Research Article

Lightweight Data Security Protection Method for AMI in Power Internet of Things

Figure 4

The average data collection completion time value of each method with different number of devices.