CN103873270B - Intelligent meter infrastructure network system and its message broadcasting method - Google Patents

Intelligent meter infrastructure network system and its message broadcasting method Download PDF

Info

Publication number
CN103873270B
CN103873270B CN201210532359.4A CN201210532359A CN103873270B CN 103873270 B CN103873270 B CN 103873270B CN 201210532359 A CN201210532359 A CN 201210532359A CN 103873270 B CN103873270 B CN 103873270B
Authority
CN
China
Prior art keywords
broadcast
key
message
ami
network node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210532359.4A
Other languages
Chinese (zh)
Other versions
CN103873270A (en
Inventor
颜嵩铭
涂政宏
吴瑞明
黄友炼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute for Information Industry
Original Assignee
Institute for Information Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute for Information Industry filed Critical Institute for Information Industry
Priority to CN201210532359.4A priority Critical patent/CN103873270B/en
Publication of CN103873270A publication Critical patent/CN103873270A/en
Application granted granted Critical
Publication of CN103873270B publication Critical patent/CN103873270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of intelligent meter infrastructure (Advanced Metering Infrastructure, AMI) server, AMI network node, AMI network system and its message broadcasting method.AMI servers are for broadcast message, broadcast key is produced by hash function, broadcast message is encrypted as encrypted broadcast messages using key is broadcasted, Encryption Key is encrypted as by key is broadcasted using symmetric key, and encrypted broadcast messages and Encryption Key are broadcasted to AMI network node.Encryption Key decryption is broadcast key using symmetric key by AMI network node, is broadcast message using broadcasting key and decrypting encrypted broadcast messages, and corresponds to broadcast key post processing broadcast message in judging to broadcast the message using the hash function.

Description

Intelligent meter infrastructure network system and its message broadcasting method
Technical field
The present invention on a kind of intelligent meter infrastructure (Advanced Metering Infrastructure, AMI) server, AMI network node, AMI network system and its message broadcasting method.More specifically, the present invention is on application In AMI servers, the safety of AMI network node and AMI network system and quick message broadcasting method.
Background technology
Intelligent meter infrastructure (Advanced Metering Infrastructure, AMI) is main by ammeter number Constituted according to management system (Meter Data Management System, MDMS) and intelligent meter (Smart Meter), and Message is transmitted by communication network, and then reaches the management and control of electric power relevent information.And it is similar with general networking, to ensure Whether the correctness of internet message content, the process that generally need in the lump consider message transmission is safe.Wherein, answering with key system With the most extensive.
It is known that in AMI using key system, when service end (such as MDMS or concentrator) electric power phase to be broadcasted When closing control message, can be encrypted for message first with key, then, then by client (such as concentrator or intelligent electricity Table) it is decrypted using key and processes message content.Similarly, the key framework of AMI is applied to also for traditional key adds Close mode.
However, when in AMI frameworks, service end and all of client are all using same common key KCDisappeared Encryption for information, then when there is any client by malicious attack and manipulation, it can directly utilize common key KCEncryption errors disappear Cease and spread according to this.On the other hand, when in AMI frameworks, service end all uses traditional symmetrical expression gold from different clients When key carries out message encryption, though its security is higher, so due to the quantity of storage and the symmetrical expression key for processing needed for service end The quantity of client is proportional to, therefore, when the client in network is significantly increased, service end need to expend the more time in treatment The encryption of broadcast message so that network overall message transmission efficiency reduction.
Furthermore, it is known that technology also has simultaneously using common key KCAnd symmetrical expression key KiComplete the mode of encryption.In detail For, service end has common key K simultaneouslyCAnd symmetrical expression key Ki, and client has symmetrical expression key Ki.Wherein, take Business end is first with common key KCRefined net message M obtains Ekc(M), then with symmetrical expression key KiEncrypt common key KCObtain Eki (KC), then, the E after (concatenate) just will be concatenatedkcAnd E (M)ki(KC) it is sent to client.
Then, client just can in advance utilize symmetrical expression key KiDecryption Eki(KC) obtain common key KC, then again with common Key KCDecryption Ekc(M) internet message M is obtained, consequently, it is possible to by this kind of mechanism, the peace that common key is used alone just can be lifted Quan Xing, and the key treatment complexity that symmetrical expression key is used alone is reduced simultaneously.
Similarly, however, if having any node in aforementioned mechanism by malicious attack and manipulation, this malicious node still may be used First pass through its original symmetrical expression key KiDecryption Eki(KC) obtain common key KC, and further utilizing common key KCPlus Close malicious messages M ' obtains EkcAfter (M '), with Ekc(M ') replaces the E of concatenateable messagekc(M), and by amended messaging to its His client.Consequently, it is possible to other clients cannot still learn the reliability of its message for being received.Furthermore, though aforementioned mechanism The key treatment complexity that symmetrical expression key is used alone can be somewhat reduced, right service end is in previous operations each client for the treatment of Eki(KC) when, its process time is still influenceed by number of nodes.
In sum, it is how safer in AMI frameworks and efficiently transmit data, it is normally fast to ensure AMI frameworks Speed is operated, and is the target that industry needs effort badly.
The content of the invention
To solve foregoing problems, the invention provides a kind of intelligent meter infrastructure (Advanced MeteringInfrastructure, AMI) server, AMI network node, AMI network system and its message broadcasting method, its The main pairing that internet message and symmetric key are completed using hash function (Hash Function), and symmetric key of arranging in pairs or groups It is used to ensure that the correctness of message.Meanwhile, the present invention also accelerates ciphering process using the encryption kenel of segmentation.
To complete object defined above, the invention provides a kind of message broadcasting method for AMI network system.AMI network System includes AMI servers and AMI network node.Message broadcasting method is comprised the steps of:A () makes AMI servers be directed to Broadcast message, broadcast key is produced by hash function;B () makes AMI server by utilizing broadcast key and is encrypted as broadcast message Encrypted broadcast messages;C () makes AMI server by utilizing to broadcast key corresponding to the symmetric key of AMI network node and is encrypted as adding Close key;D () makes AMI servers broadcast to AMI network node encrypted broadcast messages and Encryption Key;E () makes AMI network Encryption Key decryption is broadcast key using symmetric key by node;F () makes AMI network node using key is broadcasted that encryption is wide It is broadcast message to broadcast message decryption;G () makes AMI network node correspond to broadcast key in judging to broadcast the message using hash function Afterwards, treatment broadcast message.
To complete object defined above, invention further provides a kind of message broadcasting method for AMI network system.AMI nets Network system includes AMI servers and AMI network node.The broadcast key encryption of AMI server by utilizing is sent to AMI network node Message.Message broadcasting method is comprised the steps of:A () makes the elementary key of AMI server by utilizing to broadcast key and is converted to the One preliminary ciphertext;B () makes AMI server by utilizing be converted into the first preliminary ciphertext corresponding to the symmetric key of AMI network node Encryption Key message;C () makes AMI server broadcast Encryption Key message;D () makes AMI network node disappear in reception Encryption Key After breath, Encryption Key message is converted into the second preliminary ciphertext using elementary key;E () makes AMI network node using symmetrical gold Second preliminary ciphertext is converted into decrypting key the broadcast key of the encryption message of AMI server broadcasts.
To complete object defined above, the present invention provides a kind of AMI network system again, comprising AMI servers and AMI network Node.AMI servers are directed to broadcast message, and broadcast key is produced by hash function, are added using broadcasting key and will broadcast the message Close is encrypted broadcast messages, claims key to broadcast key using at least one pair of corresponding to AMI network node and is encrypted as encryption gold Key, and encrypted broadcast messages and Encryption Key are broadcasted to AMI network node.AMI network node will be added using symmetric key Close key decryption is broadcast key, is broadcast message using key is broadcasted by encrypted broadcast messages decryption, and in using hash letter After number judges that broadcast message corresponds to broadcast key, treatment broadcast message.
To complete object defined above, the present invention separately provides a kind of AMI network system, is taken comprising AMI network node and AMI Business device.AMI servers have be used to encrypt the broadcast key of the message for being sent to AMI network node.AMI server by utilizing is elementary Key will broadcast key and be converted to the first preliminary ciphertext, and preliminary by first using the symmetric key corresponding to AMI network node Ciphertext is converted into Encryption Key message.AMI servers are more used to broadcast enciphering key message.AMI network node is encrypted in reception After key message, Encryption Key message is converted into the second preliminary ciphertext using elementary key, and utilize symmetric key by second Preliminary ciphertext is converted into decrypting the broadcast key of the encryption message of AMI server broadcasts.
By above-mentioned disclosed technical characteristic, AMI servers of the invention, AMI network node, AMI network system and Its message broadcasting method will be able to the transmission that safer and efficient way completes internet message.
Brief description of the drawings
The schematic diagram of the AMI network system of Figure 1A first embodiment of the present invention;
The schematic diagram of the AMI servers of Figure 1B first embodiment of the present invention;
The schematic diagram of the AMI network node of Fig. 1 C first embodiment of the present invention;
The AMI servers of Fig. 1 D first embodiment of the present invention and the schematic diagram of AMI network node encryption and decryption;
The schematic diagram of the AMI network system of Fig. 2A second embodiment of the present invention;
The quick encryption of Fig. 2 B second embodiment of the present invention and the comparing figure of conventional cryptography;
The flow chart of the message broadcasting method of Fig. 3 third embodiment of the present invention;And
The flow chart of the message broadcasting method of Fig. 4 fourth embodiment of the present invention.
Main element symbol description:
1st, 2AMI network systems
11AMI servers
111 transceivers
113 processors
13rd, 13a, 13b, 13c AMI network node
131 transceivers
133 processors
KBBroadcast key
Ki、Ka、Kb、KcSymmetric key
M broadcasts the message
EKB(M) encrypted broadcast messages
EKi(KB)、EKa(KB)、EKb(KB)、EKc(KB) Encryption Key message
Specific embodiment
Hereinafter present invention will be explained by embodiment.However, embodiments of the invention and being not used to limit this hair It is bright need to any environment as described embodiments, using or mode can implement.Explanation accordingly, with respect to embodiment is only explaination The purpose of the present invention, and it is not used to the directly limitation present invention.Expositor is needed, it is non-straight with the present invention in following examples and diagram The element for connecing correlation has been omitted from and does not illustrate.
Refer to Figure 1A -1C.Wherein, Figure 1A is an intelligent meter infrastructure of first embodiment of the invention The schematic diagram of (Advanced Metering Infrastructure, AMI) network system 1, AMI network system includes an AMI The AMI network node 13 of server 11 and.The schematic diagram of the AMI servers 11 of Figure 1B first embodiment of the invention, AMI services Device includes a transceiver 111 and a processor 113.The schematic diagram of the AMI network node 13 of Fig. 1 C first embodiment of the invention, AMI network node 13 includes a transceiver 131 and a processor 133.
Specifically, for ease of the explanation of the technology of the present invention feature, in first embodiment, AMI servers 11 are Concentrator (Concentrator), AMI network node 13 is intelligent meter.However, what it is not intended to limiting the invention is hard Part aspect, those skilled in the art can by disclosure of the present invention, think in other embodiment easily and, when AMI servers 11 when being backend network servers, and AMI network node 13 is then relative to should be concentrator.The network element of first embodiment is interactive will It is expanded on further below.
Also referring to Fig. 1 D, it is the AMI servers 11 and AMI network node 13 plus solution of first embodiment of the invention Close schematic diagram.First, when the message to be carried out of AMI servers 11 is broadcasted, it first need to be encrypted for message.It is specific and Broadcast message M is first passed through a hash function (Hash by speech, the processor 113 of AMI servers 11 before broadcast one broadcasts the message M Function) H is calculated and is produced one to broadcast key KB, consequently, it is possible to broadcast key KBWith broadcast message M by because of hash function Calculate and there is corresponding relation.
Then, the processor 113 of AMI servers 11 is utilized and broadcasts key KBEncrypted broadcast messages M obtains a broadcast encryption Message EKB(M), and using the symmetric key K corresponding to AMI network node 13i, to broadcast key KBEncrypt to obtain an encryption gold Key message EKi(KB).Then, transceiver 111 is easy to processor 113 by encrypted broadcast messages EKBAnd Encryption Key message (M) EKi(KB) concatenate as message EKB(M)||EKi(KB) after, carry out message broadcast.
And the transceiver 131 of AMI network node 13 is in reception encrypted broadcast messages EKBAnd Encryption Key message EK (M)i (KB) concatenation message EKB(M)||EKi(KB) after, the processor 133 of AMI network node 13 then utilizes symmetric key KiWill Encryption Key message EKi(KB) decryption obtains broadcast key KB, and key K is broadcasted in utilizationBBy encrypted broadcast messages EKB(M) decrypt Obtain the M that broadcasts the message.
Immediately, the processor 133 of AMI network node 13 judges broadcast message M with broadcast key just using hash function KBWhether correspond to, and judge the correctness of broadcast message M according to this.In detail, the processor 133 of AMI network node 13 respectively will Encryption Key message EKi(KB) and encrypted broadcast messages EKB(M) decryption obtains broadcast key KBAnd after broadcast message M, AMI Broadcast message M just can first be calculated and be produced one to broadcast key K by the processor 133 of network node 13 by hash functionB’。
Accordingly, if broadcast key KB’Equal to broadcast key KB, broadcast message M is represented with broadcast key KBReally have correspondence, Then broadcast message M is correct message.If conversely, broadcast key KB’It is not equal to broadcast key KB, broadcast message M is represented with broadcast gold Key KBDo not have correspondence, then the M that broadcasts the message may be the message altered.Consequently, it is possible to the reliability of internet message transmission To be ensured.
Person especially need to not be emphasized, in other implementations aspect, to increase broadcast message M with broadcast key KBPairing property it is strong Degree, then can broadcast key K in producingBWhen add random number (Random Number) parameter application.Specifically, AMI servers 11 processor 113 can produce broadcast key K in being calculated by hash functionBWhen, further collocation one is random in calculating process The use of number parameter.Consequently, it is possible to the M and broadcast key K that broadcasts the messageBPairing will because random number parameter addition and have more Unpredictability high.Then, to make AMI network node 13 to be decrypted using identical random number parameter, AMI servers 11 Processor 113 can by random number parameter with broadcast message M simultaneously be encrypted as encrypted broadcast messages, broadcast in the lump to AMI network section Point 13.
Accordingly, the processor 133 of AMI network node 13 is just using broadcast key KBEncrypted broadcast messages decryption is obtained Random number parameter and broadcast message M, and broadcast key K in being produced using random number parameterB’Afterwards, according to itself and broadcast key KBWhether The result being consistent, judges the correctness of broadcast message M.Need to illustrate in addition, the key system that is used in first embodiment and Random number parameter, its related application is technology well known to those skilled in the art, therefore be will not be described in great detail.
Fig. 2A is refer to, it is the schematic diagram of an AMI network system 2 of second embodiment of the invention.Wherein, must especially say Bright person, the system architecture and network connection environment in second embodiment with preceding embodiment is identical, therefore symbol identical element Function is also same, is repeated no more in this.And second embodiment is with the difference of preceding embodiment, second embodiment description is multiple The implementation aspect of AMI network node 13a, 13b, 13c.
Similarly, in second embodiment, when the message to be carried out of AMI servers 11 is broadcasted, it first need to enter for message Row encryption.Specifically, broadcast message M is first passed through hash by the processor 113 of AMI servers 11 in before broadcast broadcast message M Function is calculated and produces broadcast key KB, consequently, it is possible to broadcast key KBCorresponding closing will be produced by hash function with broadcast message M System.
Then, the processor 113 of AMI servers 11 is utilized and broadcasts key KBEncrypted broadcast messages M obtains broadcast encryption and disappears Breath EKB(M), and using the symmetric key K corresponding to AMI network node 13a, 13b, 13ca、Kb、Kc, respectively to broadcast key KB Encrypt to obtain Encryption Key message EKa(KB)、EKb(KB)、EKc(KB).Then, the transceiver 111 of AMI servers 11 is easy to processor 113 by encrypted broadcast messages EKBAnd Encryption Key message EK (M)a(KB)、EKb(KB)、EKc(KB) concatenate as message EKB(M)|| EKa(KB)||Kb(KB)||EKc(KB) after, carry out message broadcast.
By taking AMI network node 13a as an example, when the transceiver of AMI network node 13a is in the broadcast of reception AMI servers 11 Encrypted broadcast messages EKBAnd Encryption Key message EK (M)a(KB)、EKb(KB)、EKc(KB) concatenation message EKB(M)||EKa (KB)||EKb(KB)||EKc(KB) after, the processor of AMI network node 13a then utilizes symmetric key KaBy Encryption Key message EKa(KB) decryption obtains broadcast key KB, and key K is broadcasted in utilizationBBy encrypted broadcast messages EKB(M) decryption is broadcast the message M.Similarly, AMI network node 13b, 13c are also using symmetric key Ka、KbObtain the M that broadcasts the message.
Immediately, the content that the processor of AMI network node 13a, 13b, 13c just can be described in detail according to first embodiment, respectively Judge broadcast message M with broadcast key K using hash functionBWhether correspond to, and judge the correctness of broadcast message M according to this.Together Sample ground, if broadcast key KB’Equal to broadcast key KB, broadcast message M is represented with broadcast key KBReally tool correspondence, then broadcast and disappear Breath M is correct message;If broadcast key KB’It is not equal to broadcast key KB, broadcast message M is represented with broadcast key KBDo not have correspondence Property, then the M that broadcasts the message may be the message altered.
On the other hand, due to traditional key cipher mode, such as encryption standard (Data Encryption Standard, DES) or advanced encryption standard (Advanced Encryption Standard, AES), it all utilizes same symmetric key, pin The data bit element adjustment of many bouts is carried out to message, in other words, if AMI servers need to be for multiple AMI network nodes, using many When individual symmetric key broadcast the encryption of key, the time spent by it will be considerable.Accordingly, in other implementations aspect In, the speed of overall encryption and data transfer can be lifted by accelerating the calculating speed of Encryption Key message.
Please also refer to Fig. 2 B, it is the comparing figure of the quick encryption with conventional cryptography of second embodiment of the invention.Specifically For, using known cipher mode, when the key for heterogeneous networks node is encrypted every time, all need to repeat completely The encipheror of (X bout bits adjustment action), and known complete action is mainly adjusted to two-stage (y bouts by the present invention Bit adjustment action is plus z bout bits adjustment action).
In more detail, in broadcast key KBDuring being encrypted to Encryption Key message, the processor of AMI servers 11 111 first with an elementary key, by broadcast key KBPreliminarily encryption is converted to one first preliminary ciphertext (its process is y bouts Bit adjustment action), then, the processor 111 of AMI servers 11 is recycled and corresponds to AMI network node 13a, 13b, 13c Symmetric key Ka、Kb、Kc, the first preliminary ciphertext is converted into Encryption Key message EK respectivelya(KB)、EKb(KB)、EKc(KB) (its process is respectively the bit adjustment action of z bouts).
Oppositely, by taking AMI network node 13a as an example, the processor of AMI network node 13a just can be first with elementary key By Encryption Key message EKa(KB) one second preliminary ciphertext is converted into, recycle symmetric key KaSecond preliminary ciphertext is converted into Broadcast key KB.Similarly, AMI network node 13b, 13c also can second order segmentation ground by Encryption Key message EKb(KB)、EKc(KB) Decryption respectively obtains KB
Accordingly, be should be clear from by Fig. 2 B, using known cipher mode, every time for the key of heterogeneous networks node When being encrypted, all need to repeat the encipheror of complete (X bout bits adjustment action).It is so close by the two-stage of the invention Literary transfer process is advantageous in that, because the content of the first preliminary ciphertext has identical content compared to different AMI network nodes, Therefore, AMI servers 11 just can be in calculating Encryption Key message EKa(KB)、EKb(KB)、EKc(KB) during, recycling First preliminary ciphertext, consequently, it is possible to AMI servers 11 will be may be such that when the Encryption Key message of different nodes is calculated, significantly Reduce its computational burden.
For example, as foregoing y=5 and z=5, then in conventional cryptography program, it mainly utilizes same symmetrical gold Key, the data bit element adjustment of X=10 bouts (y+z) is carried out for message, therefore, when AMI servers are intended to calculate three AMI networks During the Encryption Key message of node, the data bit element that AMI servers need to carry out 10 bouts for three AMI network nodes respectively is adjusted Whole, in this way, being directed to three AMI network nodes, AMI servers must carry out the data bit element adjustment of 3x10=30 bouts altogether.
If so being encrypted by the two-stage of the invention, AMI servers can carry out y=5 first with elementary key for message The data bit element of bout is adjusted to obtain preliminary ciphertext, then, when AMI servers are intended to calculate three encryptions of AMI network node During key message, AMI servers can directly using the preliminary ciphertext for having been adjusted by 5 bout data bit elements, for three AMI nets Network node carries out the data bit element adjustment of z=5 bouts respectively again, in this way, AMI servers only need to carry out 5+5x3=20 times altogether The data bit element adjustment of conjunction just can reach same encryption effect.
A 3rd embodiment of the invention is a message broadcasting method, and its flow chart refer to Fig. 3.The side of 3rd embodiment Method be used for an AMI network system (the AMI network system 1 of such as previous embodiment) and its AMI servers that are included and An at least AMI network node (such as AMI servers 11 and AMI network node 13 of previous embodiment).3rd embodiment it is detailed Thin step is as described below.
First, step 301 is performed, makes the AMI servers for a broadcast message, produce one to broadcast by a hash function Key.Step 302 is performed, makes the AMI server by utilizing broadcast key that the broadcast message is encrypted as into an encrypted broadcast messages. Step 303 is performed, makes the AMI server by utilizing claim key corresponding at least one pair of of an at least AMI network node, this is wide Broadcast key and be encrypted as an at least Encryption Key message.Perform step 304, make the AMI servers by the encrypted broadcast messages and An at least Encryption Key message is broadcasted to an at least AMI network node.Step 305 is performed, an at least AMI network section is made At least Encryption Key decryption is called the broadcast key using at least one pair of key by point.
Then, step 306 is performed, makes an at least AMI network node utilize the broadcast key by the encrypted broadcast messages Decrypt as the broadcast message.Step 307 is performed, an at least AMI network node is made in judging the broadcast using the hash function Whether message is to that should broadcast key, if correspondence, represents that the broadcast message has correctness, then perform step 308, processes the broadcast Message, if not corresponding to, then it represents that the broadcast message may be altered, then perform step 309, ignores the broadcast message.
Similarly, to increase the intensity that the broadcast message matches property with the broadcast key, then can be in the generation broadcast key When add random number parameter application.Specifically, in step 301, the AMI servers more can be for the broadcast message, by this Hash function and a random number parameter produce the broadcast key, and in step 302, the AMI servers are just using broadcast gold The broadcast message and the random number parameter are encrypted as the encrypted broadcast messages by key.
Accordingly, in step 306, an at least AMI network node is then using the broadcast key by the encrypted broadcast messages It is the broadcast message and the random number parameter to decrypt, and in step 307, an at least AMI network node just can be in miscellaneous using this Gather function and after the random number parameter judges that the broadcast message corresponds to the broadcast key, process the broadcast message.Consequently, it is possible to Because the random number parameter has random nature, therefore, the broadcast message will be because of the random number parameter with the pairing of the broadcast key Addition and there is unpredictability higher.
A fourth embodiment of the invention is a message broadcasting method, and its flow chart refer to Fig. 4.The side of fourth embodiment Method be used for an AMI network system (the AMI network system 2 of such as previous embodiment) and its AMI servers that are included and An at least AMI network node (such as AMI servers 11 of previous embodiment and AMI network node 13a, 13b, 13c).4th is real The detailed step for applying example is as described below.
First, step 401 is performed, makes the AMI servers for a broadcast message, produce one to broadcast by a hash function Key.Step 402 is performed, makes the AMI server by utilizing broadcast key that the broadcast message is encrypted as into an encrypted broadcast messages. Step 403 is performed, makes the elementary key of AMI server by utilizing one that the broadcast key is converted into one first preliminary ciphertext.Perform Step 404, make the AMI server by utilizing corresponding to an at least AMI network node this at least one pair of claim key by this first Preliminary ciphertext is converted into an at least Encryption Key message.
Then, step 405 is performed, makes the AMI servers that the encrypted broadcast messages and an at least Encryption Key disappear Breath is broadcasted to an at least AMI network node.Step 406 is performed, makes an at least AMI network node be incited somebody to action using the elementary key The Encryption Key message is converted into one second preliminary ciphertext.Step 407 is performed, makes an at least AMI network node utilize this pair Claim key that the second preliminary ciphertext is converted into the broadcast key.
Immediately, step 408 is performed, makes an at least AMI network node utilize the broadcast key by the encrypted broadcast messages Decrypt as the broadcast message.Step 409 is performed, an at least AMI network node is made in judging the broadcast using the hash function Whether message is to that should broadcast key, if correspondence, represents that the broadcast message has correctness, then perform step 410, processes the broadcast Message, if not corresponding to, then it represents that the broadcast message may be altered, then perform step 411, ignores the broadcast message.
In sum, AMI servers of the invention, AMI network node, AMI network system and its message broadcasting method, will It is able to more security and more efficient way completes the transmission of internet message, it is normal with the running for ensuring AMI network system.
Only above-described embodiment is only illustrative implementation aspect of the invention, and explains technical characteristic of the invention, Not it is used for limiting protection category of the invention.Any people skilled in the art can it is unlabored change or isotropism peace Row belongs to the scope that the present invention is advocated, the scope of the present invention should be defined by claims.

Claims (24)

1. a kind of message broadcasting method for being used for an intelligent meter infrastructure AMI servers, the AMI servers are used for one In AMI network system, the AMI network system further includes an AMI network node, and the message broadcasting method is comprised the steps of:
A () makes the AMI servers for a broadcast message, produce one to broadcast key by a hash function;
B () makes the AMI server by utilizing broadcast key that the broadcast message is encrypted as into an encrypted broadcast messages;
(c) make the AMI server by utilizing corresponding to the AMI network node a symmetric key by the broadcast key be encrypted as one plus Close key message;And
D () makes the AMI server broadcasts encrypted broadcast messages and the Encryption Key message, so that the AMI network node is sharp It is the broadcast key to be decrypted the Encryption Key message with the symmetric key, using the broadcast key by the encrypted broadcast messages solution Close is the broadcast message, and after judging that the broadcast message corresponds to the broadcast key using the hash function, processes the broadcast Message.
2. message broadcasting method as claimed in claim 1, wherein, step (a) is further included:
(a1) make the AMI servers for the broadcast message, broadcast gold is produced by the hash function and a random number parameter Key;
Wherein, step (b) is further included:
(b1) make the AMI server by utilizing broadcast key that the broadcast message and the random number parameter are encrypted as into the broadcast encryption Message;
Wherein, step (d) is further included:
(d1) the AMI server broadcasts encrypted broadcast messages and the Encryption Key message are made, so that the AMI network node is sharp It is the broadcast key to be decrypted the Encryption Key message with the symmetric key, using the broadcast key by the encrypted broadcast messages solution It is close for the broadcast message and the random number parameter, and in judging that the broadcast message is right using the hash function and the random number parameter The broadcast message should be processed in after the broadcast key.
3. message broadcasting method as claimed in claim 1, wherein, step (c) is further included:
(c1) make the elementary key of AMI server by utilizing one that the broadcast key is converted into a preliminary ciphertext;And
(c2) make the AMI server by utilizing that the preliminary ciphertext are converted into this corresponding to the symmetric key of the AMI network node Encryption Key message;
Wherein, step (d) is further included:
(d2) the AMI server broadcasts encrypted broadcast messages and the Encryption Key message are made, so that the AMI network node is sharp It is the broadcast key to be decrypted the Encryption Key message with the symmetric key and the elementary key, should using the broadcast key Encrypted broadcast messages decryption be the broadcast message, and in using the hash function judge the broadcast message correspond to the broadcast key Afterwards, the broadcast message is processed.
4. a kind of message broadcasting method for being used for an intelligent meter infrastructure AMI servers, the AMI servers are used for one In AMI network system, the AMI network system further includes an AMI network node, and the AMI network system is added using a broadcast key The close message for being sent to the AMI network node, the message broadcasting method is comprised the steps of:
A () makes the elementary key of AMI server by utilizing one that the broadcast key is converted into a preliminary ciphertext;
(b) make the AMI server by utilizing corresponding to the AMI network node a symmetric key by the preliminary ciphertext be converted into one plus Close key message;And
C () makes the AMI server broadcasts Encryption Key message, so that the AMI network node is using the symmetric key and should Encryption Key message decryption is the broadcast key by elementary key.
5. a kind of message broadcasting method for being used for an intelligent meter infrastructure AMI network node, the AMI network node is used for In one AMI network system, the AMI network system further includes an AMI servers, and the message broadcasting method is comprised the steps of:
A () makes the AMI network node receive an encrypted broadcast messages and an Encryption Key message from the AMI servers;
B it is a broadcast key by Encryption Key message decryption using a symmetric key that () makes the AMI network node;
C it is a broadcast message by encrypted broadcast messages decryption using the broadcast key that () makes the AMI network node;And
D () makes the AMI network node after judging that the broadcast message corresponds to the broadcast key using a hash function, treatment should Broadcast message.
6. message broadcasting method as claimed in claim 5, wherein, step (c) is further included:
(c1) it is that the broadcast message and one are random by encrypted broadcast messages decryption using the broadcast key to make the AMI network node Number parameter;
Wherein, step (d) is further included:
(d1) make the AMI network node wide in judging that the broadcast message corresponds to this using the hash function and the random number parameter After broadcasting key, the broadcast message is processed.
7. message broadcasting method as claimed in claim 5, wherein, step (b) is further included:
(b1) make the AMI network node that the Encryption Key message are converted into a preliminary ciphertext using an elementary key;And
(b2) make the AMI network node that the preliminary ciphertext are converted into the broadcast key using the symmetric key.
8. a kind of message broadcasting method for being used for an intelligent meter infrastructure AMI network node, the AMI network node is used for In one AMI network system, the AMI network system further includes an AMI servers, and the message broadcasting method is comprised the steps of:
A () makes the AMI network node receive an Encryption Key message from the AMI servers, the Encryption Key message is a broadcast Message after key encryption;
B () makes the AMI network node be converted to the Encryption Key message using the symmetric key corresponding to the AMI servers One preliminary ciphertext;And
C () makes the AMI network node be converted into the preliminary ciphertext using an elementary key to decrypt the AMI server broadcasts Encryption message the broadcast key.
9. a kind of message broadcasting method for being used for an intelligent meter infrastructure AMI network system, the AMI network system is included One AMI servers and an AMI network node, the message broadcasting method are comprised the steps of:
A () makes the AMI servers for a broadcast message, produce one to broadcast key by a hash function;
B () makes the AMI server by utilizing broadcast key that the broadcast message is encrypted as into an encrypted broadcast messages;
(c) make the AMI server by utilizing corresponding to the AMI network node a symmetric key by the broadcast key be encrypted as one plus Close key message;
D () makes the AMI servers broadcast to the AMI network node encrypted broadcast messages and the Encryption Key message;
E it is the broadcast key by Encryption Key message decryption using the symmetric key that () makes the AMI network node;
F it is the broadcast message by encrypted broadcast messages decryption using the broadcast key that () makes the AMI network node;And
G () makes the AMI network node after judging that the broadcast message corresponds to the broadcast key using the hash function, treatment should Broadcast message.
10. message broadcasting method as claimed in claim 9, wherein, step (a) is further included:
(a1) make the AMI servers for the broadcast message, broadcast gold is produced by the hash function and a random number parameter Key;
Wherein, step (b) is further included:
(b1) make the AMI server by utilizing broadcast key that the broadcast message and the random number parameter are encrypted as into the broadcast encryption Message;
Wherein, step (f) is further included:
(f1) it is the broadcast message and the unrest by encrypted broadcast messages decryption using the broadcast key to make the AMI network node Number parameter;
Wherein, step (g) is further included:
(g1) make the AMI network node wide in judging that the broadcast message corresponds to this using the hash function and the random number parameter After broadcasting key, the broadcast message is processed.
11. message broadcasting methods as claimed in claim 9, wherein, step (c) is further included:
(c1) make the elementary key of AMI server by utilizing one that the broadcast key is converted into one first preliminary ciphertext;And
(c2) the AMI server by utilizing is made to change the first preliminary ciphertext corresponding to the symmetric key of the AMI network node Into the Encryption Key message;
Wherein, step (e) is further included:
(e1) make the AMI network node that the Encryption Key message are converted into one second preliminary ciphertext using the elementary key;And
(e2) make the AMI network node that the second preliminary ciphertext are converted into the broadcast key using the symmetric key.
A kind of 12. message broadcasting methods for being used for an intelligent meter infrastructure AMI network system, the AMI network system bag Containing an AMI servers and an AMI network node, the AMI server by utilizing one broadcast key encryption is sent to the AMI network section The message of point, the message broadcasting method is comprised the steps of:
A () makes the elementary key of AMI server by utilizing one that the broadcast key is converted into one first preliminary ciphertext;
B () makes the AMI server by utilizing be converted into the first preliminary ciphertext corresponding to a symmetric key of the AMI network node One Encryption Key message;
C () makes the AMI server broadcasts Encryption Key message;
D () makes the AMI network node after the Encryption Key message is received, turned the Encryption Key message using the elementary key Change one second preliminary ciphertext into;And
E () makes the AMI network node be converted into decrypting the AMI servers by the second preliminary ciphertext using the symmetric key The broadcast key of the encryption message of broadcast.
A kind of 13. intelligent meter infrastructure AMI servers, for an AMI network system in, the AMI network further includes one AMI network node, the AMI servers are included:
One processor, is used to for a broadcast message, produces one to broadcast key by a hash function, will using the broadcast key The broadcast message is encrypted as an encrypted broadcast messages, and is broadcasted this using the symmetric key corresponding to the AMI network node Key is encrypted as an Encryption Key message;And
One transceiver, is used to broadcast the encrypted broadcast messages and the Encryption Key message, so as to the AMI network node is utilized be somebody's turn to do Encryption Key message decryption is the broadcast key by symmetric key, is by encrypted broadcast messages decryption using the broadcast key The broadcast message, and after judging that the broadcast message corresponds to the broadcast key using the hash function, process the broadcast message.
14. AMI servers as claimed in claim 13, wherein, the processor is more used to for the broadcast message, miscellaneous by this Gather function and a random number parameter produces the broadcast key, and using the broadcast key by the broadcast message and the random number parameter The encrypted broadcast messages are encrypted as, the transceiver is used in the broadcast encrypted broadcast messages and the Encryption Key message, so that Encryption Key message decryption is the broadcast key using the symmetric key by the AMI network node, will using the broadcast key Encrypted broadcast messages decryption is the broadcast message and the random number parameter, and in using the hash function and the random number parameter After judging that the broadcast message corresponds to the broadcast key, the broadcast message is processed.
15. AMI servers as claimed in claim 13, wherein, the processor is more used to broadcast this using an elementary key Key is converted to a preliminary ciphertext, and is converted into the preliminary ciphertext using the symmetric key corresponding to the AMI network node The Encryption Key message, the transceiver is used to broadcast the encrypted broadcast messages and the Encryption Key message, so that the AMI network Encryption Key message decryption is the broadcast key using the symmetric key and the elementary key by node, using broadcast gold Encrypted broadcast messages decryption is the broadcast message by key, and wide in judging that the broadcast message corresponds to this using the hash function After broadcasting key, the broadcast message is processed.
A kind of 16. intelligent meter infrastructure AMI servers, for an AMI network system in, the AMI network further includes one AMI network node, the AMI network system is sent to the message of the AMI network node, AMI clothes using a broadcast key encryption Business device is included:
One processor, is used to the broadcast key is converted into a preliminary ciphertext using an elementary key, and using corresponding to the AMI The preliminary ciphertext is converted into an Encryption Key message by one symmetric key of network node;And
One transceiver, is used to broadcast the Encryption Key message, so that the AMI network node is using the symmetric key and this is elementary Encryption Key message decryption is the broadcast key by key.
A kind of 17. intelligent meter infrastructure AMI network nodes, for an AMI network system, the AMI network system is more wrapped Containing an AMI servers, the AMI network node is included:
One transceiver, to receive an encrypted broadcast messages and an Encryption Key message from the AMI servers;And
One processor, is used to Encryption Key message decryption using a symmetric key for one broadcasts key, using broadcast gold Encrypted broadcast messages decryption is a broadcast message by key, and wide in judging that the broadcast message corresponds to this using a hash function After broadcasting key, the broadcast message is processed.
18. AMI network nodes as claimed in claim 17, wherein, the processor is more used to add this using the broadcast key The close decryption that broadcasts the message is the broadcast message and a random number parameter, and judges to be somebody's turn to do using the hash function and the random number parameter After broadcast message corresponds to the broadcast key, the broadcast message is processed.
19. AMI network nodes as claimed in claim 17, wherein, the processor is more used to add this using an elementary key Close key message is converted into a preliminary ciphertext, and the preliminary ciphertext is converted into the broadcast key using the symmetric key.
A kind of 20. intelligent meter infrastructure AMI network nodes, for an AMI network system, the AMI network system is more wrapped Containing an AMI servers, the AMI network node is included:
One transceiver, to receive an Encryption Key message from the AMI servers, the Encryption Key message is that a broadcast key adds Message after close;And
One processor, is used to be converted at the beginning of one the Encryption Key message using the symmetric key corresponding to the AMI servers Step ciphertext, and the preliminary ciphertext is converted into decrypting the encryption message of the AMI server broadcasts using an elementary key The broadcast key.
A kind of 21. intelligent meter infrastructure AMI network systems, comprising:
One AMI servers;And
One AMI network node;
Wherein, the AMI servers produce one to broadcast key for a broadcast message by a hash function, using broadcast gold The broadcast message is encrypted as an encrypted broadcast messages by key, using the symmetric key corresponding to the AMI network node that this is wide Broadcast key and be encrypted as an Encryption Key message, and the encrypted broadcast messages and the Encryption Key message are broadcasted to the AMI nets Encryption Key message decryption is the broadcast key using the symmetric key by network node, the AMI network node, using the broadcast Encrypted broadcast messages decryption is the broadcast message by key, and is somebody's turn to do in judging that the broadcast message corresponds to using the hash function After broadcast key, the broadcast message is processed.
22. AMI network systems as claimed in claim 21, wherein, the AMI servers more for the broadcast message, by this Hash function and a random number parameter produce the broadcast key, and are joined the broadcast message and the random number using the broadcast key Number is encrypted as the encrypted broadcast messages, and encrypted broadcast messages decryption is more by the AMI network node using the broadcast key should Broadcast message and the random number parameter, and be somebody's turn to do in judging that the broadcast message corresponds to using the hash function and the random number parameter After broadcast key, the broadcast message is processed.
23. AMI network systems as claimed in claim 21, wherein, the AMI servers are more broadcasted this using an elementary key Key is converted to one first preliminary ciphertext, and using the symmetric key corresponding to the AMI network node that this is first preliminary close Text is converted into the Encryption Key message, and the Encryption Key message is more converted into one by the AMI network node using the elementary key Second preliminary ciphertext, and the second preliminary ciphertext is converted into the broadcast key using the symmetric key.
A kind of 24. intelligent meter infrastructure AMI network systems, comprising:
One AMI network node;And
One AMI servers, with the broadcast key for being used to encrypt the message for being sent to the AMI network node;
Wherein, the broadcast key is converted to one first preliminary ciphertext by the elementary key of AMI server by utilizing one, and using corresponding The first preliminary ciphertext is converted into an Encryption Key message in a symmetric key of the AMI network node, the AMI servers are more It is used to broadcast the Encryption Key message, the AMI network node, should using the elementary key after the Encryption Key message is received Encryption Key message is converted into one second preliminary ciphertext, and is converted into solving by the second preliminary ciphertext using the symmetric key The broadcast key of the encryption message of the close AMI server broadcasts.
CN201210532359.4A 2012-12-11 2012-12-11 Intelligent meter infrastructure network system and its message broadcasting method Active CN103873270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210532359.4A CN103873270B (en) 2012-12-11 2012-12-11 Intelligent meter infrastructure network system and its message broadcasting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210532359.4A CN103873270B (en) 2012-12-11 2012-12-11 Intelligent meter infrastructure network system and its message broadcasting method

Publications (2)

Publication Number Publication Date
CN103873270A CN103873270A (en) 2014-06-18
CN103873270B true CN103873270B (en) 2017-06-23

Family

ID=50911420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210532359.4A Active CN103873270B (en) 2012-12-11 2012-12-11 Intelligent meter infrastructure network system and its message broadcasting method

Country Status (1)

Country Link
CN (1) CN103873270B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410474B (en) * 2014-08-26 2017-09-26 苏州佳世达电通有限公司 A kind of communication system and the means of communication
CN104363219B (en) * 2014-11-06 2018-07-10 江苏林洋能源股份有限公司 A kind of three parts cipher key management method based on IEC62056 data transmission security standards

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141254A (en) * 2007-10-30 2008-03-12 西安西电捷通无线网络通信有限公司 Access authentication method suitable for IBSS network
US7464266B2 (en) * 2004-02-13 2008-12-09 Microsoft Corporation Cheap signatures for synchronous broadcast communication
CN101431414A (en) * 2008-12-15 2009-05-13 西安电子科技大学 Authentication group key management method based on identity
EP2273393A2 (en) * 1998-05-29 2011-01-12 Palm, Inc. Method and apparatus for communicating information over low bandwidth communications networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2273393A2 (en) * 1998-05-29 2011-01-12 Palm, Inc. Method and apparatus for communicating information over low bandwidth communications networks
US7464266B2 (en) * 2004-02-13 2008-12-09 Microsoft Corporation Cheap signatures for synchronous broadcast communication
CN101141254A (en) * 2007-10-30 2008-03-12 西安西电捷通无线网络通信有限公司 Access authentication method suitable for IBSS network
CN101431414A (en) * 2008-12-15 2009-05-13 西安电子科技大学 Authentication group key management method based on identity

Also Published As

Publication number Publication date
CN103873270A (en) 2014-06-18

Similar Documents

Publication Publication Date Title
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
CN109005027B (en) Random data encryption and decryption method, device and system
CN112287377A (en) Model training method based on federal learning, computer equipment and storage medium
CN105227298B (en) Intelligent substation message safe transmission implementation method based on modified GCM
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN103117851A (en) Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN108632042A (en) A kind of class AKA identity authorization systems and method based on pool of symmetric keys
WO2023160420A1 (en) Group message encryption method and apparatus, device and storage medium
CN115022102B (en) Transmission line monitoring data transmission method and device, computer equipment and storage medium
CN111224958A (en) Data transmission method and system
CN114338648A (en) SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm
CN103873270B (en) Intelligent meter infrastructure network system and its message broadcasting method
Wang et al. Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
Zhang Application of information encryption technology in computer network communication security
CN113364803B (en) Block chain-based security authentication method for power distribution Internet of things
CN108134799A (en) Novel encipher-decipher method and its device
US8195949B2 (en) Mechanism for generating message sequence order numbers
CN115277040A (en) Medical health data storage and sharing method and system based on block chain technology
CN110932843B (en) Data communication encryption method for embedded system
Tao et al. Design of two-way one-time-password authentication scheme based on true random numbers
CN106911625A (en) A kind of text handling method of safe input method, device and system
US20170026829A1 (en) Advanced metering infrastructure network system and message broadcasting method
TWI571086B (en) Advanced metering infrastructure network system and message broadcasting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant