CN105721152B - A kind of safety routing method towards intelligent wireless ammeter - Google Patents
A kind of safety routing method towards intelligent wireless ammeter Download PDFInfo
- Publication number
- CN105721152B CN105721152B CN201410714831.5A CN201410714831A CN105721152B CN 105721152 B CN105721152 B CN 105721152B CN 201410714831 A CN201410714831 A CN 201410714831A CN 105721152 B CN105721152 B CN 105721152B
- Authority
- CN
- China
- Prior art keywords
- intelligent wireless
- identity
- wireless ammeter
- ammeter
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of safety routing method towards intelligent wireless ammeter, the method is that every piece of intelligent wireless ammeter defines globally unique identity, represents the true identity information in its access network;On the basis of the public-key cryptosystem of identity-based, encryption, signature and the authentication mechanism identified using identity-based ensure confidentiality, integrality and authenticity that intelligent wireless ammeter data is transmitted;The method proposes the intelligent wireless ammeter Security routing framework that control logic with data forwarding separate, use the routing algorithm being combined based on distance and link-quality, calculate optimal routed path, encryption, the safety issue and renewal of signature mechanism completion route identified using identity-based, and a plurality of alternative path is provided, path priority is set, strengthens the robustness of route.The method not only realizes the two-way authentication between intelligent wireless ammeter, is also electricity collection, status monitoring, the data transfer such as control interaction provide the route of secure extensible and forward.
Description
Technical field
The present invention relates to advanced measuring system security fields, specifically a kind of safe road towards intelligent wireless ammeter
By method.
Background technology
Intelligent electric meter is the intelligent terminal of intelligent grid, and it has not been traditional electric energy meter.Intelligent electric meter is removed
Beyond function of measuring with traditional ammeter basic electricity, in order to adapt to the use of intelligent grid and new energy, it also has
There is the intellectuality work(such as two-way various rate meterings, electrical equipment remote control, the bidirectional data communication of plurality of data transmission modes
Can, will with modern sensing measurement technology, the communication technology, computer technology and the even closer combination of control technology, towards digitlization,
Information-based, automation, interactive direction are developed.At present, due to reasons such as low cost, communication convenience and networking flexibilities, with
ZigBee, WIA-PA have obtained the extensive attention of academia and industrial quarters for the intelligent wireless ammeter of Typical Representative, in nothing
The aspects such as the Functional Design of line intelligent electric meter, the communication technology and networking mode achieve certain achievement in research.However as
In the successful Application of intelligent wireless ammeter, the network security problem of intelligent wireless ammeter is increasingly becoming pays close attention to heat to information technology
Point, is problem of the intelligent wireless ammeter towards large-scale application urgent need to resolve, is also the weight of intelligent grid theoretical and technological studies
Want one of content.
In fact, intelligent wireless ammeter network can be looked at as one for electricity, state information collection and interact
Special wireless sensor network, for its network itself, it is operated in opposing open, cooperation and arbitrary environment, is had
Fragility, topologies change are linked between ammeter node, lacks the characteristics such as Centralized Monitoring or management, and route as intelligent wireless electricity
The part of table network most critical, is responsible for the information such as electricity, state and control command and is transferred to target section from source node
Point finds suitable transmission path, and its accuracy is the primary condition of Logistics networks normal work.Therefore, the security of route
With the security and availability that robustness directly affects intelligent wireless ammeter network, the expansible method for routing of design safety has
Great meaning, will be as a vital link in intelligent wireless ammeter Research on Security Technology.
