Skip to main content

Research on Network Optimization and Network Security in Power Wireless Private Network

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1415))

Included in the following conference series:

  • 930 Accesses

Abstract

With the explosive growth of communication demand, all kinds of services require higher and higher wireless communication indicators, and the power wireless private network and 4G public network are not enough to support the massive connection, bandwidth access and low delay service requirements in the unit area, and can not support the development of the power internet of things. On the basis of this situation, this paper puts forward planning research of technologies in power system, analyzes the requirements of network in detail, and the coverage and capacity planning of network. As an important infrastructure to support the development of power system, the network will greatly promote the development of energy Internet strategy, and will greatly promote and upgrade the power services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xia, X., Zhu, X., Mei, C., Li, W., Fang, H.: Research and practice on 5G slicing in power internet of things. Mobile Commun. 43(1), 63–69 (2019)

    Google Scholar 

  2. You, X.H., Pan, Z.W., Gao, X.Q., et al.: The 5G mobile communication: the development trends and its emerging key techniques. Sci. Sinica 44(5), 551 (2014)

    Google Scholar 

  3. Liu, G., Jiang, D.: 5G: vision and requirements for mobile communication system towards Year 2020. Chin. J. Eng. 2016, 1–8 (2016)

    Google Scholar 

  4. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, pp. 648–651. Hangzhou (2012). https://doi.org/10.1109/ICCSEE.2012.373.

  5. Gao, F., Zeng, R., Qu, L., et al.: Research on identification of concept and characteristics of energy internet. Electric Power 2018, 1–6 (2018)

    Google Scholar 

  6. Xu, X.: Time-sensitive network technology and its application in industrial network. Telecommun. Network Tech. 2018(5), 1–5 (2018)

    Google Scholar 

  7. Craciunas, S.S., Oliver, R.S.: Combined task and network-level scheduling for distributed time-triggered systems. Real-Time Syst. 52(2), 161–200 (2016)

    Article  Google Scholar 

  8. Sun, G.: Research and Simulation of clock synchronization and scheduling algorithm in time-sensitive Networks, Beijing University of Posts and Telecommunications (2018)

    Google Scholar 

  9. Li, B., Zhou, J., Ren, X.: Research on key issues of TD-LTE network optimization. Telecom Eng. Tech. Standard. 1, 57–61 (2015)

    Google Scholar 

  10. Bahnasse, A., Louhab, F.E., Oulahyane, H.A., et al.: Novel SDN architecture for smart MPLS Traffic Engineering-Diff Serv Aware management. Futur. Gener. Comput. Syst. 11(2), 212–219 (2018)

    Google Scholar 

  11. Zheng, L., Tse, D.N.C.: Diversity and multiplexing: a fundamental tradeoff in multiple antenna channels. IEEE Trans. Inform. Theory (2003)

    Google Scholar 

  12. Panda, M.: Performance analysis of encryption algorithms for security. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 278–284. Paralakhemundi (2016). https://doi.org/10.1109/SCOPES.2016.7955835.

  13. Gupta, C.P., Sharma, I.: A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds. In: 2013 Fourth International Conference on the Network of the Future (NoF), pp. 1–4. Pohang (2013). https://doi.org/10.1109/NOF.2013.6724526.

  14. Wang, K.: The application of the internet of things in the 5G era in the power system. Telecom Power Technol. 35(5), 187–188 (2018).

    Google Scholar 

  15. Ma, Z., Zhang, Z.Q., Ding, Z.G., et al.: Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci. China 58(4), 41301–41321 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Jy., Bi, Sy., Gong, Ll., Kong, Ww., Zhang, Xy. (2021). Research on Network Optimization and Network Security in Power Wireless Private Network. In: Tian, Y., Ma, T., Khan, M.K. (eds) Big Data and Security. ICBDS 2020. Communications in Computer and Information Science, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-3150-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3150-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3149-8

  • Online ISBN: 978-981-16-3150-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics