Open Access

A multi-task scheduling algorithm for heterogeneous information security in the Internet of Things for electricity

, , ,  and   
Mar 26, 2025

Cite
Download Cover

Figure 1.

A complex task is divided into several subtasks with computational characteristics
A complex task is divided into several subtasks with computational characteristics

Figure 2.

Service A corresponds to the resource usage of the container
Service A corresponds to the resource usage of the container

Figure 3.

Physical machine resource usage
Physical machine resource usage

Figure 4.

Comparison of security transmission results of big data for power dispatching
Comparison of security transmission results of big data for power dispatching

Figure 5.

The relationship between the power and intercept probability of VCM control
The relationship between the power and intercept probability of VCM control

Figure 6.

The relationship between optimization target and transmission power and arrival rate
The relationship between optimization target and transmission power and arrival rate

Figure 7.

Algorithm real-time load
Algorithm real-time load

Password task execution time

Password task type Execution time
Symmetric encryption request 240ms
Symmetric decryption request 210ms
Asymmetric encryption request 380ms
Asymmetric decryption request 360ms
Signature request 420ms
Check request 580ms
Hash request 120ms
Language:
English