Biblio
Filters: Author is Zhang, Tengyue [Clear All Filters]
Security Protection Technology of Electrical Power System Based on Edge Computing. 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA). :254—258.
.
2021. In this paper, we mainly introduce the security protection technology of smart grid based on edge computing and propose an edge computing security protection architecture based on multi-service flexible mechanism. Aiming at the real time requirements of heterogeneous energy terminal access and power edge computing business in multiple interactive environment, a real-time and strong compatibility terminal security access mechanism integrating physical characteristics and lightweight cryptographic mechanism is proposed. According to different power terminal security data requirements, the edge computing data transmission, processing security and privacy protection technology are proposed. In addition, in the power system of distribution, microgrid and advanced metering system, the application of edge computing has been well reflected. Combined with encryption technology, access authentication, the security defense of edge data, edge equipment and edge application is carried out in many aspects, which strengthens the security and reliability of business penetration and information sharing at the edge of power grid, and realizes the end-to-end and end-to-system security prevention and control of power grid edge computing.
Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise. 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS). :225–229.
.
2020. Internet of Things (IoT) enable information transmission and sharing among massive IoT devices. However, the key establishment and management in IoT become more challenging due to the low latency requirements and resource constrained IoT devices. In this work, we propose a practical physical layer based secret key sharing scheme for MIMO (multiple-input-multiple-output) IoT devices to reduce the communication delay caused by key establishment of MIMO IoT devices. This is because the proposed scheme attachs secret key sharing with communication simultaneously. It is achieved by the proposed MIMO self-injection AN (SAN) tranmsission, which is designed to deliberately maximum the receive SNR (signal to noise ratio) at different antenna of the legitimate IoT device, based on the value of secret key sharing to him. The simulation results verified the validity and security of the proposed scheme.