Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things

被引:14
|
作者
Hou, Rui [1 ]
Ren, Guowen [2 ]
Zhou, Chunlei [3 ]
Yue, Hongxuan [4 ]
Liu, Huan [5 ]
Liu, Jiayue [6 ]
机构
[1] North China Elect Power Univ, Sch Econ & Management, Beijing 102206, Peoples R China
[2] Chinese Soc Urban Studies, New Energy Res Inst, Beijing 100835, Peoples R China
[3] Big Data Ctr State Grid Co Ltd, Data Management Dept, Beijing 100031, Peoples R China
[4] State Grid Xuji Wind Power Technol Co Ltd, Xuchang 461000, Peoples R China
[5] State Owned Assets Supervis & Adm Commiss, Yinchuan 750000, Ningxia, Peoples R China
[6] China Mobile Commun Grp Qinghai Co Ltd, Xining 810001, Peoples R China
关键词
Ubiquitous electricity Internet of Things; Network security analysis; Privacy security analysis; Information security; Cyber attack; CYBER SECURITY; CYBERSECURITY; SYSTEMS;
D O I
10.1016/j.comcom.2020.04.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, large-scale power outages caused by cyberattacks have occurred frequently, and the information security situation has become increasingly severe. Network security in the power and energy fields is directly related to the power supply and power security, and it should not be underestimated. The present research work focuses on the analysis of network security and privacy security in the ubiquitous electric IoT environment. This article explains the concepts and architecture of network security in the ubiquitous electric Internet of Things (IoT) environment. Based on the analysis of the ubiquitous electric IoT network development trends and technical requirements, this study proposes smart meters and acquisitions suitable for smart grid information acquisition systems. Lightweight two-way device authentication protocol. The protocol is based on the shared security key and random numbers to authenticate the identity of both parties in the communication. The security key embedded in the chip of the device is used to determine the legitimacy of the identity of the access device, avoids the use of third-party services such as certificates, and effectively preventing man-in-the-middle attacks and repeated. The launch of attacks ensures the reliability of the system. The experiments in present work show that the time-consuming time of lightweight data encryption and decryption XOR is 1/2 of the time of a typical DES algorithm, and 1/900 of the time of an RSA algorithm. The efficiency is significantly better than DES and RSA, which is consistent with industrial control systems. Need for timely communication.
引用
收藏
页码:64 / 72
页数:9
相关论文
共 50 条
  • [1] Ubiquitous Networks, Ubiquitous Sensors: Issues of Security, Reliability and Privacy in the Internet of Things
    Losavio, Michael
    Elmaghraby, Adel
    Losavio, Antonio
    [J]. UBIQUITOUS NETWORKING, UNET 2018, 2018, 11277 : 331 - 343
  • [2] Security and Privacy in the Internet of Things
    Seitz, Ludwig
    [J]. ERCIM NEWS, 2015, (101): : 17 - 17
  • [3] Security and privacy of the Internet of Things
    Strous, Leon
    von Solms, Sune
    Zuquete, Andre
    [J]. COMPUTERS & SECURITY, 2021, 102
  • [4] Security and Privacy on Internet of Things
    Ren, Zejun
    Liu, Xiangang
    Ye, Runguo
    Zhang, Tao
    [J]. PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 140 - 144
  • [5] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    [J]. FRONTIERS IN COMPUTER SCIENCE, 2023, 5
  • [6] Security and Privacy in the Internet of Things
    Fawaz, Kassem
    Shin, Kang G.
    [J]. COMPUTER, 2019, 52 (04) : 40 - 49
  • [7] Security and privacy of network transmitted system in the Internet of Robotic Things
    Abdulrahman Alamer
    Sultan Basudan
    [J]. The Journal of Supercomputing, 2022, 78 : 18361 - 18378
  • [8] Security and privacy of network transmitted system in the Internet of Robotic Things
    Alamer, Abdulrahman
    Basudan, Sultan
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (16): : 18361 - 18378
  • [9] Security, Privacy, and Trust on Internet of Things
    Kolias, Constantinos
    Meng, Weizhi
    Kambourakis, Georgios
    Chen, Jiageng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [10] SmartOrBAC Security and Privacy in the Internet of Things
    Bouij-Pasquier, Imane
    Abou El Kalam, Anas
    Ait Ouahman, Abdellah
    Ouabiba de Montfort, Mina
    [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,