Application of Symmetric Key Algorithm in Data Security Design of Smart Grid

There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII) S. 143 - 147
Hauptverfasser: Zhang, Yifan, Yu, Chaoyu, Wang, Yuqiang, Han, Junfei, Zhong, Ming, An, Haijun, Yuan, Ningping
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 01.06.2023
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important link in network transmission. The input of data parties will not interfere with each other, which protects the privacy of users. The research purpose of this paper is the application of symmetric key algorithm in smart grid data security design. In the experiment, according to the symmetric key security evaluation index, using the run-length test and frequency test methods, the data security design of the symmetric key algorithm in the smart grid is analyzed, thereby proving the security of the symmetric key algorithm.
AbstractList There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important link in network transmission. The input of data parties will not interfere with each other, which protects the privacy of users. The research purpose of this paper is the application of symmetric key algorithm in smart grid data security design. In the experiment, according to the symmetric key security evaluation index, using the run-length test and frequency test methods, the data security design of the symmetric key algorithm in the smart grid is analyzed, thereby proving the security of the symmetric key algorithm.
Author Wang, Yuqiang
Han, Junfei
Zhang, Yifan
Yu, Chaoyu
An, Haijun
Zhong, Ming
Yuan, Ningping
Author_xml – sequence: 1
  givenname: Yifan
  surname: Zhang
  fullname: Zhang, Yifan
  email: zyf_dky@163.com
  organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China
– sequence: 2
  givenname: Chaoyu
  surname: Yu
  fullname: Yu, Chaoyu
  email: nmgdlycy@163.com
  organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China
– sequence: 3
  givenname: Yuqiang
  surname: Wang
  fullname: Wang, Yuqiang
  email: wyq622@163.com
  organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China
– sequence: 4
  givenname: Junfei
  surname: Han
  fullname: Han, Junfei
  email: hanjfly@sina.com
  organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China
– sequence: 5
  givenname: Ming
  surname: Zhong
  fullname: Zhong, Ming
  email: zhongming0005@163.com
  organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China
– sequence: 6
  givenname: Haijun
  surname: An
  fullname: An, Haijun
  email: tdtc_ahhaijun@163.com
  organization: Inner Mongolia Tianda Tiancai Information Technology Co., Ltd.,Hohhot,China
– sequence: 7
  givenname: Ningping
  surname: Yuan
  fullname: Yuan, Ningping
  email: 569125226@qq.com
  organization: Inner Mongolia Medical University,School of Computer Information,Hohhot,China
BookMark eNotjs1Kw0AURkfQhda-gci8QOKdmc7PXYZUazDiorouk-SmDuSPdFzk7S20qw8OnMP3wG6HcSDGngWkQgC-FPlnURTa4QZTCVKlAKDkDVujRac0KBAK7T0rs2nqQu1jGAc-tny_9D3FOdT8gxaedcdxDvG352HgWx8931P9dyYL39IpHC9K7-fId3NoHtld67sTra-7Yj9vr9_5e1J-7Yo8K5MgBMaktlYbkM7bxqGVUoGHyoADh8Z4bZX1Wnm0UKuKGmrQe1EZpHZjKiJj1Yo9XbqBiA7THM4PloMAqY1TUv0DxmNLPg
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICMIII58949.2023.00032
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350301397
EndPage 147
ExternalDocumentID 10256832
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-c7756028a7d8972230a0b60808966a5737a53a970c3beded9aa1b69ef46bee673
IEDL.DBID RIE
IngestDate Wed Oct 04 09:12:47 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-c7756028a7d8972230a0b60808966a5737a53a970c3beded9aa1b69ef46bee673
PageCount 5
ParticipantIDs ieee_primary_10256832
PublicationCentury 2000
PublicationDate 2023-June
PublicationDateYYYYMMDD 2023-06-01
PublicationDate_xml – month: 06
  year: 2023
  text: 2023-June
PublicationDecade 2020
PublicationTitle 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII)
PublicationTitleAbbrev ICMIII
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.833475
Snippet There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause...
SourceID ieee
SourceType Publisher
StartPage 143
SubjectTerms Application and Design
Data privacy
Data processing
Data security
Maintenance engineering
Mechatronics
Privacy
Smart Grid
Smart grids
Symmetric Key Algorithm
Title Application of Symmetric Key Algorithm in Data Security Design of Smart Grid
URI https://ieeexplore.ieee.org/document/10256832
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePCkYsU3OXiNJs1usjmW1uqilkIVeit5rS64u7Juhf57k3S1Xjx4C4EQmEwyM5n55gPgkhgjYqEjlChmkPOIMZJcE0SZwTSL-spkMpBN8Mkkmc_FtAWrByyMtTYUn9krPwy5fFPppf8qczfcGWingh3Q4ZytwVot6pdgcZ0OH9M0jRMReQRK37cuxZ5W5BdtSrAa491_7rcHehv8HZz-WJZ9sGXLA_Aw2OSaYZXB2aooPB2Whvd2BQdvL5WL818LmJdwJBsJZy0zHRyFIo2wpHCKAm_r3PTA8_jmaXiHWi4ElBMiGqQ5d75JP5HcJII7m44lVsy5e4mLV2TMKZcxlYJjTZU11ggpiWLCZhFT1jJOD0G3rEp7BKBOtLFCu9eFmkgJraSQihBupMd0xOIY9LwoFu_rdheLbymc_DF_Cna8tNf1U2eg29RLew629WeTf9QX4ZC-AIFVlGU
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5aBT2pWPFtDl5Xk83uZnMsrbVLHxRaobeS1-pCd1fqVui_N0lX68WDtxAIgckkM5OZbz4A7rFSLGQy8GIRKc94xMjjVGKPRAqRNPCFSrkjm6CjUTybsXENVndYGK21Kz7TD3bocvmqlCv7VWZuuDHQRgV3wV4YBD7awLVq3C9G7DFpD5MkCWMWWAyKb5uXIkss8os4xdmN7tE_dzwGzS0CD45_bMsJ2NHFKRi0ttlmWKZwss5zS4glYV-vYWvxWppI_y2HWQE7vOJwUnPTwY4r03BLcqMq8HmZqSZ46T5N2z2vZkPwMoxZ5UlKjXfix5yqmFFj1RFHIjIOX2wiFh5SQnlIOKNIEqGVVoxzLCKm0yASWkeUnIFGURb6HEAZS6WZNO8LUYFgUnDGBcZUcYvqCNkFaFpRzN83DS_m31K4_GP-Dhz0psPBfJCM-lfg0Ep-U011DRrVcqVvwL78rLKP5a07sC9qapes
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+Mechatronics%2C+IoT+and+Industrial+Informatics+%28ICMIII%29&rft.atitle=Application+of+Symmetric+Key+Algorithm+in+Data+Security+Design+of+Smart+Grid&rft.au=Zhang%2C+Yifan&rft.au=Yu%2C+Chaoyu&rft.au=Wang%2C+Yuqiang&rft.au=Han%2C+Junfei&rft.date=2023-06-01&rft.pub=IEEE&rft.spage=143&rft.epage=147&rft_id=info:doi/10.1109%2FICMIII58949.2023.00032&rft.externalDocID=10256832