while encoding polar code. The method is tested on the fiber optic channel between the cloud computing and a local controller placed at a significant distance, thoroughly connected through the fiber optic cable network, and utilizing a 16 quadrature amplitude modulation-OFDM (QAM-OFDM) signal transmission. Our experimental results and performance analysis demonstrate that the proposed encryption scheme produces a 2.5-dB gain in sensitivity on the local controller end at a bit error rate (BER) of 10<inline-formula><tex-math notation="LaTeX">^{-3}</tex-math></inline-formula> compared to the conventional QAM-OFDM. Furthermore, the spacing window for the key distribution is 10<inline-formula><tex-math notation="LaTeX">^{75}</tex-math></inline-formula>, which can be regarded as a protection degree against any brute-force attack from unauthorized optical network units that act as local controllers. Considering the BER enhancement, reliability, and security, the proposed QAM-OFDM-based chaos encryption polar encoding can be ranked as a suitable choice for the NOCCSs data transmission and protection against any brute-force or differential attacks. |
|---|---|
| AbstractList | This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. A low-complexity variant of the 3-D chaos system is proposed to accomplish internal chaos-encryption-based polar coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS. Internal encryption is achieved by disrupting the correlation of the information bits index and frozen bits index along with the subcarrier by the three chaotic behavioral sequences obtained by Chua's system while encoding polar code. The method is tested on the fiber optic channel between the cloud computing and a local controller placed at a significant distance, thoroughly connected through the fiber optic cable network, and utilizing a 16 quadrature amplitude modulation-OFDM (QAM-OFDM) signal transmission. Our experimental results and performance analysis demonstrate that the proposed encryption scheme produces a 2.5-dB gain in sensitivity on the local controller end at a bit error rate (BER) of 10<inline-formula><tex-math notation="LaTeX">^{-3}</tex-math></inline-formula> compared to the conventional QAM-OFDM. Furthermore, the spacing window for the key distribution is 10<inline-formula><tex-math notation="LaTeX">^{75}</tex-math></inline-formula>, which can be regarded as a protection degree against any brute-force attack from unauthorized optical network units that act as local controllers. Considering the BER enhancement, reliability, and security, the proposed QAM-OFDM-based chaos encryption polar encoding can be ranked as a suitable choice for the NOCCSs data transmission and protection against any brute-force or differential attacks. This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and scalability. A low-complexity variant of the 3-D chaos system is proposed to accomplish internal chaos-encryption-based polar coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS. Internal encryption is achieved by disrupting the correlation of the information bits index and frozen bits index along with the subcarrier by the three chaotic behavioral sequences obtained by Chua's system while encoding polar code. The method is tested on the fiber optic channel between the cloud computing and a local controller placed at a significant distance, thoroughly connected through the fiber optic cable network, and utilizing a 16 quadrature amplitude modulation-OFDM (QAM-OFDM) signal transmission. Our experimental results and performance analysis demonstrate that the proposed encryption scheme produces a 2.5-dB gain in sensitivity on the local controller end at a bit error rate (BER) of 10[Formula Omitted] compared to the conventional QAM-OFDM. Furthermore, the spacing window for the key distribution is 10[Formula Omitted], which can be regarded as a protection degree against any brute-force attack from unauthorized optical network units that act as local controllers. Considering the BER enhancement, reliability, and security, the proposed QAM-OFDM-based chaos encryption polar encoding can be ranked as a suitable choice for the NOCCSs data transmission and protection against any brute-force or differential attacks. |
