Research Article
Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms
@ARTICLE{10.4108/eetsis.v10i3.2970, author={Xueqiong Zhu and Chengbo Hu and Yongling Lu and Zhen Wang and Hai Xue}, title={Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms}, journal={EAI Endorsed Transactions on Scalable Information Systems}, volume={10}, number={4}, publisher={EAI}, journal_a={SIS}, year={2023}, month={3}, keywords={bayesian network algorithms, power internet of things, lightweight encryption emulation, iot, cryptographic}, doi={10.4108/eetsis.v10i3.2970} }
- Xueqiong Zhu
Chengbo Hu
Yongling Lu
Zhen Wang
Hai Xue
Year: 2023
Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms
SIS
EAI
DOI: 10.4108/eetsis.v10i3.2970
Abstract
In the power system, the transmission and processing of information is a very important link, and the core part of it is electronic data, and the transmission and processing of electronic data is the most important link in the power system. Because information is continuously passed between network nodes, the security requirements for information are high. With the development of Internet technology, its application field has been widely expanded to various industries. Therefore, to better ensure power quality and improve network operation efficiency, it is necessary to rationally and effectively manage the entire communication system. Power Internet of Things technology combines information transmission and processing links and realizes data sharing between various communication nodes in the entire network system through intelligent management, thereby improving overall information security. This paper first introduces the research of Bayesian network algorithm, then studies the process of lightweight encryption implementation of power Internet of Things, and then simulates and compares various encryption algorithms to obtain the best encryption scheme, and finally verifies through simulation that the algorithm can effectively ensure the safe transmission of information and improve the efficiency of network operation.
Copyright © 2023 Xueqiong Zhu et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NCSA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.