A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm

The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an e...

Full description

Bibliographic Details
Main Authors: Chengzhi Jiang, Chuanfeng Huang, Qiwei Huang, Jian Shi
Format: Article
Language:English
Published: MDPI AG 2021-09-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/13/9/1718
id doaj-5334e562811041bc9e15200189be15fb
record_format Article
spelling doaj-5334e562811041bc9e15200189be15fb2021-09-26T01:31:39ZengMDPI AGSymmetry2073-89942021-09-01131718171810.3390/sym13091718A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key AlgorithmChengzhi Jiang0Chuanfeng Huang1Qiwei Huang2Jian Shi3Nanjing Institute of Technology, Nanjing 211167, ChinaNanjing Institute of Technology, Nanjing 211167, ChinaNanjing Institute of Technology, Nanjing 211167, ChinaNanjing Zhiqing Information Technology Co., Ltd., Nanjing 210008, ChinaThe multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an environment. In order to ensure the security of multi-source data in the power monitoring networks, a security system for multi-source big data in power monitoring networks based on the adaptive combined public key algorithm and an identity-based public key authentication protocol is proposed. Based on elliptic curve cryptography and combined public key authentication, the mapping value of user identification information is used to combine the information in a public and private key factor matrix to obtain the corresponding user key pair. The adaptive key fragment and combination method are designed so that the keys are generated while the status of terminals and key generation service is sensed. An identification-based public key authentication protocol is proposed for the power monitoring system where the authentication process is described step by step. Experiments are established to validate the efficiency and effectiveness of the proposed system. The results show that the proposed model demonstrates satisfying performance in key update rate, key generation quantity, data authentication time, and data security. Finally, the proposed model is experimentally implemented in a substation power IoT environment where the application architecture and security mechanism are described. The security evaluation of the experimental implementation shows that the proposed model can resist a series of attacks such as counterfeiting terminal, data eavesdropping, and tampering.https://www.mdpi.com/2073-8994/13/9/1718combined public key algorithmelliptic curve cryptographypower monitoring networkmulti-source big datadata encryption
collection DOAJ
language English
format Article
sources DOAJ
author Chengzhi Jiang
Chuanfeng Huang
Qiwei Huang
Jian Shi
spellingShingle Chengzhi Jiang
Chuanfeng Huang
Qiwei Huang
Jian Shi
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
Symmetry
combined public key algorithm
elliptic curve cryptography
power monitoring network
multi-source big data
data encryption
author_facet Chengzhi Jiang
Chuanfeng Huang
Qiwei Huang
Jian Shi
author_sort Chengzhi Jiang
title A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
title_short A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
title_full A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
title_fullStr A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
title_full_unstemmed A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
title_sort multi-source big data security system of power monitoring network based on adaptive combined public key algorithm
publisher MDPI AG
series Symmetry
issn 2073-8994
publishDate 2021-09-01
description The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an environment. In order to ensure the security of multi-source data in the power monitoring networks, a security system for multi-source big data in power monitoring networks based on the adaptive combined public key algorithm and an identity-based public key authentication protocol is proposed. Based on elliptic curve cryptography and combined public key authentication, the mapping value of user identification information is used to combine the information in a public and private key factor matrix to obtain the corresponding user key pair. The adaptive key fragment and combination method are designed so that the keys are generated while the status of terminals and key generation service is sensed. An identification-based public key authentication protocol is proposed for the power monitoring system where the authentication process is described step by step. Experiments are established to validate the efficiency and effectiveness of the proposed system. The results show that the proposed model demonstrates satisfying performance in key update rate, key generation quantity, data authentication time, and data security. Finally, the proposed model is experimentally implemented in a substation power IoT environment where the application architecture and security mechanism are described. The security evaluation of the experimental implementation shows that the proposed model can resist a series of attacks such as counterfeiting terminal, data eavesdropping, and tampering.
topic combined public key algorithm
elliptic curve cryptography
power monitoring network
multi-source big data
data encryption
url https://www.mdpi.com/2073-8994/13/9/1718
work_keys_str_mv AT chengzhijiang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT chuanfenghuang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT qiweihuang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT jianshi amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT chengzhijiang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT chuanfenghuang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT qiweihuang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
AT jianshi multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm
_version_ 1716868766565924864