skip to main content
10.1145/3674225.3674334acmotherconferencesArticle/Chapter ViewAbstractPublication PagespeaiConference Proceedingsconference-collections
research-article

Research on Anti Tampering Storage of Distributed Data in Power Grid for Side Channel Attacks

Published: 31 July 2024 Publication History

Abstract

In response to the risk of side channel attacks and the need for data tamper prevention in distributed data storage systems in power grids, a research on side channel attack oriented distributed data tamper prevention storage in power grids is proposed. In order to defend against side channel attacks, a sliding window segmentation method is used to extract key features of distributed storage data in the power grid, and matching measures are calculated to extract key features of distributed data in the power grid. By using the improved MD5 algorithm to calculate the fine-grained data in the core nodes of distributed data encryption in the power grid, the approved re encryption standards are set by the improved MD5 algorithm, and the encryption distance of distributed data in the power grid is adjusted. After completing the above operations, the deep learning structure can be embedded into the initial encryption program to achieve a bidirectional overlap relaxation encryption process, and ultimately achieve tamper proof storage of distributed data in the power grid. The experimental results show that the method proposed in this paper has a high success rate in anti tampering of distributed data in the power grid, and a shorter time consumption for anti tampering storage.

References

[1]
Bhattacharya P, Ghafouri M, Soeanu A, Security enhancement of time synchronization and fault identification in WAMS using a two-layer blockchain framework [J]. Applied Energy, 2022, 315(1): 1-15.
[2]
Pinthurat W, Hredzak B. Fully Decentralized Control Strategy for Heterogeneous Energy Storage Systems Distributed in Islanded DC Datacentre Microgrid [J]. Energy, 2021, 231(11): 1-10.
[3]
Xiang X, Cao J. An efficient authenticated key agreement scheme supporting privacy-preservation for smart grid communication [J]. Electric Power Systems Research, 2022, 203:107630-. 203(2): 1-10.
[4]
Kim Y, Back J, Kim J. A Tamper-Resistant Algorithm Using Blockchain for the Digital Tachograph [J]. Electronics, 2021 (5): 1-10.
[5]
Zuo H, Teng Y, Cheng S, Distributed multi-energy storage cooperative optimization control method for power grid voltage stability enhancement [J]. Electric Power Systems Research, 2023, 34(7): 1-17.
[6]
Muniraj A, Jeyaswamidoss J E. An enhanced Gray Wolf Optimization for cluster head selection in wireless sensor networks [J]. International journal of communication systems, 2022, 35(1): 1-15.
[7]
Mohammed F A B, Mekky N, Suleiman H H, Sectored LEACH (S-LEACH): An enhanced LEACH for wireless sensor network [J]. IET wireless sensor systems, 2022, 12(2): 56-66.
[8]
Yang J, Chen J, Huo Y, A Novel Cluster-Based Wireless Sensor Network Reliability Model Using the Expectation Maximization Algorithm [J]. Journal of Sensors, 2021 (2): 1-13.
[9]
Hameed M K, Idrees A K .Sensor Device Scheduling based Cuckoo Algorithm (SeDeSCA) for Enhancing Lifetime of Cluster based Wireless Sensor Networks [J]. International Journal of Computer Applications in Technology, 2021, 68(1): 58-65.
[10]
Nabavi S R, Moghadam V O, Hendi M Y F, Optimal Selection of the Cluster Head in Wireless Sensor Networks by Combining the Multiobjective Genetic Algorithm and the Gravitational Search Algorithm [J]. Journal of Sensors, 2021 (10): 1-16.

Index Terms

  1. Research on Anti Tampering Storage of Distributed Data in Power Grid for Side Channel Attacks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PEAI '24: Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence
    January 2024
    969 pages
    ISBN:9798400716638
    DOI:10.1145/3674225
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    PEAI 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 13
      Total Downloads
    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media