For the information security issue that intelligent wireless ammeter network is faced, the research institution of various countries and scholar are extensive
Correlative study work is carried out.In the method for detecting abnormality based on model, proposition is required to the senior measurement body of remote proving
It is AMI (Advanced Metering Infrastructure) module, is able to detect that the destruction to hardware, prevents ammeter quilt
Operation, can determine attack according to known attack pattern;In terms of the secret protection of data transfer, proposition uses symmetric cryptography
With the confidentiality of the mode protection information such as asymmetric encryption;In terms of Security routing, it is proposed that the peace under multitenant-dwelling environment
Full intelligent electric meter framework, illustrates that safe Routing Protocol is one of important composition of the framework, and on the basis of source routing
Increased security mechanism;In view of the multiple jump condition in radio communication, the multipath routing protocols in wireless AMI mesh networks
Increase security mechanism effectively, healthy and strong, attacked so as to resist go-between, black hole etc..For the trustworthy information of routing iinformation, design
New credible geographic routing protocol, produces credible forward table, by using distance factor using the credible factor of dynamic threshold
As route metric so as to determine next hop information.
The content of the invention
In view of this, it is an object of the invention to provide a kind of safety routing method towards intelligent wireless ammeter network, it is
The data transfers such as electricity collection, status monitoring, control interaction propose route and the forwarding of secure extensible, ensure senior measurement body
The security of intelligent wireless ammeter network in system.
The further object of the present invention is to provide a kind of safety routing method towards intelligent wireless ammeter network, for net
Each piece of intelligent wireless ammeter in network, defines globally unique identity, represents its real identity information, herein basis
On, the secret of intelligent wireless ammeter data transmission is on the one hand ensured using the encryption of identity-based mark, signature and authentication mechanism
Property, integrality and authenticity;On the other hand the intelligent wireless ammeter Security routing frame that control logic with data forwarding separate is proposed
Structure ensures the security and scalability of route, while providing a plurality of alternative path, sets path priority, and it is strong that enhancing route
Strong property.
The technical scheme that is used to achieve the above object of the present invention is:A kind of Security routing towards intelligent wireless ammeter
Method, comprises the following steps:
The identity of each intelligent wireless ammeter is set for global unique identification, the true identity in access network is represented
Information;
Using the identity of intelligent wireless ammeter as public key, encryption, signature, the certification machine of identity-based mark are realized
System;
Intelligent wireless ammeter network is divided into multiple control domains, one controller of deployment in each control domain, each
Controller possesses globally unique identity and represents its identity information, and each controller possesses institute in control domain where it
The network topology structure being made up of wireless intelligent electric meter, by the Publish-subscribe pattern synchronization whole network of message between controller
View, controller is responsible for calculating each intelligent wireless ammeter to the Optimization route path of data concentrator, and notifies in path
Each intelligent electric meter.
The identity of the intelligent wireless ammeter includes two parts:The family number of user and the table number of intelligent electric meter, wherein
The family number of user refers to that Electric Power Marketing System is the unique identifying number distributed using intelligent electric meter user, and the table number of intelligent electric meter is one
Internal indicator number is planted, is recorded in the memory of intelligent electric meter.
The identity of intelligent wireless ammeter table in the form of a string of characters, string number or alphanumerics are combined
Show.
The encryption mechanism of the identity-based mark is comprised the following steps:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, pass through
Private key generator generates private key corresponding with each intelligent electric meter identity information;
Data encryption:By using the identity of Correspondent Node, common parameter, transmitting terminal intelligent wireless ammeter will be transmitted
Cleartext information be encrypted to ciphertext;
Data deciphering:After receiving terminal intelligent wireless ammeter receives ciphertext, using the private key of oneself, common parameter, by ciphertext
It is reduced to the original plaintext data for sending.
The data signature mechanism of the identity-based mark is comprised the following steps:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, pass through
Private key generator generates private key corresponding with each intelligent electric meter identity information;
Digital signature:Intelligent wireless ammeter uses private key, the common parameter of oneself, and the cleartext information to transmitting is signed
Name, generation signature;
Signature verification:Using the identity of transmitting terminal intelligent wireless ammeter, common parameter, signature is verified.
The authentication mechanism of the identity-based mark is comprised the following steps:
When intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2 are mutually authenticated, intelligent wireless ammeter SM1 is first
Certification request is sent to intelligent electric meter SM2, request data package includes current time stamp, the identity mark of intelligent wireless ammeter SM1
Know, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM2 receives certification request, the correctness and digital signature of current time stamp are being verified just
True property, then sends certification response to intelligent wireless ammeter SM1, and reply data bag includes current time stamp, intelligent wireless electricity
The identity of table SM2, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM1 receives certification response, the correctness and digital signature of current time stamp are being verified just
True property, so as to complete the two-way authentication of intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2.
Intelligent wireless ammeter and controller in described each control domain identify encryption, signature, certification using identity-based
Mechanism complete both be mutually authenticated and safety information transfer.
Controller calculates control domain according to the method for routing that distance and link-quality are combined in described each control domain
Optimal path of the middle intelligent wireless ammeter to data concentrator.
The Security routing framework that described logic control with data forwarding separate, controller is each nothing in each control domain
Line intelligent electric meter provides one to a plurality of backup path, so as to converted immediately in link failure backup path, every standby road
Footpath is all set different priority according to its routing cost value, and routing cost value more high priority is lower.
The present invention has advantages below and beneficial effect:
1. through as shown from the above technical solution, compared with prior art, the present disclosure provides one kind towards wireless intelligence
The safety routing method of energy ammeter, the method is that each intelligent wireless ammeter defines globally unique identity, represents it
True identity information in access network, prevents the intelligent wireless ammeter access network of false malice.
2. the method using identity-based mark encryption, signature, authentication mechanism, not only realize intelligent wireless ammeter it
Between two-way authentication, while also having ensured the confidentiality and non-repudiation of data transfer, prevent transmission information from being eavesdropped and usurped
Change.
3. the method is the route side that the data transfers such as electricity collection, status monitoring, control interaction propose secure extensible
Method, routed path is calculated by controller, realizes the thought that logic control with data forwarding separate, and use identity-based
The encryption of mark, signature mechanism complete the safety issue of route and update, it is therefore prevented that forgery, modification, eavesdropping of routing iinformation etc.
Attack.
4. the method calculates optimal routed path using the routing algorithm being combined based on distance and link-quality, and
A plurality of alternative path is provided, path priority is set, strengthen the robustness of route.
Brief description of the drawings
Fig. 1 is intelligent wireless ammeter identity structural representation in the embodiment of the present invention;
Fig. 2 is the encryption mechanism schematic diagram of identity-based mark in the embodiment of the present invention;
Fig. 3 is the signature mechanism schematic diagram of identity-based mark in the embodiment of the present invention;
Fig. 4 is the verification process schematic diagram of identity-based mark in the embodiment of the present invention;
The Security routing configuration diagram that Fig. 5 with data forwarding separate for logic control in the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in further detail.
1. the definition of intelligent wireless ammeter identity
Each piece of intelligent electric meter is owned by a globally unique identity (Identifier, ID), represents its access
True identity information in network.Shown in Figure 1, identity is made up of two parts --- the family number of user and intelligent electric meter
Table number, wherein user family number refer to Electric Power Marketing System be the unique identifying number distributed using intelligent electric meter user, intelligence electricity
The table number of table is a kind of internal indicator number, is recorded in the memory of intelligent electric meter, and table number is must be provided with when intelligent electric meter dispatches from the factory.
Identity can be using a string of character representations of readability, it would however also be possible to employ string number is represented, or is combined using both
Mode.
2. identity-based is identified encryption, signature, authentication mechanism
In order to more easily ensure intelligent wireless ammeter network in electric quantity acquisition, real-time monitoring, information exchange, two-phase meter
The confidentiality and confirmability of the information flows such as amount, encryption, signature, authentication mechanism based on intelligent electric meter identity are based on body
On the basis of the public-key cryptosystem IBC (Identity-based Cryptographic) of part, by the identity of intelligent electric meter
As public key, the private key corresponding to this public key is generated by private key generator PKG (Private Key Generator), so that
Simplify the key management and distribution in public-key cryptosystem.
