CN104639311A - Combining method and system for protecting power utilization privacy and integrity in smart power grid - Google Patents
Combining method and system for protecting power utilization privacy and integrity in smart power grid Download PDFInfo
- Publication number
- CN104639311A CN104639311A CN201510012106.8A CN201510012106A CN104639311A CN 104639311 A CN104639311 A CN 104639311A CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 A CN104639311 A CN 104639311A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- power consumption
- trusted party
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a combining method and system for protecting power utilization privacy and integrity in a smart power grid. According to the method, a smart electric meter arranged for a user is used for recording and reporting the power consumption of the user in real time; a gateway having computing capability is responsible for a data combining function and a relay function; a control center is used for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services; a credible center is used for managing a whole system. The method comprises a system initialization stage (1), a user data reporting stage (2), a security data combining stage (3) and combined data recovery extremism (4). By adopting the combining method and system, a safe data combining system is implemented, and the power utilization privacy of the user is protected; meanwhile, the integrity of data is ensured, namely, data communication errors are detected and reported technically, the user is prevented from reporting illegally with a false name, and the reported power consumption is prevented from being illegally captured, modified, faked and the like.
Description
Technical field
The invention belongs to intelligent power grid technology field, be specifically related to polymerization and the system of electricity consumption privacy and integrity protection in a kind of intelligent grid.
Background technology
In intelligent power grid technology field, the people such as Peng Liu propose the data aggregate scheme of topological correlation mechanism Network Based, effectively can collect the power consumption of user.First, by design data polymerization tree, quality control center can collect the power consumption of all users from bottom to top.Secondly, by adopting homomorphic cryptography technology, in tree, each node can be polymerized in the data of the cryptogram space to its all child node, thus not revealing on user power utilization amount basis expressly, protects the privacy of user.But in intelligent grid application system, under accidental data communication error, inside and outside assailant malice distort the application scenarios of communication data, the completeness guarantee of data is extremely important equally.The scheme of the people such as Peng Liu, does not have data integrity audit function.Therefore, the contingency data packet transmission mistake in Internet Transmission can not be found, can not ensure that user submits real power consumption data strictly according to the facts to, assailant can not be resisted and intercept and capture and malice altered data.
Fengjun Li etc., improve the segmental defect of people's schemes such as Peng Liu, propose a protection privacy of user, and the data aggregate scheme of power consumption integrality.The overall architecture of its data aggregate system as shown in Figure 1.Root node in figure, as quality control center, is initiated the request of data aggregate, and is collected final result.System is collected from below to up and is polymerized electricity consumption total amount, and the power consumption of all child nodes is polymerized by each node, superposes the power consumption of this node, and reports to corresponding father node.Such as, the data of node 5 pairs of nodes 7, node 8 and node 5 self are polymerized, and are reported to node 2.
First, this system proposes end-to-end digital signature scheme based on homomorphism signature, and based on the special topological structure under embody rule scene, along network link, produces and upgrade the check code of each network node data polymerization result successively.Check code is for ensureing the integrality of aggregated data.Secondly, devise a digital signature scheme based on a hop node, and an increment authentication mechanism, illegally intercepted and captured to resist communication data packet and revised.
There is following defect in this system:
(1) each user carries out digital signature to respective output data, and result is stored in father node, causes huge additional data communication expense and storage overhead.
(2) they claim quality control center, after data may be attacked, can start increment certifying digital signature system afterwards, find out suspicious data, thus ensure that credibility and the non-repudiation of data.Then, due to the defective of adopted technology itself, accurate description and definition can not be carried out to the feature of suspicious data.Therefore, this system accurately can not judge the time point of the increment certifying digital signature system that startup and execution calculating and communication overhead are huge; And due to the ambiguity of suspicious data characteristic, actual operability is poor, and experiment shows, the data integrity sexual assault that (often judge by accident or fail to judge) is potential under a lot of scene, effectively accurately can not be located.
(3) in this system; quality control center, when checking suspicious data, by log-on data integrity checker, can obtain the power consumption clear data of each user; effectively can not prevent quality control center from abusing authority, thus the privacy information of user can not be protected technically.
(4) they claim and can prevent internal user from changing the data submitted to.When whether trace data is revised by internal user, quality control center is submitted to each node and the digital signature depositing in father node is verified one by one, checks possible data tampering.But the method is not highly resistant to conspiracy attack.Such as, certain node and his father's node are ganged up, and maliciously can change the data of submission and fabricate corresponding pseudo-evidence, finally get around and by the tracing program of quality control center.
Summary of the invention
For the defect existed in prior art, the object of the present invention is to provide polymerization and the system of electricity consumption privacy and integrity protection in a kind of intelligent grid.
The polymerization of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that the method reports the power consumption of user by the intelligent electric meter real time record be arranged in user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Whole system is in charge of by trusted party.Concrete steps are as follows:
(1) system initialisation phase:
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter
wherein
the Safety Big Prime Number of to be length be k, and select group
generator
;
Gen (k): select to be situated between for Big prime
two cyclic groups
,
with
upper definition non degenerate and efficient bilinear operation
and meet:
Bilinearity: for all
, meet
with
;
Non-degeneracy: for all
, exist and calculate efficiently
algorithm;
Computability: for all
, there is the algorithm calculating e (P, Q) efficiently;
2) trusted party Stochastic choice
;
3) trusted party selects hash function h and h of two cryptography meaning safety
1, wherein,
;
4) trusted party Stochastic choice n
, wherein
and meet
, and by each
be distributed to each user respectively
;
5) trusted party Stochastic choice n respectively
,
with
, wherein
and by each
with
be distributed to each user respectively
, trusted party calculates simultaneously
with
;
6) trusted party Stochastic choice
, and calculate
with
, wherein
;
7) last, each user
obtain and maintain secrecy
;
GW obtains and maintains secrecy
;
CC obtains and maintains secrecy
;
The public information of system is
with
, wherein
;
(2) user data reports the stage
At data report time point t, user
perform following operation, by power consumption
report to gateway:
1) calculate
2) will
with
send to gateway;
(3) the secure data aggregation stage
Gateway receives
with
after, perform operation below:
1) calculate
2) check
whether meet.If do not met, can detect that the integrality of user power utilization amount is destroyed; If met, will
send to control centre, the detailed process of above equation checking is as follows:
(4) aggregated data Restoration stage
Control centre receives
after, according to the secret information that it is grasped
, calculate
based on
for the logarithm at the end, thus obtain the polymerization power consumption of user
.
The paradigmatic system of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that comprising:
Trusted party: be in charge of whole system, comprises and carries out initialization to system, registers new user, issues key;
Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection;
Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized; Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling;
User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.
The paradigmatic system of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that this paradigmatic system also comprises:
(1) system initialization module
1) under the control of trusted party, adopt distributed technology, n user, share n secret information
, and meet
, for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced
with
technology, wherein
, for the method for authentication of users power consumption integrality in the module;
4) under the control of trusted party, control centre obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
(2) user data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
(3) secure data aggregation module
1) gateway is by combining
and remove the blind factor
the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related
method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
(4) aggregated data recovers module
Based on secret information
, calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption
method.
Compared with prior art, there is following beneficial effect in the present invention:
(1) ensure that privacy and the integrality of user power utilization amount simultaneously, achieve secure data aggregation function, and the automatic time achieving all users is synchronous;
(2), when each power consumption is reported, each user only need transmit two kinds of data:
with
, communication and computational efficiency are better than all existing systems;
(3), after data suffer to attack (comprise that communication makes mistakes, external attacker is intercepted and captured and distort, internal user pretends to be other user's illegal modifications data etc.), at any time, automatically, initiatively can find that the integrality of data is destroyed;
(4) thoroughly prevent gateway and control centre's abuse authority, obtain the private data of unique user.Wherein, gateway can only obtain encrypt data and the aggregated data of user power utilization amount; Control centre can only obtain total power consumption.
(5) conspiracy attack of user can effectively be resisted.User not by mutually ganging up, Update Table and not being found; User can not by the data of other users of malicious modification, and frame other users, to reach the object that deception quality control center takes Wrong control decision-making.
Accompanying drawing explanation
Fig. 1 is data aggregate system architecture structural representation in prior art;
Fig. 2 is overall system architecture structural representation of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with embodiment.
A polymerization for electricity consumption privacy and integrity protection in intelligent grid, the method is by the intelligent electric meter real time record be arranged in user and report the power consumption of user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Be in charge of whole system by trusted party, concrete steps are as follows:
System initialisation phase:
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter
, the wherein Safety Big Prime Number of q to be length be k, and select the generator of group G1
;
Gen (k): select two cyclic groups be situated between for Big prime q
,
with
upper definition non degenerate and efficient bilinear operation
and meet:
Bilinearity: for all
, meet
with
;
Non-degeneracy: exist
, make
;
Computability: for all
, exist and calculate efficiently
algorithm
2) trusted party Stochastic choice
;
3) trusted party selects the hash function of two cryptography meaning safety
with
, wherein,
;
4) trusted party Stochastic choice n
, wherein
, and meet
, and by each
be distributed to each user respectively
;
5) trusted party Stochastic choice n respectively
,
with
, wherein
and by each
with
be distributed to each user respectively
, trusted party calculates simultaneously
with
;
6) trusted party Stochastic choice
, and calculate
with
, wherein
;
7) last, each user
obtain and maintain secrecy
;
GW obtains and maintains secrecy
;
CC obtains and maintains secrecy
;
The public information of system is
with
, wherein
;
User data reports the stage
At data report time point t, user
perform following operation, by power consumption
report to gateway:
1) calculate
2) will
with
send to gateway;
The secure data aggregation stage
Gateway receives
with
after, perform operation below:
1) calculate
2) check
whether meet, if do not met, can detect that the integrality of user power utilization amount is destroyed, if met, will
send to control centre, the detailed process of above equation checking is as follows:
Aggregated data Restoration stage
Control centre receives
after, according to the secret information that it is grasped
, calculate
based on
for the logarithm at the end, thus obtain the polymerization power consumption of user
.
A paradigmatic system for electricity consumption privacy and integrity protection in intelligent grid, comprises trusted party: be in charge of whole system, comprises carrying out initialization to system, registering new user, issue key; Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection; Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized.Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling; User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.This paradigmatic system also comprises:
System initialization module
1) under the control of trusted party, adopt distributed technology, n user, share n secret information
, and meet
, for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced
with
technology, wherein
, for the method for authentication of users power consumption integrality in the module;
4) under the control of trusted party, control centre obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
User data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
Secure data aggregation module
1) gateway is by combining
and remove the blind factor
the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related
method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
Aggregated data recovers module
Based on secret information
, calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption
method.
Intelligent grid is based upon on the basis of integrated, high-speed bidirectional communication network, by the sensing of advanced person and measuring technique, advanced equipment and control and decision support technique, realizes that electrical network is reliable, safety, economy, efficient.Advanced person in intelligent grid measures a kind of important standard architecture that system (AMI) has become electric energy consumption end.In AMI, by installing the intelligent electric meter with calculating and communication capacity in user, the quality control center of all intelligent electric meters and Utilities Electric Co. is linked to be network, realizes collecting, monitoring real-time power consumption, and realize optimum distribution and the long-distance intelligent control of electric energy.In intelligent grid, by the data aggregate to each user power utilization amount, can the efficiency utilization network bandwidth, and by hiding the personal electricity of user, the electricity consumption privacy of protection user.But in order to realize smart allocation and the management of electric energy, quality control center needs frequent (usually " second " level) to obtain the power consumption information of user, and this just brings unprecedented safety and privacy concern.Therefore, this invention achieves the data aggregate system of a safety, on the one hand for the protection of the electricity consumption privacy of user; Meanwhile, also for guaranteeing the integrality of data, that is: detecting report data communication errors technically, prevent user from assuming another's name illegally to report, and the power consumption reported is by illegal intercepting and capturing, amendment, forgery etc.
Claims (3)
1. the polymerization of electricity consumption privacy and integrity protection in intelligent grid, is characterized in that the method reports the power consumption of user by the intelligent electric meter real time record be arranged in user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Be in charge of whole system by trusted party, concrete steps are as follows:
(1) system initialisation phase
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter
, the wherein Safety Big Prime Number of q to be length be k, and select group
generator
;
Gen (k): select two cyclic groups be situated between for Big prime q
,
with
upper definition non degenerate and efficient bilinear operation
and meet:
Bilinearity: for all
, meet
with
;
Non-degeneracy: exist
, make
;
Computability: for all
, exist and calculate efficiently
algorithm;
2) trusted party Stochastic choice
;
3) trusted party selects the hash function of two cryptography meaning safety
with
, wherein,
;
4) trusted party Stochastic choice n
, wherein
and meet
, and by each
be distributed to each user respectively
;
5) trusted party Stochastic choice n respectively
,
with
, wherein
and by each
with
be distributed to each user respectively
, trusted party calculates simultaneously
with
;
6) trusted party Stochastic choice
, and calculate
with
, wherein
;
7) last, each user
obtain and maintain secrecy
;
GW obtains and maintains secrecy
;
CC obtains and maintains secrecy
;
The public information of system is
with
, wherein
;
(2) user data reports the stage
At data report time point t, user
perform following operation, by power consumption
report to gateway:
1) calculate
2) will
with
send to gateway;
(3) the secure data aggregation stage
Gateway receives
with
after, perform operation below:
1) calculate
2) check
whether meet;
If do not met, can detect that the integrality of user power utilization amount is destroyed; If met, will
send to control centre, the detailed process of above equation checking is as follows:
(4) aggregated data Restoration stage
Control centre receives
after, according to the secret information that it is grasped
, calculate
based on
for the logarithm at the end, thus obtain the polymerization power consumption of user
.
2. the paradigmatic system of electricity consumption privacy and integrity protection in intelligent grid, is characterized in that comprising:
Trusted party: be in charge of whole system, comprises and carries out initialization to system, registers new user, issues key;
Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection;
Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized; Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling;
User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.
3. the paradigmatic system of electricity consumption privacy and integrity protection in a kind of intelligent grid according to claim 2, is characterized in that this paradigmatic system also comprises:
(1) system initialization module
1) under the control of trusted party, adopt distributed technology, N number of user, share n secret information
, and meet
, for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced
with
technology, wherein
, for the method for authentication of users power consumption integrality;
4) under the control of trusted party, control centre obtains
technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
(2) user data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
(3) secure data aggregation module
1) gateway is by combining
and remove the blind factor
the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related
method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
(4) aggregated data recovers module
Based on secret information
, calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption
method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104639311A true CN104639311A (en) | 2015-05-20 |
CN104639311B CN104639311B (en) | 2018-10-12 |
Family
ID=53217669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510012106.8A Active CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104639311B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790024A (en) * | 2016-12-14 | 2017-05-31 | 西安邮电大学 | Method for secret protection based on electric power injection under AMI and 5G intelligent grids |
CN108683493A (en) * | 2018-05-04 | 2018-10-19 | 西安电子科技大学 | The data aggregation method of secret protection is provided in a kind of intelligent grid |
CN108960552A (en) * | 2017-05-27 | 2018-12-07 | 华为技术有限公司 | A kind of charging method and relevant device based on Spot Price |
CN108964894A (en) * | 2018-06-28 | 2018-12-07 | 上海电力学院 | A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection |
CN109640299A (en) * | 2019-01-31 | 2019-04-16 | 浙江工商大学 | It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant |
CN109889501A (en) * | 2019-01-18 | 2019-06-14 | 浙江工商大学 | The method and system of multidimensional data polymerization and polygamma function analysis in a kind of communication of Internet of Things |
CN110049000A (en) * | 2019-01-24 | 2019-07-23 | 浙江工商大学 | A kind of size space Internet of Things communication means and system of polymerization and difference safety in plain text |
CN110661771A (en) * | 2019-06-21 | 2020-01-07 | 浙江工商大学 | Secure smart power grid access control method and system for resisting differential attack |
CN110968892A (en) * | 2019-11-18 | 2020-04-07 | 广东卓维网络有限公司 | Data encryption system based on electric quantity data query |
CN111131148A (en) * | 2019-11-11 | 2020-05-08 | 重庆邮电大学 | Aggregation method and system capable of protecting privacy data and facing smart power grid |
CN112019338A (en) * | 2019-05-31 | 2020-12-01 | 浙江工商大学 | Lightweight safety smart power grid communication method and system based on block chain |
CN112532389A (en) * | 2020-12-01 | 2021-03-19 | 南京邮电大学 | Smart power grid lightweight privacy protection data aggregation method based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921384A (en) * | 2006-09-12 | 2007-02-28 | 上海交通大学 | Public key infrastructure system, local safety apparatus and operation method |
WO2011109772A2 (en) * | 2010-03-05 | 2011-09-09 | Interdigital Patent Holdings, Inc. | Method and apparatus for providing security to devices |
CN102638345A (en) * | 2012-05-09 | 2012-08-15 | 四川师范大学 | DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption |
CN103825743A (en) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | Data security aggregation method with privacy protection function |
-
2015
- 2015-01-12 CN CN201510012106.8A patent/CN104639311B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921384A (en) * | 2006-09-12 | 2007-02-28 | 上海交通大学 | Public key infrastructure system, local safety apparatus and operation method |
WO2011109772A2 (en) * | 2010-03-05 | 2011-09-09 | Interdigital Patent Holdings, Inc. | Method and apparatus for providing security to devices |
CN102638345A (en) * | 2012-05-09 | 2012-08-15 | 四川师范大学 | DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption |
CN103825743A (en) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | Data security aggregation method with privacy protection function |
Non-Patent Citations (3)
Title |
---|
张木玲: ""智能电网中若干安全和隐私问题的研究"", 《CNKI优秀硕士学位论文全文库》 * |
柴震川等: ""An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption"", 《JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY(SCIENCE)》 * |
郭非等: ""一种基于身份的智能电网认证模式"", 《黑龙江大学自然科学学报》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790024B (en) * | 2016-12-14 | 2020-10-20 | 西安邮电大学 | Privacy protection method based on power injection under AMI and 5G intelligent power grid |
CN106790024A (en) * | 2016-12-14 | 2017-05-31 | 西安邮电大学 | Method for secret protection based on electric power injection under AMI and 5G intelligent grids |
CN108960552A (en) * | 2017-05-27 | 2018-12-07 | 华为技术有限公司 | A kind of charging method and relevant device based on Spot Price |
CN108960552B (en) * | 2017-05-27 | 2022-04-29 | 华为技术有限公司 | Charging method based on real-time electricity price and related equipment |
CN108683493A (en) * | 2018-05-04 | 2018-10-19 | 西安电子科技大学 | The data aggregation method of secret protection is provided in a kind of intelligent grid |
CN108683493B (en) * | 2018-05-04 | 2021-02-12 | 西安电子科技大学 | Data aggregation method for providing privacy protection in smart power grid |
CN108964894A (en) * | 2018-06-28 | 2018-12-07 | 上海电力学院 | A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection |
CN108964894B (en) * | 2018-06-28 | 2021-04-30 | 上海电力学院 | Power grid electricity stealing detection method based on state estimation and with privacy protection |
CN109889501A (en) * | 2019-01-18 | 2019-06-14 | 浙江工商大学 | The method and system of multidimensional data polymerization and polygamma function analysis in a kind of communication of Internet of Things |
CN109889501B (en) * | 2019-01-18 | 2021-10-26 | 浙江工商大学 | Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things |
CN110049000B (en) * | 2019-01-24 | 2021-11-23 | 浙江工商大学 | Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces |
CN110049000A (en) * | 2019-01-24 | 2019-07-23 | 浙江工商大学 | A kind of size space Internet of Things communication means and system of polymerization and difference safety in plain text |
CN109640299B (en) * | 2019-01-31 | 2021-09-21 | 浙江工商大学 | Aggregation method and system for ensuring M2M communication integrity and fault tolerance |
CN109640299A (en) * | 2019-01-31 | 2019-04-16 | 浙江工商大学 | It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant |
CN112019338A (en) * | 2019-05-31 | 2020-12-01 | 浙江工商大学 | Lightweight safety smart power grid communication method and system based on block chain |
CN110661771A (en) * | 2019-06-21 | 2020-01-07 | 浙江工商大学 | Secure smart power grid access control method and system for resisting differential attack |
CN110661771B (en) * | 2019-06-21 | 2022-03-04 | 浙江工商大学 | Secure smart power grid access control method and system for resisting differential attack |
CN111131148A (en) * | 2019-11-11 | 2020-05-08 | 重庆邮电大学 | Aggregation method and system capable of protecting privacy data and facing smart power grid |
CN111131148B (en) * | 2019-11-11 | 2022-03-22 | 重庆邮电大学 | Aggregation method and system capable of protecting privacy data and facing smart power grid |
CN110968892A (en) * | 2019-11-18 | 2020-04-07 | 广东卓维网络有限公司 | Data encryption system based on electric quantity data query |
CN112532389A (en) * | 2020-12-01 | 2021-03-19 | 南京邮电大学 | Smart power grid lightweight privacy protection data aggregation method based on block chain |
CN112532389B (en) * | 2020-12-01 | 2023-02-28 | 南京邮电大学 | Smart power grid lightweight privacy protection data aggregation method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN104639311B (en) | 2018-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639311A (en) | Combining method and system for protecting power utilization privacy and integrity in smart power grid | |
Kumar et al. | Smart grid metering networks: A survey on security, privacy and open research issues | |
Jokar et al. | A survey on security issues in smart grids | |
Rawat et al. | Cyber security for smart grid systems: Status, challenges and perspectives | |
Komninos et al. | Survey in smart grid and smart home security: Issues, challenges and countermeasures | |
Liu et al. | Cyber security and privacy issues in smart grids | |
Li et al. | Preserving data integrity for smart grid data aggregation | |
McLaughlin et al. | Energy theft in the advanced metering infrastructure | |
Li et al. | An efficient merkle-tree-based authentication scheme for smart grid | |
CN110120868B (en) | Smart power grid safety data aggregation method and system based on block chain technology | |
Ali et al. | A lightweight privacy-aware iot-based metering scheme for smart industrial ecosystems | |
Deng et al. | A secure and privacy-preserving communication scheme for advanced metering infrastructure | |
CN113691380B (en) | Multidimensional private data aggregation method in smart power grid | |
CN104219056A (en) | Privacy protection type real-time electric charge collecting method for intelligent power grid | |
CN104580061B (en) | The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid | |
Premarathne et al. | Secure and reliable surveillance over cognitive radio sensor networks in smart grid | |
CN112214544A (en) | Ubiquitous power Internet of things edge data safe storage method based on permission block chain | |
CN115118756A (en) | Method and device for designing safety interaction protocol in energy internet scene | |
CN106549767A (en) | A kind of data authentication with secret protection and tracing system | |
Alimi et al. | Security assessment of the smart grid: A review focusing on the NAN architecture | |
CN113254987B (en) | Fault-tolerant time sequence data aggregation method capable of protecting privacy | |
CN110299993A (en) | A kind of telesecurity meter register method based on improvement IBOOE algorithm | |
Lalle et al. | A privacy-protection scheme for smart water grid based on blockchain and machine learning | |
CN111786978B (en) | Electric power data aggregation acquisition method and device, computer equipment and storage medium | |
Pandey et al. | A review of security concerns in smart grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190304 Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd. Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang Patentee before: Zhejiang Gongshang University |
|
TR01 | Transfer of patent right |