Research Article

Lightweight Data Security Protection Method for AMI in Power Internet of Things

Figure 3

Throughput value of each method with different number of devices.