KR101687480B1 - A secure server for an energy management system, and a method for controlling thereof - Google Patents

A secure server for an energy management system, and a method for controlling thereof Download PDF

Info

Publication number
KR101687480B1
KR101687480B1 KR1020150044637A KR20150044637A KR101687480B1 KR 101687480 B1 KR101687480 B1 KR 101687480B1 KR 1020150044637 A KR1020150044637 A KR 1020150044637A KR 20150044637 A KR20150044637 A KR 20150044637A KR 101687480 B1 KR101687480 B1 KR 101687480B1
Authority
KR
South Korea
Prior art keywords
message
hash
hash value
function
node
Prior art date
Application number
KR1020150044637A
Other languages
Korean (ko)
Other versions
KR20160116632A (en
Inventor
박주현
정국현
이선의
김진영
Original Assignee
광운대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 광운대학교 산학협력단 filed Critical 광운대학교 산학협력단
Priority to KR1020150044637A priority Critical patent/KR101687480B1/en
Publication of KR20160116632A publication Critical patent/KR20160116632A/en
Application granted granted Critical
Publication of KR101687480B1 publication Critical patent/KR101687480B1/en

Links

Images

Classifications

    • H04L9/3223
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a security server for an energy management system and a control method thereof, and more particularly, to a security server capable of efficiently verifying a message transmitted from a terminal of an energy management system. According to an embodiment of the present invention, there is provided a security server including a control unit for controlling each unit of a security server, a communication unit for transmitting and receiving information to and from an external communication device, and a storage unit for storing a security key for verifying a message transmitted from each terminal, The hash value of the leaf node of the hash tree is used as a hash value of a root node corresponding to the security key through a hash value connection function and a hash function. The control unit receives the message of the terminal converted into the hash value of the leaf node of the hash tree through the communication unit and further receives the verification path information to be referred to when verifying the message, The hash value of the node, the verification path information, the hash value concatenation function, and the hash function. If the hash value is the same as the security key, it is determined that the message of the terminal is valid, and the verification path information includes at least one of a node included in the path, And a plurality of sibling nodes of the plurality of siblings.

Description

Technical Field [0001] The present invention relates to a security server for an energy management system and a control method thereof,

The present invention relates to a security server for an energy management system and a control method thereof, and more particularly, to a security server capable of efficiently verifying a message transmitted from a terminal of an energy management system.

Demand side management means a set of plans and means to meet stable electricity demand at the lowest cost through changing electricity usage patterns of electric consumers. Power demand management is generally divided into demand response (energy demand) and energy efficiency (energy efficiency). Demand response refers to inducing electricity consumers to change their usual power usage pattern according to the power supply situation such as peak period through demand management plan and incentive system. To improve energy efficiency, replace existing low efficiency facility with high efficiency facility such as LED Which means that the electricity consumption efficiency is continuously improved. Demand resources also refer to the conversion of energy suppliers into controllable resources through the recruitment and management of various demand responses within a set of institutions.

Among the above-mentioned issues related to power demand management, recent studies on demand response are proceeding in various ways. The demand response operates on the power consumer side by adjusting the power consumption according to the electricity bill or the supplier's request, where various information can be transmitted and received between the power consumer and the power supplier. For example, power consumer identification information, used power amount information, rate information on used power, power request information, and power rate change information over time can be transmitted and received between the power consumer and the power supplier. Since the information may include sensitive items such as personal information depending on the type, security of the information is important. In particular, recently, crimes via communication networks are frequently occurring. Various attacks against power providers and important power consumers corresponding to social infrastructures may be proceeded through illegal collection, abuse, hacking or the like of the information.

Meanwhile, the conventional energy management system performs encryption and decryption through a security algorithm of the RSA (Rivest-Shamir-Adleman) scheme. RSA is constructed in such a way as to increase safety by using the difficulty of decomposing a large number of prime numbers and performs encryption and decryption using a separately configured public key and private key. However, as the performance of an electronic computing device such as a quantum computer increases, the stability of the RSA scheme may be drastically reduced, and the computational load due to complicated encryption and decryption operations becomes problematic. Therefore, to be.

SUMMARY OF THE INVENTION The present invention has been made to solve the above problems, and it is an object of the present invention to provide means for efficiently verifying a message transmitted and received between each component of an energy management system.

According to an embodiment of the present invention, there is provided a security server for an energy management system, comprising: a control unit for controlling each unit of the security server; A communication unit for transmitting and receiving information to and from the external communication device under the control of the control unit; A storage unit for storing a security key for verifying a message transmitted from each terminal of the energy management system; Wherein the hash value of the leaf node of the hash tree is determined by a hash value concatenation function and a hash value concatenation function, The hash value of the root node corresponding to the security key is transformed into a hash value of the root node through the hash function, Further receiving authentication path information (API) that is referenced when verifying the message, and based on the hash value of the leaf node, the API, the hash value concatenation function, and the hash function If the last hash value obtained is the same as the security key, the API evaluates that the message of the terminal is valid, Assuming the route connecting the node there is a security server can be provided, it characterized in that a set of sibling nodes of the node included in the path.

The control unit may further store the combination function information and the hash function information according to the importance information of the message divided into at least two or more stages in the storage unit and store the hash value connection function according to the importance information of the message, Further calculates a security key according to the importance information of each message based on the hash function and the hash tree, and further receives the importance information of the message when receiving a message to be verified from the terminal through the communication unit A combining function and a hash function according to the importance information of the message are used when obtaining the final hash value for the verification of the message, and if the final hash value is the same as the security key according to the importance information of the corresponding message, Evaluate the message as valid.

Here, the importance of the message is determined based on the type of information included in the message and the type of the terminal that transmits the message, and the controller may be configured such that n is a natural number of 2 or more, i is a natural number of n-1 or less, hi is the hash value of the i-th hierarchy of the hash tree of n hierarchies, Bi is the hash value of the sibling node of hi, Hi () is the hash function, Ci () (I + 1) th hierarchy value hi + 1 is obtained through the hash function Ci (hi, Bi), and if the importance of the message is high, at least two of the hash functions H1 And the hash functions H1 () to Hn-1 () are selected to be the same when the importance of the message is low.

Here, the hash value of the i-th hierarchy of the hash tree in which n is a natural number of 2 or more, i is a natural number of n-1 or less, hi is an nth hierarchy, Bi is a hash value of a sibling node of hi, Hi 1) th hierarchy value hi + 1 through the equation hi + 1 = Hi (Ci (hi, Bi)) when the function Ci And the hash value concatenating functions C1 () to Cn-1 () are different from each other, and when the importance of the message is low, the hash value concatenating functions C1 () to Cn-1 .

Here, for a hash tree in which n is a natural number equal to or greater than 2, j is a natural number equal to or greater than 2 and equal to or less than n, and the first layer is the lowest layer and the nth layer is the highest layer, The hash value of the intermediate node of the hash tree is calculated on the basis of the leaf node of the leaf node and the storage unit further stores the hash value of the intermediate node, And an API, selects a natural number j of 2 or more and less than or equal to n based on the importance of the received message, and selects a partial hash tree having a node of the j-th layer as a new root node, Based on the leaf node, the API consisting of j-1 sibling nodes, the hash value concatenation function, and the hash function If the obtained last hash value is equal to the hash value of the new root node, it is determined that the message of the terminal is valid.

According to another embodiment of the present invention, there is provided a method of controlling a security server for an energy management system, the method comprising: storing a hash tree and a security key for verifying a message transmitted from each terminal of the energy management system; Wherein the leaf node hash value of the hash tree is converted into a hash value of a root node corresponding to the security key through a predetermined hash value connection function and a hash function, Further receiving an API that is referenced when receiving the message but verifying the message; Obtaining a final hash value based on the hash value of the leaf node, the API, the hash value concatenation function, and the hash function; And evaluating that the message of the terminal is valid if the last hash value is the same as the security key; Wherein the API is a set of sibling nodes of nodes included in the path when assuming a path connecting the leaf node and the root node in the hash tree, .

According to the present invention, the validity of a message transmitted by a terminal can be easily verified, and the amount of information and the amount of information required for message verification can be reduced.

Also, according to the embodiment of the present invention, the type of the hash function used in the conversion process can be determined based on the importance of the message. Thereby providing a level of security appropriate to the importance of the message.

Also, according to the embodiment of the present invention, the hash value concatenation function of the hash value used in the conversion process can be determined based on the importance of the message, so that the complexity of the encryption can be easily adjusted.

Further, according to the embodiment of the present invention, the partial hash tree can be selected based on the importance of the message.

1 is a block diagram illustrating a security server according to an exemplary embodiment of the present invention.
2 is a diagram illustrating a hash tree according to an embodiment of the present invention.
3 is a diagram illustrating verification path information according to an embodiment of the present invention.
4 is a diagram illustrating a hash value connection function according to an embodiment of the present invention.
5 is a diagram illustrating a partial hash tree according to an embodiment of the present invention.
6 is a diagram illustrating a method of controlling a security server according to an embodiment of the present invention.

The present invention relates to a security server for an energy management system and a control method thereof, and more particularly, to a security server capable of efficiently verifying a message transmitted from a terminal of an energy management system. Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings.

1 is a diagram illustrating a security server 100 according to an embodiment of the present invention. 1, a security server 100 according to an embodiment of the present invention may include a control unit 110, a communication unit 120, and a storage unit 130. [ According to the method of implementing the present invention, some of the components included in the security server 100 may be omitted or a plurality of components may be provided in one.

The security server 100 according to the present invention is for security of an energy management system and can verify a message transmitted from each terminal of the energy management system. Accordingly, the security server 100 according to the present invention can block a message transmitted from an external unauthorized terminal or a message modulated through an abnormal process from being transmitted to other components of the energy management system, Various security-related problems that may occur in the network can be prevented in advance.

The control unit 110 may control each unit of the security server 100. The controller 110 may be implemented in the form of hardware or software, or may be a combination of hardware and software. The controller 110 may be a microprocessor, but is not limited thereto.

The communication unit 120 may perform wireless communication with the external communication device under the control of the control unit 110. [ The external communication device may include an external wireless terminal and a server as well as other terminals in the energy management system. In addition, the external communication device may include terminals of each home included in a Home Area Network (HAN) and a HAN, and the controller 110 may transmit a demand power related message of each terminal of the HAN through the communication unit 120 . The message generated in the terminal in the energy management system can be transmitted to the controller 110 through the communication unit 120. The controller 110 can verify the validity of the message based on the transmitted message, The validity determination result of the message may be retransmitted to the corresponding terminal through the communication unit 120. [ Also, according to the method of implementing the present invention, the communication unit 120 can transmit and receive information through a wireless or wired network.

The storage unit 130 may store a security key for verifying a message transmitted from each terminal of the energy management system. According to a preferred embodiment of the present invention, the security key may be provided in the form of a hash code or a hash value. In addition, the information that the storage unit 130 can store is not limited to this, and can also store a hash tree structure and a hash value of each node constituting a hash tree, which will be described later.

The control unit 120 according to the present invention can verify a message transmitted from each terminal or other external communication device of the energy management system using a hash tree. The structure of the hash tree and the method of verifying the message using the hash tree will be described in more detail with reference to FIG. 2 to FIG.

At this time, the control unit 110 can determine a method of verifying the validity of the message based on the importance of the message. Here, the importance of the message can be determined based on the type of information included in the message and the type of the terminal transmitting the message. For example, if information related to personal information of a terminal user is included in the message, the message can be determined to be important. As another example, a message containing information requesting simple power usage may be determined to be relatively less important information. As another example, power-related messages generated from terminals of a social infrastructure such as hospitals, traffic control centers, and military facilities can be identified as important information because they may be key information in terms of safety and security. The importance of the message may be divided into a plurality of steps, and the same message of the same terminal may be discriminated to another importance depending on the time zone and place.

2 is a diagram illustrating a hash tree according to an embodiment of the present invention. In FIG. 2, M 1 through M 8 represent messages generated at each terminal of the energy management system, and may be converted into hash values N 1 through N 8 through a specific hash function. At this time, the hash function can operate by converting the message of each terminal into a hash value through a unidirectional encryption technique. In FIG. 2, the broken lines shown from M 1 to M 8 in the direction of N 1 to N 8 indicate the conversion of information by the hash function. In FIG. 2, a rectangle between the layers indicates a hash value connection function and a hash function used when a hash value of a lower layer node is converted into a hash value of a node of a higher layer.

According to an embodiment of the present invention, the controller performs a verification of the message using a hash tree divided into a plurality of layers, wherein a hash value of a leaf node of the hash tree is The hash value may be converted into a hash value of a root node corresponding to the security key through a hash value connection function and a hash function. More detailed description is as follows. The control unit may perform verification of the message using a hash tree divided into n hierarchies for two or more natural numbers n. The hash tree of FIG. 2 shows a case where n is 4. Wherein the hash tree includes a plurality of leaf nodes, a top n-th layer of the hash tree is composed of one root node, and when n is greater than 3, the first layer and the n-th layer There may be n - 2 intermediate node layers connecting the nodes. Referring to FIG. 2, the first layer corresponds to the hash values N 1 to N 8 described above, and can be utilized as a leaf node of a hash tree. 2, the second layer is provided as an intermediate node of N 12 , N 34 , N 56 and N 78 , and the third layer may be provided as an intermediate node of N 14 and N 58 . The top layer 4 may be provided with a root node of the N 18. At this time, the aforementioned intermediate node and root node has been identified through the representation of N ab, which with respect to the natural b of less bigger leaf node number than the natural numbers a and a is less than the leaf node number, the node is a child of the node N a To N b . As described above, the leaf node N 1 to N 8 corresponds to the hash value converted from the message of the terminal, and the intermediate node is a combination of a leaf node of a lower hierarchy or a combination of intermediate nodes of a lower hierarchy The hash value. 2, the intermediate node N 12 of the second hierarchy is a hash value converted from the combination of the lower leaf nodes N 1 and N 2 , and the intermediate node N 14 of the third hierarchy is the lower intermediate nodes N 12 and N 34 Lt; / RTI > The root node may correspond to a security key stored in the storage unit as a hash value converted from an intermediate node combination of a lower layer. According to Figure 2, the root node N 18 can be a value converted hash from the combination of intermediate nodes in the sub-N 14 and N 58. At this time, the intermediate node and the root node may be generated from at least two lower nodes, and may be generated from only two lower nodes according to the manner of practicing the present invention. If each of the messages M 1 to M 8 is a valid message that has passed the verification, the root node N 18 generated based on the valid message can be utilized as the security key described above and stored in the storage unit. Meanwhile, at least one sibling node (brother node) connected to the same upper layer node may exist in the remaining nodes except the root node in the hash tree. For example, the upper node of the leaf node N 3 in FIG. 2 is N 34 , in which case N 4 becomes a sibling node of N 3 . Similarly, the sibling node of N 4 is N 3 , and the sibling node of N 14 in the third hierarchy is N 58 .

As described above, the parent node corresponds to the hash value converted from the combination of the hash values of the child nodes. For a natural number i less than or equal to n-1, the hash value of the lower node of the i-th hierarchy is calculated by summing the hash value concatenation function C i () and the hash value combination generated by the hash value concatenation function with another hash value (I + 1) th hierarchy through a hash function H i

According to the above description, a method of verifying the validity of the message can be determined based on the importance of the message. According to the manner of implementing the present invention, the change of the i based on the importance of the message transmitted from the terminal The type of the hash function H i () corresponding to the selected hash function can be selected, and the security key based on the selected hash function type can be separately calculated. Wherein, if the high priority of the message, the hash function H 1 () to H n -1 () is selected to be different from each other of at least two, and if the priority of the message is low, the hash function H 1 () To H n -1 () may be the same.

Further, the control unit, on the basis of the importance of messages sent from the terminal to select the type of the hash value associated function C i () according to the change of i, and security key based on a type of the selected hash value associated function And if the importance of the message is high, at least two of the hash value concatenation functions C 1 () to C n -1 () are different from each other, and if the importance of the message is low , The hash functions C 1 () to C n -1 () may be the same. The description of the various hash value concatenation functions will be discussed in detail in conjunction with FIG.

In FIG. 2, n is 4 and the number of leaf nodes is 8, but the present invention is not limited thereto.

3 is a diagram illustrating authentication path information (API) according to an embodiment of the present invention. In FIG. 3, a black square represents a sibling node included in the API in the hash tree, and a rectangle indicated by a bold line represents a final hash value h ( i ) through a hash value concatenation function and a hash function based on the leaf node A1 4 is calculated. Unlike FIG. 2, the hash value concatenation function and the hash function present between the steps are omitted.

In FIG. 3, it is assumed that the message to be verified is M 5 . M 5 may be transformed to leaf node A 1 through a particular hash function. The validity of the leaf node A1 can be verified through the API. in the hash tree that are separated by the n-layer, API is the sibling node B 1 and n for connecting the root node and the leaf node of the leaf node h 1 - 2 sibling node of the intermediate node, {B 2, ... B n - 1 } are sequentially arranged in order from the lower layer to the upper layer {B 1 , ... B n - 1 }. According to FIG. 3, since n is 4, the API of the leaf node A1 may include three sibling node information. First, the sibling node of the leaf node A1 is B 1 . The intermediate node to connect the leaf node and the root node A1 A4 inde each A2 and A3, A2 is the sibling node of the B 2, and A3 of the sibling node B 3. That is, the API of the leaf node A1 may be provided as {B 1 , B 2 , B 3 }. That is, the API may be provided as a set of sibling nodes of nodes included in the path, assuming paths (A1, A2, A3, A4) connecting the leaf node A1 and the root node A4 in the hash tree have. At this time, since there is no sibling node of the root node A4, three siblings can finally be included in the API.

Meanwhile, according to the embodiment of the present invention, the control unit of the security server can verify the validity of the hash value of the leaf node through at least one conversion process based on the API. In generalization, the i-th transformation process calculates the hash value h i + 1 through the hash value connection function C i (), the hash function H i () and the formula H i (C i (h i , B i ) Process. Referring to FIG. 3, when the message of the terminal converted into the hash value h 1 of the leaf node A 1 is received, the control unit uses the hash value of the first sibling node B 1 of the API and the hash value connection function C 1 () And performs a first conversion process of calculating the hash value h 2 through the hash function H 1 (). Then, the control unit combines the hash value h 2 with the hash value of the second sibling node B 2 of the API through the hash value concatenation function C 2 (), and calculates the hash value h 3 through the hash function H 2 () And performs a second conversion process. Finally, the control unit combines the hash value h 3 with the hash value of B 3 , the third sibling node of the API, through the hash value concatenation function C 3 () and obtains the final hash value h 4 () through the hash function H 3 And a third conversion process of calculating a second conversion process. The controller evaluates that the message M 5 of the terminal is valid if the last hash value h 4 is the same as the security key stored in the storage unit, and performs subsequent processing based on the information included in the terminal. If the final hash value h 4 differs from the security key, the controller determines that the corresponding message is illegally generated or is not an authenticated terminal message, and ignores or erases the corresponding message.

According to the above description, the type of the hash function H i () according to the change of i is selected based on the importance of the message transmitted from the terminal according to the method of the present invention, and the type of the selected hash function Can be separately calculated. Wherein, if the high priority of the message, the hash function H 1 () to H n -1 () is selected to be different from each other of at least two, and if the priority of the message is low, the hash function H 1 () To H n -1 () may be the same. Further, the control unit, on the basis of the importance of messages sent from the terminal to select the type of the hash value associated function C i () according to the change of i, and security key based on a type of the selected hash value associated function And if the importance of the message is high, at least two of the hash value concatenation functions C 1 () to C n -1 () are different from each other, and if the importance of the message is low , The hash value concatenation functions C 1 () to C n-1 () may be the same.

The hash function and the hash value concatenation function may be applied to the case of FIG. That is, when a hash function or a hash value concatenation function is selected based on the importance of a message according to the above description, a hash function or a hash function that is the same as the selected hash function or hash value concatenation function in the conversion process for calculating the final hash value h 4 A hash value concatenation function may be used. When the security keys are individually calculated based on the selected hash function or the hash value connection function, the control unit can determine whether the final hash value h 4 matches the individually calculated security key, The message can be validated.

