scholarly journals Lightweight Data Security Protection Method for AMI in Power Internet of Things

2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Wenqian Jiang ◽  
Zhou Yang ◽  
Zhenglei Zhou ◽  
Jueyu Chen

Aiming at the security problems caused by the access of a large number of new advanced metering system (AMI) equipment and the rapid growth of new business data interaction volume and interaction frequency, a lightweight data security protection method for power Internet of things (IoT) is proposed. Firstly, based on the “cloud-edge-end” AMI system architecture, a multilevel anonymous authentication method is proposed to reduce the complexity of low-end equipment access without reauthentication when smart meters and other devices access the system. Then, when fully homomorphic encryption is used for data encryption transmission, the lightweight packet recombination protocol is introduced, the lightweight hash function is used to reduce the calculation cost, and the sliding address window mechanism is used to reduce the packet loss rate. Finally, improved secure multiparty computing (SMPC) is used to achieve frequency hopping data aggregation, using shared key to calculate local shared value for key update, reducing data interaction between massive devices and AMI cloud security server, and improving broadband utilization in data aggregation process. The experiment results indicate that the proposed method obtained better utilization in bandwidth and shorter average data collection completion time. Besides, the proposed method can ensure the information security in the interaction process.

2018 ◽  
Vol 14 (11) ◽  
pp. 40
Author(s):  
Bohua Guo ◽  
Yanwu Zhang

<p class="0abstract"><span lang="EN-US">To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new scheme is put forward based on the privacy protection of polynomial regression and the privacy protection method based on the homomorphic encryption. The polynomial data aggregation (PRDA+) protocol is also proposed. In this scheme, the node and the base station will pre-deploy a secret key, and the random number generator encrypts the random number for the seed through the private key, which protects the privacy of the data. Then, by comparing the decrypted aggregate data through the correlation between the two metadata, the integrity protection of the data is realized. A weighted average aggregation scheme that can be verified is proposed. In view of the different importance of user information, the corresponding weights are set for each sensor node. EL Gamal digital signature is used to authenticate sensor nodes. The results show that the signature verification algorithm enables the scheme to resist data tampering and data denial, and to trace the source of erroneous data.</span></p>


2020 ◽  
Vol 16 (3) ◽  
pp. 155014772091100
Author(s):  
Yuan Gao ◽  
Hequn Xian ◽  
Aimin Yu

Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications. In order to ensure data security for deduplication, different data should be assigned with different privacy levels. We propose a deduplication scheme based on threshold dynamic adjustment to ensure the security of data uploading and related operations. The concept of the ideal threshold is introduced for the first time, which can be used to eliminate the drawbacks of the fixed threshold in traditional schemes. The item response theory is adopted to determine the sensitivity of different data and their privacy score, which ensures the applicability of data privacy score. It can solve the problem that some users care little about the privacy issue. We propose a privacy score query and response mechanism based on data encryption. On this basis, the dynamic adjustment method of the popularity threshold is designed for data uploading. Experiment results and analysis show that the proposed scheme based on threshold dynamic adjustment has decent scalability and practicability.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiayong Zhong ◽  
Xiaofu Xiong

The existing cloud storage methods cannot meet the delay requirements of intelligent devices in the power distribution Internet of Things (IoT), and it is difficult to ensure the data security in the complex network environment. Therefore, a data Security Storage method for the power distribution IoT is proposed. Firstly, based on the “cloud tube edge end” power distribution IoT structure, a cloud edge collaborative centralized distributed joint control mode is proposed, which makes full use of the collaborative advantages of cloud computing and edge computing to meet the real-time requirements. Then, a distributed data storage method based on the Kademlia algorithm is proposed, and the homomorphic encryption and secret sharing algorithm are used to store the data in the cloud as ciphertext and perform data query directly on the ciphertext. Finally, considering the heterogeneity of edge nodes, the security protection model of edge nodes based on noncooperative differential game is established, and the algorithm of optimal defense strategy of edge nodes is designed to ensure the security of edge nodes. The experimental results show that the proposed method obtained excellent query performance, and the ability to resist network attacks is better than other comparison methods. It can reduce the data storage and query delay and ensure the data security of the system.


