Open Access

Application and Optimization of Endogenous Security Mechanisms in Photovoltaic Data Transmission and Storage

, , ,  and   
Mar 17, 2025

Cite
Download Cover

Figure 1.

LoRa data transmission network hybrid encryption scheme
LoRa data transmission network hybrid encryption scheme

Figure 2.

Data grouping based on consistent hashing algorithm
Data grouping based on consistent hashing algorithm

Figure 3.

Sensitivity ranking and data clustering
Sensitivity ranking and data clustering

Figure 4.

Overall process of desensitization method
Overall process of desensitization method

Figure 5.

Bandwidth occupancy of different methods
Bandwidth occupancy of different methods

Figure 6.

Load balancing of different methods
Load balancing of different methods

Figure 7.

Mean residual energy
Mean residual energy

Figure 8.

Data analysis of different methods
Data analysis of different methods

Figure 9.

Intrusion information data interference amplitude
Intrusion information data interference amplitude

Figure 10.

Security situation assessment
Security situation assessment

Figure 11.

Comparison of the accuracy of endogenous safety protection
Comparison of the accuracy of endogenous safety protection
Language:
English