That is, the control unit further stores the combination function information and the hash function information according to the importance information of the message classified into at least two or more stages in the storage unit, and stores the verified terminal message, the hash value connection function Further calculates a security key according to the importance information of each message based on the hash function and the hash tree, and further receives the importance information of the message when receiving a message to be verified from the terminal through the communication unit A combining function and a hash function according to the importance information of the message are used when obtaining the final hash value for the verification of the message, and if the final hash value is the same as the security key according to the importance information of the corresponding message, The message can be evaluated as valid.

4 is a diagram illustrating a hash value connection function according to an embodiment of the present invention. 4, a white square represents a node corresponding to a hash value h i of the i- th layer or a hash value h i + 1 of the ( i + 1) th layer, and a black square represents a node corresponding to the hash value h i Represents the sibling node B i .

Brother, as described above, the control unit, n is natural number equal to or greater than 2, and i is a natural number less than n-1, h i is n hash value of the i-th layer of the hash tree comprised of one layer, B i is h i the hash value of the node, H i () is a hash function, C i () when the hash value connecting a function, the formula h i + 1 = H i (C i (h i, B i)) the i + 1 layer, via a of, asking the hash value h i + 1, if the priority of the message is high, is the hash function H 1 () to H n -1 at least more than one is selected to be different from each other, and the importance of the message of () low , The hash functions H 1 () to H n -1 () can be selected to be the same. If the importance of the message is high, the controller selects that at least two of the hash value concatenation functions C 1 () to C n -1 () are different from each other, and if the importance of the message is low, The connection functions C 1 () to C n -1 () can be selected to be the same. The security server according to the present invention can adjust the degree of protection of the message based on the importance of the message, and if the hash function and the hash value connection function are leaked to the outside, the security server can effectively maintain the security state. This is because only a part of the hash function and a part of the hash value connection function can not generate a terminal message matching the security key.

According to Fig. 4, the hash value h i of the i-th layer and the hash value B i of the sibling node can be interconnected in various ways. In FIG. 4 (a), the hash value concatenating function may be provided in a simple manner of concatenating the two hash values. The hash value concatenation function of Fig. 4 (b) is the reverse of the case of Fig. 4 (a). The hash value concatenation function of FIG. 4 (c) is connected in such a way that the hash values h i and B i segmented into a certain length are mutually intersected. In this case, according to the method of the present invention, the crossing order and the segmented length of the two hash values may be connected to each other in an irregular pattern. In the case of FIG. 4 (d), the hash value connection function may be provided as a separate signal processing function f (). The function f () may be provided in a form of doubling the length of each hash value and then mutually combining, or it may be a separate hash function. However, the embodiment of the function is not limited thereto.

5 is a diagram illustrating a partial hash tree according to an embodiment of the present invention. 5, the hash value concatenation function and the hash function are not shown in the same manner as in FIG. In FIG. 5, denoted by a black square means a node corresponding to a hash value N5 of the message M5 and the message M5 transmitted from the terminal. In FIG. 5, the partial hash tree is indicated by a bold solid line, and the remaining hash tree portions that do not belong to the partial hash tree are indicated by a dotted line.

According to a method of implementing the present invention, a hash tree of which n is a natural number of 2 or more, j is a natural number of 2 or more and n or less, and is divided into n layers, the first layer being the lowest layer, The control unit may calculate a hash value of the intermediate node of the hash tree based on the verified leaf node, and the storage unit may further store the hash value of the intermediate node. The control unit receives the message and API converted from the terminal to the leaf node through the communication unit, selects a natural number j of 2 or more and n or less based on the importance information of the received message, Wherein the partial hash tree includes the received leaf node as a lower layer node, the API comprising the leaf node, j-1 sibling nodes, the hash value connection Function and the hash value obtained based on the hash function are the same as the hash value of the new root node, the message of the terminal can be evaluated as valid.

FIG. 5 (a) shows a case where the natural number j is four. That is, the entire area of the hash tree can be utilized as a partial hash tree. According to the preferred embodiment of the present invention, the higher the importance of the message received from the terminal, the closer to n the natural number j can be selected. Conversely, the lower the importance of the message, the closer to 2 a natural number j can be selected. The closer the value of j is to n, the higher the level of the new root node. Therefore, the information to be secured for invasion from the external energy management system, such as hash function, hash value connection function, and sibling node information, is increased.

5 (b) shows a case where the natural number j is 3. According to FIG. 5 (b), node N 58 serves as a new root node. Accordingly, the API of node N 5 is composed of two siblings N 6 and N 78 , and can reach the layer of N 58 through sequential hash value combination and hash value conversion. The control unit may determine that the message is valid if the hash value of N 58 stored in the storage unit and the hash value information of N 58 generated based on the received message are the same.

6 is a diagram illustrating a method of controlling a security server according to an embodiment of the present invention. Referring to FIG. 6, a method of controlling a security server for an energy management system may include storing a hash tree and a security key (S110) for verifying a message transmitted from each terminal of the energy management system. At this time, the leaf node hash value of the hash tree can be converted into the hash value of the root node corresponding to the security key through the predetermined hash value connection function and the hash function. Thereafter, the mobile node receives the message of the terminal, which has been converted into the hash value of the leaf node of the hash tree, and further receives the API referenced in verifying the message (S120). In this case, the API may be a set of sibling nodes of the node included in the path, assuming a path connecting the leaf node and the root node in the hash tree. Then, a final hash value is obtained based on the hash value of the leaf node, the API, the hash value connection function, and the hash function (S130). If the final hash value is equal to the security key, (S140). ≪ / RTI >

At this time, according to the method of the present invention, storing the hash tree and the secret key (S110) may further store the combination function information and the hash function information according to the importance information of the message divided into at least two steps . Accordingly, the security server can further calculate the security key according to the importance information of each message based on the verified terminal message, the hash value connection function according to the importance information of the message, the hash function, and the hash tree, The step of obtaining the final hash value (S130) may further receive the importance information of the message. The secure server may use a combination function and a hash function according to the importance information of the message when obtaining the final hash value for the verification of the message, and the step of evaluating the validity of the message of the terminal (S140) If the hash value is the same as the security key according to the importance information of the corresponding message, the message of the terminal can be evaluated as valid. In this case, the importance of the message can be determined based on the type of information included in the message and the type of the terminal transmitting the message.

The detailed description of each step is omitted because it is the same as that described in the first to fifth embodiments.

According to the present invention, the validity of a message transmitted by a terminal can be easily verified, and the amount of information and the amount of information required for message verification can be reduced.

Also, according to the embodiment of the present invention, the type of the hash function used in the conversion process can be determined based on the importance of the message. Thereby providing a level of security appropriate to the importance of the message.

Also, according to the embodiment of the present invention, the hash value concatenation function of the hash value used in the conversion process can be determined based on the importance of the message, so that the complexity of the encryption can be easily adjusted.

Further, according to the embodiment of the present invention, the partial hash tree can be selected based on the importance of the message.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention. Accordingly, it is to be understood that within the scope of the appended claims, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

100: Security server
110:
120:
130:

Claims (6)

A security server for an energy management system,
A communication unit for transmitting and receiving information to and from an external communication device;
A storage unit for storing a security key for verifying a message; And
And a control unit for controlling each unit of the security server,
The security key is calculated for each type of hash function for calculating an upper hash value from the combined hash value and a connection function for combining the hash value,
Wherein,
Receiving the message through the communication unit, selecting the connection function and the hash function based on the importance of the message, generating a hash tree using the hash value of the message, the selected connection function and the hash function, And evaluates the message as valid if the hash value of the root node of the hash tree is the same as the security key corresponding to the selected connection function and the hash function.
delete The method according to claim 1,
The hash tree comprises a plurality of layers,
Wherein,
If the importance of the message is high, at least two layers of the hash tree are generated by different hash functions,
And when the importance of the message is low, the layers of the hash tree are generated by the same hash function.
The method according to claim 1,
The hash tree comprises a plurality of layers,
Wherein,
If the importance of the message is high, at least two layers of the hash tree are generated by different connection functions,
And when the importance of the message is low, the layers of the hash tree are generated by the same connection function.
The method according to claim 1,
Wherein the importance of the message is determined based on at least one of a type of information included in the message, a type of a terminal transmitting the message, a time zone in which the message is transmitted, and a place where the message is transmitted. .
A method of controlling a security server for an energy management system,
Storing a security key for verifying a message, the secret key being separately computed for each type of hash function for calculating an upper hash value from the combined hash value and a connection function for combining the hash value;
Receiving a message;
Selecting the connection function and the hash function based on the importance of the message;
Generating a hash tree using a hash value of the message, the selected connection function, and a hash function; And
And evaluating that the message is valid if the hash value of the root node of the hash tree is the same as the security key corresponding to the selected connection function and the hash function.
KR1020150044637A 2015-03-30 2015-03-30 A secure server for an energy management system, and a method for controlling thereof KR101687480B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150044637A KR101687480B1 (en) 2015-03-30 2015-03-30 A secure server for an energy management system, and a method for controlling thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150044637A KR101687480B1 (en) 2015-03-30 2015-03-30 A secure server for an energy management system, and a method for controlling thereof

Publications (2)

Publication Number Publication Date
KR20160116632A KR20160116632A (en) 2016-10-10
KR101687480B1 true KR101687480B1 (en) 2016-12-16

Family

ID=57146090

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150044637A KR101687480B1 (en) 2015-03-30 2015-03-30 A secure server for an energy management system, and a method for controlling thereof

Country Status (1)

Country Link
KR (1) KR101687480B1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116739813B (en) * 2023-08-15 2023-10-20 湖南奔普智能科技有限公司 Hash algorithm-based ward settlement and reconciliation method
CN117195300B (en) * 2023-09-20 2024-03-29 全拓科技(杭州)股份有限公司 Big data safety protection method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007013745A (en) 2005-07-01 2007-01-18 Internatl Business Mach Corp <Ibm> Traceability signature system, signature method and program
US20100042842A1 (en) 2008-08-12 2010-02-18 Industrial Technology Research Institute Light weight authentication and secret retrieval
JP2010219908A (en) 2009-03-17 2010-09-30 Nec Access Technica Ltd Network system and method of collecting authentication information of terminal equipment in network system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102238681B1 (en) * 2013-07-01 2021-04-12 삼성전자주식회사 Method of generating and verifying signature information and system thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007013745A (en) 2005-07-01 2007-01-18 Internatl Business Mach Corp <Ibm> Traceability signature system, signature method and program
US20100042842A1 (en) 2008-08-12 2010-02-18 Industrial Technology Research Institute Light weight authentication and secret retrieval
JP2010219908A (en) 2009-03-17 2010-09-30 Nec Access Technica Ltd Network system and method of collecting authentication information of terminal equipment in network system

Also Published As

Publication number Publication date
KR20160116632A (en) 2016-10-10

Similar Documents

Publication Publication Date Title
AU2018202251B2 (en) Parameter based key derivation
CN1910848B (en) Efficient management of cryptographic key generations
CN101926188B (en) Security policy distribution to communication terminal
Shen et al. Secure authentication in cloud big data with hierarchical attribute authorization structure
CN102782694A (en) Transaction auditing for data security devices
Mustapa et al. Hardware-oriented authentication for advanced metering infrastructure
CN103618729A (en) Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN105959111A (en) Information security big-data resource access control system based on cloud computing and credible computing
CN114024686B (en) Intelligent community Internet of things information sharing model based on block chain
CN105071937A (en) Ciphertext poly attribute base encryption method having efficient attribute revocation capability
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN113343286B (en) Data encryption and decryption method, data uploading end, data receiving end and system
CN110933033A (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN112989416A (en) Anonymous multidimensional data aggregation privacy protection method facing smart power grid
CN108289026A (en) Identity identifying method and relevant device in a kind of satellite network
Samy et al. Towards a secured blockchain-based smart grid
CN106817217B (en) A kind of dynamic password Encryption Algorithm of interrupted aging
Macedo et al. Assigning trust to devices in the context of consumer IoT applications
CN103155480A (en) Authentication device, authentication method, and program
KR101687480B1 (en) A secure server for an energy management system, and a method for controlling thereof
CN110100413A (en) Robust for certification calculates Fuzzy extractor and method
Dawar Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks
KR102381389B1 (en) System and Method for Controlling Multi Factor Access Prioritized
CN112868202B (en) Continuous inextensible code with space limitation in strong space evidence
Zhang et al. Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and rlwe

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20191202

Year of fee payment: 4