Author(s):  
Remigius Chidiebere Diovu ◽  
John Terhile Agee

In a secured smart grid AMI environment, congestion management during data aggregation with security encryption for privacy preservation is a challenging issue. By introducing data communication network schemes into the Advanced Metering Infrastructure (AMI), network traffic congestion and service rates can be improved while preserving user’s privacy from the grid operator’s end. In this paper, a resilient architecture called Ring Triangulation Communication Architecture (RTCA) for data aggregation and user privacy protection is proposed. To preserve privacy as well as reducing traffic congestion in the architecture, DMF homomorphic encryption algorithms were formulated for local concentrators while using a global concentrator to check for anomalies in the AMI server clusters. With TCP/IP protocol and IEEE 802.11 MAC/PHY on the network, TCP message flooding was contextualized for congestion scenario. Stochastic TCP congestion management schemes with wired equivalent privacy (WEP) and the Data Minimizing Function (DMF) scheme were compared. Our proposed architecture significantly reduced transmission congestion and cryptographic overheads incurred during message aggregation. The results of the performance of the DMF Homomorphic encryption scheme incorporated into our proposed architecture for the SG AMI were discussed. These include service rate and other QoS metrics which are negatively affected by a congestive network condition.Keywords: Advanced Metering Infrastructure (AMI), Data Minimizing Function (DMF), Ring Triangulation Communication Architecture (RTCA), Data Aggregation, Smart Grid (SG), Smart Meter (SM).


Author(s):  
Lujain S. Abdulla ◽  
Musaria K. Mahmood ◽  
Abbas F. Salih ◽  
Sulaiman M. Karim

A large number of sensors and intelligent devices are interconnected via the internet to collect data as part of the internet of things (IoT) applications. Data security is one of the important challenges for these applications due to vulnerability of the internet. IoT devices limiting factors, such as delay-sensitivity, restricted memory, and low computing capability, make choosing the appropriate data encryption standard extremely important. The current research focuses on evaluating four data security, block cipher standards for the IoT smart home application. Considering the encryption/decryption speed, DES, TDES, AES, and SAFER+ standards are evaluated by implementing the algorithms with MATLAB to determine the best security solution. The simulation of the four standards shows the superiority of SAFER+ standard in term of encryption speed compared to others added to its capabilities on security, and software implementation opportunity. The use of classical symmetric key standards for real time data security in the IoT application can be validated through the selection of SAFER+.


2021 ◽  
pp. 1-11
Author(s):  
Lin Tang

In order to overcome the problems of high data storage occupancy and long encryption time in traditional integrity protection methods for trusted data of IOT node, this paper proposes an integrity protection method for trusted data of IOT node based on transfer learning. Through the transfer learning algorithm, the data characteristics of the IOT node is obtained, the feature mapping function in the common characteristics of the node data is set to complete the classification of the complete data and incomplete data in the IOT nodes. The data of the IOT nodes is input into the data processing database to verify its security, eliminate the node data with low security, and integrate the security data and the complete data. On this basis, homomorphic encryption algorithm is used to encrypt the trusted data of IOT nodes, and embedded processor is added to the IOT to realize data integrity protection. The experimental results show that: after using the proposed method to protect the integrity of trusted data of IOT nodes, the data storage occupancy rate is only about 3.5%, the shortest time-consuming of trusted data encryption of IOT nodes is about 3 s, and the work efficiency is high.


2013 ◽  
Vol 416-417 ◽  
pp. 1466-1469
Author(s):  
Fu Zhao Sun

Internet of Things has received more and more attention, due to a wide range of potential applications. In this paper, we propose a secure data aggregation framework for the Internet of Things. It is based on fully homomorphic encryption. Moreover, this is a form of encryption where any specific algebraic operation performed on the raw sensor data is equivalent to the same algebraic operation performed on the cryptographic sensor data.


2018 ◽  
Vol 5 (1) ◽  
pp. 44-51
Author(s):  
"Mustafa Abdalrassual Jassim

"Homomorphic encryption technique is latest development in the field of data encryption. The replacement algorithm is taking part in this technique. In this paper, this technique is used for security of patient’s medical record on cloud. Proposed technique besides data security, stores and retrieves cloud data is very fast. Paper proposes a model and encryption techniques with analysis before conclusion.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Sign in / Sign up

Export Citation Format

Share Document