2020
DOI: 10.1177/1550147720968458
|View full text |Cite
|
Sign up to set email alerts
|

Research on information security of users’ electricity data including electric vehicle based on elliptic curve encryption

Abstract: In the smart grid and big data environment, accurate and large amount of power load data for users can be obtained with the wide application of non-intrusive load monitoring technology. In the research process of customers’ information, information security protection of users’ electricity data has become a research hotspot urgently. This article proposes a new type of load decomposition method for electric vehicle load information and compares it with hidden Markov model algorithm to verify its accuracy. On t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…It has the advantages of high security and fast decryption speed. [5] The ECC has the highest bit intensity in the current asymmetric encryption algorithm. [6] Compared with the RSA , the ECC can achieve the same degree of security using a shorter key.…”
Section: Elliptic Curve Cryptosystemmentioning
confidence: 99%
“…It has the advantages of high security and fast decryption speed. [5] The ECC has the highest bit intensity in the current asymmetric encryption algorithm. [6] Compared with the RSA , the ECC can achieve the same degree of security using a shorter key.…”
Section: Elliptic Curve Cryptosystemmentioning
confidence: 99%
“…In order to adapt to the Internet of vehicles data access scenario, secure, efficient, and flexible sharing should be ensured under the requirements of complex access sets and diversified access subjects. The process of data sharing in a blockchain is based on this [24,25]. The attack types of Internet of vehicles nodes include information tampering attack, Sybil attack, packet replay attack, denial of service attack, etc.…”
Section: Data Risk Forecast Model Of Electric Vehicle Internet Of Veh...mentioning
confidence: 99%
“…The AES and RSA hybrid encryption algorithm is used to encrypt vehicle information, realize the concealment of vehicle information. On the basis of the original remote monitoring system for hazardous chemicals transport vehicles (Hazardous chemicals vehicle networking), according to the project's requirements for vehicle information encryption, using information encryption technology, the key information of the Internet of Vehicles is encrypted and transmitted, in order to achieve the purpose of information security of the Internet of Vehicles for hazardous chemicals [1].…”
Section: Introductionmentioning
confidence: 99%