Shown in Figure 2, the encryption mechanism implementation procedure of identity-based mark is as follows:
1. systematic parameter is generated.Systematic parameter is generated by third party private key generator PKG trusty, main to include entirely
The master key mk and common parameter params two parts of system, wherein master key mk are maintained secrecy, and common parameter params is disclosed, point
Issue each intelligent electric meter.
2. intelligent electric meter private key generation.By the identity of master key mk, common parameter params and intelligent electric meter,
PKG generates private key K corresponding with each intelligent electric meter identity informationID, as shown in formula (1).
Ksm<—ExtractSMKey(params,mk,IDsm) (1)
Wherein, KsmIt is the private key of intelligent electric meter SM, ExtractSMKey is extracted for private key, IDsmIt is the body of intelligent electric meter SM
Part mark, i.e. public key.
3. data encryption process.By using the identity of Correspondent Node, common parameter params, transmitting terminal intelligence electricity
The cleartext information M of transmission is encrypted to ciphertext C by table, as shown in formula (2).
Csm<—EncryptSM(params,IDsm,M) (2)
Wherein, CsmIt is the cipher-text information after encryption, EncryptSM is encryption.
4. data decrypting process.After receiving terminal receives ciphertext C, using the private key K of oneselfsm, common parameter params, will be close
Literary C is reduced to the original plaintext data M for sending, as shown in formula (3).
M<—DecryptSM(params,Ksm,Csm) (3)
Wherein, DecryptSM is decryption.
Shown in Figure 3, the signature mechanism implementation procedure of identity-based mark is as follows:
1. systematic parameter is generated.Systematic parameter is generated by third party private key generator PKG trusty, main to include entirely
The master key mk and common parameter params two parts of system, wherein master key mk are maintained secrecy, and common parameter params is disclosed, point
Issue each intelligent electric meter.
2. intelligent electric meter private key generation.By the identity of master key mk, common parameter params and intelligent electric meter,
PKG generates private key K corresponding with each intelligent electric meter identity informationsm。
3. digital signature procedure.Intelligent electric meter uses the private key K of oneselfsm, common parameter params, to transmit plaintext letter
Breath M is signed, generation signature sig, as shown in formula (4).
sig<—SignSM(params,Ksm,M) (4)
Wherein, SignSM is digital signature.
4. signature-verification process.Use the identity ID of transmitting terminal intelligent electric metersm, common parameter params, to signature
Sig is verified that output result verifies the true and false of signature with TRUE or FALSE, as shown in formula (5).
d<—VerifySM(params,IDsm,sig,M) (5)
Wherein, VerifySM is signature verification, and d is the result (TRUE or FALSE).
What the encrypted and digitally signed of identity-based mark was proposed on the basis of Identity- based cryptography (IBE), its
In master key and common parameter be that Identity- based cryptography (IBE) needs the basic system parameter that previously generates, specifically
Content you can be found in the master thesis of Nanjing Univ. of Posts and Telecommunications《Identity based encryption and signature are studied》Section 3.1,
Author Li Yanwen, tutor Yang Geng, the thesis submission date are in March, 2012.
Shown in Figure 4, the authentication mechanism implementation procedure of identity-based mark is as follows:
Can be complete by way of challenge/response between intelligent wireless ammeter and between intelligent electric meter and data concentrator
Into two-way authentication, identity is exchanged first, the signature mechanism for then being identified using identity-based completes to be mutually authenticated, because body
Part mark represents the unique identity information of intelligent electric meter, and private key only corresponding to identity is just able to verify that signature
Correctness.Specific verification process is as follows:
1. when intelligent electric meter SM1 and intelligent electric meter SM2 are mutually authenticated, intelligent electric meter SM1 is first to intelligent electric meter
SM2 sends certification request AuReq, mainly includes:The current time stamp T that intelligent electric meter SM1 is producedsm1, the body of intelligent electric meter SM1
Part mark IDsm1, and with the private key of oneself to Tsm1And IDsm1Digital signature Sigsm1 { Tsm1,IDsm1};
2. after intelligent electric meter SM2 receives the certification request AuReq of intelligent electric meter SM1, it first checks for current time stamp
Correctness, then with the public key ID of intelligent electric meter SM1sm1Checking digital signature Sigsm1 { Tsm1,IDsm1Correctness, if institute
There is checking all correct, then intelligent electric meter SM2 thinks that the identity of intelligent electric meter SM1 is real, is then sent to intelligent electric meter SM1
Certification response AuAck, mainly includes:The current time stamp T that intelligent electric meter SM2 is producedsm2, the identity of intelligent electric meter SM2
IDsm2, and with the private key of oneself to Tsm2And IDsm2Digital signature Sigsm2{Tsm2,IDsm2};
3. after intelligent electric meter SM1 receives the certification response AuAck of intelligent electric meter SM2, current time stamp and numeral are verified
Signature Sigsm1 { Tsm1,IDsm1Correctness, if correctly, intelligent electric meter SM1 thinks that the identity of intelligent electric meter SM2 is true
, so as to complete the two-way authentication of intelligent electric meter SM1 and intelligent electric meter SM2.
3. the Security routing framework that logic control with data forwarding separate
Based on the thought of SDN (Software-defined Networking) technology, the biography that intelligent wireless ammeter is constituted
Sense network is divided into decision plane and datum plane two parts, and decision plane makes network and controls to determine by global network view
Plan, and datum plane is directly issued to, datum plane only completes data forwarding function only in accordance with network control decision, so as to realize
The new routing framework that logic control with data forwarding separate.Shown in Figure 5, intelligent wireless ammeter network is by different control
Region is constituted, and a controller is disposed in each control area, and controller possesses all intelligent wireless ammeter compositions in the domain
Network topology structure, by the Publish-subscribe pattern synchronization whole network view of message between controller, controller is responsible for calculating
Each intelligent wireless ammeter is notified to each intelligent electric meter in path to the Optimization route path of data concentrator.Nothing
The not responsible searching of line intelligent electric meter and more new routing information, are merely responsible for collecting, forward the work such as electricity or control command.Example
Such as, when an intelligent wireless ammeter is added to certain control domain, first this intelligent electric meter using identity-based mark encryption,
Signature mechanism completes to be mutually authenticated with the domain internal controller, then intelligent electric meter by oneself channel, power, signal intensity,
Controller is sent to after the public key encryption of the information controller such as adjacent node, controller decrypts transmission with the private key of oneself
After information, the intelligent electric meter node is added in network topology, the route side being then combined according to distance and link-quality
Method calculates this intelligent electric meter to the optimal path of data concentrator, then by this routing iinformation encryption by way of notify to
All intelligent wireless ammeters on the optimal path.
The method for routing that distance and link-quality are combined contains two routing algorithms, and one is that Shortest path routing is calculated
Method, two is that the routing cost based on link-quality is calculated, and both approaches are all existing technologies.The basis that the present invention is mentioned
The method for routing that distance and link-quality are combined is to combine above two method, is calculated according to shortest-path rout ing algorithms first
Go out several shorter paths, routing cost then is calculated to this several paths, so as to find out optimal path.Shortest path is used first
Routing algorithm calculates the n bar shortest paths from a certain intelligent wireless ammeter to data concentrator, then calculates per paths
Routing cost, that optimal shortest path of link-quality is found out according to routing cost.The calculating of routing cost can be divided into logical
Letter cost, path cost and the part of average path cost 3, are described in detail below:
1. communication cost.1bit data transfers are carried out between the intelligent wireless ammeter for representing any two direct neighbor to be consumed
Energy.Communication cost between intelligent wireless ammeter A and B is defined as:
W in formulaPt(A) for A transmission powers are PtWhen send 1bit data power consumption;EinlAnd E (B)rmn(B) it is respectively B
Primary power and current remaining;LQA,BIt is the quality of communication link (A, B), can be entered using packet receiving rate or received signal strength
Row description.The formula shows that the link-quality between two intelligent wireless ammeters is poorer and dump energy is smaller, the communication generation between node
Valency is bigger.
2. path cost.Represent any intelligent wireless ammeter transmit data to data concentrator by the total energy on path
Amount consumption.Intelligent wireless ammeter A is through neighbors FiThe path cost communicated with data concentrator is expressed as:
Cost(A,Fi)=Metric (A, Fi)+Cost(Fi) (7)
Cost (F in formulai) it is neighbors FiAverage routing cost.
3. average routing cost.Expression is weighted average value, the selected conduct of weights in each path to path cost
The probability of data transfer path.The average routing cost of intelligent wireless ammeter A can be expressed as:
K represents the neighbors number of A, P (A, F in formulai) it is A to neighbors FiThe select probability in place path, is defined as:
Controller can provide one to a plurality of backup path for each intelligent wireless ammeter, so as to be stood in link failure
Convert backup path.It is that each intelligent wireless ammeter picks out several sub-optimal paths after controller finds out optimal path, according to
Every routing cost value of sub-optimal path, is that every sub-optimal path sets different priority, and routing cost value gets over high priority
Lower, then this several paths information and priority are informed corresponding intelligent wireless ammeter by controller.When priority is higher
After path failure, intelligent wireless ammeter can select the path of next priority to carry out data transmission.
Claims (6)
1. a kind of safety routing method towards intelligent wireless ammeter, it is characterised in that comprise the following steps:
The identity of each intelligent wireless ammeter is set for global unique identification, the true identity letter in access network is represented
Breath;The identity of the intelligent wireless ammeter includes two parts:The family number of user and the table number of intelligent electric meter, wherein user
Family number refers to that Electric Power Marketing System is the unique identifying number distributed using intelligent electric meter user, and the table number of intelligent electric meter is inside one kind
Identification number, records in the memory of intelligent electric meter;
The public-key cryptosystem of identity-based, using the identity of intelligent wireless ammeter as public key, realizes that identity-based is identified
Encryption, signature, authentication mechanism;For the safety issue and renewal of intelligent wireless ammeter network route;
Intelligent wireless ammeter network is divided into multiple control domains, one controller of deployment in each control domain, each control
Device possesses globally unique identity and represents its identity information, and each controller possesses control domain where it is interior to be whether there is
The network topology structure of line intelligent electric meter composition, by the Publish-subscribe pattern synchronization whole network view of message between controller,
The safety issue of routing iinformation is only completed with renewal by controller, so as to realize the wireless intelligence that logic control with data forwarding separate
Can ammeter network routing framework;Controller is responsible for calculating each intelligent wireless ammeter to the Optimization route path of data concentrator,
And notify to each intelligent electric meter in path;
Channel, power, signal intensity, adjacent node letter of the controller according to intelligent wireless ammeter network in described each control domain
Breath, the method for routing being combined using distance and link-quality calculates in control domain intelligent wireless ammeter to data concentrator
Shortest path and Minimal routing cost, draw Optimization route path;
In the Security routing framework that described logic control with data forwarding separate, controller is that each is wireless in each control domain
Intelligent electric meter provides one to a plurality of backup path, so as to converted immediately in link failure backup path, every backup path
Different priority are all set according to its routing cost value, routing cost value more high priority is lower.
2. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the nothing
The identity of line intelligent electric meter is represented in the form of a string of characters, string number or alphanumerics are combined.
3. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base
Comprised the following steps in the encryption mechanism of identity:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, by private key
Generator generates private key corresponding with each intelligent electric meter identity information;
Data encryption:By using the identity of Correspondent Node, common parameter, transmitting terminal intelligent wireless ammeter is bright by what is transmitted
Literary information is encrypted to ciphertext;
Data deciphering:After receiving terminal intelligent wireless ammeter receives ciphertext, using the private key of oneself, common parameter, ciphertext is reduced
It is the original plaintext data for sending.
4. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base
Comprised the following steps in the data signature mechanism of identity:
Generation systematic parameter:Master key and common parameter two parts including whole system;
Generation intelligent wireless ammeter private key:According to the identity of master key, common parameter and intelligent wireless ammeter, by private key
Generator generates private key corresponding with each intelligent electric meter identity information;
Digital signature:Intelligent wireless ammeter uses private key, the common parameter of oneself, and the cleartext information to transmitting is signed, raw
Into signature;
Signature verification:Using the identity of transmitting terminal intelligent wireless ammeter, common parameter, signature is verified.
5. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that the base
Comprised the following steps in the authentication mechanism of identity:
When intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2 are mutually authenticated, intelligent wireless ammeter SM1 is first to intelligence
Can ammeter SM2 send certification request, request data package includes current time stamp, the identity of intelligent wireless ammeter SM1, with
And with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM2 receives certification request, the correctness of current time stamp and the correctness of digital signature are verified,
Then certification response is sent to intelligent wireless ammeter SM1, reply data bag includes current time stamp, intelligent wireless ammeter SM2
Identity, and with the private key of oneself to timestamp and the digital signature of identity;
After intelligent wireless ammeter SM1 receives certification response, the correctness of current time stamp and the correctness of digital signature are verified,
So as to complete the two-way authentication of intelligent wireless ammeter SM1 and intelligent wireless ammeter SM2.
6. a kind of safety routing method towards intelligent wireless ammeter according to claim 1, it is characterised in that described every
After controller completes the two-way authentication with intelligent wireless ammeter using the authentication mechanism that identity-based is identified in individual control domain, use
The encryption of identity-based mark, signature mechanism complete the safety issue of routing iinformation and update.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410714831.5A CN105721152B (en) | 2014-11-30 | 2014-11-30 | A kind of safety routing method towards intelligent wireless ammeter |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410714831.5A CN105721152B (en) | 2014-11-30 | 2014-11-30 | A kind of safety routing method towards intelligent wireless ammeter |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105721152A CN105721152A (en) | 2016-06-29 |
CN105721152B true CN105721152B (en) | 2017-06-30 |
Family
ID=56145871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410714831.5A Active CN105721152B (en) | 2014-11-30 | 2014-11-30 | A kind of safety routing method towards intelligent wireless ammeter |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105721152B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330317A (en) * | 2016-09-07 | 2017-01-11 | 国网电力科学研究院武汉南瑞有限责任公司 | Community service platform based on smart TV and operation method thereof |
CN106788598B (en) * | 2016-12-16 | 2020-09-08 | 北京智芯微电子科技有限公司 | Networking method and device for power line communication |
CN108449325A (en) * | 2018-02-27 | 2018-08-24 | 中国地质大学(武汉) | A kind of block chain authentication method, equipment and the storage device of ID-based cryptosystem |
CN109218012B (en) * | 2018-09-11 | 2021-07-16 | 重庆邮电大学 | Distributed intelligent electric meter electricity selling method and system with concentrator |
CN110097017B (en) * | 2019-05-09 | 2020-03-31 | 浙江天普胜电气有限公司 | Power transmission network special-type ammeter monitoring system and method |
CN112104461A (en) * | 2019-06-18 | 2020-12-18 | 中国科学院沈阳自动化研究所 | SDN-based wireless security routing method in edge scene |
CN111650549B (en) * | 2020-06-13 | 2022-08-19 | 国网宁夏电力有限公司营销服务中心(国网宁夏电力有限公司计量中心) | On-site ammeter fault identification method and mobile device readable storage medium |
CN112039979B (en) * | 2020-08-27 | 2023-06-20 | 中国平安财产保险股份有限公司 | Distributed data cache management method, device, equipment and storage medium |
