Font Size: a A A

Research On Security Monitoring And Protection Technology Of Full Service Ubiquitous Power Internet Of Things Terminal Layer

Posted on:2022-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:C C YangFull Text:PDF
GTID:2492306338474144Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the continuous improvement of smart grid,Internet of things technology is gradually applied in all aspects of smart grid operation.However,the openness of the network also brings great risks to the preservation and transmission of full-service ubiquitous power Internet of things.Cryptographic technology is an important scientific way to ensure information security at this stage,and the terminal block cipher algorithm used is the mainstream cipher algorithm to ensure safe and efficient transmission,so as to ensure information security.After deeply analyzing the present algorithm and synthesizing the SPN structure,this paper constructs a new block cipher algorithm m-present,which uses 64 bit permutation layer in the algorithm.For the algorithm,the key length is set to 80 bits.After security research,the whole algorithm has excellent advantages in resisting differential analysis,linear analysis and other fields,and has strong security.This also shows that the proposed P replacement layer is scientific and reasonable.At the same time,the design of the whole replacement layer gives a new idea for the subsequent design of all kinds of replacement layers.Secondly,in terms of software and hardware implementation efficiency,the software implementation of m-present algorithm is similar to that of present algorithm,and the hardware implementation efficiency is higher than that of most lightweight ciphers.In this study,a kind of lightweight hash function HVH is established,which focuses on the use of the sponge iterative structure,and the compression function is VH type algorithm.After the efficiency test of hash function,the final data show that the software efficiency of hvh-88 is 1.47mb/s,the efficiency of normal RFID environment is 10 times of that of spongent-88,and the hardware completion requirement of hvh-88 is 1129ge,which is consistent with that of spongent-88.Linear analysis,differential analysis and anti-collision analysis show that the HVH can meet the safety requirements of the original design.
Keywords/Search Tags:Full Service Ubiquitous Power Internet of Things, Terminal security protection, Lightweight block cipher algorithm
PDF Full Text Request
Related items