Research on the Standardization of AI-driven Data Security Communication Protocols for Power Trading Networks

Authors

  • Mo Pingyan Guangdong Power Grid Company Limited, Guangzhou, China
  • Li Kai Guangdong Power Grid Company Limited, Guangzhou, China
  • Lu Yanqian Guangdong Power Grid Company Limited, Guangzhou, China
  • Wen You Guangdong Power Grid Company Limited, Guangzhou, China
  • Li Tao Guangdong Power Grid Company Limited, Guangzhou, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1332

Keywords:

Electricity trading network, data security, AI communication protocols, quantum resistance

Abstract

This paper addresses the core security issues faced by power trading networks, including threats from quantum computing, rigid static protocol configurations, and poor cross-domain heterogeneous communication compatibility. It also presents research on AI-driven standardized data security communication protocols. Unlike existing studies that mainly focus on single technological applications, this paper innovatively proposes an intelligent secure communication protocol framework that integrates deep reinforcement learning, post-quantum cryptography, knowledge graphs, and blockchain, achieving multi-technology collaborative optimization and standardized design across the protocol’s lifecycle. Through a deep reinforcement learning agent, the framework senses network status in real-time and dynamically optimizes encryption algorithms and transmission parameters. It integrates MLWE-1024-based post-quantum cryptographic mechanisms and quantum key distribution technology to build forward-secure channels, uses graph neural networks to construct power entity knowledge graphs for high-precision anomaly detection, and incorporates a blockchain-driven trusted settlement mechanism to ensure transaction data integrity. In practical validation on a provincial power trading platform, this protocol outperformed traditional solutions in key metrics such as quantum security strength, protocol conversion delay, consensus convergence efficiency, and anomaly detection accuracy, demonstrating superior dynamic adaptability, attack resistance, and system compatibility. Furthermore, it proposes a phased standardization pathway covering architectural specifications, technical implementation, and evaluation certification, providing critical technical support and standardization foundations for building high-security, low-latency, and strongly interoperable power trading communication infrastructure.

Downloads

Download data is not yet available.

Author Biographies

Mo Pingyan, Guangdong Power Grid Company Limited, Guangzhou, China

Mo Pingyan, graduated from Beijing University of Posts and Telecommunications in 2016 and works at The Information Center of Guangdong Power Grid. Her main research interest is computer science and technology.

Li Kai, Guangdong Power Grid Company Limited, Guangzhou, China

Li Kai, received his master’s degree in Computer System Architecture from Jinan University in 2014. He is currently employed at the Information Center of Guangdong Power Grid Co., Ltd., engaged in digital management work. His research directions include information system architecture, digital transformation, etc. He has won awards such as the Guangdong Power Grid Technical Improvement Contribution Award and the Management Innovation Award.

Lu Yanqian, Guangdong Power Grid Company Limited, Guangzhou, China

Lu Yanqian graduated with a bachelor’s degree from North China Electric Power University (highest degree) and is currently working as an engineer in the Application Management Department of Guangdong Power Grid Company’s Information Center. Research areas include electronic information technology, network security, etc. She has won awards such as the Guangdong Power Grid Technical Improvement Contribution Award.

Wen You, Guangdong Power Grid Company Limited, Guangzhou, China

Wen You currently works at the Guangdong Power Grid Corporation Information Center and has a master’s degree.

Li Tao, Guangdong Power Grid Company Limited, Guangzhou, China

Li Tao received his bachelor’s degree in Electronic Information Engineering from the City College of Kunming University of Science and Technology in 2014. He is currently working as a R&D Engineer at Southern Power Grid Digital Grid Technology (Guangdong) Co., Ltd. Kunming Branch. With extensive experience in power grid intelligent operation and technology development, his research interests focus on power trading. He has contributed to various projects in the power industry through roles at companies such as Kunming Nengxun Technology Co., Ltd. and other technology firms.

References

Krause T, Ernst R, Klaer B, et al. Cybersecurity in power grids: Challenges and opportunities[J]. Sensors, 2021, 21(18): 6225.

John H. Migrating to post-quantum cryptography[J]. National Cyber Security Centre blog post, 2023.

