Secure Transmission Method of Power Quality Data in Power Internet of Things Based on the Encryption Algorithm

被引:0
|
作者
Liu, Xin [1 ]
Chang, Yingxian [2 ]
Yao, Honglei [1 ]
Su, Bing [1 ]
机构
[1] State Grid Shandong Elect Power Res Inst, Jinan, Peoples R China
[2] State Grid Shandong Elect Power Co, Jinan, Peoples R China
关键词
Encryption Algorithm; Graphical User Interface; Power Internet of Things; Power Quality Data; Secure Channel; Secure Transmission Method; SYSTEM;
D O I
10.4018/IJDWM.330014
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet of things in the era of the internet of things. Power quality data is the efficiency with which a power grid delivers electricity to users and expresses how well a piece of machinery uses the electricity it receives. The waveform at the nominal voltage and frequency is the goal of power quality research and improvement. The power internet of things (IoT) is an intelligent service platform that fully uses cutting-edge tech to enable user-machine interaction, data-driven decision-making, real-time analytics, and adaptive software design. The process by which plaintext is converted into cipher text is called an encryption algorithm. The cipher text may seem completely random, but it can be decrypted using the exact mechanism that created the encryption key.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Chen, Xingxing
    Cheng, Qingfeng
    Yang, Weidong
    Luo, Xiangyang
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)
  • [32] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Xingxing Chen
    Qingfeng Cheng
    Weidong Yang
    Xiangyang Luo
    Frontiers of Computer Science, 2024, 18
  • [33] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [34] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Maryam Ataei Nezhad
    Hamid Barati
    Ali Barati
    Journal of Grid Computing, 2022, 20
  • [35] A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)
    Chaudhari, Dipalee Ashok
    Umamaheswari, Ekambaram
    BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK, 2021, 66 (01): : 91 - 105
  • [36] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Ataei Nezhad, Maryam
    Barati, Hamid
    Barati, Ali
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [37] Research on Edge Cloud Data Storage Method of Power Operation Site in Internet of Things Environment Based on Paxos Algorithm
    Huang, Xiang
    Liang, Zhihong
    Zhang, Qiankun
    Mo, Jianfeng
    Zhao, Lei
    JOURNAL OF TESTING AND EVALUATION, 2024, 52 (03) : 1738 - 1751
  • [38] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [39] Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Mazurczyk, Wojciech
    Fung, Carol
    Venegas-Andraca, Salvador E.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 118 - 131
  • [40] A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System
    Xin, Mingyuan
    2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 62 - 65