典型文献
Security Protection Method of Energy Internet with Android
文献摘要:
As a product of the combination of information and energy technology,the energy internet is enormous and complex,and the absence of security safeguards at any aspect of it can cause incalculable damage.Aiming at the problems that Energy Internet terminals are difficult to be trusted and the integrity of massive terminals cannot be guaranteed,this paper designs and implements a set of comprehensive credibility measures and security protec-tion schemes,isolates various malicious operations,and ensures that the system is always in a credible state.Specifically,we de-velop a secure TF card control program in the Android terminal application layer to realize the overall security scheme.Experi-mental results prove that this security protection scheme can effec-tively detect illegal application packages in energy Internet termi-nal devices,resist malicious programs,and protect key data from theft at the same time,achieving security protection in the"thing-to-thing"interconnection scenario of the Energy Internet.
文献关键词:
中图分类号:
作者姓名:
ZHU Yayun;JIANG Lin;YUAN Anqi;YUAN Yinghao
作者机构:
China Electric Power Research Institute,Beijing 100192,China;School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,Hubei,China
文献出处:
引用格式:
[1]ZHU Yayun;JIANG Lin;YUAN Anqi;YUAN Yinghao-.Security Protection Method of Energy Internet with Android)[J].武汉大学自然科学学报(英文版),2022(01):11-16
A类:
incalculable
B类:
Security,Protection,Method,Energy,Internet,Android,product,combination,information,energy,technology,internet,enormous,complex,absence,security,safeguards,any,aspect,cause,damage,Aiming,problems,that,terminals,are,difficult,be,trusted,integrity,massive,cannot,guaranteed,this,paper,designs,implements,set,comprehensive,credibility,measures,schemes,isolates,various,malicious,operations,ensures,system,always,credible,state,Specifically,we,velop,secure,TF,card,control,application,layer,realize,overall,Experi,mental,results,prove,protection,effec,tively,detect,illegal,packages,devices,resist,programs,key,data,from,theft,same,achieving,thing,interconnection,scenario
AB值:
0.618576
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。