
Research Article
Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things
@INPROCEEDINGS{10.1007/978-3-030-94185-7_25, author={Hong Xu and Xin Sun and Jie-yao Ying and Qing-li Niu}, title={Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things}, proceedings={IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part I}, proceedings_a={IOTCARE}, year={2022}, month={6}, keywords={Power Internet of things Perception terminal Security monitoring system Data acquisition Security vulnerability}, doi={10.1007/978-3-030-94185-7_25} }
- Hong Xu
Xin Sun
Jie-yao Ying
Qing-li Niu
Year: 2022
Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things
IOTCARE
Springer
DOI: 10.1007/978-3-030-94185-7_25
Abstract
The information acquired by the traditional power Internet of Things sensing terminal monitoring system is not comprehensive, which leads to the long time needed to monitor the terminal security vulnerabilities. In order to solve this problem, this paper designs a new security monitoring system of power IOT sensing terminal. On the basis of the traditional system hardware design, the overall architecture of the system is designed by fully considering the security function of the power IOT sensing terminal. Then, the data of sensing terminal is collected at the monitored object end, and the data display module is designed. Then, the specific monitoring module is designed from three aspects of monitoring process, power Internet of things sensing terminal application, client and server, so as to realize the security monitoring of power Internet of things sensing terminal. In the experimental part, we design the vulnerability of the power IOT sensing terminal and the possible attack actions under the vulnerability. The results show that compared with the traditional system, the system in this paper needs less time to monitor the vulnerability of the power IOT sensing terminal.