Traditional data security transmission methods use single thread to write data,resulting in slow data transmission speed.In order to improve the efficiency of data transmission,a new method of data security transmission in power monitoring network based on embedded technology is designed.The data substitution is changed from single thread to multi-thread,and the byte substitution and displacement substitution are used to encrypt and decrypt the power monitoring network data in groups.Then,based on embedded technology,the data stream is reconstructed,and the encryption and decryption coefficients are set to verify the security and integrity of power monitoring network data.Finally,based on the extraction of hashing function value,an algorithm for secure data transmission in power monitoring network is designed.The comparative test results show that the embedded technology takes less time in data encryption,data transmission and data decryption than the traditional method,which shows that the method in this paper takes the shortest time and has the highest efficiency in data transmission.
Key words
embedded technology /
power monitoring network /
data security /
data transmission /
plaintext encryption
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
References
[1] 黄蓉.计算机网络安全与数据完整性技术探究[J].网络安全技术与应用,2021(4):57-58.
[2] 李潇.基于区块链的视频会议数据安全传输技术研究[J].自动化与仪器仪表,2021(8):18-22.
[3] 郝一诺,金梁,黄开枝,等.准静态场景下基于智能超表面的密钥生成方法[J].网络与信息安全学报,2021,7(2):77-85.
[4] 王龙翔,董凯,董小社,等.面向虚拟数据空间的轻量级安全传输方法[J].华中科技大学学报(自然科学版),2021,49(4):108-113.
[5] 刘高产.5G无线通信技术与网络安全研究[J].网络安全技术与应用,2021(2):70-71.
[6] 张海港.工业互联网垂直平台的信息安全保障体系构建[J].中国信息安全,2021(1):55-58.
[7] 杨郁.数据中心网络传输数据安全自动监测系统设计[J].自动化与仪器仪表,2020(12):103-106.
[8] 陈亚科.基于大数据的信息传输过程中数据安全性的研究[J].电子测量技术,2020,43(7):119-123.
[9] 李莹,余齐豪,余修武,等.遗传禁忌搜索的能量均衡深井安全监测WSN分簇路由算法[J].中国安全生产科学技术,2020,16(3):81-87.
[10] 吴雪松,李志.机载数传设备嵌入式应用软件的内存池设计[J].单片机与嵌入式系统应用,2020,20(3):12-15.
[11] 王军.网络数据动态传输与存储安全自动监测系统设计[J].自动化与仪器仪表,2020(1):70-73.
[12] 包晓安,李刚,文艺霏,等.基于压缩和差分算法的嵌入式平台远程更新设计与分析[J].浙江理工大学学报(自然科学版),2020,43(4):535-541.
[13] 张玉峰,任海英,何晓,等.船岸一体信息加密与传输安全技术研究[J].网络安全技术与应用,2019(9):29-30.
[14] 刘冬兰,刘新,陈剑飞,等.基于物理不可克隆函数的电网NB-IoT端到端安全加密方案[J].山东大学学报(工学版),2020,50(1):63-71.
[15] 张德胜.矿井移动数据监控系统设计[J].自动化与仪器仪表,2019(7):70-72,76.
[16] 郭亚中,肖全.面向交通专网节点升级的网络安全架构设计研究[J].信息安全研究,2019,5(7):639-643.