CN104639311B - The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid - Google Patents
The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Download PDFInfo
- Publication number
- CN104639311B CN104639311B CN201510012106.8A CN201510012106A CN104639311B CN 104639311 B CN104639311 B CN 104639311B CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 B CN104639311 B CN 104639311B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- electricity consumption
- trusted party
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Small-Scale Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses electricity consumption privacy in a kind of intelligent grid and the polymerizations and system of integrity protection; this method is recorded in real time by the intelligent electric meter in user and is reported the electricity consumption of user, by having the function of that the gateway of computing capability is responsible for data aggregate and relay function, is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre; and reliability services are provided, whole system is responsible for by trusted party, it is as follows:(1)System initialisation phase;(2)User data reports the stage;(3)The secure data aggregation stage;(4)Aggregated data restores extreme.The invention realizes the data aggregate system of a safety, on the one hand is used to protect the electricity consumption privacy of user;Meanwhile also serving to ensure that the integrality of data, i.e.,:Technically detection report data communication errors, prevent user from assuming another's name illegally to report, and the electricity consumption reported is by illegal intercepting and capturing, modification, forgery etc..
Description
Technical field
The invention belongs to intelligent power grid technology fields, and in particular to electricity consumption privacy and integrity protection in a kind of intelligent grid
Polymerization and system.
Background technology
In intelligent power grid technology field, Peng Liu et al. people propose the data aggregate based on network topology relation mechanism
Scheme can effectively collect the electricity consumption of user.First, it is polymerize by design data and is set, quality control center can be received from bottom to top
Collect the electricity consumption of all users.Next, by using homomorphic cryptography technology, each node can be all to it in the cryptogram space in tree
The data of child node are polymerize, on the basis of not revealing user power consumption plaintext, protect the privacy of user.So
And in intelligent grid application system, distort communication data in accidental data communication error, inside and outside attacker malice
Under application scenarios, the completeness guarantee of data is equally important.The scheme of Peng Liu et al. people does not have data integrity and examines
Look into function.It is thus impossible to the contingency data packet error of transmission in network transmission be found, it cannot be guaranteed that user submits really strictly according to the facts
Electricity consumption data, can not resist attacker intercept and capture and malice altered data.
Fengjun Li et al. improves the segmental defect of Peng Liu et al. people's schemes, it is proposed that a protection is used
The data aggregation scheme of family privacy and electricity consumption integrality.The overall architecture of its data aggregate system is as shown in Figure 1.In figure
Root node initiates the request of data aggregate as quality control center, and collects final handling result.System is received from below to up
The electricity consumption of all child nodes polymerize by collection and polymerization electricity consumption total amount, each node, is superimposed the electricity consumption of this node, and
It is reported to corresponding father node.For example, node 5 polymerize node 7, node 8 and node 5 data of itself, and reports and give
Node 2.
First, which is based on homomorphism signature and proposes end-to-end digital signature scheme, and based under concrete application scene
Special topological structure be sequentially generated and update the check code of each network node data polymerization result along network link.Verification
Integrality of the code for ensureing aggregated data.Secondly, a digital signature scheme and an increasing based on a hop node are devised
Authentication mechanism is measured, illegally intercepts and captures and changes to resist communication data coating.
The system has the following defects:
(1)Each user is digitally signed respective output data, and result is stored in father node, causes huge
Big additional data communication expense and storage overhead.
(2)They claim quality control center, can be subsequent to start increment verification number label after data can suffer from attack
Name system, finds out suspicious data, to ensure that the credibility and non-repudiation of data.Then, by used technology sheet
The defective of body cannot carry out accurate description and definition to the feature of suspicious data.Therefore, which is unable to accurate judgement startup
The time point that digital signature system is verified with the huge increment of communication overhead is calculated with executing;Moreover, because suspicious data characteristic
Ambiguity, practical operability is poor, and experiment shows effectively be accurately positioned under many scenes(It often judges by accident or fails to judge)
Potential data integrity attack.
(3)In the system, quality control center is when checking suspicious data, by log-on data integrity checker,
The electricity consumption clear data that each user can be obtained not can effectively prevent quality control center abuse permission, thus cannot be from skill
The privacy information of user is protected in art.
(4)They, which claim, can prevent internal user from changing the data submitted.Whether changed by internal user in tracking data
When, quality control center submits each node and deposits in the digital signature of father node and verified one by one, checks possible number
According to distorting.However, this method is not highly resistant to conspiracy attack.For example, certain node and its father node are ganged up, can maliciously change
Become the data submitted and fabricates corresponding pseudo- evidence, it is final to get around and the tracing program of quality control center be passed through.
Invention content
In view of the deficiencies in the prior art, the purpose of the present invention is to provide electricity consumption privacy in a kind of intelligent grid and
The polymerization and system of integrity protection.
The polymerization of electricity consumption privacy and integrity protection in the intelligent grid, it is characterised in that this method is by installing
Intelligent electric meter in user records and reports the electricity consumption of user in real time;Data aggregate is responsible for by the gateway with computing capability
Function and relay function;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and is provided reliable
Service;Whole system is responsible for by trusted party.It is as follows:
(1)System initialisation phase:
1)Trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameterWhereinIt is the Safety Big Prime Number that length is k, and selects groupGeneration member;
Gen(k):It selects to be situated between for Big primeTwo cyclic groups,WithUpper definition non degenerate and height
The bilinear operation of effectAnd meet:
Bilinearity:For all, meetWith ;
Non-degeneracy:For all, there are efficient calculatingAlgorithm;
Computability:For all, there is the efficient algorithm for calculating e (P, Q);
2)Trusted party randomly chooses;
3)Trusted party selects the hash function h and h of two cryptography meaning safety1, wherein
;
4)Trusted party randomly chooses n, whereinAnd meet
, and by eachIt is distributed to each user respectively;
5)Trusted party randomly chooses n respectively,With, whereinAnd by eachWithIt is distributed to each user respectively, trusted party calculates simultaneouslyWith;
6)Trusted party randomly chooses, and calculateWith , wherein;
7)Finally, each userIt obtains and maintains secrecy;
GW is obtained and is maintained secrecy;
CC is obtained and is maintained secrecy;
The public information of system isWith, wherein;
(2)User data reports the stage
In data report time point t, userFollowing operation is executed, by electricity consumptionIt is reported to gateway:
1)It calculates
2)It willWithIt is sent to gateway;
(3)The secure data aggregation stage
Gateway receivesWithAfter, execute following operation:
1)It calculates
2)It checksWhether meet.If conditions are not met, can detect that user power utilization
The integrality of amount has been destroyed;If it is satisfied, willIt is sent to control centre, the detailed process of above equation verification is as follows:
(4)Aggregated data Restoration stage
Control centre receivesAfter, according to the secret information of its grasp, calculateIt is based onFor the logarithm at bottom, to obtain the polymerization of user
Electricity consumption。
Electricity consumption privacy and the paradigmatic system of integrity protection in the intelligent grid, it is characterised in that including:
Trusted party:It is responsible for whole system, includes being initialized to system, registering new user, publication key;
Control centre:It is responsible for collecting, handles and analyze the real-time electricity consumption data of each user, and reliable service is provided,
Electricity consumption situation, the electricity consumption trend of forecasting system entirety, power stealing including monitoring user in real time monitor, data tampering detects;
Gateway:For connecting trusted party and area of resident family, including data aggregate function, it is responsible for each user in trusted party
Data polymerize;Relay function is responsible for carrying out secure data forwarding between control centre and each user;
User:N user is shared in area of resident family, each user installs an intelligent electric meter, for recording and converging in real time
Report the electricity consumption of user.
Electricity consumption privacy and the paradigmatic system of integrity protection in the intelligent grid, it is characterised in that the paradigmatic system is also
Including:
(1)System initialization module
1)Under the control of trusted party, using distributed technology, n user shares n secret information, and it is full
Foot, the method for protecting individual subscriber electricity consumption privacy and integrality;
2)Under the control of trusted party, gateway obtainsTechnology, for protecting individual subscriber to use
The method of electricity privacy and integrality;
3)Under the control of trusted party, the open certificate parameter of generation systemWith Skill
Art, wherein, the method for verifying user power consumption integrality in the module;
4)Under the control of trusted party, control centre obtainsTechnology, for protecting individual subscriber
The method of electricity consumption privacy and integrality;
(2)User data reporting module
1)All users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption;
2)The method of secure data aggregation that is distributed while ensureing data privacy and integrality;
(3)Secure data aggregation module
1)Gateway passes through combinationAnd the blind factor of removalDistributed be used for
Protect the data aggregation method of individual subscriber electricity consumption privacy and integrality;
2)The method for realizing the encryption and digital signature of protection individual subscriber electricity consumption privacy and integrality simultaneously;Packet
It includes:Generation, which is mutually related, discloses parameterMethod;Utilize the characteristic of bilinearity, efficient verification data
The method of integrality;
(4)Aggregated data recovery module
Based on secret information, the technology of discrete logarithm is calculated, polymerize electricity consumption to obtain userMethod.
Compared with prior art, the present invention there are following advantageous effects:
(1)The privacy and integrality that ensure that user power consumption simultaneously, realize secure data aggregation function, and realize
The automatic time of all users synchronizes;
(2)When each electricity consumption is reported, each user need to only transmit two kinds of data:With, communication and computational efficiency
Better than all existing systems;
(3)Data are attacked(It intercepts and captures and distorts including communication error, external attacker, internal user pretends to be other use
Family illegal modifications data etc.)Afterwards, can at any time, automatically, the integrality that actively discovers data has been destroyed;
(4)It thoroughly prevents gateway and control centre to abuse permission, obtains the private data of single user.Wherein, gateway
The ciphertext data and aggregated data of user power consumption can only be obtained;Control centre can only obtain total electricity consumption.
(5)It is effective against the conspiracy attack of user.User cannot be by mutually ganging up, and modification data are without being found;
User can not frame other users by the data of malicious modification other users, be taken with reaching deception quality control center
The purpose of error control decision.
Description of the drawings
Fig. 1 is data aggregate system architecture structural schematic diagram in the prior art;
Fig. 2 is overall system architecture structural schematic diagram of the present invention.
Specific implementation mode
The present invention is described in further detail With reference to embodiment.
The polymerization of electricity consumption privacy and integrity protection in a kind of intelligent grid, this method is by the intelligence in user
Energy ammeter records and reports the electricity consumption of user in real time;By having the function of that the gateway of computing capability is responsible for data aggregate and relaying work(
Energy;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and reliability services is provided;By credible
Whole system is responsible at center, is as follows:
System initialisation phase:
1)Trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameter, wherein q is the Safety Big Prime Number that length is k, and selects the generation member of crowd G1;
Gen(k):Select two cyclic groups being situated between for Big prime q,WithUpper definition non degenerate and height
The bilinear operation of effectAnd meet:
Bilinearity:For all, meetWith ;
Non-degeneracy:In the presence ofSo that ;
Computability:For all, there are efficient calculatingAlgorithm
2)Trusted party randomly chooses;
3)Trusted party selects the hash function of two cryptography meaning safetyWith, wherein
;
4)Trusted party randomly chooses n, wherein, and meet, and by eachIt is distributed to each user respectively;
5)Trusted party randomly chooses n respectively,With, whereinAnd by eachWithIt is distributed to each user respectively, trusted party calculates simultaneouslyWith;
6)Trusted party randomly chooses, and calculateWith , wherein;
7)Finally, each userIt obtains and maintains secrecy;
GW is obtained and is maintained secrecy;
CC is obtained and is maintained secrecy;
The public information of system isWith, wherein;
User data reports the stage
In data report time point t, userFollowing operation is executed, by electricity consumptionIt is reported to gateway:
1)It calculates
2)It willWithIt is sent to gateway;
The secure data aggregation stage
Gateway receivesWithAfter, execute following operation:
1)It calculates
2)It checksWhether meet, if conditions are not met, can detect that user power utilization
The integrality of amount has been destroyed, if it is satisfied, willIt is sent to control centre, the detailed process of above equation verification is as follows:
Aggregated data Restoration stage
Control centre receivesAfter, according to the secret information of its grasp, calculateIt is based onFor the logarithm at bottom, to obtain the polymerization of user
Electricity consumption。
Electricity consumption privacy and the paradigmatic system of integrity protection in a kind of intelligent grid, including trusted party:It is responsible for whole
A system includes being initialized to system, registering new user, publication key;Control centre:It is responsible for collecting, handle and dividing
The real-time electricity consumption data of each user are analysed, and reliable service is provided, include electricity consumption situation, the forecasting system of real time monitoring user
The electricity consumption trend of entirety, power stealing monitoring, data tampering detection;Gateway:For connecting trusted party and area of resident family, including data
Polymerizable functional is responsible for the data of each user in trusted party polymerizeing.Relay function is responsible in control centre and each user
Between carry out secure data forwarding;User:N user is shared in area of resident family, each user installs an intelligent electric meter, for real
Shi Jilu and the electricity consumption for reporting user.The paradigmatic system further includes:
System initialization module
1)Under the control of trusted party, using distributed technology, n user shares n secret information, and it is full
Foot, the method for protecting individual subscriber electricity consumption privacy and integrality;
2)Under the control of trusted party, gateway obtainsTechnology, for protecting individual subscriber to use
The method of electricity privacy and integrality;
3)Under the control of trusted party, the open certificate parameter of generation systemWith Skill
Art, wherein, the method for verifying user power consumption integrality in the module;
4)Under the control of trusted party, control centre obtainsTechnology, for protecting individual subscriber electricity consumption
The method for measuring privacy and integrality;
User data reporting module
1)All users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption;
2)The method of secure data aggregation that is distributed while ensureing data privacy and integrality;
Secure data aggregation module
1)Gateway passes through combinationAnd the blind factor of removalDistributed be used for
Protect the data aggregation method of individual subscriber electricity consumption privacy and integrality;
2)The method for realizing the encryption and digital signature of protection individual subscriber electricity consumption privacy and integrality simultaneously;Packet
It includes:Generation, which is mutually related, discloses parameterMethod;Utilize the characteristic of bilinearity, efficient verification data
The method of integrality;
Aggregated data recovery module
Based on secret information, the technology of discrete logarithm is calculated, polymerize electricity consumption to obtain userMethod.
Intelligent grid is established on the basis of integrated, high-speed bidirectional communication network, by advanced sensing and measuring technique,
Advanced equipment and control and decision support technique realize power grid reliable, safety, economy, efficiently.Advanced survey in intelligent grid
Amount system(AMI)Have become a kind of important criteria framework at electric energy consumption end.In AMI, there is meter by being installed in user
The intelligent electric meter with communication capacity is calculated, the quality control center of all intelligent electric meters and Utilities Electric Co. is linked to be network, is realized
It collects, monitor real-time electricity consumption, and realize the optimum distribution and long-distance intelligent control of electric energy.In intelligent grid, by right
The data aggregate of each user power consumption can efficiently utilize network bandwidth, and the personal electricity consumption by hiding user, protection
The electricity consumption privacy of user.However, in order to realize that smart allocation and the management of electric energy, quality control center need frequent(Usually
" second " grade)The electricity consumption information of user is obtained, this just brings unprecedented safety and privacy concern.Therefore, which realizes
On the one hand the data aggregate system of one safety is used to protect the electricity consumption privacy of user;Meanwhile also serving to ensure that the complete of data
Property, i.e.,:Report data communication errors are technically detected, prevent user from assuming another's name illegally to report, and the electricity consumption reported is non-
Method intercepting and capturing, modification, forgery etc..
Claims (2)
1. the polymerization of electricity consumption privacy and integrity protection in a kind of intelligent grid, it is characterised in that this method is by being mounted on use
Intelligent electric meter in family records and reports the electricity consumption of user in real time;By having the function of that the gateway of computing capability is responsible for data aggregate
And relay function;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and reliable clothes is provided
Business;Whole system is responsible for by trusted party, is as follows:
(1) system initialisation phase
1) trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameter (q, g, G1, G2, e),
Middle q is the Safety Big Prime Number that length is k, and selects crowd G1Generation member g ∈ G1;
Gen(k):Select rank for two cyclic group { G of Big prime q1, G2, in G1And G2Upper definition non degenerate and efficient two-wire
Property operation e:G1×G1→G2And meet:
Bilinearity:For all P, Q ∈ G1,MeetWith e (Pa, Qb)=e (P, Q)ab∈G2;
Non-degeneracy:There are P, Q ∈ G1So that
Computability:For all P, Q ∈ G1, there is the efficient algorithm for calculating e (P, Q);
2) trusted party randomly chooses g1∈G1;
3) trusted party selects the hash function h and h of two cryptography meaning safety1, wherein
h:{ 0,1 }*→G1, h1:{ 0,1 }*→G1;
4) trusted party random selection nWherein i=1,2 ..., n, and meetAnd it will
Each ziIt is distributed to each user U respectivelyi;
5) trusted party randomly chooses n respectivelyWithWherein i=1,2 ..., n is simultaneously
By each ui, viAnd xiIt is distributed to each user U respectivelyi, trusted party calculates simultaneouslyWith
6) trusted party randomly choosesAnd it calculatesWithWherein i=1,2 ..., n;
7) finally, each user UiAcquisition and secrecy < ui, υi, zi, xi>;
Gateway obtains and secrecy w;
Control centre obtains and secrecy υ;
The public information of system is < g, g1, h, h1, Y > and Mi, wherein i=1,2 ..., n;
(2) user data reports the stage
In data report time point t, user UiFollowing operation is executed, by electricity consumption miIt is reported to gateway:
1) it calculates
2) by ciAnd σiIt is sent to gateway;
(3) the secure data aggregation stage
Gateway receives ciAnd σiAfter, execute following operation:
1) it calculates
2) it checksWhether meet, if conditions are not met, can detect that the complete of user power consumption
Property has been destroyed;If it is satisfied, c is sent to control centre, the detailed process of above equation verification is as follows:
(4) aggregated data Restoration stage
After control centre receives c, according to the secret information of its graspFirst calculateLogarithm is calculated againTo obtain the polymerization of user
Electricity consumption
2. a kind of polymerization system implementing the polymerization of electricity consumption privacy and integrity protection in intelligent grid described in claim 1
System, it is characterised in that paradigmatic system includes:
Trusted party:It is responsible for whole system, includes being initialized to system, registering new user, publication key;
Control centre:It is responsible for collecting, handles and analyze the real-time electricity consumption data of each user, and reliable service is provided, including
The electricity consumption situation of real time monitoring user, the electricity consumption trend of forecasting system entirety, power stealing monitoring, data tampering detection;
Gateway:For connecting trusted party and area of resident family, including data aggregate function, it is responsible for the number of each user in trusted party
According to being polymerize;Relay function is responsible for carrying out secure data forwarding between control centre and each user;
User:N user is shared in area of resident family, each user installs an intelligent electric meter, for recording in real time and reporting use
The electricity consumption at family;
Paradigmatic system further includes:
(1) system initialization module
1) under the control of trusted party, using distribution, n secret information ziIt is carried out in system initialization by trusted party
It chooses, and is respectively allocated to n user, and meetIn system initialization module,
Trusted party random selection meetsN of conditionAnd by each ziDistribute respectively
Give each user Ui, in secure data aggregation module, gateway passes through Implicit ConditionsAnd the gateway palm
The secret information heldCancellation blinds part, and carries out integrity verification;
2) under the control of trusted party, gateway obtainsIn system initialization module, trusted party meter
It calculatesAnd w is distributed into gateway, as the secret information of gateway, it is used in secure data aggregation module,
Gateway cancellation blinds part, to protect individual subscriber electricity consumption privacy and data integrity;
3) under the control of trusted party, the open certificate parameter of generation systemWithWherein i=1,
2 ..., n, the method for verifying user power consumption integrality:In system initialization module, trusted party calculates and discloses Y
And Mi, in secure data aggregation module, gateway to carry out user power consumption integrity checking;
4) under the control of trusted party, control centre obtainsIn system initialization module, trusted party
It calculatesAnd v is distributed into control centre, as the secret information of control centre, for extensive in aggregated data
In multiple module, the polymerization electricity consumption of user restores in control centre, to protect individual subscriber electricity consumption privacy and data integrity;
(2) user data reporting module
1) all users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption:In user data reporting module,
All n users in data report time point t, area of resident family, while calculating separately ciAnd σi, and it is synchronous by ciAnd σiIt is sent to
Gateway;
2) method of secure data aggregation that is distributed while ensureing data privacy and integrality:Mould is reported in user data
In block, each user calculates separately and reports ciAnd σiTo gateway, in secure data aggregation module, gateway receives ciAnd σi
After, it calculatesAnd it checksIt is
No satisfaction, if conditions are not met, can detect that the integrality of user power consumption has been destroyed;If it is satisfied, indicating what user reported
Electricity consumption data are the information of integrality, then c are sent to control centre;
(3) secure data aggregation module
1) gateway passes through combinationAnd the blind factor of removalIt is distributed for protect use
The data aggregation method of family individual's electricity consumption privacy and integrality:In system initialization module, trusted party calculates ziWith
And w, and it is respectively allocated to all users and gateway, in secure data aggregation module, gateway passes through Implicit ConditionsAnd the secret information that gateway is graspedCancellation blinds part, and carries out integrality and test
Card, to protect individual subscriber electricity consumption privacy and data integrity;
2) at the same realize protection individual subscriber electricity consumption privacy and integrality encryption and digital signature method;Including:Production
Raw be mutually related open parameter c, Y, σi, MiMethod;Utilize bilinear characteristic, the method for efficient verification data integrity:
In system initialization module, trusted party calculates and discloses Y and Mi, in secure data aggregation module, gateway utilizes certainly
The secret information w of body calculates c, and combines the report information σ of each useri, integrity verification is carried out, to protect individual subscriber electricity consumption
Measure privacy and data integrity;
(4) aggregated data recovery module
Based on secret informationThe technology for calculating discrete logarithm polymerize electricity consumption to obtain userMethod:In system initialization module, trusted party calculatesAnd v is distributed into control
Center, as the secret information of control centre, in aggregated data recovery module, the polymerization that user restores in control centre to be used
Electricity
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104639311A CN104639311A (en) | 2015-05-20 |
CN104639311B true CN104639311B (en) | 2018-10-12 |
Family
ID=53217669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510012106.8A Active CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104639311B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790024B (en) * | 2016-12-14 | 2020-10-20 | 西安邮电大学 | Privacy protection method based on power injection under AMI and 5G intelligent power grid |
CN108960552B (en) * | 2017-05-27 | 2022-04-29 | 华为技术有限公司 | Charging method based on real-time electricity price and related equipment |
CN108683493B (en) * | 2018-05-04 | 2021-02-12 | 西安电子科技大学 | Data aggregation method for providing privacy protection in smart power grid |
CN108964894B (en) * | 2018-06-28 | 2021-04-30 | 上海电力学院 | Power grid electricity stealing detection method based on state estimation and with privacy protection |
CN109889501B (en) * | 2019-01-18 | 2021-10-26 | 浙江工商大学 | Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things |
CN110049000B (en) * | 2019-01-24 | 2021-11-23 | 浙江工商大学 | Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces |
CN109640299B (en) * | 2019-01-31 | 2021-09-21 | 浙江工商大学 | Aggregation method and system for ensuring M2M communication integrity and fault tolerance |
CN112019338A (en) * | 2019-05-31 | 2020-12-01 | 浙江工商大学 | Lightweight safety smart power grid communication method and system based on block chain |
CN110661771B (en) * | 2019-06-21 | 2022-03-04 | 浙江工商大学 | Secure smart power grid access control method and system for resisting differential attack |
CN111131148B (en) * | 2019-11-11 | 2022-03-22 | 重庆邮电大学 | Aggregation method and system capable of protecting privacy data and facing smart power grid |
CN110968892A (en) * | 2019-11-18 | 2020-04-07 | 广东卓维网络有限公司 | Data encryption system based on electric quantity data query |
CN112532389B (en) * | 2020-12-01 | 2023-02-28 | 南京邮电大学 | Smart power grid lightweight privacy protection data aggregation method based on block chain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921384A (en) * | 2006-09-12 | 2007-02-28 | 上海交通大学 | Public key infrastructure system, local safety apparatus and operation method |
KR101699359B1 (en) * | 2010-03-05 | 2017-01-24 | 인터디지탈 패튼 홀딩스, 인크 | Method and apparatus for providing security to devices |
CN102638345B (en) * | 2012-05-09 | 2015-07-15 | 四川师范大学 | DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption |
CN103825743A (en) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | Data security aggregation method with privacy protection function |
-
2015
- 2015-01-12 CN CN201510012106.8A patent/CN104639311B/en active Active
Non-Patent Citations (3)
Title |
---|
"An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption";柴震川等;《Journal of Shanghai Jiaotong University(Science)》;20050704;第271-278页 * |
"一种基于身份的智能电网认证模式";郭非等;《黑龙江大学自然科学学报》;20120430;第152-158页 * |
"智能电网中若干安全和隐私问题的研究";张木玲;《CNKI优秀硕士学位论文全文库》;20141231;第13-56页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104639311A (en) | 2015-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639311B (en) | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid | |
Kumar et al. | Smart grid metering networks: A survey on security, privacy and open research issues | |
Zhuang et al. | Blockchain for cybersecurity in smart grid: A comprehensive survey | |
CN111294366B (en) | Statistical analysis method for aggregation of encrypted data for resisting secret key leakage in smart power grid | |
McLaughlin et al. | Energy theft in the advanced metering infrastructure | |
Jokar et al. | A survey on security issues in smart grids | |
Rawat et al. | Cyber security for smart grid systems: Status, challenges and perspectives | |
CN110536259B (en) | Lightweight privacy protection data multistage aggregation method based on fog calculation | |
CN110138538B (en) | Smart grid security and privacy protection data aggregation method based on fog calculation | |
CN104219056B (en) | Privacy protection type real-time electric charge collecting method for intelligent power grid | |
Li et al. | Preserving data integrity for smart grid data aggregation | |
Bao et al. | BLITHE: Behavior rule-based insider threat detection for smart grid | |
Ni et al. | EDAT: Efficient data aggregation without TTP for privacy-assured smart metering | |
CN104580061B (en) | The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid | |
Kim et al. | Smart grid security: Attacks and defence techniques | |
Rottondi et al. | A security framework for smart metering with multiple data consumers | |
Premarathne et al. | Secure and reliable surveillance over cognitive radio sensor networks in smart grid | |
CN112291191A (en) | Lightweight privacy protection multidimensional data aggregation method based on edge calculation | |
CN107896216B (en) | A kind of key management, data encryption and the identity identifying method of electric power measuring instrument | |
Abdallah et al. | Security and privacy in smart grid | |
CN106549767A (en) | A kind of data authentication with secret protection and tracing system | |
Alimi et al. | Security assessment of the smart grid: A review focusing on the NAN architecture | |
Chia et al. | Secure data provenance in home energy monitoring networks | |
Haider et al. | Threat modeling of wireless attacks on advanced metering infrastructure | |
Lalle et al. | A privacy-protection scheme for smart water grid based on blockchain and machine learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190304 Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd. Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang Patentee before: Zhejiang Gongshang University |