Ghadi Y Y, Mazhar T, Shahzad T, et al. A hybrid AI-Blockchain security framework for smart grids[J]. Scientific Reports, 2025, 15(1): 20882.

Wen G, Yang T, Zhou J, et al. Reinforcement learning and adaptive/approximate dynamic programming: A survey from theory to applications in multi-agent systems[J]. Control Decis., 2023, 38(5): 1200–1230.

Betouil A, El Haddouti S, Chaoui H. Global Research Trends in AI and Blockchain for Smart Grids: A Bibliometric Analysis with a Focus on Morocco (2014–2024)[J]. Electronics, 2025, 14(12): 2314.

Qiu D, Wang J, Wang J, et al. Multi-Agent Reinforcement Learning for Automated Peer-to-Peer Energy Trading in Double-Side Auction Market[C]//IJCAI. 2021: 2913–2920.

Press C. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things[J]. 2017.

Li G, Wang M H. Design of Routing Algorithm for Communication of Power Wireless Sensor Networks Based on Improved Harmony Search[J]. Journal of ICT Standardization, 2024, 12(2): 189–214.

Wang B, Xu L, Wang J. A privacy-preserving trading strategy for blockchain-based P2P electricity transactions[J]. Applied Energy, 2023, 335: 120664.

Stonebraker M, Çetintemel U, Zdonik S. The 8 requirements of real-time stream processing[J]. ACM Sigmod Record, 2005, 34(4): 42–47.

Huang J, Zhou S, Li G, et al. Real-time monitoring and optimization methods for user-side energy management based on edge computing[J]. Scientific Reports, 2025, 15(1): 24890.

Astrizi T L, Custódio R. Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption[J]. Sensors, 2024, 24(22): 7300.

Sen Ö, Gurabi M A, Deruelle M, et al. Encryption-Aware Anomaly Detection in Power Grid Communication Networks[C]//2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE). IEEE, 2024: 1–5.

Arnob A K B, Mridha M F, Safran M, et al. An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data[J]. International Journal of Computational Intelligence Systems, 2025, 18(1): 19.

Zhou Z, Onireti O, Xu H, et al. AI and blockchain enabled future wireless networks: a survey and outlook[J]. Distributed Ledger Technologies: Research and Practice, 2024, 3(3): 1–30.

Guennoun Ihaaz. Integration of blockchain and artificial intelligence in smart grids: A comprehensive review [J].

Chang C, Yang Y, Shi C. Research on Social Network Advertisement Delivery Platform Based on Blockchain[J]. Journal of ICT Standardization, 2024, 12(2): 215–228.

Gao W, Zhang L, Ju Y. A blockchain-based MQTT protocol optimization algorithm[J]. Journal of ICT Standardization, 2023, 11(2): 135–156.

Zeng P, Bandyopadhyay D, Méndez J A M, et al. Practical hybrid PQC-QKD protocols with enhanced security and performance[J]. arXiv preprint arXiv:2411.01086, 2024.

Kale M R, El-Ebiary Y A B, Sathiya L, et al. Designing Quantum-Resilient Blockchain Frameworks: Enhancing Transactional Security with Quantum Algorithms in Decentralized Ledgers[J]. International Journal of Advanced Computer Science & Applications, 2025, 16(4).

Tessone C J, Tasca P, Iannelli F. Stochastic modelling of blockchain consensus[J]. arXiv preprint arXiv:2106.06465, 2021.

Mattsson U. Controlling Privacy and the Use of Data Assets-Volume 1: Who Owns the New Oil? [M]. CRC Press, 2022.

Maringer G, Wachter-Zeh A. Reducing Ciphertext and Key Sizes for MLWE-Based Cryptosystems[C]//2024 IEEE Information Theory Workshop (ITW). IEEE, 2024: 187–192.

Downloads

Published

2025-12-19

How to Cite

Pingyan, M. ., Kai, L. ., Yanqian, L. ., You, W. ., & Tao, L. . (2025). Research on the Standardization of AI-driven Data Security Communication Protocols for Power Trading Networks. Journal of ICT Standardization, 13(03), 257–280. https://doi.org/10.13052/jicts2245-800X.1332

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications