CN104639311B - The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid - Google Patents

The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Download PDF

Info

Publication number
CN104639311B
CN104639311B CN201510012106.8A CN201510012106A CN104639311B CN 104639311 B CN104639311 B CN 104639311B CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 B CN104639311 B CN 104639311B
Authority
CN
China
Prior art keywords
user
data
electricity consumption
trusted party
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510012106.8A
Other languages
Chinese (zh)
Other versions
CN104639311A (en
Inventor
鲍海勇
陆荣幸
陈乐�
曹珍富
董晓蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunyuan Shengli Technology Co Ltd
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201510012106.8A priority Critical patent/CN104639311B/en
Publication of CN104639311A publication Critical patent/CN104639311A/en
Application granted granted Critical
Publication of CN104639311B publication Critical patent/CN104639311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Small-Scale Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses electricity consumption privacy in a kind of intelligent grid and the polymerizations and system of integrity protection; this method is recorded in real time by the intelligent electric meter in user and is reported the electricity consumption of user, by having the function of that the gateway of computing capability is responsible for data aggregate and relay function, is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre; and reliability services are provided, whole system is responsible for by trusted party, it is as follows:(1)System initialisation phase;(2)User data reports the stage;(3)The secure data aggregation stage;(4)Aggregated data restores extreme.The invention realizes the data aggregate system of a safety, on the one hand is used to protect the electricity consumption privacy of user;Meanwhile also serving to ensure that the integrality of data, i.e.,:Technically detection report data communication errors, prevent user from assuming another's name illegally to report, and the electricity consumption reported is by illegal intercepting and capturing, modification, forgery etc..

