CN102882688A - Lightweight authentication and key agreement protocol applicable to electric information acquisition - Google Patents

Lightweight authentication and key agreement protocol applicable to electric information acquisition Download PDF

Info

Publication number
CN102882688A
CN102882688A CN2012104090402A CN201210409040A CN102882688A CN 102882688 A CN102882688 A CN 102882688A CN 2012104090402 A CN2012104090402 A CN 2012104090402A CN 201210409040 A CN201210409040 A CN 201210409040A CN 102882688 A CN102882688 A CN 102882688A
Authority
CN
China
Prior art keywords
key
new
agreement
authentication
insured
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104090402A
Other languages
Chinese (zh)
Inventor
高欣
赵兵
翟峰
郜盼盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN2012104090402A priority Critical patent/CN102882688A/en
Publication of CN102882688A publication Critical patent/CN102882688A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a lightweight authentication and key agreement protocol applicable to electric information acquisition. An identify authentication stage is completed on the basis of communication of a digital certificate of an authentication center of a state grid cooperation of China and a shared key. In a key agreement stage, new and old parameter protection keys which are updated dynamically are utilized, and lightweight operators are utilized for computation, and the key agreement is completed by communication circulations only. In a key updating stage, a session key group and the new and old parameter protection keys are synchronized. During key agreement, parameters are protected alternatively by the new and old parameter protection keys so that nonsynchronous attack can be resisted effectively. The protocol can be analyzed by combination of BAN logic formal analysis and informal analysis methods, can be approved to have safety attributes such as two-way entity authentication, perfect forward security and the like when reaching first-level faith and second-level faith, resists to various attacks, and can complete identify authentication and key agreement in real time effectively on the premises of security guarantee and meet requirements of an electric information acquisition system to key application.

Description

A kind of light-weight authentication key agreement protocol that is applicable to the power information collection
Technical field
Because huge, the broad covered area of power information acquisition system Information Monitoring amount, traditional authenticated key agreement agreement metering expense is large, and communication interaction can't satisfy the demands often.In order to realize the real-time security high efficiency of transmission of electric power data, to utilize State Grid Corporation of China certificate verification center, based on certificate verification and new and old insured key dynamic negotiation mechanism, a kind of light-weight authentication key agreement protocol is proposed, in conjunction with the fractional analysis of BAN logical form and non-Formal Analysis Method agreement is analyzed, identification protocol has two-way entity authentication when reaching one-level faith and secondary faith, the perfect security attribute such as confidentiality forward, resisting various attacks, can be in the situation that guarantees safety real-time high-efficiency finish authentication and key agreement, be applicable to the secure communication of power information acquisition system.
Background technology
The intelligent power System Construction requires during " 12 " in " " 12 " power marketing development plan ", gather coverage rate 100%, 2.2 hundred million of intelligent electric meters are installed, finish 10107 constructions of intelligent community, the communication network that intelligent power relies on covers huge numbers of families.In the power marketing process, the power information acquisition system is the core business system that sales service is used, its Information Monitoring amount is huge, broad covered area, and its collection, transmission, storage, the customer information of processing and using, power information and electricity charge information etc. are not only the core data data of power industry, also relate to the every aspect of social life, has higher confidentiality, illegally using and leaking of information may bring irremediable loss, therefore the requirement of power information security protection also needs to rise to higher level (Chen Shuyong, Song Shufang, Li Lanxin etc. intelligent grid technology summary [J]. electric power network technique, 2009,33 (8): 1-7.), traditional protecting information safety strategy and safety protection technique can not adapt to the demand of power information acquisition system business development, important power information (parameter setting between the intelligent electric meter of main website and information acquisition terminal and direct communication, control command, power information etc.) transmission should have authentication and key agreement and encryption measures (Deng Chen Jun wears the Guiping China's dawn. based on the intelligent grid kilowatt meter reading-out system research [J] of radio sensing network. electrical measurement and instrument, 2010, (8) .), the security protection general requirement of building to reach national information system is for the sales service application system provides accurate, reliably, effectively, real-time basic data.So utilize the ca authentication center of State Grid Corporation of China's construction, based on digital certificate, safe in conjunction with symmetric cryptography and public-key cryptosystem design one cover, the communication interaction number of times is few, memory space and computing cost little the authenticated key agreement agreement be to guarantee power information acquisition system safe and stable operation, business datum is safe and reliable, the important channel of user power utilization information security real-time Transmission.
2002, the propositions such as the Hu Yan of Tsing-Hua University are applied to the fail safe that electric power system is used with Strengthens network with ssl protocol, but the computing cost of ssl protocol is large and communication interaction often, and pointed out to suffer easily the encryption key exhaustive attack, abandon (the Qiu Zhiguo such as change key standard message attack, the attack of<one class SSL cryptographic algorithm 〉, Shandong University's Master's thesis, in April, 2007) (David Wagner, Bruce Schneier, " Analysis of the SSL3.0 protocol ", 2nd USENIX Workshop on Electronic Commerce, November 1996.).China in 2003 have released the WLAN (wireless local area network) standard GB/T 15629.11 (Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11:Wireless LAN Meditum Access Control (MAC) and Physical Layer (PHY) Specifications.GB 15629.11-2003. (in Chinese)) of oneself, standard comprises wireless authentication and secret infrastructure WAPI mechanism, but this agreement lacks the private key checking in the authentication link, the key agreement link does not possess the security attributes such as forward security, can not resist the attacks such as Replay Attack and key be asynchronous.2004, ieee standard approval 802.11i safety standard (IEEE P802.11i/D3.0, Specification for Enhanced Security[OL], http://standards.ieee.org/reading/ieee/std/lanman/rafts/P802.11 i.pdf.), " EAP-Success " message that sends owing to the AP end is expressly to transmit, and is easy to the victim forgery and carries out man-in-the-middle attack.2007, the people such as Feng (Feng Dengguo, Chen Weidong. the modularized design of the security protocol of password-based and analysis [J]. Chinese science E collects, 2007,37 (2): 223-237.) proposed the modularization authentication protocol of password-based, but because the expense of agreement in communication and calculating is all larger, be not suitable for the power information collection.2010, the people such as Lo (Lo J-W, Lee C-C, Hwang M-S.A secure and efficient ECC-based AKA protocol for wireless mobile communications.Int J Innovat Comput Inform Control 2010,6 (11): 5249-58.) utilize the ECC algorithm to propose the authenticated key agreement agreement of password-based, He in 2011 points out that the people's such as Lo agreement can not resist off-line password exhaustive attack (He D.Weakness in an ECC-based AKA protocol for wireless mobile communications.Cryptology ePrint Archive, Report 2011/336,2011.).Above agreement is because its communication amount of calculation expense is excessive or anti-attack ability causes not them and is not suitable for being applied to the power information acquisition system.
Summary of the invention
Because above-mentioned, this paper proposes a kind of light-weight authentication key agreement protocol that is applicable to the power information acquisition system based on certificate verification and insured key dynamic negotiation mechanism, in conjunction with the fractional analysis of BAN logical form and non-Formal Analysis Method agreement is analyzed, identification protocol reach have two-way entity authentication when one-level faith and secondary are looked up to, the perfect security attribute such as confidentiality forward, resisting various attacks can be realized the secure communication of power information acquisition system efficiently in the situation that guarantees safety.
In order to realize this purpose, the present invention has designed and has been applicable to the light-weight authentication key agreement protocol that power information gathers, and its concrete interaction flow as shown in Figure 1.
Symbol definition in the agreement:
K a, K b: Alice, the PKI of Bob.
Figure BSA00000793985000021
Alice, the private key of Bob.
Rot (x, y): x ring shift left f (y) position.
Mixbits (x, y) arthmetic statement:
z←x
for·i=1 to 32 do
z ← ( z 2 + z + z + y ) mod 2 L
end for
return z
Figure BSA00000793985000023
: XOR is carried out in step-by-step
∨: exclusive disjunction is carried out in step-by-step
The invention has the advantages that: memory space and computing cost are little; the communication interaction number of times is few; the agreement that is used alternatingly and upgrade uses synchronously of new and old parameter protection key can effectively be resisted asynchronous attack; and can realize two-way entity authentication; key agreement; has perfectly forward confidentiality (PFS); the opposing Replay Attack; the attacks such as known-key attacks; the safety approach that provides real-time high-efficiency for authentication and the key agreement of communicating pair in the power information acquisition system; can be applicable to pay and purchase the safe transfer of telecommunications breath; comprising holds purchases the electric industry affair; long-range recharging service; the processes such as intelligent electric meter Long-distance Control; to guarantee that the user purchases that electricity is supplemented with money or the safe transmission of the information such as control command, improve the fail safe of electric power system.
Description of drawings
Fig. 1 is the designed concrete reciprocal process that is applicable to the light-weight authentication key agreement protocol that power information gathers among the present invention;
Embodiment
(1) implementation step
As shown in Figure 1, agreement has comprised authentication, key agreement and key updating three phases, and the communication entity both sides share old insured key K s in advance O1, Ks O2With new insured key K s N1, Ks N2, agreement is used the exchange of new insured cryptographic key protection important parameter under normal circumstances, and when the authentication of both sides' entity identities or key agreement failure, Alice enables old insured key, makes Ks N1=Ks O1, Ks N2=Ks O2, restart Hello and provoke session.Now the concrete communication process with agreement is described below:
Provoke session 1.Alice send Hello message to Bob, generate 32 byte random number n A, and with insured key K s N1Encrypt, the digital certificate of enclosing Alice after Hello message reaches
Figure BSA00000793985000031
Calculate eap-message digest and use the encrypted private key generating digital of Alice to sign.
2.Bob after receiving the Hello message of Alice, the check dight certificate validity carries out authentication, extracts the PKI of Alice, the digital signature of checking Alice checks message integrity, and proves that it is this session holder really.
3.Bob use insured key K s N1Deciphering obtains random number n A, then generate random number 32 byte random number n B, calculate α, Ks New, K ABAs shown in Figure 1, send message Give Alice, wherein
Figure BSA00000793985000033
The digital signature that generates for the eap-message digest of the several parts in encrypted private key message front of using Bob.
4.Alice after receiving message, at first check the validity of certificate, Bob carried out authentication, if the identity of the identity information in the certificate and Bob is coincide, then extract the digital signature of public key verifications Bob, the integrality of inspection message, and proof Bob is this session holder really.
5. if Alice passes through in the integrality of the 4th step inspection message, then obtain n with insured secret key decryption B, calculating K s New, relatively α if equate, then calculates shared key group K AB, new key more.Use new MAC key and initial vector that α is calculated the MAC value, send to Bob.If relatively the α failure then sends alert message, and makes Ks N1=Ks O1, Ks N2=Ks O2, use old insured key to restart new round agreement as insured key.
6.Bob calculating is also compared MAC (α), if consistent, then upgrades all keys.So far authentication and key agreement stage finish, and can bring into use afterwards the secret key encryption power information data that consult to carry out secure communication.If MAC (α) value is inconsistent, then send alert message, not new key more.
(2) BAN logical form fractional analysis
At first utilize BAN formalization of logic analytical method that lightweight wireless network authentication key agreement protocol proposed by the invention is carried out formalization analysis, analytic process is carried out in strict accordance with the analytical procedure that the BAN logic requires.
The authentication purpose of agreement:
One-level faith:
Secondary faith:
Figure BSA00000793985000036
Figure BSA00000793985000037
The description of agreement:
A → B : { CertificateA , { n A } Ks n 1 } K a - 1
B → A : { CertificateB , { n B } Ks n 2 , α } K b - 1 A → B : { ( n A , n B ) } K AB
Agreement is idealized:
Message 1,
Figure BSA00000793985000041
Message 2:
Figure BSA00000793985000042
Message 3:
Figure BSA00000793985000043
Initial state assumption:
(1) (2)
Figure BSA00000793985000045
(3)B|≡#(n A)(4)A|≡#(n B) (5)
Figure BSA00000793985000046
(6)
Figure BSA00000793985000047
(7) B | ≡ A ⇒ ( n A ) (8) A | ≡ B | ⇒ ( n B ) (9)A|≡n A (10)B|≡n B
Reasoning from logic:
Can be got by message 1
Figure BSA000007939850000410
By formula (1-a), use and receive rule, obtain
Figure BSA000007939850000411
By formula (1-b) and hypothesis (5), the shared key rule in the application message implication obtains
B|≡A|~n A (1-c)
By formula (1-c) and hypothesis (3), use the nonce proof rule, can get
B|≡A|≡n A (1-d)
By formula (1-d) and hypothesis (7), use arbitration rules, can get
B|≡n A (1-e)
By formula (1-e) and hypothesis (10), use the faith rule, obtain
B|≡(n A,n B)
Namely
Figure BSA000007939850000412
Can be got by message 2
By formula (2-a), use and receive rule, obtain
Figure BSA000007939850000414
By formula (2-b) and hypothesis (6), the shared key rule in the application message implication obtains
A|≡B|~n B (2-c)
(2-c) supposes (4) by formula, uses the nonce proof rule, obtains
A|≡B|≡n B (2-d)
By formula (2-d) and hypothesis (8), use arbitration rules, obtain
A|≡n B (2-e)
By formula (2-e) and hypothesis (9), use the faith rule, obtain
A|≡(n A,n B)
Namely
Figure BSA00000793985000051
By formula (2-a) and hypothesis (2), the PKI rule in the application message implication obtains
Figure BSA00000793985000052
By formula (2-f), use and send rule, obtain
A|≡B|~(n A,n B)
Namely
Figure BSA00000793985000053
By hypothesis (4), use the freshness rule, obtain
A|≡#(n A,n B)
Namely
Figure BSA00000793985000054
By formula (2-g) and (2-h), use the nonce proof rule, can get
Figure BSA00000793985000055
Can be got by message 3
Figure BSA00000793985000056
By formula (a) and (3-a), the shared key rule in the application message implication can get
Figure BSA00000793985000057
By hypothesis (3), use the freshness rule, obtain
B|≡#(n A,n B)
Namely
Figure BSA00000793985000058
By formula (3-b) and (3-c), use the nonce proof rule, can get
Figure BSA00000793985000059
By above analysis as can be known this agreement meet final target, reach the purpose of authentication, i.e. one-level faith (a) and (b), secondary is looked up to (c) and (d).If the assailant implements Replay Attack, then Alice and Bob will find when the correctness of certificate parameter, and therefore hypothesis (3) and hypothesis (4) are set up in above analysis.
(3) security attribute and anti-attack ability analysis
Because some defectives of BAN logic itself, may probe to some attack of agreement and some security attributes of agreement, so this paper is further analyzed agreement from attack and confidentiality aspect in conjunction with non-Formal Analysis Method.
1. two-way entity authentication
Alice and Bob are at first by sending digital certificate and the digital signature that sends information being realized authentication.Because the identity information that comprises in the digital certificate has the third-party signature of CA authority, the user at first can carry out the authentication of first gravidity part by checking identity information, Bob can extract the signature of the public key information checking Alice of Alice in the certificate afterwards, thereby proof Alice is the session holder really.In like manner, Bob also is the same.Because Alice and Bob all have the new and old insured key of sharing, so in the exchange random number, can play the effect of second gravidity part authentication.Through realizing the two-way entity authentication between the user after the double authentication.
2. key agreement
Set of cipher key between Alice and the Bob and insured key are by n A, n BThree parameters generate through correlation computations, wherein n AGenerated at random by Alice, and n BGenerated at random n by Bob A, n BRespectively at insured key K s N1, Ks N2Protection under encrypted transmission, and utilize
Figure BSA00000793985000061
Carry out the confirming proper of parameter, only have Alice, Bob can calculate, and MAC (α) value that last Bob sends by Alice is carried out the consistency affirmation of key, so final set of cipher key and Protective Key only have Alice and Bob to obtain.
3. perfect confidentiality (PFS) forward
In the negotiation and renewal process of set of cipher key and insured key, even the assailant has grasped the current session key of both sides, can the key agreement of next time not threatened yet.Because participating in two random numbers of each session key batch total calculation all regenerates, and respectively by two different insured secret key encryption transmission, only have the user who holds simultaneously two insured keys just can obtain, and assailant's insured key that can not make new advances from current session key derivation and consult, therefore the key agreement of next time can't be affected.In addition, even agreement participant's long-term private is leaked, also can not cause the leakage of old session key, so this agreement has PFS character.
4. preventing playback attack
When the assailant reset front two message in agreement, Alice was calculating n BAnd relatively will find to be attacked during the correctness of α.When the assailant resets the 3rd message, because MAC (α) value is to calculate with the MAC key and the initial vector that newly consult, so will find during in comparison MAC (α) value as Bob.
5. anti-asynchronous attack
Because the communicating pair entity is shared two pairs of new and old parameter protection keys in advance, when when front two-wheeled is attacked, Alice and Bob all can make Ks N1=Ks O1, Ks N2=Ks O2, use old insured key to restart Hello as insured key and provoke new round agreement.If attacked in third round, Bob checking MAC (α) be worth unsuccessfully, and new key and send alert message more not then is owing to Alice at this moment more new key, wherein Ks O1=Ks N1Ks O2=Ks N2Ks N1=(Ks New) 0~15; Ks N1=(Ks New) 16-31, make Ks after receiving alert message N1=Ks O1, Ks N1=Ks O2, the Ks of Alice here N1, Ks N2Just and the Ks of Bob N1, Ks N2Corresponding, Alice can restart Hello and provoke new round agreement.Therefore asynchronous attack is not prove effective for this agreement.
(4) Performance Ratio
It is more as shown in table 1 that the light-weight authentication key agreement protocol that is applicable to the power information collection proposed by the invention and existing other two kinds of agreements are carried out Performance Ratio.
Table 1 with the Performance Ratio of quasi-protocol
Figure BSA00000793985000062
Annotate: 1. the described every amount of calculation that all refers to session setup side of calculated performance
2.2 (1/1) the type has been carried out altogether in expression 2 times, comprises 1 cryptographic calculation and 1 decrypt operation.
The authentication link of WAPI agreement is what to be separated with the key agreement stage, lacks the private key authentication in the authentication link, and the key agreement stage lacks the key confirmation process, if consider private key authentication and key confirmation, the mutual wheel number of agreement will be more.The light-weight authentication key agreement protocol that is applicable to the power information collection that this paper carries as can be seen from Table 1, on performance, obviously be better than EAP-TLS and WAPI agreement, be more suitable for being applied to the power information acquisition system, for the safe and efficient real-time Transmission of electric power data provides safeguard.

Claims (3)

1. a power information gathers the authenticated key agreement agreement, it is characterized in that may further comprise the steps:
1) uses the digital certificate that State Grid Corporation of China certificate verification center issues and the person's that holds the certificate having property of digital signature proof private key, and carry out dual-identity authentication in conjunction with sharing symmetric key;
2) new and old parameter protection key rotation is used, the Protective Key negotiations process;
3) utilize the new MAC key of consulting and initial vector to calculate MAC value and carry out key updating and confirm, upgrade to guarantee both sides' key dynamic synchronization, in case failed then utilize old insured key to provoke new round agreement.
2. power information as claimed in claim 1 gathers the authenticated key agreement agreement, it is characterized in that:
Described step 2) concrete steps that the important parameter that calculates new session key in conjunction with new and old cryptographic key protection participation in exchanges are (the supposition communicating pair are Alice and Bob):
The communication entity both sides share old insured key K s in advance O1, Ks O2With new insured key K s N1, Ks N2, agreement is used the exchange of new insured cryptographic key protection important parameter under normal circumstances, and when the authentication of both sides' entity identities or key agreement failure, Alice enables old insured key, makes Ks N1=Ks O1, Ks N2=Ks O2, restart Hello and provoke session.Now the concrete communication process with agreement is described below:
2.1) Alice sends Hello message to Bob and provoke session, generates 32 byte random number n A, and with insured key K s N1Encrypt, the digital certificate of enclosing Alice after Hello message reaches
Figure FSA00000793984900011
Calculating disappears
Breath is made a summary and is signed with the encrypted private key generating digital of Alice;
2.2) Bob is after receiving the Hello message of Alice, the check dight certificate validity carries out authentication,
Use insured key K s N1Deciphering obtains random number n A, then generate random number 32 byte random number n B, calculate α, Ks New, K ABAs shown in Figure 1, send message
Figure FSA00000793984900012
Give
Alice, wherein
Figure FSA00000793984900013
The digital signature that generates for the eap-message digest of the several parts in encrypted private key message front of using Bob;
2.3) Alice checks validity and the having property of private key of the certificate receive, obtains n with insured secret key decryption B, calculating K s New, relatively α if equate, then calculates shared key group K AB, and new key more.Use new MAC key and initial vector that α is calculated the MAC value, send to Bob.If relatively the α failure then sends alert message, and makes Ks N1=Ks O1, Ks N2=Ks O2, use old insured key to restart new round agreement as insured key.
3. wireless network light-weight authentication key agreement protocol as claimed in claim 1 is characterized in that:
Described step 3) concrete steps of key updating are in: Bob calculates and compares MAC (α), if consistent, then upgrades all keys.So far authentication and key agreement stage finish, and can bring into use afterwards the secret key encryption power information data that consult to carry out secure communication.If MAC (α) value is inconsistent, then send alert message, new key more not, detailed process is as follows:
3.1) Alice calculating K s New, comparing α, computational process if equate, is then calculated shared key group K as shown in Figure 1 AB, and new key more.Use new MAC key and initial vector that α is calculated the MAC value, send to Bob.If relatively the α failure then sends alert message, and makes Ks N1=Ks O1, Ks N2=Ks O2, use old insured key to restart new round agreement as insured key.
3.2) Bob calculates and MAC (α) relatively, if consistent, then more new session key and insured key.So far authentication and key agreement stage finish, and can bring into use afterwards the secret key encryption power information data that consult to carry out secure communication.If MAC (α) value is inconsistent, then send alert message, not new key more.
CN2012104090402A 2012-10-24 2012-10-24 Lightweight authentication and key agreement protocol applicable to electric information acquisition Pending CN102882688A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012104090402A CN102882688A (en) 2012-10-24 2012-10-24 Lightweight authentication and key agreement protocol applicable to electric information acquisition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012104090402A CN102882688A (en) 2012-10-24 2012-10-24 Lightweight authentication and key agreement protocol applicable to electric information acquisition

Publications (1)

Publication Number Publication Date
CN102882688A true CN102882688A (en) 2013-01-16

Family

ID=47483844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012104090402A Pending CN102882688A (en) 2012-10-24 2012-10-24 Lightweight authentication and key agreement protocol applicable to electric information acquisition

Country Status (1)

Country Link
CN (1) CN102882688A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281316A (en) * 2013-05-20 2013-09-04 国家电网公司 Safe protection method for intelligent energy consuming system
CN104283675A (en) * 2013-07-10 2015-01-14 中兴通讯股份有限公司 Concentrator, electricity meter and message processing method of concentrator and electricity meter
CN104363219A (en) * 2014-11-06 2015-02-18 江苏林洋电子股份有限公司 Three-party secret key management method based on IEC62056 data transmission safety standard
CN106487502A (en) * 2015-09-02 2017-03-08 国网智能电网研究院 A kind of lightweight key negotiation method based on password
CN106549767A (en) * 2016-11-04 2017-03-29 上海电力学院 A kind of data authentication with secret protection and tracing system
CN106559218A (en) * 2015-09-29 2017-04-05 中国电力科学研究院 A kind of safe acquisition method of intelligent substation continuous data
CN107948144A (en) * 2017-11-17 2018-04-20 国网重庆市电力公司南岸供电分公司 A kind of threat processing system based on the detection of intelligent grid information security
CN108183553A (en) * 2015-09-15 2018-06-19 柳超 A kind of data test and acquisition monitoring device, intelligent grid and its user terminal
CN108600205A (en) * 2018-04-11 2018-09-28 国电中自(合肥)电气科技有限公司 A kind of electric grid secondary access system
CN108683498A (en) * 2018-05-14 2018-10-19 国网江西省电力有限公司电力科学研究院 A kind of cloud terminal management-control method based on changeable key national secret algorithm
CN108810023A (en) * 2018-07-19 2018-11-13 北京智芯微电子科技有限公司 Safe encryption method, key sharing method and safety encryption isolation gateway
CN109088728A (en) * 2018-09-17 2018-12-25 国网浙江省电力有限公司电力科学研究院 A kind of electric system debugging tool encryption communication method based on shared key
CN113965364A (en) * 2021-10-12 2022-01-21 西安电子科技大学 Lightweight safety communication method and system for unmanned equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040090930A1 (en) * 2002-11-13 2004-05-13 Lee Hyun-Woo Authentication method and system for public wireless local area network system
CN101959191A (en) * 2010-09-25 2011-01-26 华中科技大学 Safety authentication method and system for wireless network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040090930A1 (en) * 2002-11-13 2004-05-13 Lee Hyun-Woo Authentication method and system for public wireless local area network system
CN101959191A (en) * 2010-09-25 2011-01-26 华中科技大学 Safety authentication method and system for wireless network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曾萍等: "WSN中基于ECC的轻量级认证密钥协商协议", 《计算机工程与应用》, 1 August 2012 (2012-08-01), pages 65 - 69 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281316A (en) * 2013-05-20 2013-09-04 国家电网公司 Safe protection method for intelligent energy consuming system
CN104283675A (en) * 2013-07-10 2015-01-14 中兴通讯股份有限公司 Concentrator, electricity meter and message processing method of concentrator and electricity meter
CN104363219A (en) * 2014-11-06 2015-02-18 江苏林洋电子股份有限公司 Three-party secret key management method based on IEC62056 data transmission safety standard
CN104363219B (en) * 2014-11-06 2018-07-10 江苏林洋能源股份有限公司 A kind of three parts cipher key management method based on IEC62056 data transmission security standards
CN106487502B (en) * 2015-09-02 2020-01-24 全球能源互联网研究院 Lightweight key negotiation method based on password
CN106487502A (en) * 2015-09-02 2017-03-08 国网智能电网研究院 A kind of lightweight key negotiation method based on password
CN108183553B (en) * 2015-09-15 2021-04-06 宁夏隆基宁光仪表股份有限公司 Data testing and collecting monitoring device, smart power grid and user side thereof
CN108183553A (en) * 2015-09-15 2018-06-19 柳超 A kind of data test and acquisition monitoring device, intelligent grid and its user terminal
CN106559218A (en) * 2015-09-29 2017-04-05 中国电力科学研究院 A kind of safe acquisition method of intelligent substation continuous data
CN106549767A (en) * 2016-11-04 2017-03-29 上海电力学院 A kind of data authentication with secret protection and tracing system
CN107948144A (en) * 2017-11-17 2018-04-20 国网重庆市电力公司南岸供电分公司 A kind of threat processing system based on the detection of intelligent grid information security
CN108600205A (en) * 2018-04-11 2018-09-28 国电中自(合肥)电气科技有限公司 A kind of electric grid secondary access system
CN108683498A (en) * 2018-05-14 2018-10-19 国网江西省电力有限公司电力科学研究院 A kind of cloud terminal management-control method based on changeable key national secret algorithm
CN108810023A (en) * 2018-07-19 2018-11-13 北京智芯微电子科技有限公司 Safe encryption method, key sharing method and safety encryption isolation gateway
CN109088728A (en) * 2018-09-17 2018-12-25 国网浙江省电力有限公司电力科学研究院 A kind of electric system debugging tool encryption communication method based on shared key
CN109088728B (en) * 2018-09-17 2021-02-12 国网浙江省电力有限公司电力科学研究院 Electric power system debugging tool encrypted communication method based on shared secret key
CN113965364A (en) * 2021-10-12 2022-01-21 西安电子科技大学 Lightweight safety communication method and system for unmanned equipment
CN113965364B (en) * 2021-10-12 2022-07-15 西安电子科技大学 Lightweight secure communication method and system for unmanned equipment

Similar Documents

Publication Publication Date Title
CN102882688A (en) Lightweight authentication and key agreement protocol applicable to electric information acquisition
Irshad et al. A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
Ferrag et al. A systematic review of data protection and privacy preservation schemes for smart grid communications
CN104219056B (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
CN103095696B (en) A kind of authentication and cryptographic key negotiation method being applicable to power information acquisition system
Kamto et al. Light-weight key distribution and management for advanced metering infrastructure
CN111131148A (en) Aggregation method and system capable of protecting privacy data and facing smart power grid
CN102017510A (en) Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols
Wu et al. Anonymous and efficient message authentication scheme for smart grid
CN103024743A (en) Wireless local area network trusted security access method
CN112202544B (en) Smart power grid data security aggregation method based on Paillier homomorphic encryption algorithm
CN113691380A (en) Multidimensional private data aggregation method in smart power grid
CN102833748A (en) Wireless network lightweight class authentication key negotiation protocol based on digital certificate
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN110430050A (en) A kind of smart grid collecting method based on secret protection
CN105812128A (en) Malicious data mining attack-resisting data aggregation system and method for smart grid
CN107294696A (en) For the full homomorphism method for distributing key of Leveled
Qian et al. The secure lattice-based data aggregation scheme in residential networks for smart grid
Zhang et al. An efficient and robust multidimensional data aggregation scheme for smart grid based on blockchain
Chen et al. Traceable and authenticated key negotiations via blockchain for vehicular communications
CN116015751B (en) Intelligent power grid bidirectional authentication system and method
Yahya et al. On the security of an authentication scheme for smart metering infrastructure
Seo et al. POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures
Shamshad et al. A provably secure and lightweight access control protocol for EI-based vehicle to grid environment
Bhanse et al. A novel smart meter authentication scheme for secure smart grid communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130116