Application of Symmetric Key Algorithm in Data Security Design of Smart Grid
There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important...
Gespeichert in:
| Veröffentlicht in: | 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII) S. 143 - 147 |
|---|---|
| Hauptverfasser: | , , , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.06.2023
|
| Schlagworte: | |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important link in network transmission. The input of data parties will not interfere with each other, which protects the privacy of users. The research purpose of this paper is the application of symmetric key algorithm in smart grid data security design. In the experiment, according to the symmetric key security evaluation index, using the run-length test and frequency test methods, the data security design of the symmetric key algorithm in the smart grid is analyzed, thereby proving the security of the symmetric key algorithm. |
|---|---|
| AbstractList | There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause problems such as low security level, privacy leakage and high maintenance cost. Protecting the privacy and security of data is the most important link in network transmission. The input of data parties will not interfere with each other, which protects the privacy of users. The research purpose of this paper is the application of symmetric key algorithm in smart grid data security design. In the experiment, according to the symmetric key security evaluation index, using the run-length test and frequency test methods, the data security design of the symmetric key algorithm in the smart grid is analyzed, thereby proving the security of the symmetric key algorithm. |
| Author | Wang, Yuqiang Han, Junfei Zhang, Yifan Yu, Chaoyu An, Haijun Zhong, Ming Yuan, Ningping |
| Author_xml | – sequence: 1 givenname: Yifan surname: Zhang fullname: Zhang, Yifan email: zyf_dky@163.com organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China – sequence: 2 givenname: Chaoyu surname: Yu fullname: Yu, Chaoyu email: nmgdlycy@163.com organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China – sequence: 3 givenname: Yuqiang surname: Wang fullname: Wang, Yuqiang email: wyq622@163.com organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China – sequence: 4 givenname: Junfei surname: Han fullname: Han, Junfei email: hanjfly@sina.com organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China – sequence: 5 givenname: Ming surname: Zhong fullname: Zhong, Ming email: zhongming0005@163.com organization: Inner Mongolia Enterprise Key Laboratory of Smart Grid Simulation of Electrical Power System Inner Mongolia Power Research Institute,Hohhot,China – sequence: 6 givenname: Haijun surname: An fullname: An, Haijun email: tdtc_ahhaijun@163.com organization: Inner Mongolia Tianda Tiancai Information Technology Co., Ltd.,Hohhot,China – sequence: 7 givenname: Ningping surname: Yuan fullname: Yuan, Ningping email: 569125226@qq.com organization: Inner Mongolia Medical University,School of Computer Information,Hohhot,China |
| BookMark | eNotjs1Kw0AURkfQhda-gci8QOKdmc7PXYZUazDiorouk-SmDuSPdFzk7S20qw8OnMP3wG6HcSDGngWkQgC-FPlnURTa4QZTCVKlAKDkDVujRac0KBAK7T0rs2nqQu1jGAc-tny_9D3FOdT8gxaedcdxDvG352HgWx8931P9dyYL39IpHC9K7-fId3NoHtld67sTra-7Yj9vr9_5e1J-7Yo8K5MgBMaktlYbkM7bxqGVUoGHyoADh8Z4bZX1Wnm0UKuKGmrQe1EZpHZjKiJj1Yo9XbqBiA7THM4PloMAqY1TUv0DxmNLPg |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICMIII58949.2023.00032 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350301397 |
| EndPage | 147 |
| ExternalDocumentID | 10256832 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-c7756028a7d8972230a0b60808966a5737a53a970c3beded9aa1b69ef46bee673 |
| IEDL.DBID | RIE |
| IngestDate | Wed Oct 04 09:12:47 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-c7756028a7d8972230a0b60808966a5737a53a970c3beded9aa1b69ef46bee673 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10256832 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-June |
| PublicationDateYYYYMMDD | 2023-06-01 |
| PublicationDate_xml | – month: 06 year: 2023 text: 2023-June |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII) |
| PublicationTitleAbbrev | ICMIII |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.833475 |
| Snippet | There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 143 |
| SubjectTerms | Application and Design Data privacy Data processing Data security Maintenance engineering Mechatronics Privacy Smart Grid Smart grids Symmetric Key Algorithm |
| Title | Application of Symmetric Key Algorithm in Data Security Design of Smart Grid |
| URI | https://ieeexplore.ieee.org/document/10256832 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePCkYsU3OXiNJs1usjmW1uqilkIVeit5rS64u7Juhf57k3S1Xjx4C4EQmEwyM5n55gPgkhgjYqEjlChmkPOIMZJcE0SZwTSL-spkMpBN8Mkkmc_FtAWrByyMtTYUn9krPwy5fFPppf8qczfcGWingh3Q4ZytwVot6pdgcZ0OH9M0jRMReQRK37cuxZ5W5BdtSrAa491_7rcHehv8HZz-WJZ9sGXLA_Aw2OSaYZXB2aooPB2Whvd2BQdvL5WL818LmJdwJBsJZy0zHRyFIo2wpHCKAm_r3PTA8_jmaXiHWi4ElBMiGqQ5d75JP5HcJII7m44lVsy5e4mLV2TMKZcxlYJjTZU11ggpiWLCZhFT1jJOD0G3rEp7BKBOtLFCu9eFmkgJraSQihBupMd0xOIY9LwoFu_rdheLbymc_DF_Cna8tNf1U2eg29RLew629WeTf9QX4ZC-AIFVlGU |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5aBT2pWPFtDl5Xk83uZnMsrbVLHxRaobeS1-pCd1fqVui_N0lX68WDtxAIgckkM5OZbz4A7rFSLGQy8GIRKc94xMjjVGKPRAqRNPCFSrkjm6CjUTybsXENVndYGK21Kz7TD3bocvmqlCv7VWZuuDHQRgV3wV4YBD7awLVq3C9G7DFpD5MkCWMWWAyKb5uXIkss8os4xdmN7tE_dzwGzS0CD45_bMsJ2NHFKRi0ttlmWKZwss5zS4glYV-vYWvxWppI_y2HWQE7vOJwUnPTwY4r03BLcqMq8HmZqSZ46T5N2z2vZkPwMoxZ5UlKjXfix5yqmFFj1RFHIjIOX2wiFh5SQnlIOKNIEqGVVoxzLCKm0yASWkeUnIFGURb6HEAZS6WZNO8LUYFgUnDGBcZUcYvqCNkFaFpRzN83DS_m31K4_GP-Dhz0psPBfJCM-lfg0Ep-U011DRrVcqVvwL78rLKP5a07sC9qapes |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+Mechatronics%2C+IoT+and+Industrial+Informatics+%28ICMIII%29&rft.atitle=Application+of+Symmetric+Key+Algorithm+in+Data+Security+Design+of+Smart+Grid&rft.au=Zhang%2C+Yifan&rft.au=Yu%2C+Chaoyu&rft.au=Wang%2C+Yuqiang&rft.au=Han%2C+Junfei&rft.date=2023-06-01&rft.pub=IEEE&rft.spage=143&rft.epage=147&rft_id=info:doi/10.1109%2FICMIII58949.2023.00032&rft.externalDocID=10256832 |