Description

The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid
Technical field
The invention belongs to intelligent power grid technology fields, and in particular to electricity consumption privacy and integrity protection in a kind of intelligent grid Polymerization and system.
Background technology
In intelligent power grid technology field, Peng Liu et al. people propose the data aggregate based on network topology relation mechanism Scheme can effectively collect the electricity consumption of user.First, it is polymerize by design data and is set, quality control center can be received from bottom to top Collect the electricity consumption of all users.Next, by using homomorphic cryptography technology, each node can be all to it in the cryptogram space in tree The data of child node are polymerize, on the basis of not revealing user power consumption plaintext, protect the privacy of user.So And in intelligent grid application system, distort communication data in accidental data communication error, inside and outside attacker malice Under application scenarios, the completeness guarantee of data is equally important.The scheme of Peng Liu et al. people does not have data integrity and examines Look into function.It is thus impossible to the contingency data packet error of transmission in network transmission be found, it cannot be guaranteed that user submits really strictly according to the facts Electricity consumption data, can not resist attacker intercept and capture and malice altered data.
Fengjun Li et al. improves the segmental defect of Peng Liu et al. people's schemes, it is proposed that a protection is used The data aggregation scheme of family privacy and electricity consumption integrality.The overall architecture of its data aggregate system is as shown in Figure 1.In figure Root node initiates the request of data aggregate as quality control center, and collects final handling result.System is received from below to up The electricity consumption of all child nodes polymerize by collection and polymerization electricity consumption total amount, each node, is superimposed the electricity consumption of this node, and It is reported to corresponding father node.For example, node 5 polymerize node 7, node 8 and node 5 data of itself, and reports and give Node 2.
First, which is based on homomorphism signature and proposes end-to-end digital signature scheme, and based under concrete application scene Special topological structure be sequentially generated and update the check code of each network node data polymerization result along network link.Verification Integrality of the code for ensureing aggregated data.Secondly, a digital signature scheme and an increasing based on a hop node are devised Authentication mechanism is measured, illegally intercepts and captures and changes to resist communication data coating.
The system has the following defects:
(1)Each user is digitally signed respective output data, and result is stored in father node, causes huge Big additional data communication expense and storage overhead.
(2)They claim quality control center, can be subsequent to start increment verification number label after data can suffer from attack Name system, finds out suspicious data, to ensure that the credibility and non-repudiation of data.Then, by used technology sheet The defective of body cannot carry out accurate description and definition to the feature of suspicious data.Therefore, which is unable to accurate judgement startup The time point that digital signature system is verified with the huge increment of communication overhead is calculated with executing;Moreover, because suspicious data characteristic Ambiguity, practical operability is poor, and experiment shows effectively be accurately positioned under many scenes(It often judges by accident or fails to judge) Potential data integrity attack.
(3)In the system, quality control center is when checking suspicious data, by log-on data integrity checker, The electricity consumption clear data that each user can be obtained not can effectively prevent quality control center abuse permission, thus cannot be from skill The privacy information of user is protected in art.
(4)They, which claim, can prevent internal user from changing the data submitted.Whether changed by internal user in tracking data When, quality control center submits each node and deposits in the digital signature of father node and verified one by one, checks possible number According to distorting.However, this method is not highly resistant to conspiracy attack.For example, certain node and its father node are ganged up, can maliciously change Become the data submitted and fabricates corresponding pseudo- evidence, it is final to get around and the tracing program of quality control center be passed through.
Invention content
In view of the deficiencies in the prior art, the purpose of the present invention is to provide electricity consumption privacy in a kind of intelligent grid and The polymerization and system of integrity protection.
The polymerization of electricity consumption privacy and integrity protection in the intelligent grid, it is characterised in that this method is by installing Intelligent electric meter in user records and reports the electricity consumption of user in real time;Data aggregate is responsible for by the gateway with computing capability Function and relay function;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and is provided reliable Service;Whole system is responsible for by trusted party.It is as follows:
(1)System initialisation phase:
1)Trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameterWhereinIt is the Safety Big Prime Number that length is k, and selects groupGeneration member
Gen(k):It selects to be situated between for Big primeTwo cyclic groups,WithUpper definition non degenerate and height The bilinear operation of effectAnd meet:
Bilinearity:For all, meetWith
Non-degeneracy:For all, there are efficient calculatingAlgorithm;
Computability:For all, there is the efficient algorithm for calculating e (P, Q);
2)Trusted party randomly chooses
3)Trusted party selects the hash function h and h of two cryptography meaning safety1, wherein
4)Trusted party randomly chooses n, whereinAnd meet , and by eachIt is distributed to each user respectively
5)Trusted party randomly chooses n respectively,With, whereinAnd by eachWithIt is distributed to each user respectively, trusted party calculates simultaneouslyWith
6)Trusted party randomly chooses, and calculateWith , wherein
7)Finally, each userIt obtains and maintains secrecy
GW is obtained and is maintained secrecy
CC is obtained and is maintained secrecy
The public information of system isWith, wherein
(2)User data reports the stage
In data report time point t, userFollowing operation is executed, by electricity consumptionIt is reported to gateway:
1)It calculates
2)It willWithIt is sent to gateway;
(3)The secure data aggregation stage
Gateway receivesWithAfter, execute following operation:
1)It calculates
2)It checksWhether meet.If conditions are not met, can detect that user power utilization The integrality of amount has been destroyed;If it is satisfied, willIt is sent to control centre, the detailed process of above equation verification is as follows:
(4)Aggregated data Restoration stage
Control centre receivesAfter, according to the secret information of its grasp, calculateIt is based onFor the logarithm at bottom, to obtain the polymerization of user Electricity consumption
Electricity consumption privacy and the paradigmatic system of integrity protection in the intelligent grid, it is characterised in that including:
Trusted party:It is responsible for whole system, includes being initialized to system, registering new user, publication key;
Control centre:It is responsible for collecting, handles and analyze the real-time electricity consumption data of each user, and reliable service is provided, Electricity consumption situation, the electricity consumption trend of forecasting system entirety, power stealing including monitoring user in real time monitor, data tampering detects;
Gateway:For connecting trusted party and area of resident family, including data aggregate function, it is responsible for each user in trusted party Data polymerize;Relay function is responsible for carrying out secure data forwarding between control centre and each user;
User:N user is shared in area of resident family, each user installs an intelligent electric meter, for recording and converging in real time Report the electricity consumption of user.
Electricity consumption privacy and the paradigmatic system of integrity protection in the intelligent grid, it is characterised in that the paradigmatic system is also Including:
(1)System initialization module
1)Under the control of trusted party, using distributed technology, n user shares n secret information, and it is full Foot, the method for protecting individual subscriber electricity consumption privacy and integrality;
2)Under the control of trusted party, gateway obtainsTechnology, for protecting individual subscriber to use The method of electricity privacy and integrality;
3)Under the control of trusted party, the open certificate parameter of generation systemWith Skill Art, wherein, the method for verifying user power consumption integrality in the module;
4)Under the control of trusted party, control centre obtainsTechnology, for protecting individual subscriber The method of electricity consumption privacy and integrality;
(2)User data reporting module
1)All users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption;
2)The method of secure data aggregation that is distributed while ensureing data privacy and integrality;
(3)Secure data aggregation module
1)Gateway passes through combinationAnd the blind factor of removalDistributed be used for Protect the data aggregation method of individual subscriber electricity consumption privacy and integrality;
2)The method for realizing the encryption and digital signature of protection individual subscriber electricity consumption privacy and integrality simultaneously;Packet It includes:Generation, which is mutually related, discloses parameterMethod;Utilize the characteristic of bilinearity, efficient verification data The method of integrality;
(4)Aggregated data recovery module
Based on secret information, the technology of discrete logarithm is calculated, polymerize electricity consumption to obtain userMethod.
Compared with prior art, the present invention there are following advantageous effects:
(1)The privacy and integrality that ensure that user power consumption simultaneously, realize secure data aggregation function, and realize The automatic time of all users synchronizes;
(2)When each electricity consumption is reported, each user need to only transmit two kinds of data:With, communication and computational efficiency Better than all existing systems;
(3)Data are attacked(It intercepts and captures and distorts including communication error, external attacker, internal user pretends to be other use Family illegal modifications data etc.)Afterwards, can at any time, automatically, the integrality that actively discovers data has been destroyed;
(4)It thoroughly prevents gateway and control centre to abuse permission, obtains the private data of single user.Wherein, gateway The ciphertext data and aggregated data of user power consumption can only be obtained;Control centre can only obtain total electricity consumption.
(5)It is effective against the conspiracy attack of user.User cannot be by mutually ganging up, and modification data are without being found; User can not frame other users by the data of malicious modification other users, be taken with reaching deception quality control center The purpose of error control decision.
Description of the drawings
Fig. 1 is data aggregate system architecture structural schematic diagram in the prior art;
Fig. 2 is overall system architecture structural schematic diagram of the present invention.
Specific implementation mode
The present invention is described in further detail With reference to embodiment.
The polymerization of electricity consumption privacy and integrity protection in a kind of intelligent grid, this method is by the intelligence in user Energy ammeter records and reports the electricity consumption of user in real time;By having the function of that the gateway of computing capability is responsible for data aggregate and relaying work( Energy;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and reliability services is provided;By credible Whole system is responsible at center, is as follows:
System initialisation phase:
1)Trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameter, wherein q is the Safety Big Prime Number that length is k, and selects the generation member of crowd G1
Gen(k):Select two cyclic groups being situated between for Big prime q,WithUpper definition non degenerate and height The bilinear operation of effectAnd meet:
Bilinearity:For all, meetWith
Non-degeneracy:In the presence ofSo that
Computability:For all, there are efficient calculatingAlgorithm
2)Trusted party randomly chooses
3)Trusted party selects the hash function of two cryptography meaning safetyWith, wherein
4)Trusted party randomly chooses n, wherein, and meet, and by eachIt is distributed to each user respectively
5)Trusted party randomly chooses n respectively,With, whereinAnd by eachWithIt is distributed to each user respectively, trusted party calculates simultaneouslyWith
6)Trusted party randomly chooses, and calculateWith , wherein
7)Finally, each userIt obtains and maintains secrecy
GW is obtained and is maintained secrecy
CC is obtained and is maintained secrecy
The public information of system isWith, wherein
User data reports the stage
In data report time point t, userFollowing operation is executed, by electricity consumptionIt is reported to gateway:
1)It calculates
2)It willWithIt is sent to gateway;
The secure data aggregation stage
Gateway receivesWithAfter, execute following operation:
1)It calculates
2)It checksWhether meet, if conditions are not met, can detect that user power utilization The integrality of amount has been destroyed, if it is satisfied, willIt is sent to control centre, the detailed process of above equation verification is as follows:
Aggregated data Restoration stage
Control centre receivesAfter, according to the secret information of its grasp, calculateIt is based onFor the logarithm at bottom, to obtain the polymerization of user Electricity consumption
Electricity consumption privacy and the paradigmatic system of integrity protection in a kind of intelligent grid, including trusted party:It is responsible for whole A system includes being initialized to system, registering new user, publication key;Control centre:It is responsible for collecting, handle and dividing The real-time electricity consumption data of each user are analysed, and reliable service is provided, include electricity consumption situation, the forecasting system of real time monitoring user The electricity consumption trend of entirety, power stealing monitoring, data tampering detection;Gateway:For connecting trusted party and area of resident family, including data Polymerizable functional is responsible for the data of each user in trusted party polymerizeing.Relay function is responsible in control centre and each user Between carry out secure data forwarding;User:N user is shared in area of resident family, each user installs an intelligent electric meter, for real Shi Jilu and the electricity consumption for reporting user.The paradigmatic system further includes:
System initialization module
1)Under the control of trusted party, using distributed technology, n user shares n secret information, and it is full Foot, the method for protecting individual subscriber electricity consumption privacy and integrality;
2)Under the control of trusted party, gateway obtainsTechnology, for protecting individual subscriber to use The method of electricity privacy and integrality;
3)Under the control of trusted party, the open certificate parameter of generation systemWith Skill Art, wherein, the method for verifying user power consumption integrality in the module;
4)Under the control of trusted party, control centre obtainsTechnology, for protecting individual subscriber electricity consumption The method for measuring privacy and integrality;
User data reporting module
1)All users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption;
2)The method of secure data aggregation that is distributed while ensureing data privacy and integrality;
Secure data aggregation module
1)Gateway passes through combinationAnd the blind factor of removalDistributed be used for Protect the data aggregation method of individual subscriber electricity consumption privacy and integrality;
2)The method for realizing the encryption and digital signature of protection individual subscriber electricity consumption privacy and integrality simultaneously;Packet It includes:Generation, which is mutually related, discloses parameterMethod;Utilize the characteristic of bilinearity, efficient verification data The method of integrality;
Aggregated data recovery module
Based on secret information, the technology of discrete logarithm is calculated, polymerize electricity consumption to obtain userMethod.
Intelligent grid is established on the basis of integrated, high-speed bidirectional communication network, by advanced sensing and measuring technique, Advanced equipment and control and decision support technique realize power grid reliable, safety, economy, efficiently.Advanced survey in intelligent grid Amount system(AMI)Have become a kind of important criteria framework at electric energy consumption end.In AMI, there is meter by being installed in user The intelligent electric meter with communication capacity is calculated, the quality control center of all intelligent electric meters and Utilities Electric Co. is linked to be network, is realized It collects, monitor real-time electricity consumption, and realize the optimum distribution and long-distance intelligent control of electric energy.In intelligent grid, by right The data aggregate of each user power consumption can efficiently utilize network bandwidth, and the personal electricity consumption by hiding user, protection The electricity consumption privacy of user.However, in order to realize that smart allocation and the management of electric energy, quality control center need frequent(Usually " second " grade)The electricity consumption information of user is obtained, this just brings unprecedented safety and privacy concern.Therefore, which realizes On the one hand the data aggregate system of one safety is used to protect the electricity consumption privacy of user;Meanwhile also serving to ensure that the complete of data Property, i.e.,:Report data communication errors are technically detected, prevent user from assuming another's name illegally to report, and the electricity consumption reported is non- Method intercepting and capturing, modification, forgery etc..

Claims (2)

1. the polymerization of electricity consumption privacy and integrity protection in a kind of intelligent grid, it is characterised in that this method is by being mounted on use Intelligent electric meter in family records and reports the electricity consumption of user in real time;By having the function of that the gateway of computing capability is responsible for data aggregate And relay function;It is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre, and reliable clothes is provided Business;Whole system is responsible for by trusted party, is as follows:
(1) system initialisation phase
1) trusted party runs following algorithm Gen (k) according to the security parameter k of input, obtains parameter (q, g, G1, G2, e), Middle q is the Safety Big Prime Number that length is k, and selects crowd G1Generation member g ∈ G1
Gen(k):Select rank for two cyclic group { G of Big prime q1, G2, in G1And G2Upper definition non degenerate and efficient two-wire Property operation e:G1×G1→G2And meet:
Bilinearity:For all P, Q ∈ G1,MeetWith e (Pa, Qb)=e (P, Q)ab∈G2
Non-degeneracy:There are P, Q ∈ G1So that
Computability:For all P, Q ∈ G1, there is the efficient algorithm for calculating e (P, Q);
2) trusted party randomly chooses g1∈G1
3) trusted party selects the hash function h and h of two cryptography meaning safety1, wherein
h:{ 0,1 }*→G1, h1:{ 0,1 }*→G1
4) trusted party random selection nWherein i=1,2 ..., n, and meetAnd it will Each ziIt is distributed to each user U respectivelyi
5) trusted party randomly chooses n respectivelyWithWherein i=1,2 ..., n is simultaneously By each ui, viAnd xiIt is distributed to each user U respectivelyi, trusted party calculates simultaneouslyWith
6) trusted party randomly choosesAnd it calculatesWithWherein i=1,2 ..., n;
7) finally, each user UiAcquisition and secrecy < ui, υi, zi, xi>;
Gateway obtains and secrecy w;
Control centre obtains and secrecy υ;
The public information of system is < g, g1, h, h1, Y > and Mi, wherein i=1,2 ..., n;
(2) user data reports the stage
In data report time point t, user UiFollowing operation is executed, by electricity consumption miIt is reported to gateway:
1) it calculates
2) by ciAnd σiIt is sent to gateway;
(3) the secure data aggregation stage
Gateway receives ciAnd σiAfter, execute following operation:
1) it calculates
2) it checksWhether meet, if conditions are not met, can detect that the complete of user power consumption Property has been destroyed;If it is satisfied, c is sent to control centre, the detailed process of above equation verification is as follows:
(4) aggregated data Restoration stage
After control centre receives c, according to the secret information of its graspFirst calculateLogarithm is calculated againTo obtain the polymerization of user Electricity consumption
2. a kind of polymerization system implementing the polymerization of electricity consumption privacy and integrity protection in intelligent grid described in claim 1 System, it is characterised in that paradigmatic system includes:
Trusted party:It is responsible for whole system, includes being initialized to system, registering new user, publication key;
Control centre:It is responsible for collecting, handles and analyze the real-time electricity consumption data of each user, and reliable service is provided, including The electricity consumption situation of real time monitoring user, the electricity consumption trend of forecasting system entirety, power stealing monitoring, data tampering detection;
Gateway:For connecting trusted party and area of resident family, including data aggregate function, it is responsible for the number of each user in trusted party According to being polymerize;Relay function is responsible for carrying out secure data forwarding between control centre and each user;
User:N user is shared in area of resident family, each user installs an intelligent electric meter, for recording in real time and reporting use The electricity consumption at family;
Paradigmatic system further includes:
(1) system initialization module
1) under the control of trusted party, using distribution, n secret information ziIt is carried out in system initialization by trusted party It chooses, and is respectively allocated to n user, and meetIn system initialization module,
Trusted party random selection meetsN of conditionAnd by each ziDistribute respectively Give each user Ui, in secure data aggregation module, gateway passes through Implicit ConditionsAnd the gateway palm The secret information heldCancellation blinds part, and carries out integrity verification;
2) under the control of trusted party, gateway obtainsIn system initialization module, trusted party meter It calculatesAnd w is distributed into gateway, as the secret information of gateway, it is used in secure data aggregation module, Gateway cancellation blinds part, to protect individual subscriber electricity consumption privacy and data integrity;
3) under the control of trusted party, the open certificate parameter of generation systemWithWherein i=1, 2 ..., n, the method for verifying user power consumption integrality:In system initialization module, trusted party calculates and discloses Y And Mi, in secure data aggregation module, gateway to carry out user power consumption integrity checking;
4) under the control of trusted party, control centre obtainsIn system initialization module, trusted party It calculatesAnd v is distributed into control centre, as the secret information of control centre, for extensive in aggregated data In multiple module, the polymerization electricity consumption of user restores in control centre, to protect individual subscriber electricity consumption privacy and data integrity;
(2) user data reporting module
1) all users are efficiently used for, the method that automatic time synchronizes when reporting electricity consumption:In user data reporting module, All n users in data report time point t, area of resident family, while calculating separately ciAnd σi, and it is synchronous by ciAnd σiIt is sent to Gateway;
2) method of secure data aggregation that is distributed while ensureing data privacy and integrality:Mould is reported in user data In block, each user calculates separately and reports ciAnd σiTo gateway, in secure data aggregation module, gateway receives ciAnd σi After, it calculatesAnd it checksIt is No satisfaction, if conditions are not met, can detect that the integrality of user power consumption has been destroyed;If it is satisfied, indicating what user reported Electricity consumption data are the information of integrality, then c are sent to control centre;
(3) secure data aggregation module
1) gateway passes through combinationAnd the blind factor of removalIt is distributed for protect use The data aggregation method of family individual's electricity consumption privacy and integrality:In system initialization module, trusted party calculates ziWith And w, and it is respectively allocated to all users and gateway, in secure data aggregation module, gateway passes through Implicit ConditionsAnd the secret information that gateway is graspedCancellation blinds part, and carries out integrality and test Card, to protect individual subscriber electricity consumption privacy and data integrity;
2) at the same realize protection individual subscriber electricity consumption privacy and integrality encryption and digital signature method;Including:Production Raw be mutually related open parameter c, Y, σi, MiMethod;Utilize bilinear characteristic, the method for efficient verification data integrity: In system initialization module, trusted party calculates and discloses Y and Mi, in secure data aggregation module, gateway utilizes certainly The secret information w of body calculates c, and combines the report information σ of each useri, integrity verification is carried out, to protect individual subscriber electricity consumption Measure privacy and data integrity;
(4) aggregated data recovery module
Based on secret informationThe technology for calculating discrete logarithm polymerize electricity consumption to obtain userMethod:In system initialization module, trusted party calculatesAnd v is distributed into control Center, as the secret information of control centre, in aggregated data recovery module, the polymerization that user restores in control centre to be used Electricity
CN201510012106.8A 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Active CN104639311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Publications (2)

Publication Number Publication Date
CN104639311A CN104639311A (en) 2015-05-20
CN104639311B true CN104639311B (en) 2018-10-12

Family

ID=53217669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510012106.8A Active CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Country Status (1)

Country Link
CN (1) CN104639311B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790024B (en) * 2016-12-14 2020-10-20 西安邮电大学 Privacy protection method based on power injection under AMI and 5G intelligent power grid
CN108960552B (en) * 2017-05-27 2022-04-29 华为技术有限公司 Charging method based on real-time electricity price and related equipment
CN108683493B (en) * 2018-05-04 2021-02-12 西安电子科技大学 Data aggregation method for providing privacy protection in smart power grid
CN108964894B (en) * 2018-06-28 2021-04-30 上海电力学院 Power grid electricity stealing detection method based on state estimation and with privacy protection
CN109889501B (en) * 2019-01-18 2021-10-26 浙江工商大学 Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things
CN110049000B (en) * 2019-01-24 2021-11-23 浙江工商大学 Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces
CN109640299B (en) * 2019-01-31 2021-09-21 浙江工商大学 Aggregation method and system for ensuring M2M communication integrity and fault tolerance
CN112019338A (en) * 2019-05-31 2020-12-01 浙江工商大学 Lightweight safety smart power grid communication method and system based on block chain
CN110661771B (en) * 2019-06-21 2022-03-04 浙江工商大学 Secure smart power grid access control method and system for resisting differential attack
CN111131148B (en) * 2019-11-11 2022-03-22 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN110968892A (en) * 2019-11-18 2020-04-07 广东卓维网络有限公司 Data encryption system based on electric quantity data query
CN112532389B (en) * 2020-12-01 2023-02-28 南京邮电大学 Smart power grid lightweight privacy protection data aggregation method based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921384A (en) * 2006-09-12 2007-02-28 上海交通大学 Public key infrastructure system, local safety apparatus and operation method
KR101699359B1 (en) * 2010-03-05 2017-01-24 인터디지탈 패튼 홀딩스, 인크 Method and apparatus for providing security to devices
CN102638345B (en) * 2012-05-09 2015-07-15 四川师范大学 DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption";柴震川等;《Journal of Shanghai Jiaotong University(Science)》;20050704;第271-278页 *
"一种基于身份的智能电网认证模式";郭非等;《黑龙江大学自然科学学报》;20120430;第152-158页 *
"智能电网中若干安全和隐私问题的研究";张木玲;《CNKI优秀硕士学位论文全文库》;20141231;第13-56页 *

Also Published As

Publication number Publication date
CN104639311A (en) 2015-05-20

Similar Documents

Publication Publication Date Title
CN104639311B (en) The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid
Kumar et al. Smart grid metering networks: A survey on security, privacy and open research issues
Zhuang et al. Blockchain for cybersecurity in smart grid: A comprehensive survey
CN111294366B (en) Statistical analysis method for aggregation of encrypted data for resisting secret key leakage in smart power grid
McLaughlin et al. Energy theft in the advanced metering infrastructure
Jokar et al. A survey on security issues in smart grids
Rawat et al. Cyber security for smart grid systems: Status, challenges and perspectives
CN110536259B (en) Lightweight privacy protection data multistage aggregation method based on fog calculation
CN110138538B (en) Smart grid security and privacy protection data aggregation method based on fog calculation
CN104219056B (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
Li et al. Preserving data integrity for smart grid data aggregation
Bao et al. BLITHE: Behavior rule-based insider threat detection for smart grid
Ni et al. EDAT: Efficient data aggregation without TTP for privacy-assured smart metering
CN104580061B (en) The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid
Kim et al. Smart grid security: Attacks and defence techniques
Rottondi et al. A security framework for smart metering with multiple data consumers
Premarathne et al. Secure and reliable surveillance over cognitive radio sensor networks in smart grid
CN112291191A (en) Lightweight privacy protection multidimensional data aggregation method based on edge calculation
CN107896216B (en) A kind of key management, data encryption and the identity identifying method of electric power measuring instrument
Abdallah et al. Security and privacy in smart grid
CN106549767A (en) A kind of data authentication with secret protection and tracing system
Alimi et al. Security assessment of the smart grid: A review focusing on the NAN architecture
Chia et al. Secure data provenance in home energy monitoring networks
Haider et al. Threat modeling of wireless attacks on advanced metering infrastructure
Lalle et al. A privacy-protection scheme for smart water grid based on blockchain and machine learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190304

Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd.

Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang

Patentee before: Zhejiang Gongshang University