{"title":"基于电力物联网终端的安全检测与防护技术","authors":"Caiwei Guo, Yuxiang Cai, Wen Ji, Qimin Xiao, ShuLin Wu, Weitao Zheng, Wei Zhou, Taining Huang, Jianxiong Huang","doi":"10.1109/TOCS56154.2022.10016113","DOIUrl":null,"url":null,"abstract":"As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Measurement and Protection Technology Based on Power Internet of Things Terminal\",\"authors\":\"Caiwei Guo, Yuxiang Cai, Wen Ji, Qimin Xiao, ShuLin Wu, Weitao Zheng, Wei Zhou, Taining Huang, Jianxiong Huang\",\"doi\":\"10.1109/TOCS56154.2022.10016113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.\",\"PeriodicalId\":227449,\"journal\":{\"name\":\"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TOCS56154.2022.10016113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TOCS56154.2022.10016113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Measurement and Protection Technology Based on Power Internet of Things Terminal
As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.