CN104639311A - Combining method and system for protecting power utilization privacy and integrity in smart power grid - Google Patents

Combining method and system for protecting power utilization privacy and integrity in smart power grid Download PDF

Info

Publication number
CN104639311A
CN104639311A CN201510012106.8A CN201510012106A CN104639311A CN 104639311 A CN104639311 A CN 104639311A CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 A CN104639311 A CN 104639311A
Authority
CN
China
Prior art keywords
user
data
power consumption
trusted party
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510012106.8A
Other languages
Chinese (zh)
Other versions
CN104639311B (en
Inventor
鲍海勇
陆荣幸
陈乐�
曹珍富
董晓蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunyuan Shengli Technology Co Ltd
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201510012106.8A priority Critical patent/CN104639311B/en
Publication of CN104639311A publication Critical patent/CN104639311A/en
Application granted granted Critical
Publication of CN104639311B publication Critical patent/CN104639311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a combining method and system for protecting power utilization privacy and integrity in a smart power grid. According to the method, a smart electric meter arranged for a user is used for recording and reporting the power consumption of the user in real time; a gateway having computing capability is responsible for a data combining function and a relay function; a control center is used for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services; a credible center is used for managing a whole system. The method comprises a system initialization stage (1), a user data reporting stage (2), a security data combining stage (3) and combined data recovery extremism (4). By adopting the combining method and system, a safe data combining system is implemented, and the power utilization privacy of the user is protected; meanwhile, the integrity of data is ensured, namely, data communication errors are detected and reported technically, the user is prevented from reporting illegally with a false name, and the reported power consumption is prevented from being illegally captured, modified, faked and the like.

Description

The polymerization of electricity consumption privacy and integrity protection and system in a kind of intelligent grid
Technical field
The invention belongs to intelligent power grid technology field, be specifically related to polymerization and the system of electricity consumption privacy and integrity protection in a kind of intelligent grid.
Background technology
In intelligent power grid technology field, the people such as Peng Liu propose the data aggregate scheme of topological correlation mechanism Network Based, effectively can collect the power consumption of user.First, by design data polymerization tree, quality control center can collect the power consumption of all users from bottom to top.Secondly, by adopting homomorphic cryptography technology, in tree, each node can be polymerized in the data of the cryptogram space to its all child node, thus not revealing on user power utilization amount basis expressly, protects the privacy of user.But in intelligent grid application system, under accidental data communication error, inside and outside assailant malice distort the application scenarios of communication data, the completeness guarantee of data is extremely important equally.The scheme of the people such as Peng Liu, does not have data integrity audit function.Therefore, the contingency data packet transmission mistake in Internet Transmission can not be found, can not ensure that user submits real power consumption data strictly according to the facts to, assailant can not be resisted and intercept and capture and malice altered data.
Fengjun Li etc., improve the segmental defect of people's schemes such as Peng Liu, propose a protection privacy of user, and the data aggregate scheme of power consumption integrality.The overall architecture of its data aggregate system as shown in Figure 1.Root node in figure, as quality control center, is initiated the request of data aggregate, and is collected final result.System is collected from below to up and is polymerized electricity consumption total amount, and the power consumption of all child nodes is polymerized by each node, superposes the power consumption of this node, and reports to corresponding father node.Such as, the data of node 5 pairs of nodes 7, node 8 and node 5 self are polymerized, and are reported to node 2.
First, this system proposes end-to-end digital signature scheme based on homomorphism signature, and based on the special topological structure under embody rule scene, along network link, produces and upgrade the check code of each network node data polymerization result successively.Check code is for ensureing the integrality of aggregated data.Secondly, devise a digital signature scheme based on a hop node, and an increment authentication mechanism, illegally intercepted and captured to resist communication data packet and revised.
There is following defect in this system:
(1) each user carries out digital signature to respective output data, and result is stored in father node, causes huge additional data communication expense and storage overhead.
(2) they claim quality control center, after data may be attacked, can start increment certifying digital signature system afterwards, find out suspicious data, thus ensure that credibility and the non-repudiation of data.Then, due to the defective of adopted technology itself, accurate description and definition can not be carried out to the feature of suspicious data.Therefore, this system accurately can not judge the time point of the increment certifying digital signature system that startup and execution calculating and communication overhead are huge; And due to the ambiguity of suspicious data characteristic, actual operability is poor, and experiment shows, the data integrity sexual assault that (often judge by accident or fail to judge) is potential under a lot of scene, effectively accurately can not be located.
(3) in this system; quality control center, when checking suspicious data, by log-on data integrity checker, can obtain the power consumption clear data of each user; effectively can not prevent quality control center from abusing authority, thus the privacy information of user can not be protected technically.
(4) they claim and can prevent internal user from changing the data submitted to.When whether trace data is revised by internal user, quality control center is submitted to each node and the digital signature depositing in father node is verified one by one, checks possible data tampering.But the method is not highly resistant to conspiracy attack.Such as, certain node and his father's node are ganged up, and maliciously can change the data of submission and fabricate corresponding pseudo-evidence, finally get around and by the tracing program of quality control center.
Summary of the invention
For the defect existed in prior art, the object of the present invention is to provide polymerization and the system of electricity consumption privacy and integrity protection in a kind of intelligent grid.
The polymerization of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that the method reports the power consumption of user by the intelligent electric meter real time record be arranged in user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Whole system is in charge of by trusted party.Concrete steps are as follows:
(1) system initialisation phase:
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter wherein the Safety Big Prime Number of to be length be k, and select group generator ;
Gen (k): select to be situated between for Big prime two cyclic groups , with upper definition non degenerate and efficient bilinear operation and meet:
Bilinearity: for all , meet with ;
Non-degeneracy: for all , exist and calculate efficiently algorithm;
Computability: for all , there is the algorithm calculating e (P, Q) efficiently;
2) trusted party Stochastic choice ;
3) trusted party selects hash function h and h of two cryptography meaning safety 1, wherein,
4) trusted party Stochastic choice n , wherein and meet , and by each be distributed to each user respectively ;
5) trusted party Stochastic choice n respectively , with , wherein and by each with be distributed to each user respectively , trusted party calculates simultaneously with ;
6) trusted party Stochastic choice , and calculate with , wherein ;
7) last, each user obtain and maintain secrecy ;
GW obtains and maintains secrecy ;
CC obtains and maintains secrecy ;
The public information of system is with , wherein ;
(2) user data reports the stage
At data report time point t, user perform following operation, by power consumption report to gateway:
1) calculate
2) will with send to gateway;
(3) the secure data aggregation stage
Gateway receives with after, perform operation below:
1) calculate
2) check whether meet.If do not met, can detect that the integrality of user power utilization amount is destroyed; If met, will send to control centre, the detailed process of above equation checking is as follows:
(4) aggregated data Restoration stage
Control centre receives after, according to the secret information that it is grasped , calculate based on for the logarithm at the end, thus obtain the polymerization power consumption of user .
The paradigmatic system of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that comprising:
Trusted party: be in charge of whole system, comprises and carries out initialization to system, registers new user, issues key;
Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection;
Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized; Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling;
User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.
The paradigmatic system of electricity consumption privacy and integrity protection in described intelligent grid, is characterized in that this paradigmatic system also comprises:
(1) system initialization module
1) under the control of trusted party, adopt distributed technology, n user, share n secret information , and meet , for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced with technology, wherein , for the method for authentication of users power consumption integrality in the module;
4) under the control of trusted party, control centre obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
(2) user data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
(3) secure data aggregation module
1) gateway is by combining and remove the blind factor the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
(4) aggregated data recovers module
Based on secret information , calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption method.
Compared with prior art, there is following beneficial effect in the present invention:
(1) ensure that privacy and the integrality of user power utilization amount simultaneously, achieve secure data aggregation function, and the automatic time achieving all users is synchronous;
(2), when each power consumption is reported, each user only need transmit two kinds of data: with , communication and computational efficiency are better than all existing systems;
(3), after data suffer to attack (comprise that communication makes mistakes, external attacker is intercepted and captured and distort, internal user pretends to be other user's illegal modifications data etc.), at any time, automatically, initiatively can find that the integrality of data is destroyed;
(4) thoroughly prevent gateway and control centre's abuse authority, obtain the private data of unique user.Wherein, gateway can only obtain encrypt data and the aggregated data of user power utilization amount; Control centre can only obtain total power consumption.
(5) conspiracy attack of user can effectively be resisted.User not by mutually ganging up, Update Table and not being found; User can not by the data of other users of malicious modification, and frame other users, to reach the object that deception quality control center takes Wrong control decision-making.
Accompanying drawing explanation
Fig. 1 is data aggregate system architecture structural representation in prior art;
Fig. 2 is overall system architecture structural representation of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with embodiment.
A polymerization for electricity consumption privacy and integrity protection in intelligent grid, the method is by the intelligent electric meter real time record be arranged in user and report the power consumption of user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Be in charge of whole system by trusted party, concrete steps are as follows:
System initialisation phase:
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter , the wherein Safety Big Prime Number of q to be length be k, and select the generator of group G1 ;
Gen (k): select two cyclic groups be situated between for Big prime q , with upper definition non degenerate and efficient bilinear operation and meet:
Bilinearity: for all , meet with ;
Non-degeneracy: exist , make ;
Computability: for all , exist and calculate efficiently algorithm
2) trusted party Stochastic choice ;
3) trusted party selects the hash function of two cryptography meaning safety with , wherein,
4) trusted party Stochastic choice n , wherein , and meet , and by each be distributed to each user respectively ;
5) trusted party Stochastic choice n respectively , with , wherein and by each with be distributed to each user respectively , trusted party calculates simultaneously with ;
6) trusted party Stochastic choice , and calculate with , wherein ;
7) last, each user obtain and maintain secrecy ;
GW obtains and maintains secrecy ;
CC obtains and maintains secrecy ;
The public information of system is with , wherein ;
User data reports the stage
At data report time point t, user perform following operation, by power consumption report to gateway:
1) calculate
2) will with send to gateway;
The secure data aggregation stage
Gateway receives with after, perform operation below:
1) calculate
2) check whether meet, if do not met, can detect that the integrality of user power utilization amount is destroyed, if met, will send to control centre, the detailed process of above equation checking is as follows:
Aggregated data Restoration stage
Control centre receives after, according to the secret information that it is grasped , calculate based on for the logarithm at the end, thus obtain the polymerization power consumption of user .
A paradigmatic system for electricity consumption privacy and integrity protection in intelligent grid, comprises trusted party: be in charge of whole system, comprises carrying out initialization to system, registering new user, issue key; Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection; Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized.Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling; User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.This paradigmatic system also comprises:
System initialization module
1) under the control of trusted party, adopt distributed technology, n user, share n secret information , and meet , for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced with technology, wherein , for the method for authentication of users power consumption integrality in the module;
4) under the control of trusted party, control centre obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
User data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
Secure data aggregation module
1) gateway is by combining and remove the blind factor the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
Aggregated data recovers module
Based on secret information , calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption method.
Intelligent grid is based upon on the basis of integrated, high-speed bidirectional communication network, by the sensing of advanced person and measuring technique, advanced equipment and control and decision support technique, realizes that electrical network is reliable, safety, economy, efficient.Advanced person in intelligent grid measures a kind of important standard architecture that system (AMI) has become electric energy consumption end.In AMI, by installing the intelligent electric meter with calculating and communication capacity in user, the quality control center of all intelligent electric meters and Utilities Electric Co. is linked to be network, realizes collecting, monitoring real-time power consumption, and realize optimum distribution and the long-distance intelligent control of electric energy.In intelligent grid, by the data aggregate to each user power utilization amount, can the efficiency utilization network bandwidth, and by hiding the personal electricity of user, the electricity consumption privacy of protection user.But in order to realize smart allocation and the management of electric energy, quality control center needs frequent (usually " second " level) to obtain the power consumption information of user, and this just brings unprecedented safety and privacy concern.Therefore, this invention achieves the data aggregate system of a safety, on the one hand for the protection of the electricity consumption privacy of user; Meanwhile, also for guaranteeing the integrality of data, that is: detecting report data communication errors technically, prevent user from assuming another's name illegally to report, and the power consumption reported is by illegal intercepting and capturing, amendment, forgery etc.

Claims (3)

1. the polymerization of electricity consumption privacy and integrity protection in intelligent grid, is characterized in that the method reports the power consumption of user by the intelligent electric meter real time record be arranged in user; Data aggregate function and relay function is responsible for by the gateway with computing capability; Be responsible for the real-time power consumption data of collecting, processing and analyze each user by control centre, and reliability services is provided; Be in charge of whole system by trusted party, concrete steps are as follows:
(1) system initialisation phase
1) trusted party is according to the security parameter k of input, runs following algorithm Gen (k), obtains parameter , the wherein Safety Big Prime Number of q to be length be k, and select group generator ;
Gen (k): select two cyclic groups be situated between for Big prime q , with upper definition non degenerate and efficient bilinear operation and meet:
Bilinearity: for all , meet with ;
Non-degeneracy: exist , make ;
Computability: for all , exist and calculate efficiently algorithm;
2) trusted party Stochastic choice ;
3) trusted party selects the hash function of two cryptography meaning safety with , wherein,
4) trusted party Stochastic choice n , wherein and meet , and by each be distributed to each user respectively ;
5) trusted party Stochastic choice n respectively , with , wherein and by each with be distributed to each user respectively , trusted party calculates simultaneously with ;
6) trusted party Stochastic choice , and calculate with , wherein ;
7) last, each user obtain and maintain secrecy ;
GW obtains and maintains secrecy ;
CC obtains and maintains secrecy ;
The public information of system is with , wherein ;
(2) user data reports the stage
At data report time point t, user perform following operation, by power consumption report to gateway:
1) calculate
2) will with send to gateway;
(3) the secure data aggregation stage
Gateway receives with after, perform operation below:
1) calculate
2) check whether meet;
If do not met, can detect that the integrality of user power utilization amount is destroyed; If met, will send to control centre, the detailed process of above equation checking is as follows:
(4) aggregated data Restoration stage
Control centre receives after, according to the secret information that it is grasped , calculate based on for the logarithm at the end, thus obtain the polymerization power consumption of user .
2. the paradigmatic system of electricity consumption privacy and integrity protection in intelligent grid, is characterized in that comprising:
Trusted party: be in charge of whole system, comprises and carries out initialization to system, registers new user, issues key;
Control centre: be responsible for the real-time power consumption data of collecting, processing and analyze each user, and provide reliable service, comprises the electricity consumption situation of real-time supervisory user, the electricity consumption trend of prognoses system entirety, power stealing monitoring, data tampering detection;
Gateway: for connecting trusted party and district of resident family, comprise data aggregate function, is responsible for the data of user each in trusted party to be polymerized; Relay function, is responsible for carrying out secure data forwarding between the heart and each user in the controlling;
User: total n user in district of resident family, each user installs an intelligent electric meter, reports the power consumption of user for real time record.
3. the paradigmatic system of electricity consumption privacy and integrity protection in a kind of intelligent grid according to claim 2, is characterized in that this paradigmatic system also comprises:
(1) system initialization module
1) under the control of trusted party, adopt distributed technology, N number of user, share n secret information , and meet , for the protection of the method for individual subscriber power consumption privacy and integrality;
2) under the control of trusted party, gateway obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
3) under the control of trusted party, the open certificate parameter of system is produced with technology, wherein , for the method for authentication of users power consumption integrality;
4) under the control of trusted party, control centre obtains technology, for the protection of the method for individual subscriber power consumption privacy and integrality;
(2) user data reporting module
1) efficiently for all users, the method that during report power consumption, automatic time is synchronous;
2) the distributed method simultaneously ensureing the secure data aggregation of data privacy and integrality;
(3) secure data aggregation module
1) gateway is by combining and remove the blind factor the distributed data aggregation method for the protection of individual subscriber power consumption privacy and integrality;
2) realize protection individual subscriber power consumption privacy and the encryption of integrality and the method for digital signature simultaneously; Comprise: produce the open parameter that is mutually related method; Utilize the characteristic of bilinearity, the method for efficient verification data integrity;
(4) aggregated data recovers module
Based on secret information , calculate the technology of discrete logarithm, thus acquisition user is polymerized power consumption method.
CN201510012106.8A 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Active CN104639311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Publications (2)

Publication Number Publication Date
CN104639311A true CN104639311A (en) 2015-05-20
CN104639311B CN104639311B (en) 2018-10-12

Family

ID=53217669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510012106.8A Active CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Country Status (1)

Country Link
CN (1) CN104639311B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790024A (en) * 2016-12-14 2017-05-31 西安邮电大学 Method for secret protection based on electric power injection under AMI and 5G intelligent grids
CN108683493A (en) * 2018-05-04 2018-10-19 西安电子科技大学 The data aggregation method of secret protection is provided in a kind of intelligent grid
CN108960552A (en) * 2017-05-27 2018-12-07 华为技术有限公司 A kind of charging method and relevant device based on Spot Price
CN108964894A (en) * 2018-06-28 2018-12-07 上海电力学院 A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection
CN109640299A (en) * 2019-01-31 2019-04-16 浙江工商大学 It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant
CN109889501A (en) * 2019-01-18 2019-06-14 浙江工商大学 The method and system of multidimensional data polymerization and polygamma function analysis in a kind of communication of Internet of Things
CN110049000A (en) * 2019-01-24 2019-07-23 浙江工商大学 A kind of size space Internet of Things communication means and system of polymerization and difference safety in plain text
CN110661771A (en) * 2019-06-21 2020-01-07 浙江工商大学 Secure smart power grid access control method and system for resisting differential attack
CN110968892A (en) * 2019-11-18 2020-04-07 广东卓维网络有限公司 Data encryption system based on electric quantity data query
CN111131148A (en) * 2019-11-11 2020-05-08 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN112019338A (en) * 2019-05-31 2020-12-01 浙江工商大学 Lightweight safety smart power grid communication method and system based on block chain
CN112532389A (en) * 2020-12-01 2021-03-19 南京邮电大学 Smart power grid lightweight privacy protection data aggregation method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921384A (en) * 2006-09-12 2007-02-28 上海交通大学 Public key infrastructure system, local safety apparatus and operation method
WO2011109772A2 (en) * 2010-03-05 2011-09-09 Interdigital Patent Holdings, Inc. Method and apparatus for providing security to devices
CN102638345A (en) * 2012-05-09 2012-08-15 四川师范大学 DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921384A (en) * 2006-09-12 2007-02-28 上海交通大学 Public key infrastructure system, local safety apparatus and operation method
WO2011109772A2 (en) * 2010-03-05 2011-09-09 Interdigital Patent Holdings, Inc. Method and apparatus for providing security to devices
CN102638345A (en) * 2012-05-09 2012-08-15 四川师范大学 DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张木玲: ""智能电网中若干安全和隐私问题的研究"", 《CNKI优秀硕士学位论文全文库》 *
柴震川等: ""An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption"", 《JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY(SCIENCE)》 *
郭非等: ""一种基于身份的智能电网认证模式"", 《黑龙江大学自然科学学报》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790024B (en) * 2016-12-14 2020-10-20 西安邮电大学 Privacy protection method based on power injection under AMI and 5G intelligent power grid
CN106790024A (en) * 2016-12-14 2017-05-31 西安邮电大学 Method for secret protection based on electric power injection under AMI and 5G intelligent grids
CN108960552A (en) * 2017-05-27 2018-12-07 华为技术有限公司 A kind of charging method and relevant device based on Spot Price
CN108960552B (en) * 2017-05-27 2022-04-29 华为技术有限公司 Charging method based on real-time electricity price and related equipment
CN108683493A (en) * 2018-05-04 2018-10-19 西安电子科技大学 The data aggregation method of secret protection is provided in a kind of intelligent grid
CN108683493B (en) * 2018-05-04 2021-02-12 西安电子科技大学 Data aggregation method for providing privacy protection in smart power grid
CN108964894A (en) * 2018-06-28 2018-12-07 上海电力学院 A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection
CN108964894B (en) * 2018-06-28 2021-04-30 上海电力学院 Power grid electricity stealing detection method based on state estimation and with privacy protection
CN109889501A (en) * 2019-01-18 2019-06-14 浙江工商大学 The method and system of multidimensional data polymerization and polygamma function analysis in a kind of communication of Internet of Things
CN109889501B (en) * 2019-01-18 2021-10-26 浙江工商大学 Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things
CN110049000B (en) * 2019-01-24 2021-11-23 浙江工商大学 Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces
CN110049000A (en) * 2019-01-24 2019-07-23 浙江工商大学 A kind of size space Internet of Things communication means and system of polymerization and difference safety in plain text
CN109640299B (en) * 2019-01-31 2021-09-21 浙江工商大学 Aggregation method and system for ensuring M2M communication integrity and fault tolerance
CN109640299A (en) * 2019-01-31 2019-04-16 浙江工商大学 It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant
CN112019338A (en) * 2019-05-31 2020-12-01 浙江工商大学 Lightweight safety smart power grid communication method and system based on block chain
CN110661771A (en) * 2019-06-21 2020-01-07 浙江工商大学 Secure smart power grid access control method and system for resisting differential attack
CN110661771B (en) * 2019-06-21 2022-03-04 浙江工商大学 Secure smart power grid access control method and system for resisting differential attack
CN111131148A (en) * 2019-11-11 2020-05-08 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN111131148B (en) * 2019-11-11 2022-03-22 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN110968892A (en) * 2019-11-18 2020-04-07 广东卓维网络有限公司 Data encryption system based on electric quantity data query
CN112532389A (en) * 2020-12-01 2021-03-19 南京邮电大学 Smart power grid lightweight privacy protection data aggregation method based on block chain
CN112532389B (en) * 2020-12-01 2023-02-28 南京邮电大学 Smart power grid lightweight privacy protection data aggregation method based on block chain

Also Published As

Publication number Publication date
CN104639311B (en) 2018-10-12

Similar Documents

Publication Publication Date Title
CN104639311A (en) Combining method and system for protecting power utilization privacy and integrity in smart power grid
Kumar et al. Smart grid metering networks: A survey on security, privacy and open research issues
Jokar et al. A survey on security issues in smart grids
Rawat et al. Cyber security for smart grid systems: Status, challenges and perspectives
Komninos et al. Survey in smart grid and smart home security: Issues, challenges and countermeasures
Liu et al. Cyber security and privacy issues in smart grids
Li et al. Preserving data integrity for smart grid data aggregation
McLaughlin et al. Energy theft in the advanced metering infrastructure
Li et al. An efficient merkle-tree-based authentication scheme for smart grid
CN110120868B (en) Smart power grid safety data aggregation method and system based on block chain technology
Ali et al. A lightweight privacy-aware iot-based metering scheme for smart industrial ecosystems
Deng et al. A secure and privacy-preserving communication scheme for advanced metering infrastructure
CN113691380B (en) Multidimensional private data aggregation method in smart power grid
CN104219056A (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
CN104580061B (en) The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid
Premarathne et al. Secure and reliable surveillance over cognitive radio sensor networks in smart grid
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN115118756A (en) Method and device for designing safety interaction protocol in energy internet scene
CN106549767A (en) A kind of data authentication with secret protection and tracing system
Alimi et al. Security assessment of the smart grid: A review focusing on the NAN architecture
CN113254987B (en) Fault-tolerant time sequence data aggregation method capable of protecting privacy
CN110299993A (en) A kind of telesecurity meter register method based on improvement IBOOE algorithm
Lalle et al. A privacy-protection scheme for smart water grid based on blockchain and machine learning
CN111786978B (en) Electric power data aggregation acquisition method and device, computer equipment and storage medium
Pandey et al. A review of security concerns in smart grid

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190304

Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd.

Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang

Patentee before: Zhejiang Gongshang University

TR01 Transfer of patent right