Abstract

As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.