Research Article

Lightweight Data Security Protection Method for AMI in Power Internet of Things

Figure 5

Security comparison of different methods.