Skip to main content

A Secure and Trustable Access Method of Power Business in 5G Networks

  • Conference paper
  • First Online:
Simulation Tools and Techniques (SIMUtools 2020)

Abstract

The 5G power network has gradually adopted mobile terminal access to access the network to manage business. With the continuous expansion of access terminal scale, if the attacker impersonates the terminal or hijack the terminal to attack the master server, it will cause serious consequences. Therefore, this paper proposes a lightweight and efficient terminal secure and trustable access method in 5G power business network. Considering the core idea of security stratification and network special, we design a three-layer security access architecture to ensure the security of terminals in the access process and data protection process. Then, we propose a lightweight secure certification method for large-scale terminal accessing power network. The simulation results show that the proposed method can reduce the communication overhead and provide good security when massive terminals accessing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Y., Yang, W., Shang, X., Hu, J., Huang, Y., Cai, Y.: Energy-efficient secure transmission for wireless powered internet of things with multiple power beacons. IEEE Access 6, 75086–75098 (2018)

    Article  Google Scholar 

  2. Liming, C., Xuzhu, D., Baoren, C., Jin, L., Qiqi, W.: Reliability enhancement of public wireless communication for remote control services in power distribution in smart grid. In: Proceedings of CICED’18, pp. 1700–1704 (2018)

    Google Scholar 

  3. Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)

    Article  Google Scholar 

  4. Guo, S., Hu, X., Zhou, Z., Wang, X., Qi, F., Gao, L.: Trust access authentication in vehicular network based on blockchain. China Commun. 16(6), 18–30 (2019)

    Article  Google Scholar 

  5. Lubega, P., Ssettumba, T., Nabuuma, H., Serugunda,J.: A secure energy efficient multi-user selection scheme for SWIPT wireless IoT networks in the presence of cooperative jamming. In: Proceedings of TELFOR’19, pp. 1–4 (2019)

    Google Scholar 

  6. Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)

    Article  MathSciNet  Google Scholar 

  7. Chaudhry, S.A., Alhakami, H., Baz, A., Al-Turjman, F.: Securing demand response management: a certificate-based access control in smart grid edge computing infra-structure. IEEE Access 8, 101235–101243 (2020)

    Article  Google Scholar 

  8. Sha, K., Alatrash, N., Wang, Z.: A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 8(6), 2519–2531 (2017)

    Article  Google Scholar 

  9. Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)

    Article  MathSciNet  Google Scholar 

  10. Navya, M., Sanjay, H.A., Deepika, K.: Securing smart grid data under key exposure and revocation in cloud computing. In: Proceedings of I4C’18, pp. 1–4 (2018)

    Google Scholar 

  11. Chekired, D., Khoukhi, L., Mouftah, H.: Decentralized cloud-SDN architecture in smart grid: A dynamic pricing model. IEEE Trans. Industr. Inf. 14(3), 1220–1231 (2018)

    Article  Google Scholar 

  12. W. Chen, B. Liu, H. Huang, et al. When UAV swarm meets edge-cloud computing: The QoS perspective, IEEE Network, 2019, 36–43

    Google Scholar 

  13. Liu, B., Jia, D., Wang, J., et al.: Cloud-assisted safety message dissemination in VANET–cellular heterogeneous wireless network. IEEE Syst. J. 11(1), 128–139 (2017)

    Article  Google Scholar 

  14. Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS One 13(5), 1–23 (2018)

    Google Scholar 

  15. Zhou, Y., Zhu, X.: Analysis of vehicle network architecture and performance optimization based on soft definition of integration of cloud and fog. IEEE Access 7(2019), 101171–101177 (2019)

    Article  Google Scholar 

  16. El-sayed, H., Sankar, S., Prasad, M., et al.: Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6, 1–12 (2018)

    Article  Google Scholar 

  17. Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 2017(220), 160–169 (2017)

    Article  Google Scholar 

  18. Zhang, K., Mao, Y., Leng, S., et al.: Mobile-edge computing for vehicular networks. IEEE Veh. Technol. Mag. 12, 36–44 (2017)

    Article  Google Scholar 

  19. Pu, L., Chen, X., Mao, G., et al.: Chimera: an energy-efficient and deadline-aware hybrid edge computing framework for vehicular crowdsensing applications. IEEE Internet of Things J. 6(1), 84–99 (2019)

    Article  Google Scholar 

  20. Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for industry 4.0 applications. IEEE Trans. Ind. Inf. 16(2), 1310–1320 (2020)

    Article  Google Scholar 

  21. Eldjali, C., Lyes, K.: Optimal priority-queuing for EV charging-discharging service based on cloud computing. In: Proceedings of the ICC’17, pp. 1–6 (2017)

    Google Scholar 

  22. Xie, R., Tang, Q., Wang, Q., et al.: Collaborative vehicular edge computing networks: architecture design and research challenges. IEEE Access 7(2019), 178942–178952 (2019)

    Article  Google Scholar 

  23. Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network se-lection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)

    Article  Google Scholar 

  24. Yang, Y., Niu, X., Li, L., et al.: A secure and efficient transmission method in connected vehicular cloud computing. IEEE Netw. 32, 14–19 (2018)

    Article  Google Scholar 

  25. Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things J. 3(6), 1437–1447 (2016)

    Article  Google Scholar 

  26. Kaur, K., Garg, S., Kaddoum, G., et al.: Demand-response management using a fleet of electric vehicles: an opportunistic-SDN-based edge-cloud framework for smart grids. IEEE Netw. 33, 46–53 (2019)

    Article  Google Scholar 

  27. Guo, H., Zhang, J., Liu, J.: FiWi-enhanced vehicular edge computing networks. IEEE Veh. Technol. Mag. 14, 45–53 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, H., Meng, F., Wang, D., Yang, Z. (2021). A Secure and Trustable Access Method of Power Business in 5G Networks. In: Song, H., Jiang, D. (eds) Simulation Tools and Techniques. SIMUtools 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-030-72792-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72792-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72791-8

  • Online ISBN: 978-3-030-72792-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics