Research Article

[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System

Table 8

Redundancy-based data obfuscation algorithm.

Input: Data output from paradigm check
Output: OutData after redundancy is added to the control domain
1 input data, and extract the control field action in the data
2 action is an eight-digit number, with storage location is 76543210 from low to high; the eight-digit number is divided into four parts, i.e., 76,54,32, and 10, which are, respectively, the first, the second, the third, and the fourth bytes in the 32-digit number
3 generate a random 32-digit number “ActionPro”, each digit of which is random; two maximum digits are taken from each byte
4 The first two bits of each byte are sequentially spliced together to form a new data
5 data mod 7 = z
6 then, starting from the zth bit of each byte (from left to right), the numbers 76,54,32, and10 in aciton are stored sequentially, generating AcitonPro
7 write AcitonPro back to the data to generate OutData
8 output OutData