Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the deployment of an effective key management scheme (KMS) for multiple Smart Meters (SMs) and devices is imperative. The AMI exhibits unique characteristics, including storage and computation constraints in SMs, hybrid message transmission techniques, and varying participation levels in Demand Response (DR) projects, necessitating a tailored approach to security compared to other systems. In this research, we propose a KMS that is designed to address the specific security concerns of the AMI. The scheme comprises three key management procedures catering to the unicast, broadcast, and multicast modes of hybrid transmission. Given the resource limitations of SMs, we adopted simple cryptographic techniques for key creation and refreshing policies, ensuring efficiency without compromising on security. Furthermore, considering the variability of participants in DR projects, we established key refreshing policies that adapted to changing involvement. The effectiveness and security of the proposed KMS were rigorously evaluated, demonstrating its practical applicability and ability to safeguard the AMI ecosystem. The results of the evaluation indicate that our approach provides a viable and robust solution to the security challenges faced by AMI systems. By employing the proposed KMS, stakeholders can confidently deploy and manage AMI, ensuring the protection of sensitive data and maintaining the integrity of the Smart Electrical Grid.
The massive growth and use of digital multimedia through computer networks, including video and images, has increased the demand for protecting this digital data. In order to secure digital video, video encryption is frequently utilized. In this paper, a brand-new video scrambling technique based on two chaotic linearly symmetric maps and one chaotic tent map that has been twisted is suggested. The permutation procedure moves every frame pixel's position using a P-box created by permuting a linearly symmetric chaotic sequence. The diffusion technique employs both linearly symmetric chaos maps and distorted tent maps to create key streams. The keystream closely resembles simple frames because the pixels in the permuted frame indicate which of the two even symmetric chaos maps is replicated each time for the following byte. The information entropy, histogram, neighboring pixel correlation and sensitivity analysis, number of pixel changing regions (NPCR), and unified mean change intensity are used to thoroughly evaluate the recommended method's capacity to improve performance and security (UACI). Comparatively to other methods, the suggested algorithm is resistant to clipping, salt and pepper noise, speckle noise rotation assaults, and clipping. This positive outcome indicates that the plan can be successfully implemented for secure video communication applications.
The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this digital data. To secure digital video, video encryption is frequently utilized. In this paper, a brand-new video scrambling technique based on two chaotic linearly symmetric maps and one chaotic tent map that has been twisted is suggested. The permutation procedure moves every frame pixel's position using a P-box created by permuting a linearly symmetric chaotic sequence. The diffusion technique employs both linearly symmetric chaos maps and distorted tent maps to create key streams. The keystream closely resembles simple frames because the pixels in the permuted frame indicate which of the two even symmetric chaos maps is replicated each time for the following byte. The information entropy, histogram, neighboring pixel correlation and sensitivity analysis, number of pixels changing regions (NPCR), and unified mean change intensity are used to thoroughly evaluate the recommended method's capacity to improve performance and security (UACI). Comparatively to other methods, the suggested algorithm is resistant to clipping, salt and pepper noise, speckle noise rotation assaults, and clipping. This positive outcome indicates that the plan can be successfully implemented for secure video communication applications.
The Raman gain coefficient, the attenuations at signal and pump wavelengths and the refractive indices of both core and cladding of silica doped Germania optical fiber are functions of the Germania ratio, temperature and wavelengths. The Raman amplifier gain increases with Germania ratio but it decreases with temperature. Also, Raman gain either increases or decreases with signal wavelength. As the fiber core radius increases, the Raman gain decreases. The gain distribution through the amplifier length of dual pumps with power divided ratio (S=0.5) is better than that for the forward pump amplifier and the backward pump amplifier. The forward pump has a maximized gain but the backward pump has a minimized gain, while the dual pumps have both the maximum and minimized gains. The final amplifier gain for the three kinds of pumps with the same pump power (Pp) is equally.The pump wavelength (λp=1.4553μm) gives the biggest Raman gain at the center of wideband signal wavelength (λs=1.50 to 1.60μm). With λp =1.48μm, the gain increases with λs until λs=1.57μm and after that the gain decreases with λs and so with the above three kinds of pumps, gain fluctuations over the band wavelength of signal. The threshold pump power and gain saturation are studied.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.