Abstract

In recent years, large-scale power outages caused by cyberattacks have occurred frequently, and the information security situation has become increasingly severe. Network security in the power and energy fields is directly related to the power supply and power security, and it should not be underestimated. The present research work focuses on the analysis of network security and privacy security in the ubiquitous electric IoT environment. This article explains the concepts and architecture of network security in the ubiquitous electric Internet of Things (IoT) environment. Based on the analysis of the ubiquitous electric IoT network development trends and technical requirements, this study proposes smart meters and acquisitions suitable for smart grid information acquisition systems. Lightweight two-way device authentication protocol. The protocol is based on the shared security key and random numbers to authenticate the identity of both parties in the communication. The security key embedded in the chip of the device is used to determine the legitimacy of the identity of the access device, avoids the use of third-party services such as certificates, and effectively preventing man-in-the-middle attacks and repeated. The launch of attacks ensures the reliability of the system. The experiments in present work show that the time-consuming time of lightweight data encryption and decryption XOR is 1/2 of the time of a typical DES algorithm, and 1/900 of the time of an RSA algorithm. The efficiency is significantly better than DES and RSA, which is consistent with industrial control systems. Need for timely communication.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.