CN112822253B (en) * | 2020-12-31 | 2023-01-06 | 广州技象科技有限公司 | Power utilization data skip transmission method and device of power Internet of things |
CN112671927B (en) * | 2020-12-31 | 2022-11-22 | 广州技象科技有限公司 | Service data transmission method and device based on electric power Internet of things system change |
CN113055162B (en) * | 2021-03-10 | 2022-07-08 | 重庆邮电大学 | WIA-PA network security communication method based on state cryptographic algorithm |
CN113904775A (en) * | 2021-08-26 | 2022-01-07 | 中国电力科学研究院有限公司 | Smart meter interaction authentication method and system |
CN115529138A (en) * | 2022-08-29 | 2022-12-27 | 中国南方电网有限责任公司 | Transformer substation safety communication method and system based on digital authentication technology |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425219A (en) * | 2007-10-29 | 2009-05-06 | 吉林市曼博科技有限公司 | Intelligent telemetering electric meter based on wireless sensor network |
CN102033518A (en) * | 2009-09-25 | 2011-04-27 | 河南大学 | Centralized control type monitoring system of electricity meter based on BACnet (a data communication protocol for building automation and control networks) |
CN203909574U (en) * | 2014-04-29 | 2014-10-29 | 波瑞电气有限公司 | Digital household electrical appliance control system based on wired and wireless mixing communication mode |
-
2014
- 2014-11-30 CN CN201410714831.5A patent/CN105721152B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425219A (en) * | 2007-10-29 | 2009-05-06 | 吉林市曼博科技有限公司 | Intelligent telemetering electric meter based on wireless sensor network |
CN102033518A (en) * | 2009-09-25 | 2011-04-27 | 河南大学 | Centralized control type monitoring system of electricity meter based on BACnet (a data communication protocol for building automation and control networks) |
CN203909574U (en) * | 2014-04-29 | 2014-10-29 | 波瑞电气有限公司 | Digital household electrical appliance control system based on wired and wireless mixing communication mode |
Also Published As
Publication number | Publication date |
---|---|
CN105721152A (en) | 2016-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105721152B (en) | A kind of safety routing method towards intelligent wireless ammeter | |
Li et al. | Secure and privacy-preserving information aggregation for smart grids | |
Li et al. | Secure information aggregation for smart grids using homomorphic encryption | |
Fan et al. | Consortium blockchain based data aggregation and regulation mechanism for smart grid | |
CN104219056B (en) | Privacy protection type real-time electric charge collecting method for intelligent power grid | |
So et al. | Zero-configuration identity-based signcryption scheme for smart grid | |
Ruj et al. | A decentralized security framework for data aggregation and access control in smart grids | |
Li et al. | Preserving data integrity for smart grid data aggregation | |
Deng et al. | A secure and privacy-preserving communication scheme for advanced metering infrastructure | |
Khan et al. | Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids | |
Beaver et al. | Key management for SCADA | |
CN103475464A (en) | Power special quantum encryption gateway system | |
Li et al. | P3: Privacy preservation protocol for automatic appliance control application in smart grid | |
Zhang et al. | A security scheme for intelligent substation communications considering real-time performance | |
CN107896216B (en) | Key management, data encryption and identity authentication method for electric power measuring instrument | |
Bicakci et al. | Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures | |
CN106549767A (en) | A kind of data authentication with secret protection and tracing system | |
Wu et al. | A robust and lightweight privacy-preserving data aggregation scheme for smart grid | |
Wang et al. | Research on data security of multicast transmission based on certificateless multi-recipient signcryption in AMI | |
CN107231353A (en) | Batch authentication method based on binary tree in a kind of intelligent grid | |
Dehalwar et al. | Multi-agent based public key infrastructure for smart grid | |
Chen et al. | A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid | |
Garg et al. | LiSA: A lightweight and secure authentication mechanism for smart metering infrastructure | |
CN104303452A (en) | Method and device for generating cryptographically protected redundant data packets | |
Jin et al. | Secure data collection in constrained tree-based smart grid environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |