This paper constructs a security transmission model to calculate the power data, uses cluster analysis to analyze and integrate the collected data, and forms a security transmission fuzzy set, so as to construct a security system to realize the security transmission of power data information. Multiple tasks in the heterogeneous platform are represented using acyclic graph DAG, and suitable CPUs
... [Show full abstract] are classified according to the task characteristics. Two optimization objectives, minimizing the average completion time of the task and maximizing the security guarantee factor of the task, are proposed, and a mathematical model is established. According to the actual application of power IoT information security service, create and match the computing nodes. Use the QPSO algorithm to complete task scheduling and realize the optimization of task completion time. Construct an environment that simulates the operation of electric power IoT and analyze the performance of the constructed model. Simulation experiments show that the interception probability is significantly reduced when using the VCM threshold transmission control scheme compared with the probability of not using the VCM threshold transmission control scheme, from a probability of more than 90% to 0~20%, thus indicating that the VCM threshold transmission control scheme can effectively improve the security of information transmission. Comparing the load rate of computing nodes of the three algorithms, the real-time load of this paper’s algorithm floats within the range of 58%~78%, and the real-time load changes are smoother, and this paper’s algorithm is more suitable for the scheduling scenario of the Internet of Things in electric power.