Abstract
The 5G power network has gradually adopted mobile terminal access to access the network to manage business. With the continuous expansion of access terminal scale, if the attacker impersonates the terminal or hijack the terminal to attack the master server, it will cause serious consequences. Therefore, this paper proposes a lightweight and efficient terminal secure and trustable access method in 5G power business network. Considering the core idea of security stratification and network special, we design a three-layer security access architecture to ensure the security of terminals in the access process and data protection process. Then, we propose a lightweight secure certification method for large-scale terminal accessing power network. The simulation results show that the proposed method can reduce the communication overhead and provide good security when massive terminals accessing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, Y., Yang, W., Shang, X., Hu, J., Huang, Y., Cai, Y.: Energy-efficient secure transmission for wireless powered internet of things with multiple power beacons. IEEE Access 6, 75086–75098 (2018)
Liming, C., Xuzhu, D., Baoren, C., Jin, L., Qiqi, W.: Reliability enhancement of public wireless communication for remote control services in power distribution in smart grid. In: Proceedings of CICED’18, pp. 1700–1704 (2018)
Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)
Guo, S., Hu, X., Zhou, Z., Wang, X., Qi, F., Gao, L.: Trust access authentication in vehicular network based on blockchain. China Commun. 16(6), 18–30 (2019)
Lubega, P., Ssettumba, T., Nabuuma, H., Serugunda,J.: A secure energy efficient multi-user selection scheme for SWIPT wireless IoT networks in the presence of cooperative jamming. In: Proceedings of TELFOR’19, pp. 1–4 (2019)
Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)
Chaudhry, S.A., Alhakami, H., Baz, A., Al-Turjman, F.: Securing demand response management: a certificate-based access control in smart grid edge computing infra-structure. IEEE Access 8, 101235–101243 (2020)
Sha, K., Alatrash, N., Wang, Z.: A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 8(6), 2519–2531 (2017)
Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)
Navya, M., Sanjay, H.A., Deepika, K.: Securing smart grid data under key exposure and revocation in cloud computing. In: Proceedings of I4C’18, pp. 1–4 (2018)
Chekired, D., Khoukhi, L., Mouftah, H.: Decentralized cloud-SDN architecture in smart grid: A dynamic pricing model. IEEE Trans. Industr. Inf. 14(3), 1220–1231 (2018)
W. Chen, B. Liu, H. Huang, et al. When UAV swarm meets edge-cloud computing: The QoS perspective, IEEE Network, 2019, 36–43
Liu, B., Jia, D., Wang, J., et al.: Cloud-assisted safety message dissemination in VANET–cellular heterogeneous wireless network. IEEE Syst. J. 11(1), 128–139 (2017)
Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS One 13(5), 1–23 (2018)
Zhou, Y., Zhu, X.: Analysis of vehicle network architecture and performance optimization based on soft definition of integration of cloud and fog. IEEE Access 7(2019), 101171–101177 (2019)
El-sayed, H., Sankar, S., Prasad, M., et al.: Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6, 1–12 (2018)
Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 2017(220), 160–169 (2017)
Zhang, K., Mao, Y., Leng, S., et al.: Mobile-edge computing for vehicular networks. IEEE Veh. Technol. Mag. 12, 36–44 (2017)
Pu, L., Chen, X., Mao, G., et al.: Chimera: an energy-efficient and deadline-aware hybrid edge computing framework for vehicular crowdsensing applications. IEEE Internet of Things J. 6(1), 84–99 (2019)
Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for industry 4.0 applications. IEEE Trans. Ind. Inf. 16(2), 1310–1320 (2020)
Eldjali, C., Lyes, K.: Optimal priority-queuing for EV charging-discharging service based on cloud computing. In: Proceedings of the ICC’17, pp. 1–6 (2017)
Xie, R., Tang, Q., Wang, Q., et al.: Collaborative vehicular edge computing networks: architecture design and research challenges. IEEE Access 7(2019), 178942–178952 (2019)
Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network se-lection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)
Yang, Y., Niu, X., Li, L., et al.: A secure and efficient transmission method in connected vehicular cloud computing. IEEE Netw. 32, 14–19 (2018)
Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things J. 3(6), 1437–1447 (2016)
Kaur, K., Garg, S., Kaddoum, G., et al.: Demand-response management using a fleet of electric vehicles: an opportunistic-SDN-based edge-cloud framework for smart grids. IEEE Netw. 33, 46–53 (2019)
Guo, H., Zhang, J., Liu, J.: FiWi-enhanced vehicular edge computing networks. IEEE Veh. Technol. Mag. 14, 45–53 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, H., Meng, F., Wang, D., Yang, Z. (2021). A Secure and Trustable Access Method of Power Business in 5G Networks. In: Song, H., Jiang, D. (eds) Simulation Tools and Techniques. SIMUtools 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-030-72792-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-72792-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72791-8
Online ISBN: 978-3-030-72792-5
eBook Packages: Computer ScienceComputer Science (R0)