Skip to main content

Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

  • 1333 Accesses

Abstract

The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries. The national secret algorithm can integrate the characteristics of the power Internet of things for deployment and application, and improve the industry security of the power Internet of things. Based on the characteristics of the power Internet of Things architecture, the security analysis of the interconnection of power grids is carried out, combined with the calculation points of the national secret algorithm, the business application scenarios of the national secret algorithm in the power industry are discussed, and a kind of electricity information encryption is proposed for the communication requirements of the power terminal and the grid platform. In the transmission scheme, SM2 is applied to the encrypted communication between the power terminal and the power grid platform server to solve the security issues such as identity authentication and encrypted transmission, and to improve the security efficiency of the power Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid-the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)

    Article  Google Scholar 

  2. Aoufi, S., Derhab, A., Guerroumi, M.: Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54, 2214–2226 (2020)

    Google Scholar 

  3. Yang, W., Mao, W., Zhang, J., Zou, J.: Narrowband wireless access for low-power massive internet of things: a bandwidth perspective. IEEE Wirel. Commun. 24(3), 138–145 (2017)

    Article  Google Scholar 

  4. Kimani, K., Oduol, V., Langat, K.: Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)

    Article  Google Scholar 

  5. Shrestha, M., Johansen, C., Noll, J., Roverso, D.: A methodology for security classification applied to smart grid infrastructures. Int. J. Crit. Infrastruct. Prot. 28, 100342 (2020)

    Google Scholar 

  6. Wang, Y., Wu, L., Yun, Y.: Security authentication method of terminal trusted access in smartgrid. Int. J. Secur. Appl. 9(7), 337–346 (2015)

    Google Scholar 

  7. Sun, H., Guo, Q., Zhang, B., Wu, W.: Integrated energy management system: concept, design, and demonstration in China. IEEE Electrific. Mag. 6(2), 42–50 (2018)

    Article  Google Scholar 

  8. Lu, Q., Cui, W.: Research on security monitoring and analysis technology of ubiquitous power internet of things germinal layer. Inf. Technol. 44(2), 121–125 (2020)

    Google Scholar 

  9. Li, P.Z., Xiao, Z.F., Chen, Z.W.: The research on communication technology matching of power terminal communication access network. Procedia Comput. Sci. 155, 785–790 (2019)

    Article  Google Scholar 

  10. Luo, Z., Xie, J.H., Gu, W.: Development of power grid information security support platformbased on SM2 cryptosystem. Autom. Electr. Power Syst. 38(6), 68–74 (2014)

    Google Scholar 

  11. Tong, W.: The research of the SM2, SM3 and SM4 algorithms in WLAN of transformer sub- station. In: 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276–283 (2019)

    Google Scholar 

  12. Tian, C., Wang, L., Li, M.: Design and implementation of SM9 Identity based Cryptograph algorithm. In: 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA), pp. 96–100 (2020)

    Google Scholar 

  13. Ding, F., Long, Y., Wu, P.: Study on secret sharing for SM2 digital signature and its application. In: 14th International Conference on Computational Intelligence and Security (CIS), pp. 205–209 (2018)

    Google Scholar 

  14. Yang, A.: Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols. Sci. World J. (2014)

    Google Scholar 

  15. National cryptography authority, SM2 elliptic curve public key cryptography algorithm, pp. 65–68 (2010). https://www.occa.gov.cn/sca/xwdt/2020-12/08/content_1060792.shtml

  16. Wang, Z., Zhang, Z.: Overview on public key cryptographic algorithm SM2 based on elliptic curves. J. Inf. Secur. Res. 16(5), 12–17 (2016)

    Google Scholar 

  17. Wang, Z.H., Zhang, Z.F.: Overview of SM2 elliptic curve public key cryptography algorithm. Inf. Secur. Res. 2(11), 972–982 (2016)

    Google Scholar 

  18. Bai, L., Zhang, Y., Yang, G.: SM2 cryptographic algorithm based on discrete logarithm problem and prospect. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1294–1297 (2012)

    Google Scholar 

  19. Xia, X.: A survey on 5G network slicing enabling the smart grid. In: 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), pp. 911–916 (2019)

    Google Scholar 

  20. Hong, N., Zheng, X.: A security framework for internet of things based on sm2 cipher algorithm. In: 2013 International Conference on Computational and Information Sciences, pp. 13–16 (2013)

    Google Scholar 

  21. Guo, Q., Ke, Z., Wang, S., Zheng, S.: Persistent fault analysis against SM4 implementations in libraries crypto++ and GMSSL. IEEE Access 9, 63636–63645 (2021)

    Article  Google Scholar 

  22. Jia, R., Xin, Y., Liu, B., Qin, Q.: Dynamic encryption and secure transmission of terminal data files. Comput. Mater. Continua 71(1), 1221–1232 (2022)

    Article  Google Scholar 

  23. Li, L., Xu, C., Yu, X., Dou, B., Zuo, C.: Searchable encryption with access control on keywords in multi-user setting. J. Cyber Secur. 2(1), 9–23 (2020)

    Article  Google Scholar 

  24. Ali, M., Xu, C., Hussain, A.: Authorized attribute-based encryption multi-keywords search with policy updating. J. New Media 2(1), 31–43 (2020)

    Article  Google Scholar 

  25. Feng, T., Pei, H., Ma, R., Tian, Y., Feng, X.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua 66(1), 871–890 (2021)

    Article  Google Scholar 

  26. Doss, S., Paranthaman, J., Gopalakrishnan, S., Duraisamy, A.: Memetic optimization with cryptographic encryption for secure medical data transmission in IoT-based distributed systems. Comput. Mater. Continua 66(2), 1577–1594 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, J., Wu, Q., Li, J., Li, J. (2022). Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics