Security Measurement and Protection Technology Based on Power Internet of Things Terminal

Caiwei Guo, Yuxiang Cai, Wen Ji, Qimin Xiao, ShuLin Wu, Weitao Zheng, Wei Zhou, Taining Huang, Jianxiong Huang
{"title":"Security Measurement and Protection Technology Based on Power Internet of Things Terminal","authors":"Caiwei Guo, Yuxiang Cai, Wen Ji, Qimin Xiao, ShuLin Wu, Weitao Zheng, Wei Zhou, Taining Huang, Jianxiong Huang","doi":"10.1109/TOCS56154.2022.10016113","DOIUrl":null,"url":null,"abstract":"As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TOCS56154.2022.10016113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.
基于电力物联网终端的安全检测与防护技术
电力物联网终端设备作为信息系统的底层边缘设备,直接实现对物理系统和环境的测量、监控和控制功能。它是信息物理系统闭环的关键节点。一旦受到攻击,造成的信息盗窃和信息破坏的后果是非常严重的。为此,工程界开始对物联网业务交互终端的安全性进行研究,从而产生了物联网终端的安全测量与防护技术。本文设计了电力物联网安全防护系统的三层逻辑架构和安全防护功能模块,测试了分组密码数学模型、数据安全防护技术和IC卡应用技术对电力数据恶意攻击的防御能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信