基于可信密码模块的电力物联网边缘侧信息安全传输方法
CSTR:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:


Information Security Transmission Method for Edge Side of Power IoT Based on Trusted Cryptographic Module
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    针对电力物联网边缘侧信息安全传输,提出基于可信密码模块的传输方法。构建SG-Edge可信边缘计算框架,实现在确保传输任务安全性约束条件下的信息传输执行效率优化。结合USBKey双因素、TCM认证机制,通过量化处理,度量信息传输信道安全性。通过多轮复合加密过程逆操作,生成可信密钥,保证无线信道互易性。计算初始相干时间,使得调整后的训练序列长度能够在相干时间段内完成数据安全传输。实验结果表明,该方法在12:00~21:00时间段内三相电流与实际数据仅存在最大为10、4和5 A的误差,相比于其他方法传输误差最小,说明使用该方法能够保护边缘侧信息传输安全。

    Abstract:

    A transmission method based on trusted cryptographic modules is proposed for secure information transmission on the edge side of the power IoT. The SG-Edge trusted edge computing framework is constructed to optimize the execution efficiency of information transmission under the constraint of ensuring the security of transmission tasks. By combining USBKey dual-factor and TCM authentication mechanisms, the security of the information transmission channel is measured through quantitative processing. Through multiple rounds of composite encryption process inverse operations, a trusted key is generated to ensure the reciprocity of wireless channels. The initial coherence time is calculated so that the adjusted training sequence length can complete secure data transmission within the coherence time period. The experimental results show that the method has errors of up to 10, 4, and 5 A between the three-phase current and actual data during the time period from 12:00 to 21:00. Compared with other methods, the transmission error is minimal, indicating that the use of this method can protect the security of information transmission on the edge side.

    参考文献
    相似文献
    引证文献
引用本文

孙艳玲.基于可信密码模块的电力物联网边缘侧信息安全传输方法[J].,2025,44(12).

复制
分享
相关视频

文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2024-10-18
  • 最后修改日期:2024-11-18
  • 录用日期:
  • 在线发布日期: 2025-12-29
  • 出版日期:
文章二维码