| Author | Xia, Yuanqing Ali, Yasir Manzoor, Tayyab Sulek, Wojciech |
| Author_xml | – sequence: 1 givenname: Yasir orcidid: 0000-0003-3998-9218 surname: Ali fullname: Ali, Yasir email: yasiralibit@gmail.com organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 2 givenname: Yuanqing orcidid: 0000-0002-5977-4911 surname: Xia fullname: Xia, Yuanqing email: xia_yuanqing@bit.edu.cn organization: School of Automation, Beijing Institute of Technology, Beijing, China – sequence: 3 givenname: Wojciech orcidid: 0000-0003-3462-0657 surname: Sulek fullname: Sulek, Wojciech email: wojciech.sulek@polsl.pl organization: Department of Telecommunication and Tele-informatics, Faculty of Automatic Control, Electronics, and Computer Science, Joint Doctoral School, Silesian University of Technology, Gliwice, Poland – sequence: 4 givenname: Tayyab orcidid: 0000-0003-3932-0506 surname: Manzoor fullname: Manzoor, Tayyab email: tm.engcst@gmail.com organization: School of Automation Science and Engineering, South China University of Technology, Guangzhou, China |
| BookMark | eNp9kDFPwzAQRi1UJEphZ2CIxJxy9jUOHiEqUKmiSC1z5DgXSEnjYjtC_fekagfEwHJ3w_fudO-cDVrbEmNXHMacg7pdzWZjAQLHiFwKnp6wIVcTHgMkMOjnJOExCsAzdu79GgBTQDVkq-xDWx9PW-N221DbNn7QnspoSaZzFL3aRrsos2XdvkeVddELhW_rPuOFq6kNfTBrbNdX2wZnm2i584E2F-y00o2ny2MfsbfH6Sp7jueLp1l2P4-NUCLEVaVKo0GWqdBcF1QSllJOioQXphBlApMECw5IE0TAIjEVV6ZKhUStSkUFjtjNYe_W2a-OfMjXtnNtfzIXCu9AyFSkfUoeUsZZ7x1VuamD3v8anK6bnEO-N5j3BvO9wfxosAfhD7h19Ua73X_I9QGpiehXXEiVSoE_0NF-BA |
| CODEN | ITIICH |
| CitedBy_id | crossref_primary_10_1364_OL_566608 crossref_primary_10_1016_j_chaos_2025_116379 crossref_primary_10_1109_TII_2024_3431085 crossref_primary_10_1109_ACCESS_2025_3545029 crossref_primary_10_1109_JLT_2025_3579518 crossref_primary_10_1109_TCYB_2025_3579036 crossref_primary_10_1109_TII_2024_3476516 |
| Cites_doi | 10.1109/LPT.2011.2149512 10.1016/j.optcom.2017.05.066 10.1016/j.arcontrol.2023.03.009 10.1109/JIOT.2022.3194945 10.1109/JLT.2019.2902601 10.1109/TSP.2020.2981766 10.1109/TITS.2021.3053406 10.1109/ACCESS.2019.2919598 10.1109/TCOMM.2022.3184359 10.1109/LCOMM.2022.3144695 10.1109/CAC.2018.8623109 10.1109/LPT.2014.2370757 10.1109/ICCChina.2016.7636841 10.1109/JPHOT.2021.3122909 10.3390/s22020588 10.3390/drones7010004 10.1109/ACCESS.2018.2888883 10.1109/TCSII.2022.3178975 10.1007/s11276-022-03127-1 10.1016/j.optcom.2018.10.015 10.1364/OE.21.015627 10.1016/j.optcom.2021.127055 10.1109/LCOMM.2021.3072050 10.1007/s11768-018-8002-8 10.1109/TMTT.2022.3194092 10.1109/TIT.2015.2410251 10.1109/ACCESS.2022.3144681 10.1109/TIT.2022.3173152 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TII.2023.3316217 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1941-0050 |
| EndPage | 3947 |
| ExternalDocumentID | 10_1109_TII_2023_3316217 10269762 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Department of Telecommunication and Tele-informatics, Silesian University of Technology – fundername: National Natural Science Foundation of China grantid: 61836001 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c292t-ff9dca06d72a1abede3d664b51bcb2d50453b103e43303b5cf19cf7263a9d9eb3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001085372500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1551-3203 |
| IngestDate | Tue Aug 12 22:18:18 EDT 2025 Tue Nov 18 22:28:56 EST 2025 Sat Nov 29 04:17:09 EST 2025 Wed Aug 27 02:22:17 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c292t-ff9dca06d72a1abede3d664b51bcb2d50453b103e43303b5cf19cf7263a9d9eb3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5977-4911 0000-0003-3998-9218 0000-0003-3462-0657 0000-0003-3932-0506 |
| PQID | 2938026727 |
| PQPubID | 85507 |
| PageCount | 13 |
| ParticipantIDs | crossref_citationtrail_10_1109_TII_2023_3316217 crossref_primary_10_1109_TII_2023_3316217 ieee_primary_10269762 proquest_journals_2938026727 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-03-01 |
| PublicationDateYYYYMMDD | 2024-03-01 |
| PublicationDate_xml | – month: 03 year: 2024 text: 2024-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on industrial informatics |
| PublicationTitleAbbrev | TII |
| PublicationYear | 2024 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref13 doi: 10.1109/LPT.2011.2149512 – ident: ref24 doi: 10.1016/j.optcom.2017.05.066 – ident: ref25 doi: 10.1016/j.arcontrol.2023.03.009 – ident: ref26 doi: 10.1109/JIOT.2022.3194945 – ident: ref5 doi: 10.1109/JLT.2019.2902601 – ident: ref8 doi: 10.1109/TSP.2020.2981766 – ident: ref1 doi: 10.1109/TITS.2021.3053406 – ident: ref16 doi: 10.1109/ACCESS.2019.2919598 – ident: ref10 doi: 10.1109/TCOMM.2022.3184359 – ident: ref23 doi: 10.1109/LCOMM.2022.3144695 – ident: ref3 doi: 10.1109/CAC.2018.8623109 – ident: ref18 doi: 10.1109/LPT.2014.2370757 – ident: ref19 doi: 10.1109/ICCChina.2016.7636841 – ident: ref21 doi: 10.1109/JPHOT.2021.3122909 – ident: ref12 doi: 10.3390/s22020588 – ident: ref27 doi: 10.3390/drones7010004 – ident: ref14 doi: 10.1109/ACCESS.2018.2888883 – ident: ref2 doi: 10.1109/TCSII.2022.3178975 – ident: ref15 doi: 10.1007/s11276-022-03127-1 – ident: ref17 doi: 10.1016/j.optcom.2018.10.015 – ident: ref11 doi: 10.1364/OE.21.015627 – ident: ref20 doi: 10.1016/j.optcom.2021.127055 – ident: ref22 doi: 10.1109/LCOMM.2021.3072050 – ident: ref4 doi: 10.1007/s11768-018-8002-8 – ident: ref6 doi: 10.1109/TMTT.2022.3194092 – ident: ref9 doi: 10.1109/TIT.2015.2410251 – ident: ref28 doi: 10.1109/ACCESS.2022.3144681 – ident: ref7 doi: 10.1109/TIT.2022.3173152 |
| SSID | ssj0037039 |
| Score | 2.4373178 |
| Snippet | This article proposes a reliable and secured polar coding for the network-oriented cloud control system (NOCCS) in the context of security, reliability, and... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3935 |
| SubjectTerms | Bit error rate Channel security Chaotic communication Cloud computing cloud control system Coding Control systems Controllers Cybersecurity Data transmission Decoding Encoding Encryption Fiber optics internal chaotic encryption Optical communication Optical sensors Orthogonal Frequency Division Multiplexing Polar codes Quadrature amplitude modulation Reliability secure polar codes Sequences Signal transmission |
| Title | Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System |
| URI | https://ieeexplore.ieee.org/document/10269762 https://www.proquest.com/docview/2938026727 |
| Volume | 20 |
| WOSCitedRecordID | wos001085372500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0050 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037039 issn: 1551-3203 databaseCode: RIE dateStart: 20050101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA4qHvTgWrFaJQcvHtLOJJnlHbW0WJDaQ4XehmyDQulIF8F_b5apFkTByzCHZBjel7wlee97CN04yt44yQ2RXEeES-AEEsiJAMMl5Sw3gSTpMRsO88kERnWxuq-FMcb45DPTdq_-Ll9XauWOyuwOp6k1n1bjbmdZGoq11mqX2aULnhw1iQmjEVvfSUbQGQ8GbdcmvM1YnFLfm-zbBvmmKj80sTcv_cN__tgROqj9SHwXgD9GW2Z2gvY32AVP0bj7IqoF6c3U_MMrBnJvTZbG_ojd4JELanG3csYLW9cVD0NGOHly1MfWEcXdabWyz5DMjgO3eQM993vj7gOpmygQRYEuSVmCViJKdUZFLKTRhuk05TKJpZJUJ9alYzKOmOHMWjOZqDIGVWY0ZQI02FD7DO3Mqpk5R1hIZoGlIi91wiXLRBZpYEwqLUoAA03UWYu1UDXDuGt0MS18pBFBYYEoHBBFDUQT3X7NeAvsGn-MbTjBb4wLMm-i1hq6ot5_i8I6MbnrrUWzi1-mXaI9-3Ue0slaaGc5X5krtKvel6-L-bVfWp9p_MvB |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5SBfXgLtY1By8e0s4kmeUdtVQs1uqhQm9DtkFBOtJF8N-bZaqCKHgZ5pAww_uStyTvfQ-hc0fZGye5IZLriHAJnEACORFguKSc5SaQJPWzwSAfjeChLlb3tTDGGJ98Zlru1d_l60rN3VGZ3eE0tebTatzlhHMahXKtheJldvGCp0dNYsJoxBa3khG0h71eyzUKbzEWp9R3J_uyQr6tyg9d7A3M9eY_f20LbdSeJL4M0G-jJTPeQevf-AV30bDzJKop6Y7V5N2rBnJljZbG_pDd4AcX1uJO5cwXts4rHoSccHLvyI-tK4o7L9XcPkM6Ow7s5nvo8bo77NyQuo0CURTojJQlaCWiVGdUxEIabZhOUy6TWCpJdWKdOibjiBnOrD2TiSpjUGVGUyZAgw2291FjXI3NAcJCMgstFXmpEy5ZJrJIA2NSaVECGGii9kKshao5xl2ri5fCxxoRFBaIwgFR1EA00cXnjNfAr_HH2D0n-G_jgsyb6HgBXVHvwGlh3Zjcddei2eEv087Q6s3wrl_0e4PbI7Rmv8RDctkxaswmc3OCVtTb7Hk6OfXL7AMs2s8I |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Chaos-Encryption-Based+Secure+Polar+Coding+for+Network-Oriented+Cloud+Control+System&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Ali%2C+Yasir&rft.au=Xia%2C+Yuanqing&rft.au=Sulek%2C+Wojciech&rft.au=Manzoor%2C+Tayyab&rft.date=2024-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1551-3203&rft.eissn=1941-0050&rft.volume=20&rft.issue=3&rft.spage=3935&rft_id=info:doi/10.1109%2FTII.2023.3316217&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon |