Abstract

Big data and artificial intelligence technology, as the unified means and carrier for collecting, storing and computing core data of contemporary power IoT, has diverse and complex characteristics of its data sources and types. And the lack of insecure data access, abnormal response and terminal access rights control leads to the failure of the integrity and credibility of the closed-loop information defense. In particular, wireless sensor networks (WSNs) in power scenarios are more susceptible to malicious attacks. To address the above problems, this paper proposes a power IOT information defense strategy based on improved identity-based dynamic clustering authentication algorithm (IIDC). First, the terminal device sets the private key to solve the key escrow problem of terminal security authentication in the IOT model. At the same time, the improved algorithm dynamically generates pseudo-cryptographic matrix to avoid collusion attack. Finally, a hierarchical privilege management mechanism is adopted to decrypt the terminal authentication once. The proposed algorithm is more suitable for terminal security access and power consumption requirements in WSN-based power IOT scenario, as verified by experimental simulation.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call