Paper
22 May 2023 Research on terminal security access of the power Internet of Things
Ning Xu, Shi Zhu, Haozhi Li, Yuxiang Zhang, Fuqiang Sun
Author Affiliations +
Proceedings Volume 12640, International Conference on Internet of Things and Machine Learning (IoTML 2022); 1264011 (2023) https://doi.org/10.1117/12.2673568
Event: International Conference on Internet of Things and Machine Learning (IoTML 2022), 2022, Harbin, China
Abstract
With the proposal of new power system, the construction of the power Internet of Things is also accelerating gradually. As an important equipment for collecting massive data, how to ensure the information security of the Internet of Things perception layer terminal has become an urgent problem to be solved. We proposed a secure access scheme for electric Internet of Things terminals, which includes three modules: secure SDK, terminal encryption management module and agent component. The secure SDK is used to realize terminal security encryption and decryption. The terminal encryption management module is mainly responsible for file and information management, and the agent component is mainly responsible for device configuration update. Based on this scheme, the terminal accesses the secure access gateway by changing device configuration information through the agent component, after the authentication of the unified password service platform is completed, the terminal encryption management module sends the digital certificate to the terminal remotely, the terminal establishes an encrypted transmission channel with secure access gateway through secure SDK to ensure the security of data transmission.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ning Xu, Shi Zhu, Haozhi Li, Yuxiang Zhang, and Fuqiang Sun "Research on terminal security access of the power Internet of Things", Proc. SPIE 12640, International Conference on Internet of Things and Machine Learning (IoTML 2022), 1264011 (22 May 2023); https://doi.org/10.1117/12.2673568
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet of things

Network security

Data transmission

Computer security

Symmetric-key encryption

Information security

Data communications

Back to Top