Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Power service secure transmission method and system based on edge calculation

An edge computing and power business technology, applied in transmission systems, transmission monitoring, information technology support systems, etc., can solve problems such as low data security, optimize computing and communication resources, and improve confidentiality capacity and security.

Inactive Publication Date: 2021-06-18
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, the method and system for safe transmission of power services based on edge computing provided by the present invention overcomes the defect of low data security when the power terminal equipment offloads tasks to the edge computing server in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power service secure transmission method and system based on edge calculation
  • Power service secure transmission method and system based on edge calculation
  • Power service secure transmission method and system based on edge calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050]An edge computing-based secure power service transmission method provided by an embodiment of the present invention is suitable for 5G communication networks, such as figure 1 As shown, the method is based on the physical layer security policy system model of power Internet of Things edge computing, which consists of a business system layer, a base station equipped with a mobile edge computing server, multiple power terminal devices, and an eavesdropper. Such as figure 2 shown, including the following steps:

[0051] Step S1: According to the processing capability of the power terminal equipment, calculate the energy consumption of the power service for local computing and the energy consumption of safe offloading transmission offloaded to the mobile edge computing server.

[0052] In the embodiment of the present invention, each power terminal device needs to perform at least one task within a period of time, and its task can be represented by a binary parameter A=(I,...

Embodiment 2

[0092] An embodiment of the present invention provides a power service security transmission system based on edge computing. The system is based on a physical layer security policy system model of power Internet of Things edge computing. It consists of a business system layer, a base station equipped with a mobile edge computing server, and multiple A power terminal device and an eavesdropper, such as Figure 5 As shown, the system includes:

[0093] The energy consumption calculation module 1 is used to separately calculate the energy consumption of the power service for local calculation and the energy consumption of safe offloading transmission offloaded to the mobile edge computing server according to the processing capability of the power terminal equipment; this module executes the steps in Embodiment 1 The method described in S1 will not be repeated here.

[0094] The secrecy capacity calculation module 2 is used to calculate the secrecy capacity of the fading channel ...

Embodiment 3

[0099] An embodiment of the present invention provides a terminal, such as Image 6 As shown, it includes: at least one processor 401 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 403 , memory 404 , and at least one communication bus 402 . Wherein, the communication bus 402 is used to realize connection and communication between these components. Wherein, the communication interface 403 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 403 may also include a standard wired interface and a wireless interface. The memory 404 may be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 404 may also be at least one storage device located away from the aforementioned processor 401 . The processor 401 may execute the edge computing-based s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power service secure transmission method and system based on edge calculation. The method comprises the steps: taking the easy eavesdropping during data unloading and the limited processing resources of a power service terminal as consideration factors, According to the processing capability of power terminal equipment, carrying out the edge calculation; the method comprises the following steps: respectively calculating energy consumption of power service for local calculation and secure unloading transmission energy consumption unloaded to a mobile edge calculation server, introducing a Lagrange function based on a physical layer protection technology of main channel capacity and eavesdropping channel capacity, establishing a transmitting power utility function for secure unloading, introducing a KKT condition equation, and establishing a secure unloading transmission power utility function for secure unloading; by calculating the optimal solution, the local optimal task allocation quantity of the power terminal equipment and the optimal transmitting power for safe unloading are obtained, the safe transmission of the power service is completed, the calculation and communication resources of the power terminal equipment are optimized, and the secrecy capacity and the safety of the system are improved.

Description

technical field [0001] The present invention relates to the technical field of electric power wireless communication, in particular to a method and system for secure transmission of electric power services based on edge computing. Background technique [0002] With the development of wireless network technology, the demand for power services and network upgrades further drive the development of edge computing. Due to insufficient cloud computing capabilities, it cannot meet the explosive growth of massive data demand, and the sharp increase in transmission load leads to longer delays, which cannot meet Real-time requirements, due to the limited computing power and battery power of power terminal equipment, and as the complexity of access equipment increases, the resources of power terminal equipment are limited, and the data security and user privacy of power terminal equipment are also threatened. The problem of low data security when the device offloads tasks to the edge c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04B17/391H04B17/336H02J13/00
CPCH04L63/20H04L63/0414H04B17/3911H04B17/336H02J13/00006Y04S40/12Y04S40/20Y02E60/00
Inventor 吴鹏郭云飞姚继明金燊赵阳
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products