{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:44Z","timestamp":1750220264558,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"DOI":"10.1145\/3524304.3524324","type":"proceedings-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T16:13:59Z","timestamp":1654532039000},"page":"129-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Trusted connection architecture of electric IoT"],"prefix":"10.1145","author":[{"given":"Jin","family":"Peng","sequence":"first","affiliation":[{"name":"Beijing university of technology, China"}]},{"given":"Zhenhu","family":"Ning","sequence":"additional","affiliation":[{"name":"Beijing university of technology, China"}]},{"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[{"name":"Beijing university of technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2960440"},{"key":"e_1_3_2_1_2_1","first-page":"37","article-title":"Power Internet of Things Security Analysis and National Secret Algorithm Application","author":"Xinyu Xiang","year":"2021","unstructured":"Xiang Xinyu , Yao Haiyan , Yu Zhiyuan , Hui Yixuan , and Wang Dejun , \" Power Internet of Things Security Analysis and National Secret Algorithm Application ,\" Network Security Technology and Application , pp. 37 - 39 , 2021 . Xiang Xinyu, Yao Haiyan, Yu Zhiyuan, Hui Yixuan, and Wang Dejun, \"Power Internet of Things Security Analysis and National Secret Algorithm Application,\" Network Security Technology and Application, pp. 37-39, 2021.","journal-title":"Network Security Technology and Application"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Research on the Security Technology of Power Internet of Things Based on Random Patrol Mechanism","author":"Yingjie Li","year":"2021","unstructured":"Li Yingjie , Huang Yongguang and Bao Xianlu , \" Research on the Security Technology of Power Internet of Things Based on Random Patrol Mechanism ,\" Electrical Measurement and Instrumentation , pp. 1 - 7 , 2021 . Li Yingjie, Huang Yongguang and Bao Xianlu, \"Research on the Security Technology of Power Internet of Things Based on Random Patrol Mechanism,\" Electrical Measurement and Instrumentation, pp. 1-7, 2021.","journal-title":"Electrical Measurement and Instrumentation"},{"key":"e_1_3_2_1_4_1","first-page":"19","article-title":"Research on Communication Protocol Detection Technology of Power Internet of Things","volume":"39","author":"Juling Zhang","year":"2021","unstructured":"Zhang Juling , Xiang Siyu , Pan Wenfen , Zhang Linghao , and Tang Chao , \" Research on Communication Protocol Detection Technology of Power Internet of Things ,\" Digital Technology and Application , vol. 39 , pp. 19 - 21 , 2021 . Zhang Juling, Xiang Siyu, Pan Wenfen, Zhang Linghao, and Tang Chao, \"Research on Communication Protocol Detection Technology of Power Internet of Things,\" Digital Technology and Application, vol. 39, pp. 19-21, 2021.","journal-title":"Digital Technology and Application"},{"key":"e_1_3_2_1_5_1","first-page":"8","article-title":"Research on Security Communication Protocol of Power Internet of Things","volume":"21","author":"Kehe Wu","year":"2021","unstructured":"Wu Kehe , Cheng Rui , Zheng Bihuang , and Cui Wenchao , \" Research on Security Communication Protocol of Power Internet of Things ,\" Information Network Security , vol. 21 , pp. 8 - 15 , 2021 -09-10 2021. Wu Kehe, Cheng Rui, Zheng Bihuang, and Cui Wenchao, \"Research on Security Communication Protocol of Power Internet of Things,\" Information Network Security, vol. 21, pp. 8-15, 2021-09-10 2021.","journal-title":"Information Network Security"},{"key":"e_1_3_2_1_6_1","first-page":"46","article-title":"Optimization deployment model of deception resources for power Internet of Things","volume":"19","author":"Yunan Zhang","year":"2021","unstructured":"Zhang Yunan , Kuang Xiaoyun , Hong Chao , Xu Aidong , Jiang Yixin , and Zhao Anan , \" Optimization deployment model of deception resources for power Internet of Things ,\" Electric Power Information and Communication Technology , vol. 19 , pp. 46 - 51 , 2021 . Zhang Yunan, Kuang Xiaoyun, Hong Chao, Xu Aidong, Jiang Yixin, and Zhao Anan, \"Optimization deployment model of deception resources for power Internet of Things,\" Electric Power Information and Communication Technology, vol. 19, pp. 46-51,2021.","journal-title":"Electric Power Information and Communication Technology"},{"key":"e_1_3_2_1_7_1","first-page":"192","article-title":"Design and Implementation of Trust Gateway for Power Internet of Things Based on Blockchain","volume":"54","author":"Bingzhen Zhao","year":"2021","unstructured":"Zhao Bingzhen , Wang Dong , Qian Xue , and Li Jun , \" Design and Implementation of Trust Gateway for Power Internet of Things Based on Blockchain ,\" China Electric Power , vol. 54 , pp. 192 - 197 , 2021 . Zhao Bingzhen, Wang Dong, Qian Xue, and Li Jun, \"Design and Implementation of Trust Gateway for Power Internet of Things Based on Blockchain,\" China Electric Power, vol. 54, pp. 192-197, 2021.","journal-title":"China Electric Power"},{"key":"e_1_3_2_1_8_1","first-page":"706","article-title":"Research on trusted network connection","volume":"33","author":"Zhang H.","year":"2010","unstructured":"H. Zhang , L. Chen and L. Zhang , \" Research on trusted network connection ,\" Jisuanji Xuebao(Chinese Journal of Computers) , vol. 33 , pp. 706 - 717 , 2010 . H. Zhang, L. Chen and L. Zhang, \"Research on trusted network connection,\" Jisuanji Xuebao(Chinese Journal of Computers), vol. 33, pp. 706-717, 2010.","journal-title":"Jisuanji Xuebao(Chinese Journal of Computers)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.9728\/dcs.2016.17.6.499"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.019"}],"event":{"name":"ICSCA 2022: 2022 11th International Conference on Software and Computer Applications","acronym":"ICSCA 2022","location":"Melaka Malaysia"},"container-title":["2022 11th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524304.3524324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524304.3524324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:57Z","timestamp":1750188657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524304.3524324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":10,"alternative-id":["10.1145\/3524304.3524324","10.1145\/3524304"],"URL":"https:\/\/doi.org\/10.1145\/3524304.3524324","relation":{},"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}