I. Introduction
With the development of renewable energy, electric vehicle, smart grid, and vehicle-to-network technologies, the existing energy industry is beginning to shift to distributed solutions [1], [2]. As a result, following smart grids, IoE has become a hot technology in the energy sector. However, due to its information characteristics, IoE will also bring many network security problems. In 2015, for example, A denial-of-service (DoS) attack on Ukraine's power grid left 225,000 people without electricity. In addition to the security of the grid itself, the private data of PUS and PSS should not be compromised with the operation of the IoE and should be reasonably protected. To protect the network security of the IoE, many scholars set up secure access protocols to prevent malicious users from accessing data by forging identities and forcibly attacking cryptography algorithms.