Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things

被引:14
|
作者
Hou, Rui [1 ]
Ren, Guowen [2 ]
Zhou, Chunlei [3 ]
Yue, Hongxuan [4 ]
Liu, Huan [5 ]
Liu, Jiayue [6 ]
机构
[1] North China Elect Power Univ, Sch Econ & Management, Beijing 102206, Peoples R China
[2] Chinese Soc Urban Studies, New Energy Res Inst, Beijing 100835, Peoples R China
[3] Big Data Ctr State Grid Co Ltd, Data Management Dept, Beijing 100031, Peoples R China
[4] State Grid Xuji Wind Power Technol Co Ltd, Xuchang 461000, Peoples R China
[5] State Owned Assets Supervis & Adm Commiss, Yinchuan 750000, Ningxia, Peoples R China
[6] China Mobile Commun Grp Qinghai Co Ltd, Xining 810001, Peoples R China
关键词
Ubiquitous electricity Internet of Things; Network security analysis; Privacy security analysis; Information security; Cyber attack; CYBER SECURITY; CYBERSECURITY; SYSTEMS;
D O I
10.1016/j.comcom.2020.04.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, large-scale power outages caused by cyberattacks have occurred frequently, and the information security situation has become increasingly severe. Network security in the power and energy fields is directly related to the power supply and power security, and it should not be underestimated. The present research work focuses on the analysis of network security and privacy security in the ubiquitous electric IoT environment. This article explains the concepts and architecture of network security in the ubiquitous electric Internet of Things (IoT) environment. Based on the analysis of the ubiquitous electric IoT network development trends and technical requirements, this study proposes smart meters and acquisitions suitable for smart grid information acquisition systems. Lightweight two-way device authentication protocol. The protocol is based on the shared security key and random numbers to authenticate the identity of both parties in the communication. The security key embedded in the chip of the device is used to determine the legitimacy of the identity of the access device, avoids the use of third-party services such as certificates, and effectively preventing man-in-the-middle attacks and repeated. The launch of attacks ensures the reliability of the system. The experiments in present work show that the time-consuming time of lightweight data encryption and decryption XOR is 1/2 of the time of a typical DES algorithm, and 1/900 of the time of an RSA algorithm. The efficiency is significantly better than DES and RSA, which is consistent with industrial control systems. Need for timely communication.
引用
收藏
页码:64 / 72
页数:9
相关论文
共 50 条
  • [31] Review on Security and Privacy Concerns in Internet of Things
    Kumar, Nishant
    Madhuri, J.
    ChanneGowda, Manjunath
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [32] Privacy and Security in Internet of Things and Wearable Devices
    Arias, Orlando
    Wurm, Jacob
    Khoa Hoang
    Jin, Yier
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02): : 99 - 109
  • [33] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [34] Security and privacy mechanism for health internet of things
    [J]. Kang, K. (onefish@126.com), 2013, Beijing University of Posts and Telecommunications (20):
  • [35] Security and privacy in the Internet of Things: threats and challenges
    Badr, Youakim
    Zhu, Xiaoyang
    Alraja, Mansour Naser
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) : 257 - 271
  • [36] Editorial: Security and Privacy Challenges in Internet of Things
    Wang, Ding
    Meng, Weizhi
    [J]. MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 343 - 345
  • [37] An Overview of Security and Privacy Issues for Internet of Things
    Youm, Heung Youl
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08) : 1649 - 1662
  • [38] Editorial: Security and Privacy Challenges in Internet of Things
    Ding Wang
    Weizhi Meng
    [J]. Mobile Networks and Applications, 2022, 27 : 343 - 345
  • [39] Security and privacy Aspects for Internet of Things (IoT)
    Bansal, Malti
    Nanda, Marshal
    Husain, Md Nazir
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 199 - 204
  • [40] Human Factors in the Privacy and Security of the Internet of Things
    Chong, Isis
    Xiong, Aiping
    Proctor, Robert W.
    [J]. ERGONOMICS IN DESIGN, 2019, 27 (03) : 5 - 10