Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms

Authors

  • Xueqiong Zhu State Grid Jiangsu Electric Power Company Ltd. Research Institute, Jiangsu, China
  • Chengbo Hu State Grid Jiangsu Electric Power Company Ltd. Research Institute, Jiangsu, China
  • Yongling Lu State Grid Jiangsu Electric Power Company Ltd. Research Institute, Jiangsu, China
  • Zhen Wang State Grid Jiangsu Electric Power Company Ltd. Research Institute, Jiangsu, China
  • Hai Xue State Grid Jiangsu Electric Power Company Ltd. Research Institute, Jiangsu, China

DOI:

https://doi.org/10.4108/eetsis.v10i3.2970

Keywords:

bayesian network algorithms, power internet of things, lightweight encryption emulation, iot, cryptographic

Abstract

In the power system, the transmission and processing of information is a very important link, and the core part of it is electronic data, and the transmission and processing of electronic data is the most important link in the power system. Because information is continuously passed between network nodes, the security requirements for information are high. With the development of Internet technology, its application field has been widely expanded to various industries. Therefore, to better ensure power quality and improve network operation efficiency, it is necessary to rationally and effectively manage the entire communication system. Power Internet of Things technology combines information transmission and processing links and realizes data sharing between various communication nodes in the entire network system through intelligent management, thereby improving overall information security. This paper first introduces the research of Bayesian network algorithm, then studies the process of lightweight encryption implementation of power Internet of Things, and then simulates and compares various encryption algorithms to obtain the best encryption scheme, and finally verifies through simulation that the algorithm can effectively ensure the safe transmission of information and improve the efficiency of network operation.

References

Guoliang LI,Lining XING,Zhongshan ZHANG,Yingwu CHEN. "A New Bayesian Network Structure Learning Algorithm Mechanism Based on the Decomposability of Scoring Functions[J]." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2017(7):14-17

Suzhen Li. "Bayesian network algorithms used in the assessment of learners' learning behaviour[J]." International Journal of Continuing Engineering Education and Life-Long Learning,2021(3):31-33

Diego Oliva,Marcella S.R. Martins,Valentín Osuna-Enciso,et al. "Combining information from thresholding techniques through an evolutionary Bayesian network algorithm[J]." Applied Soft Computing Journal,2020(3):90-93

Mortazavi Amin,Rashidi Amir,Ghaderi-Zefrehei Mostafa,et al. "WITHDRAWN:Identification of bovine uterine transcriptomic hub genes using Bayesian network algorithms.[J]. "Asian-Australasian journal of animal sciences,2019:21-25

Wang Chuanlong,Jin Yahong,Zhang Ruiting,et al. "Tunable ultraviolet-B full-spectrum delayed luminescence of bismuth-activated phosphors for high-secure data encryption and decryption[J]." Journal of Alloys and Compounds,2022:902-904

Wu Lizhi,Guan Jinlan. "Application of Data Encryption Technology in Computer Network Security[J]." International Journal of Computational and Engineering,2021(1):6-11

Lanlan Yin,Feng Mo,Qiming Wu,et al. "Research on Application of Data Encryption in Computer Network Security[C]//."Proceedings of the 11th International Conference on Computer Engineering and Networks(CENet2021)Part I.,2021:706-713

Srivastava, Gautam,Kumar, et al."Two-stage data encryption using chaotic neural networks[J]."JOURNAL OF INTELLIGENT & FUZZY SYSTEMS,2020:2561-2568

Gonzalez-Gil, Pedro,Antonio Martinez, et al."Lightweight Data-Security Ontology for IoT[J]."SENSORS,2020:24-27

Tu T. Vo,Ngoc T. Luong,Doan Hoang. "MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network[J]." Wireless Networks,2019(7):25-27

Adwan Yasin,Abdelmunem Abuhasan. "Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).[J]." Int. Arab J. Inf. Technol.,2018(6):15-16

Guo Huiping,Li Hongru. "An efficient Bayesian network structure learning algorithm using the strategy of two-stage searches[J]." Intelligent Data Analysis,2020(5):24

D. Jerusha,T. Jaya. "Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing[J]." COMPUTER SYSTEMS SCIENCE AND ENGINEERING,2022(3):42-44

Tanh Nguyen Van,Tri Ngo Quang,Giang Nguyen Linh,Duy Tien-Le. "A Solution to Improve the Security of the Internet of Things Network with Lightweight Encryption Methods[J]." Journal of Physics: Conference Series,2021(1):1933

Pejman Panahi,Cüneyt Bayılmış,Unal Çavuşoğlu,et al. "Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications[J]." Arabian Journal for Science and Engineering,2021:18-20

Henschen L,Lee J. "A Very Lightweight Encryption Method Based on Multiple Substitution Tables[J]. "Journal of Physics: Conference Series,2021(1):1828-1830

Bo-fan GONG. "Hybrid Compression and Lightweight Encryption of Color Image[C]//".Proceedings of 2020 5th International Conference on Multimedia Systems and Signal Processing(ICMSSP 2020).,2020:38-41

Amna Shifa,Muhammad Babar Imtiaz,Mamoona Naveed Asghar,et al. "Skin detection and lightweight encryption for privacy protection in real-time surveillance applications[J]." Image and Vision Computing,2020,94-96

Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas, "Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications", Complexity, vol. 2021, Article ID 5540296, 13 pages, 2021.

Sunil Kumar et al., “A Survey of Lightweight Cryptography for Power-Constrained IoT Devices: Security Challenges and Issues,” Green Engineering and Technology, 1st Edition, 2021.

Gookyi, D.A.N.; Ryoo, K. A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices. Sensors 2022, 22, 3004.

Runa Chatterjee et al., “Design of Lightweight Cryptographic Model for End-to-End Encryption in IoT Domain” J. Sustain. Wireless Syst. Vol.01/ No. 04 Pages: 215-224

Bora Aslan, Füsun Yavuzer Aslan, M. Tolga Sakallı, "Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications", Security and Communication Networks, vol. 2020,2020.

Y. Zhang, Y. Shen, H. Wang, J. Yong and X. Jiang, "On Secure Wireless Communications for IoT Under Eavesdropper Collusion," in IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp. 1281-1293, July 2016.

Y. Shen, T. Zhang, Y. Wang, H. Wang and X. Jiang, "MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation," in IEEE Communications Magazine, vol. 55, no. 9, pp. 86-93, Sept. 2017, doi: 10.1109/MCOM.2017.1700104.

J. Yin, M. Tang, J. Cao, M. You, H. Wang and M. Alazab, "Knowledge-Driven Cybersecurity intelligence: Software Vulnerability Co-exploitation Behaviour Discovery," in IEEE Transactions on Industrial Informatics, 2022, doi: 10.1109/TII.2022.3192027.

You, M., Yin, J., Wang, H. et al. A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (2022).

Ge, YF., Orlowska, M., Cao, J. et al. MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. The VLDB Journal 31, 957–975 (2022).

Y. -F. Ge et al., "Distributed Memetic Algorithm for Outsourced Database Fragmentation," in IEEE Transactions on Cybernetics, vol. 51, no. 10, pp. 4808-4821, Oct. 2021, doi: 10.1109/TCYB.2020.3027962.

Downloads

Published

29-03-2023

How to Cite

1.
Zhu X, Hu C, Lu Y, Wang Z, Xue H. Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms. EAI Endorsed Scal Inf Syst [Internet]. 2023 Mar. 29 [cited 2024 May 6];10(4):e1. Available from: https://publications.eai.eu/index.php/sis/article/view/2970

Funding data