CN105721152B - A kind of safety routing method towards intelligent wireless ammeter - Google Patents

A kind of safety routing method towards intelligent wireless ammeter Download PDF

Info

Publication number
CN105721152B
CN105721152B CN201410714831.5A CN201410714831A CN105721152B CN 105721152 B CN105721152 B CN 105721152B CN 201410714831 A CN201410714831 A CN 201410714831A CN 105721152 B CN105721152 B CN 105721152B
Authority
CN
China
Prior art keywords
intelligent wireless
identity
wireless ammeter
ammeter
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410714831.5A
Other languages
Chinese (zh)
Other versions
CN105721152A (en
Inventor
万明
尚文利
曾鹏
于海斌
赵剑明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Institute of Automation of CAS
Original Assignee
Shenyang Institute of Automation of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Institute of Automation of CAS filed Critical Shenyang Institute of Automation of CAS
Priority to CN201410714831.5A priority Critical patent/CN105721152B/en
Publication of CN105721152A publication Critical patent/CN105721152A/en
Application granted granted Critical
Publication of CN105721152B publication Critical patent/CN105721152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of safety routing method towards intelligent wireless ammeter, the method is that every piece of intelligent wireless ammeter defines globally unique identity, represents the true identity information in its access network;On the basis of the public-key cryptosystem of identity-based, encryption, signature and the authentication mechanism identified using identity-based ensure confidentiality, integrality and authenticity that intelligent wireless ammeter data is transmitted;The method proposes the intelligent wireless ammeter Security routing framework that control logic with data forwarding separate, use the routing algorithm being combined based on distance and link-quality, calculate optimal routed path, encryption, the safety issue and renewal of signature mechanism completion route identified using identity-based, and a plurality of alternative path is provided, path priority is set, strengthens the robustness of route.The method not only realizes the two-way authentication between intelligent wireless ammeter, is also electricity collection, status monitoring, the data transfer such as control interaction provide the route of secure extensible and forward.

Description

A kind of safety routing method towards intelligent wireless ammeter
Technical field
The present invention relates to advanced measuring system security fields, specifically a kind of safe road towards intelligent wireless ammeter By method.
Background technology
Intelligent electric meter is the intelligent terminal of intelligent grid, and it has not been traditional electric energy meter.Intelligent electric meter is removed Beyond function of measuring with traditional ammeter basic electricity, in order to adapt to the use of intelligent grid and new energy, it also has There is the intellectuality work(such as two-way various rate meterings, electrical equipment remote control, the bidirectional data communication of plurality of data transmission modes Can, will with modern sensing measurement technology, the communication technology, computer technology and the even closer combination of control technology, towards digitlization, Information-based, automation, interactive direction are developed.At present, due to reasons such as low cost, communication convenience and networking flexibilities, with ZigBee, WIA-PA have obtained the extensive attention of academia and industrial quarters for the intelligent wireless ammeter of Typical Representative, in nothing The aspects such as the Functional Design of line intelligent electric meter, the communication technology and networking mode achieve certain achievement in research.However as In the successful Application of intelligent wireless ammeter, the network security problem of intelligent wireless ammeter is increasingly becoming pays close attention to heat to information technology Point, is problem of the intelligent wireless ammeter towards large-scale application urgent need to resolve, is also the weight of intelligent grid theoretical and technological studies Want one of content.
In fact, intelligent wireless ammeter network can be looked at as one for electricity, state information collection and interact Special wireless sensor network, for its network itself, it is operated in opposing open, cooperation and arbitrary environment, is had Fragility, topologies change are linked between ammeter node, lacks the characteristics such as Centralized Monitoring or management, and route as intelligent wireless electricity The part of table network most critical, is responsible for the information such as electricity, state and control command and is transferred to target section from source node Point finds suitable transmission path, and its accuracy is the primary condition of Logistics networks normal work.Therefore, the security of route With the security and availability that robustness directly affects intelligent wireless ammeter network, the expansible method for routing of design safety has Great meaning, will be as a vital link in intelligent wireless ammeter Research on Security Technology.
For the information security issue that intelligent wireless ammeter network is faced, the research institution of various countries and scholar are extensive Correlative study work is carried out.In the method for detecting abnormality based on model, proposition is required to the senior measurement body of remote proving It is AMI (Advanced Metering Infrastructure) module, is able to detect that the destruction to hardware, prevents ammeter quilt Operation, can determine attack according to known attack pattern;In terms of the secret protection of data transfer, proposition uses symmetric cryptography With the confidentiality of the mode protection information such as asymmetric encryption;In terms of Security routing, it is proposed that the peace under multitenant-dwelling environment Full intelligent electric meter framework, illustrates that safe Routing Protocol is one of important composition of the framework, and on the basis of source routing Increased security mechanism;In view of the multiple jump condition in radio communication, the multipath routing protocols in wireless AMI mesh networks Increase security mechanism effectively, healthy and strong, attacked so as to resist go-between, black hole etc..For the trustworthy information of routing iinformation, design New credible geographic routing protocol, produces credible forward table, by using distance factor using the credible factor of dynamic threshold As route metric so as to determine next hop information.
The content of the invention
In view of this, it is an object of the invention to provide a kind of safety routing method towards intelligent wireless ammeter network, it is The data transfers such as electricity collection, status monitoring, control interaction propose route and the forwarding of secure extensible, ensure senior measurement body The security of intelligent wireless ammeter network in system.
The further object of the present invention is to provide a kind of safety routing method towards intelligent wireless ammeter network, for net Each piece of intelligent wireless ammeter in network, defines globally unique identity, represents its real identity information, herein basis On, the secret of intelligent wireless ammeter data transmission is on the one hand ensured using the encryption of identity-based mark, signature and authentication mechanism Property, integrality and authenticity;On the other hand the intelligent wireless ammeter Security routing frame that control logic with data forwarding separate is proposed Structure ensures the security and scalability of route, while providing a plurality of alternative path, sets path priority, and it is strong that enhancing route Strong property.
The technical scheme that is used to achieve the above object of the present invention is:A kind of Security routing towards intelligent wireless ammeter Method, comprises the following steps:
The identity of each intelligent wireless ammeter is set for global unique identification, the true identity in access network is represented Information;
Using the identity of intelligent wireless ammeter as public key, encryption, signature, the certification machine of identity-based mark are realized System;
Intelligent wireless ammeter network is divided into multiple control domains, one controller of deployment in each control domain, each Controller possesses globally unique identity and represents its identity information, and each controller possesses institute in control domain where it The network topology structure being made up of wireless intelligent electric meter, by the Publish-subscribe pattern synchronization whole network of message between controller View, controller is responsible for calculating each intelligent wireless ammeter to the Optimization route path of data concentrator, and notifies in path Each intelligent electric meter.
The identity of the intelligent wireless ammeter includes two parts:The family number of user and the table number of intelligent electric meter, wherein The family number of user refers to that Electric Power Marketing System is the unique identifying number distributed using intelligent electric meter user, and the table number of intelligent electric meter is one Internal indicator number is planted, is recorded in the memory of intelligent electric meter.
The identity of intelligent wireless ammeter table in the form of a string of characters, string number or alphanumerics are combined Show.
The encryption mechanism of the identity-based mark is comprised the following steps:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, pass through Private key generator generates private key corresponding with each intelligent electric meter identity information;
Data encryption:By using the identity of Correspondent Node, common parameter, transmitting terminal intelligent wireless ammeter will be transmitted Cleartext information be encrypted to ciphertext;
Data deciphering:After receiving terminal intelligent wireless ammeter receives ciphertext, using the private key of oneself, common parameter, by ciphertext It is reduced to the original plaintext data for sending.
The data signature mechanism of the identity-based mark is comprised the following steps:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, pass through Private key generator generates private key corresponding with each intelligent electric meter identity information;
Digital signature:Intelligent wireless ammeter uses private key, the common parameter of oneself, and the cleartext information to transmitting is signed Name, generation signature;
Signature verification:Using the identity of transmitting terminal intelligent wireless ammeter, common parameter, signature is verified.
The authentication mechanism of the identity-based mark is comprised the following steps:
When intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2 are mutually authenticated, intelligent wireless ammeter SM1 is first Certification request is sent to intelligent electric meter SM2, request data package includes current time stamp, the identity mark of intelligent wireless ammeter SM1 Know, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM2 receives certification request, the correctness and digital signature of current time stamp are being verified just True property, then sends certification response to intelligent wireless ammeter SM1, and reply data bag includes current time stamp, intelligent wireless electricity The identity of table SM2, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM1 receives certification response, the correctness and digital signature of current time stamp are being verified just True property, so as to complete the two-way authentication of intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2.
Intelligent wireless ammeter and controller in described each control domain identify encryption, signature, certification using identity-based Mechanism complete both be mutually authenticated and safety information transfer.
Controller calculates control domain according to the method for routing that distance and link-quality are combined in described each control domain Optimal path of the middle intelligent wireless ammeter to data concentrator.
The Security routing framework that described logic control with data forwarding separate, controller is each nothing in each control domain Line intelligent electric meter provides one to a plurality of backup path, so as to converted immediately in link failure backup path, every standby road Footpath is all set different priority according to its routing cost value, and routing cost value more high priority is lower.
The present invention has advantages below and beneficial effect:
1. through as shown from the above technical solution, compared with prior art, the present disclosure provides one kind towards wireless intelligence The safety routing method of energy ammeter, the method is that each intelligent wireless ammeter defines globally unique identity, represents it True identity information in access network, prevents the intelligent wireless ammeter access network of false malice.
2. the method using identity-based mark encryption, signature, authentication mechanism, not only realize intelligent wireless ammeter it Between two-way authentication, while also having ensured the confidentiality and non-repudiation of data transfer, prevent transmission information from being eavesdropped and usurped Change.
3. the method is the route side that the data transfers such as electricity collection, status monitoring, control interaction propose secure extensible Method, routed path is calculated by controller, realizes the thought that logic control with data forwarding separate, and use identity-based The encryption of mark, signature mechanism complete the safety issue of route and update, it is therefore prevented that forgery, modification, eavesdropping of routing iinformation etc. Attack.
4. the method calculates optimal routed path using the routing algorithm being combined based on distance and link-quality, and A plurality of alternative path is provided, path priority is set, strengthen the robustness of route.
Brief description of the drawings
Fig. 1 is intelligent wireless ammeter identity structural representation in the embodiment of the present invention;
Fig. 2 is the encryption mechanism schematic diagram of identity-based mark in the embodiment of the present invention;
Fig. 3 is the signature mechanism schematic diagram of identity-based mark in the embodiment of the present invention;
Fig. 4 is the verification process schematic diagram of identity-based mark in the embodiment of the present invention;
The Security routing configuration diagram that Fig. 5 with data forwarding separate for logic control in the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in further detail.
1. the definition of intelligent wireless ammeter identity
Each piece of intelligent electric meter is owned by a globally unique identity (Identifier, ID), represents its access True identity information in network.Shown in Figure 1, identity is made up of two parts --- the family number of user and intelligent electric meter Table number, wherein user family number refer to Electric Power Marketing System be the unique identifying number distributed using intelligent electric meter user, intelligence electricity The table number of table is a kind of internal indicator number, is recorded in the memory of intelligent electric meter, and table number is must be provided with when intelligent electric meter dispatches from the factory. Identity can be using a string of character representations of readability, it would however also be possible to employ string number is represented, or is combined using both Mode.
2. identity-based is identified encryption, signature, authentication mechanism
In order to more easily ensure intelligent wireless ammeter network in electric quantity acquisition, real-time monitoring, information exchange, two-phase meter The confidentiality and confirmability of the information flows such as amount, encryption, signature, authentication mechanism based on intelligent electric meter identity are based on body On the basis of the public-key cryptosystem IBC (Identity-based Cryptographic) of part, by the identity of intelligent electric meter As public key, the private key corresponding to this public key is generated by private key generator PKG (Private Key Generator), so that Simplify the key management and distribution in public-key cryptosystem.
Shown in Figure 2, the encryption mechanism implementation procedure of identity-based mark is as follows:
1. systematic parameter is generated.Systematic parameter is generated by third party private key generator PKG trusty, main to include entirely The master key mk and common parameter params two parts of system, wherein master key mk are maintained secrecy, and common parameter params is disclosed, point Issue each intelligent electric meter.
2. intelligent electric meter private key generation.By the identity of master key mk, common parameter params and intelligent electric meter, PKG generates private key K corresponding with each intelligent electric meter identity informationID, as shown in formula (1).
Ksm<—ExtractSMKey(params,mk,IDsm) (1)
Wherein, KsmIt is the private key of intelligent electric meter SM, ExtractSMKey is extracted for private key, IDsmIt is the body of intelligent electric meter SM Part mark, i.e. public key.
3. data encryption process.By using the identity of Correspondent Node, common parameter params, transmitting terminal intelligence electricity The cleartext information M of transmission is encrypted to ciphertext C by table, as shown in formula (2).
Csm<—EncryptSM(params,IDsm,M) (2)
Wherein, CsmIt is the cipher-text information after encryption, EncryptSM is encryption.
4. data decrypting process.After receiving terminal receives ciphertext C, using the private key K of oneselfsm, common parameter params, will be close Literary C is reduced to the original plaintext data M for sending, as shown in formula (3).
M<—DecryptSM(params,Ksm,Csm) (3)
Wherein, DecryptSM is decryption.
Shown in Figure 3, the signature mechanism implementation procedure of identity-based mark is as follows:
1. systematic parameter is generated.Systematic parameter is generated by third party private key generator PKG trusty, main to include entirely The master key mk and common parameter params two parts of system, wherein master key mk are maintained secrecy, and common parameter params is disclosed, point Issue each intelligent electric meter.
2. intelligent electric meter private key generation.By the identity of master key mk, common parameter params and intelligent electric meter, PKG generates private key K corresponding with each intelligent electric meter identity informationsm
3. digital signature procedure.Intelligent electric meter uses the private key K of oneselfsm, common parameter params, to transmit plaintext letter Breath M is signed, generation signature sig, as shown in formula (4).
sig<—SignSM(params,Ksm,M) (4)
Wherein, SignSM is digital signature.
4. signature-verification process.Use the identity ID of transmitting terminal intelligent electric metersm, common parameter params, to signature Sig is verified that output result verifies the true and false of signature with TRUE or FALSE, as shown in formula (5).
d<—VerifySM(params,IDsm,sig,M) (5)
Wherein, VerifySM is signature verification, and d is the result (TRUE or FALSE).
What the encrypted and digitally signed of identity-based mark was proposed on the basis of Identity- based cryptography (IBE), its In master key and common parameter be that Identity- based cryptography (IBE) needs the basic system parameter that previously generates, specifically Content you can be found in the master thesis of Nanjing Univ. of Posts and Telecommunications《Identity based encryption and signature are studied》Section 3.1, Author Li Yanwen, tutor Yang Geng, the thesis submission date are in March, 2012.
Shown in Figure 4, the authentication mechanism implementation procedure of identity-based mark is as follows:
Can be complete by way of challenge/response between intelligent wireless ammeter and between intelligent electric meter and data concentrator Into two-way authentication, identity is exchanged first, the signature mechanism for then being identified using identity-based completes to be mutually authenticated, because body Part mark represents the unique identity information of intelligent electric meter, and private key only corresponding to identity is just able to verify that signature Correctness.Specific verification process is as follows:
1. when intelligent electric meter SM1 and intelligent electric meter SM2 are mutually authenticated, intelligent electric meter SM1 is first to intelligent electric meter SM2 sends certification request AuReq, mainly includes:The current time stamp T that intelligent electric meter SM1 is producedsm1, the body of intelligent electric meter SM1 Part mark IDsm1, and with the private key of oneself to Tsm1And IDsm1Digital signature Sigsm1 { Tsm1,IDsm1};
2. after intelligent electric meter SM2 receives the certification request AuReq of intelligent electric meter SM1, it first checks for current time stamp Correctness, then with the public key ID of intelligent electric meter SM1sm1Checking digital signature Sigsm1 { Tsm1,IDsm1Correctness, if institute There is checking all correct, then intelligent electric meter SM2 thinks that the identity of intelligent electric meter SM1 is real, is then sent to intelligent electric meter SM1 Certification response AuAck, mainly includes:The current time stamp T that intelligent electric meter SM2 is producedsm2, the identity of intelligent electric meter SM2 IDsm2, and with the private key of oneself to Tsm2And IDsm2Digital signature Sigsm2{Tsm2,IDsm2};
3. after intelligent electric meter SM1 receives the certification response AuAck of intelligent electric meter SM2, current time stamp and numeral are verified Signature Sigsm1 { Tsm1,IDsm1Correctness, if correctly, intelligent electric meter SM1 thinks that the identity of intelligent electric meter SM2 is true , so as to complete the two-way authentication of intelligent electric meter SM1 and intelligent electric meter SM2.
3. the Security routing framework that logic control with data forwarding separate
Based on the thought of SDN (Software-defined Networking) technology, the biography that intelligent wireless ammeter is constituted Sense network is divided into decision plane and datum plane two parts, and decision plane makes network and controls to determine by global network view Plan, and datum plane is directly issued to, datum plane only completes data forwarding function only in accordance with network control decision, so as to realize The new routing framework that logic control with data forwarding separate.Shown in Figure 5, intelligent wireless ammeter network is by different control Region is constituted, and a controller is disposed in each control area, and controller possesses all intelligent wireless ammeter compositions in the domain Network topology structure, by the Publish-subscribe pattern synchronization whole network view of message between controller, controller is responsible for calculating Each intelligent wireless ammeter is notified to each intelligent electric meter in path to the Optimization route path of data concentrator.Nothing The not responsible searching of line intelligent electric meter and more new routing information, are merely responsible for collecting, forward the work such as electricity or control command.Example Such as, when an intelligent wireless ammeter is added to certain control domain, first this intelligent electric meter using identity-based mark encryption, Signature mechanism completes to be mutually authenticated with the domain internal controller, then intelligent electric meter by oneself channel, power, signal intensity, Controller is sent to after the public key encryption of the information controller such as adjacent node, controller decrypts transmission with the private key of oneself After information, the intelligent electric meter node is added in network topology, the route side being then combined according to distance and link-quality Method calculates this intelligent electric meter to the optimal path of data concentrator, then by this routing iinformation encryption by way of notify to All intelligent wireless ammeters on the optimal path.
The method for routing that distance and link-quality are combined contains two routing algorithms, and one is that Shortest path routing is calculated Method, two is that the routing cost based on link-quality is calculated, and both approaches are all existing technologies.The basis that the present invention is mentioned The method for routing that distance and link-quality are combined is to combine above two method, is calculated according to shortest-path rout ing algorithms first Go out several shorter paths, routing cost then is calculated to this several paths, so as to find out optimal path.Shortest path is used first Routing algorithm calculates the n bar shortest paths from a certain intelligent wireless ammeter to data concentrator, then calculates per paths Routing cost, that optimal shortest path of link-quality is found out according to routing cost.The calculating of routing cost can be divided into logical Letter cost, path cost and the part of average path cost 3, are described in detail below:
1. communication cost.1bit data transfers are carried out between the intelligent wireless ammeter for representing any two direct neighbor to be consumed Energy.Communication cost between intelligent wireless ammeter A and B is defined as:
W in formulaPt(A) for A transmission powers are PtWhen send 1bit data power consumption;EinlAnd E (B)rmn(B) it is respectively B Primary power and current remaining;LQA,BIt is the quality of communication link (A, B), can be entered using packet receiving rate or received signal strength Row description.The formula shows that the link-quality between two intelligent wireless ammeters is poorer and dump energy is smaller, the communication generation between node Valency is bigger.
2. path cost.Represent any intelligent wireless ammeter transmit data to data concentrator by the total energy on path Amount consumption.Intelligent wireless ammeter A is through neighbors FiThe path cost communicated with data concentrator is expressed as:
Cost(A,Fi)=Metric (A, Fi)+Cost(Fi) (7)
Cost (F in formulai) it is neighbors FiAverage routing cost.
3. average routing cost.Expression is weighted average value, the selected conduct of weights in each path to path cost The probability of data transfer path.The average routing cost of intelligent wireless ammeter A can be expressed as:
K represents the neighbors number of A, P (A, F in formulai) it is A to neighbors FiThe select probability in place path, is defined as:
Controller can provide one to a plurality of backup path for each intelligent wireless ammeter, so as to be stood in link failure Convert backup path.It is that each intelligent wireless ammeter picks out several sub-optimal paths after controller finds out optimal path, according to Every routing cost value of sub-optimal path, is that every sub-optimal path sets different priority, and routing cost value gets over high priority Lower, then this several paths information and priority are informed corresponding intelligent wireless ammeter by controller.When priority is higher After path failure, intelligent wireless ammeter can select the path of next priority to carry out data transmission.

Claims (6)

1. a kind of safety routing method towards intelligent wireless ammeter, it is characterised in that comprise the following steps:
The identity of each intelligent wireless ammeter is set for global unique identification, the true identity letter in access network is represented Breath;The identity of the intelligent wireless ammeter includes two parts:The family number of user and the table number of intelligent electric meter, wherein user Family number refers to that Electric Power Marketing System is the unique identifying number distributed using intelligent electric meter user, and the table number of intelligent electric meter is inside one kind Identification number, records in the memory of intelligent electric meter;
The public-key cryptosystem of identity-based, using the identity of intelligent wireless ammeter as public key, realizes that identity-based is identified Encryption, signature, authentication mechanism;For the safety issue and renewal of intelligent wireless ammeter network route;
Intelligent wireless ammeter network is divided into multiple control domains, one controller of deployment in each control domain, each control Device possesses globally unique identity and represents its identity information, and each controller possesses control domain where it is interior to be whether there is The network topology structure of line intelligent electric meter composition, by the Publish-subscribe pattern synchronization whole network view of message between controller, The safety issue of routing iinformation is only completed with renewal by controller, so as to realize the wireless intelligence that logic control with data forwarding separate Can ammeter network routing framework;Controller is responsible for calculating each intelligent wireless ammeter to the Optimization route path of data concentrator, And notify to each intelligent electric meter in path;
Channel, power, signal intensity, adjacent node letter of the controller according to intelligent wireless ammeter network in described each control domain Breath, the method for routing being combined using distance and link-quality calculates in control domain intelligent wireless ammeter to data concentrator Shortest path and Minimal routing cost, draw Optimization route path;
In the Security routing framework that described logic control with data forwarding separate, controller is that each is wireless in each control domain Intelligent electric meter provides one to a plurality of backup path, so as to converted immediately in link failure backup path, every backup path Different priority are all set according to its routing cost value, routing cost value more high priority is lower.
2. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the nothing The identity of line intelligent electric meter is represented in the form of a string of characters, string number or alphanumerics are combined.
3. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base Comprised the following steps in the encryption mechanism of identity:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, by private key Generator generates private key corresponding with each intelligent electric meter identity information;
Data encryption:By using the identity of Correspondent Node, common parameter, transmitting terminal intelligent wireless ammeter is bright by what is transmitted Literary information is encrypted to ciphertext;
Data deciphering:After receiving terminal intelligent wireless ammeter receives ciphertext, using the private key of oneself, common parameter, ciphertext is reduced It is the original plaintext data for sending.
4. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base Comprised the following steps in the data signature mechanism of identity:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, by private key Generator generates private key corresponding with each intelligent electric meter identity information;
Digital signature:Intelligent wireless ammeter uses private key, the common parameter of oneself, and the cleartext information to transmitting is signed, raw Into signature;
Signature verification:Using the identity of transmitting terminal intelligent wireless ammeter, common parameter, signature is verified.
5. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base Comprised the following steps in the authentication mechanism of identity:
When intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2 are mutually authenticated, intelligent wireless ammeter SM1 is first to intelligence Can ammeter SM2 send certification request, request data package includes current time stamp, the identity of intelligent wireless ammeter SM1, with And with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM2 receives certification request, the correctness of current time stamp and the correctness of digital signature are verified, Then certification response is sent to intelligent wireless ammeter SM1, reply data bag includes current time stamp, intelligent wireless ammeter SM2 Identity, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM1 receives certification response, the correctness of current time stamp and the correctness of digital signature are verified, So as to complete the two-way authentication of intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2.
6. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that described every After controller completes the two-way authentication with intelligent wireless ammeter using the authentication mechanism that identity-based is identified in individual control domain, use The encryption of identity-based mark, signature mechanism complete the safety issue of routing iinformation and update.
CN201410714831.5A 2014-11-30 2014-11-30 A kind of safety routing method towards intelligent wireless ammeter Active CN105721152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410714831.5A CN105721152B (en) 2014-11-30 2014-11-30 A kind of safety routing method towards intelligent wireless ammeter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410714831.5A CN105721152B (en) 2014-11-30 2014-11-30 A kind of safety routing method towards intelligent wireless ammeter

Publications (2)

Publication Number Publication Date
CN105721152A CN105721152A (en) 2016-06-29
CN105721152B true CN105721152B (en) 2017-06-30

Family

ID=56145871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410714831.5A Active CN105721152B (en) 2014-11-30 2014-11-30 A kind of safety routing method towards intelligent wireless ammeter

Country Status (1)

Country Link
CN (1) CN105721152B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330317A (en) * 2016-09-07 2017-01-11 国网电力科学研究院武汉南瑞有限责任公司 Community service platform based on smart TV and operation method thereof
CN106788598B (en) * 2016-12-16 2020-09-08 北京智芯微电子科技有限公司 Networking method and device for power line communication
CN108449325A (en) * 2018-02-27 2018-08-24 中国地质大学(武汉) A kind of block chain authentication method, equipment and the storage device of ID-based cryptosystem
CN109218012B (en) * 2018-09-11 2021-07-16 重庆邮电大学 Distributed intelligent electric meter electricity selling method and system with concentrator
CN110097017B (en) * 2019-05-09 2020-03-31 浙江天普胜电气有限公司 Power transmission network special-type ammeter monitoring system and method
CN112104461A (en) * 2019-06-18 2020-12-18 中国科学院沈阳自动化研究所 SDN-based wireless security routing method in edge scene
CN111650549B (en) * 2020-06-13 2022-08-19 国网宁夏电力有限公司营销服务中心(国网宁夏电力有限公司计量中心) On-site ammeter fault identification method and mobile device readable storage medium
CN112039979B (en) * 2020-08-27 2023-06-20 中国平安财产保险股份有限公司 Distributed data cache management method, device, equipment and storage medium
CN112822253B (en) * 2020-12-31 2023-01-06 广州技象科技有限公司 Power utilization data skip transmission method and device of power Internet of things
CN112671927B (en) * 2020-12-31 2022-11-22 广州技象科技有限公司 Service data transmission method and device based on electric power Internet of things system change
CN113055162B (en) * 2021-03-10 2022-07-08 重庆邮电大学 WIA-PA network security communication method based on state cryptographic algorithm
CN113904775A (en) * 2021-08-26 2022-01-07 中国电力科学研究院有限公司 Smart meter interaction authentication method and system
CN115529138A (en) * 2022-08-29 2022-12-27 中国南方电网有限责任公司 Transformer substation safety communication method and system based on digital authentication technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425219A (en) * 2007-10-29 2009-05-06 吉林市曼博科技有限公司 Intelligent telemetering electric meter based on wireless sensor network
CN102033518A (en) * 2009-09-25 2011-04-27 河南大学 Centralized control type monitoring system of electricity meter based on BACnet (a data communication protocol for building automation and control networks)
CN203909574U (en) * 2014-04-29 2014-10-29 波瑞电气有限公司 Digital household electrical appliance control system based on wired and wireless mixing communication mode

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425219A (en) * 2007-10-29 2009-05-06 吉林市曼博科技有限公司 Intelligent telemetering electric meter based on wireless sensor network
CN102033518A (en) * 2009-09-25 2011-04-27 河南大学 Centralized control type monitoring system of electricity meter based on BACnet (a data communication protocol for building automation and control networks)
CN203909574U (en) * 2014-04-29 2014-10-29 波瑞电气有限公司 Digital household electrical appliance control system based on wired and wireless mixing communication mode

Also Published As

Publication number Publication date
CN105721152A (en) 2016-06-29

Similar Documents

Publication Publication Date Title
CN105721152B (en) A kind of safety routing method towards intelligent wireless ammeter
Li et al. Secure and privacy-preserving information aggregation for smart grids
Li et al. Secure information aggregation for smart grids using homomorphic encryption
Fan et al. Consortium blockchain based data aggregation and regulation mechanism for smart grid
CN104219056B (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
So et al. Zero-configuration identity-based signcryption scheme for smart grid
Ruj et al. A decentralized security framework for data aggregation and access control in smart grids
Li et al. Preserving data integrity for smart grid data aggregation
Deng et al. A secure and privacy-preserving communication scheme for advanced metering infrastructure
Khan et al. Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids
Beaver et al. Key management for SCADA
CN103475464A (en) Power special quantum encryption gateway system
Li et al. P3: Privacy preservation protocol for automatic appliance control application in smart grid
Zhang et al. A security scheme for intelligent substation communications considering real-time performance
CN107896216B (en) Key management, data encryption and identity authentication method for electric power measuring instrument
Bicakci et al. Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures
CN106549767A (en) A kind of data authentication with secret protection and tracing system
Wu et al. A robust and lightweight privacy-preserving data aggregation scheme for smart grid
Wang et al. Research on data security of multicast transmission based on certificateless multi-recipient signcryption in AMI
CN107231353A (en) Batch authentication method based on binary tree in a kind of intelligent grid
Dehalwar et al. Multi-agent based public key infrastructure for smart grid
Chen et al. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid
Garg et al. LiSA: A lightweight and secure authentication mechanism for smart metering infrastructure
CN104303452A (en) Method and device for generating cryptographically protected redundant data packets
Jin et al. Secure data collection in constrained tree-based smart grid environments

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant