[1]Barik A K, Das D C. Active power management of isolated renewable microgrid generating power from Rooftop solar arrays, sewage waters and solid urban wastes of a smart city using Salp swarm algorithm[C] Proc of 2018 Technologies for SmartCity Energy Security and Power (ICSESP). Piscataway, NJ: IEEE, 2018: 16[2]Gzde H, Taplamacolu M C, Ar M, et al. 4GLTE technology for smart grid communication infrastructure[C] Proc of the 3rd Int Istanbul Smart Grid Congress and Fair (ICSG). Piscataway, NJ: IEEE, 2015: 14[3]Kalalas C, Thrybom L, AlonsoZarate J. Cellular communications for smart grid neighborhood area networks: A survey[J]. IEEE Access, 2016, 4: 14691493[4]Mohd Azmi K H, Mohamed Radzi N A, Azhar N A, et al. Active electric distribution network: Applications, challenges, and opportunities[J]. IEEE Access, 2022, 10: 134655134689[5]Islam S N, Baig Z, Zeadally S. Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures[J]. IEEE Trans on Industrial Informatics, 2019, 15(12): 65226530[6]Haddad Z, Mahmoud M, Taha S, et al. Secure and privacypreserving AMIutility communications via LTEA networks[C] Proc of the 11th IEEE Int Conf on Wireless and Mobile Computing, Networking and Communications (WiMob). Piscataway, NJ: IEEE, 2015: 748755[7]Pedramnia K, Rahmani M. Survey of DoS attacks on LTE infrastructure used in AMI system and countermeasures[C] Proc of 2018 Smart Grid Conference(SGC). Piscataway, NJ: IEEE, 2018: 16[8]Gao L Y, Xu T X, Kun M B, et al. Analysis of service load and security of power TDLTE wireless private network[C] Proc of 2018 China Int Conf on Electricity Distribution (CICED). Piscataway, NJ: IEEE, 2018: 387392[9]李玲, 朱立东, 李卫榜. 6G网络安全与隐私保护的研究现状及展望[J]. 信息安全研究, 2023, 9(9): 822831[10]Li G, Hu L, Staat P, et al. Reconfigurable intelligent surface for physical layer key generation: Constructive or destructive[J]. IEEE Wireless Communications, 2022, 29(4): 146153[11]Li G, Sun C, Xu W, et al. On maximizing the sum secret key rate for reconfigurable intelligent surfaceassisted multiuser systems[J]. IEEE Trans on Information Forensics and Security, 2022, 17: 211225[12]Elzaher M F A, Shalaby M. Twolevel chaotic system versus nonautonomous modulation in the context of chaotic voice encryption[C] Proc of 2021 Int Telecommunications Conference(ITCEgypt). Piscataway, NJ: IEEE, 2021: 16[13]Dsouza C A, Sonawane K. Securing folder directory using image encryption by Chaos and Rijndael Algorithm[C] Proc of 2021 Int Conf on Communication Information and Computing Technology (ICCICT). Piscataway, NJ: IEEE, 2021: 17[14]Wang F, Zhu B, Wang K, et al. Physical layer encryption in DMT based on digital multiscroll chaotic system[J]. IEEE Photonics Technology Letters, 2020, 32(20): 13031306[15]Qi G, Chen G. Analysis and circuit implementation of a new 4D chaotic system[J]. Physics Letters, Section A: General, Atomic and Solid State Physics, 2006, 352(45): 386397
|