About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part I

Research Article

Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-94185-7_25,
        author={Hong Xu and Xin Sun and Jie-yao Ying and Qing-li Niu},
        title={Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things},
        proceedings={IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part I},
        proceedings_a={IOTCARE},
        year={2022},
        month={6},
        keywords={Power Internet of things Perception terminal Security monitoring system Data acquisition Security vulnerability},
        doi={10.1007/978-3-030-94185-7_25}
    }
    
  • Hong Xu
    Xin Sun
    Jie-yao Ying
    Qing-li Niu
    Year: 2022
    Design and Application of Security Monitoring System for Perception Terminal of Power Internet of Things
    IOTCARE
    Springer
    DOI: 10.1007/978-3-030-94185-7_25
Hong Xu1,*, Xin Sun2, Jie-yao Ying3, Qing-li Niu4
  • 1: School of Software, Zhengzhou University
  • 2: School of Electrical Engineering, Zhejiang University
  • 3: School of Software, Zhejiang University
  • 4: College of Information Engineering, Zhengzhou University of Science and Technology
*Contact email: xuhhhh06@outlook.com

Abstract

The information acquired by the traditional power Internet of Things sensing terminal monitoring system is not comprehensive, which leads to the long time needed to monitor the terminal security vulnerabilities. In order to solve this problem, this paper designs a new security monitoring system of power IOT sensing terminal. On the basis of the traditional system hardware design, the overall architecture of the system is designed by fully considering the security function of the power IOT sensing terminal. Then, the data of sensing terminal is collected at the monitored object end, and the data display module is designed. Then, the specific monitoring module is designed from three aspects of monitoring process, power Internet of things sensing terminal application, client and server, so as to realize the security monitoring of power Internet of things sensing terminal. In the experimental part, we design the vulnerability of the power IOT sensing terminal and the possible attack actions under the vulnerability. The results show that compared with the traditional system, the system in this paper needs less time to monitor the vulnerability of the power IOT sensing terminal.

Keywords
Power Internet of things Perception terminal Security monitoring system Data acquisition Security vulnerability
Published
2022-06-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-94185-7_25
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL