A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm
The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an e...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-09-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/13/9/1718 |
id |
doaj-5334e562811041bc9e15200189be15fb |
---|---|
record_format |
Article |
spelling |
doaj-5334e562811041bc9e15200189be15fb2021-09-26T01:31:39ZengMDPI AGSymmetry2073-89942021-09-01131718171810.3390/sym13091718A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key AlgorithmChengzhi Jiang0Chuanfeng Huang1Qiwei Huang2Jian Shi3Nanjing Institute of Technology, Nanjing 211167, ChinaNanjing Institute of Technology, Nanjing 211167, ChinaNanjing Institute of Technology, Nanjing 211167, ChinaNanjing Zhiqing Information Technology Co., Ltd., Nanjing 210008, ChinaThe multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an environment. In order to ensure the security of multi-source data in the power monitoring networks, a security system for multi-source big data in power monitoring networks based on the adaptive combined public key algorithm and an identity-based public key authentication protocol is proposed. Based on elliptic curve cryptography and combined public key authentication, the mapping value of user identification information is used to combine the information in a public and private key factor matrix to obtain the corresponding user key pair. The adaptive key fragment and combination method are designed so that the keys are generated while the status of terminals and key generation service is sensed. An identification-based public key authentication protocol is proposed for the power monitoring system where the authentication process is described step by step. Experiments are established to validate the efficiency and effectiveness of the proposed system. The results show that the proposed model demonstrates satisfying performance in key update rate, key generation quantity, data authentication time, and data security. Finally, the proposed model is experimentally implemented in a substation power IoT environment where the application architecture and security mechanism are described. The security evaluation of the experimental implementation shows that the proposed model can resist a series of attacks such as counterfeiting terminal, data eavesdropping, and tampering.https://www.mdpi.com/2073-8994/13/9/1718combined public key algorithmelliptic curve cryptographypower monitoring networkmulti-source big datadata encryption |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chengzhi Jiang Chuanfeng Huang Qiwei Huang Jian Shi |
spellingShingle |
Chengzhi Jiang Chuanfeng Huang Qiwei Huang Jian Shi A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm Symmetry combined public key algorithm elliptic curve cryptography power monitoring network multi-source big data data encryption |
author_facet |
Chengzhi Jiang Chuanfeng Huang Qiwei Huang Jian Shi |
author_sort |
Chengzhi Jiang |
title |
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm |
title_short |
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm |
title_full |
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm |
title_fullStr |
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm |
title_full_unstemmed |
A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm |
title_sort |
multi-source big data security system of power monitoring network based on adaptive combined public key algorithm |
publisher |
MDPI AG |
series |
Symmetry |
issn |
2073-8994 |
publishDate |
2021-09-01 |
description |
The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional security mechanism has to be adapted to such an environment. In order to ensure the security of multi-source data in the power monitoring networks, a security system for multi-source big data in power monitoring networks based on the adaptive combined public key algorithm and an identity-based public key authentication protocol is proposed. Based on elliptic curve cryptography and combined public key authentication, the mapping value of user identification information is used to combine the information in a public and private key factor matrix to obtain the corresponding user key pair. The adaptive key fragment and combination method are designed so that the keys are generated while the status of terminals and key generation service is sensed. An identification-based public key authentication protocol is proposed for the power monitoring system where the authentication process is described step by step. Experiments are established to validate the efficiency and effectiveness of the proposed system. The results show that the proposed model demonstrates satisfying performance in key update rate, key generation quantity, data authentication time, and data security. Finally, the proposed model is experimentally implemented in a substation power IoT environment where the application architecture and security mechanism are described. The security evaluation of the experimental implementation shows that the proposed model can resist a series of attacks such as counterfeiting terminal, data eavesdropping, and tampering. |
topic |
combined public key algorithm elliptic curve cryptography power monitoring network multi-source big data data encryption |
url |
https://www.mdpi.com/2073-8994/13/9/1718 |
work_keys_str_mv |
AT chengzhijiang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT chuanfenghuang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT qiweihuang amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT jianshi amultisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT chengzhijiang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT chuanfenghuang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT qiweihuang multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm AT jianshi multisourcebigdatasecuritysystemofpowermonitoringnetworkbasedonadaptivecombinedpublickeyalgorithm |
_version_ |
1716868766565924864 |