Abstract

The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an environment. In order to ensure the security of multi-source data in the power monitoring networks, a security system for multi-source big data in power monitoring networks based on the adaptive combined public key algorithm and an identity-based public key authentication protocol is proposed. Based on elliptic curve cryptography and combined public key authentication, the mapping value of user identification information is used to combine the information in a public and private key factor matrix to obtain the corresponding user key pair. The adaptive key fragment and combination method are designed so that the keys are generated while the status of terminals and key generation service is sensed. An identification-based public key authentication protocol is proposed for the power monitoring system where the authentication process is described step by step. Experiments are established to validate the efficiency and effectiveness of the proposed system. The results show that the proposed model demonstrates satisfying performance in key update rate, key generation quantity, data authentication time, and data security. Finally, the proposed model is experimentally implemented in a substation power IoT environment where the application architecture and security mechanism are described. The security evaluation of the experimental implementation shows that the proposed model can resist a series of attacks such as counterfeiting terminal, data eavesdropping, and tampering.

Highlights

  • This paper proposes a system of multi-source big data security based on the combined public key algorithm in the power monitoring network

  • Inspired by the realistic implementations of State Grid Corporation of China (SGCC) and the security threats faced by Internet of Things (IoT) and big data in smart grid, we propose a more efficient, effective, and easy-to-implement security system to provide end-to-end security, so that the risks such as malicious node injection, unauthorized access, and node tampering [14] are significantly lowered; To increase the efficiency of the security system, we upgraded the combined public key (CPK) algorithm with the adaptive key fragment and combination method, so that the key generation and updating process is adapted according to the number of connecting terminals; To eliminate the negative impact of malicious terminals, we propose an identity-based public key authentication protocol

  • A security system of multi-source big data in power monitoring networks is proposed based on combined public key algorithm where an adaptive key fragment and combination method and an identity-based authentication protocol are described in detail

Read more

Summary

Introduction

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. This paper proposes a system of multi-source big data security based on the combined public key algorithm in the power monitoring network. Inspired by the realistic implementations of SGCC (lack of efficient security countermeasures for massive IoT terminals/nodes) and the security threats faced by IoT and big data in smart grid, we propose a more efficient, effective, and easy-to-implement security system to provide end-to-end security, so that the risks such as malicious node injection, unauthorized access, and node tampering [14] are significantly lowered; To increase the efficiency of the security system, we upgraded the CPK algorithm with the adaptive key fragment and combination method, so that the key generation and updating process is adapted according to the number of connecting terminals; To eliminate the negative impact of malicious terminals, we propose an identity-based public key authentication protocol.

Combined Public Key Algorithm
Elliptic Curve Cryptography
CPK System
System Architecture
Adaptive Key Fragment and Combination Method
Identity-Based Public Key Authentication Protocol
Experimental Results and Analysis
Data Authentication Time Analysis
Key Generation Quantity Analysis
Key Update Rate Analysis
Data Security Analysis
Implementation of the Proposed System in Power System
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call