A Multi-Level Hash-Based Data Integrity Verification and Traceability Scheme for Digital Transformation in Power IoT Networks
Abstract
This paper addresses the unique data security and real-time monitoring requirements in the digital transformation of electric power enterprises, and combines the development characteristics of smart grids to solve the challenges of data integrity verification and anomaly tracing in the electric power Internet of Things (IoT). It proposes a topology-integrated multi-level hash verification and tracing scheme. This method utilizes asymmetric encryption (RSA key generation algorithm KeyGen) and digital signature technology to design a tree-like network architecture (including terminal devices TD, relay devices RD, IoT gateways IoTG, and data servers DS). It employs a multi-level aggregated hash generation algorithm (MLHashGen) to achieve one-time verification of data across the entire network, and precisely locates tampered nodes through an anomaly tracing process. Experimental results show that at a terminal scale of t=300, the computational overhead is reduced to 142.3ms (a 63.3% reduction compared to traditional schemes), the communication overhead is 1,850KB (a 36.5% reduction), and the accuracy rate of anomaly localization reaches 96.5% with a tampering rate of 40% (with a false alarm rate of only 0.8%). The tracing delay of 18.7ms meets the real-time monitoring standards for electric power. This scheme effectively improves data processing efficiency and enterprise benefits. The core contribution lies in eliminating the third-party dependency risks (such as difficulties in defining responsibilities) of centralized systems, establishing a dynamic verification mechanism to block the spread of anomalies, and providing a practical technical framework for electric power enterprises. Future work will focus on optimizing the tracing delay issue in large-scale networks.DOI:
https://doi.org/10.31449/inf.v49i36.10475Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







