Abstract
The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries. The national secret algorithm can integrate the characteristics of the power Internet of things for deployment and application, and improve the industry security of the power Internet of things. Based on the characteristics of the power Internet of Things architecture, the security analysis of the interconnection of power grids is carried out, combined with the calculation points of the national secret algorithm, the business application scenarios of the national secret algorithm in the power industry are discussed, and a kind of electricity information encryption is proposed for the communication requirements of the power terminal and the grid platform. In the transmission scheme, SM2 is applied to the encrypted communication between the power terminal and the power grid platform server to solve the security issues such as identity authentication and encrypted transmission, and to improve the security efficiency of the power Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid-the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)
Aoufi, S., Derhab, A., Guerroumi, M.: Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54, 2214–2226 (2020)
Yang, W., Mao, W., Zhang, J., Zou, J.: Narrowband wireless access for low-power massive internet of things: a bandwidth perspective. IEEE Wirel. Commun. 24(3), 138–145 (2017)
Kimani, K., Oduol, V., Langat, K.: Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)
Shrestha, M., Johansen, C., Noll, J., Roverso, D.: A methodology for security classification applied to smart grid infrastructures. Int. J. Crit. Infrastruct. Prot. 28, 100342 (2020)
Wang, Y., Wu, L., Yun, Y.: Security authentication method of terminal trusted access in smartgrid. Int. J. Secur. Appl. 9(7), 337–346 (2015)
Sun, H., Guo, Q., Zhang, B., Wu, W.: Integrated energy management system: concept, design, and demonstration in China. IEEE Electrific. Mag. 6(2), 42–50 (2018)
Lu, Q., Cui, W.: Research on security monitoring and analysis technology of ubiquitous power internet of things germinal layer. Inf. Technol. 44(2), 121–125 (2020)
Li, P.Z., Xiao, Z.F., Chen, Z.W.: The research on communication technology matching of power terminal communication access network. Procedia Comput. Sci. 155, 785–790 (2019)
Luo, Z., Xie, J.H., Gu, W.: Development of power grid information security support platformbased on SM2 cryptosystem. Autom. Electr. Power Syst. 38(6), 68–74 (2014)
Tong, W.: The research of the SM2, SM3 and SM4 algorithms in WLAN of transformer sub- station. In: 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276–283 (2019)
Tian, C., Wang, L., Li, M.: Design and implementation of SM9 Identity based Cryptograph algorithm. In: 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA), pp. 96–100 (2020)
Ding, F., Long, Y., Wu, P.: Study on secret sharing for SM2 digital signature and its application. In: 14th International Conference on Computational Intelligence and Security (CIS), pp. 205–209 (2018)
Yang, A.: Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols. Sci. World J. (2014)
National cryptography authority, SM2 elliptic curve public key cryptography algorithm, pp. 65–68 (2010). https://www.occa.gov.cn/sca/xwdt/2020-12/08/content_1060792.shtml
Wang, Z., Zhang, Z.: Overview on public key cryptographic algorithm SM2 based on elliptic curves. J. Inf. Secur. Res. 16(5), 12–17 (2016)
Wang, Z.H., Zhang, Z.F.: Overview of SM2 elliptic curve public key cryptography algorithm. Inf. Secur. Res. 2(11), 972–982 (2016)
Bai, L., Zhang, Y., Yang, G.: SM2 cryptographic algorithm based on discrete logarithm problem and prospect. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1294–1297 (2012)
Xia, X.: A survey on 5G network slicing enabling the smart grid. In: 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), pp. 911–916 (2019)
Hong, N., Zheng, X.: A security framework for internet of things based on sm2 cipher algorithm. In: 2013 International Conference on Computational and Information Sciences, pp. 13–16 (2013)
Guo, Q., Ke, Z., Wang, S., Zheng, S.: Persistent fault analysis against SM4 implementations in libraries crypto++ and GMSSL. IEEE Access 9, 63636–63645 (2021)
Jia, R., Xin, Y., Liu, B., Qin, Q.: Dynamic encryption and secure transmission of terminal data files. Comput. Mater. Continua 71(1), 1221–1232 (2022)
Li, L., Xu, C., Yu, X., Dou, B., Zuo, C.: Searchable encryption with access control on keywords in multi-user setting. J. Cyber Secur. 2(1), 9–23 (2020)
Ali, M., Xu, C., Hussain, A.: Authorized attribute-based encryption multi-keywords search with policy updating. J. New Media 2(1), 31–43 (2020)
Feng, T., Pei, H., Ma, R., Tian, Y., Feng, X.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua 66(1), 871–890 (2021)
Doss, S., Paranthaman, J., Gopalakrishnan, S., Duraisamy, A.: Memetic optimization with cryptographic encryption for secure medical data transmission in IoT-based distributed systems. Comput. Mater. Continua 66(2), 1577–1594 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, J., Wu, Q., Li, J., Li, J. (2022). Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_39
Download citation
DOI: https://doi.org/10.1007/978-3-031-06791-4_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06790-7
Online ISBN: 978-3-031-06791-4
eBook Packages: Computer ScienceComputer Science (R0)