CN104639311B - The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid - Google Patents
The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Download PDFInfo
- Publication number
- CN104639311B CN104639311B CN201510012106.8A CN201510012106A CN104639311B CN 104639311 B CN104639311 B CN 104639311B CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 B CN104639311 B CN 104639311B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- gateway
- integrity
- power consumption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005611 electricity Effects 0.000 title claims abstract description 46
- 238000006116 polymerization reaction Methods 0.000 title abstract 2
- 230000002776 aggregation Effects 0.000 claims abstract description 49
- 238000004220 aggregation Methods 0.000 claims abstract description 49
- 238000000034 method Methods 0.000 claims abstract description 40
- 238000001514 detection method Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 12
- 238000011084 recovery Methods 0.000 claims description 8
- 238000004422 calculation algorithm Methods 0.000 claims description 7
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 230000004931 aggregating effect Effects 0.000 claims description 3
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 231100000279 safety data Toxicity 0.000 claims 1
- 238000004891 communication Methods 0.000 abstract description 11
- 238000012986 modification Methods 0.000 abstract description 2
- 230000004048 modification Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
技术领域technical field
本发明属于智能电网技术领域,具体涉及一种智能电网中用电隐私及完整性保护的聚合方法及系统。The invention belongs to the technical field of smart grids, and in particular relates to an aggregation method and system for electricity privacy and integrity protection in smart grids.
背景技术Background technique
在智能电网技术领域中,Peng Liu等人提出了基于网络拓扑关联机制的数据聚合方案,可有效收集用户的用电量。首先,通过设计数据聚合树,电能控制中心可自下而上收集所有用户的用电量。其次,通过采用同态加密技术,树中每个节点可在密文空间对其所有子节点的数据进行聚合,从而在不泄露用户用电量明文的基础上,保护了用户的隐私。然而,智能电网应用系统中,在偶然的数据通信错误、内部和外部攻击者恶意篡改通信数据的应用场景下,数据的完整性保证同样非常重要。Peng Liu等人的方案,不具有数据完整性检查功能。因此,不能发现网络传输中的偶然性数据包传输错误,不能保证用户如实提交真正的用电量数据,也不能抵抗攻击者截获并恶意篡改数据。In the field of smart grid technology, Peng Liu et al. proposed a data aggregation scheme based on the network topology association mechanism, which can effectively collect the electricity consumption of users. First, by designing a data aggregation tree, the power control center can collect the power consumption of all users from bottom to top. Secondly, by adopting homomorphic encryption technology, each node in the tree can aggregate the data of all its child nodes in the ciphertext space, thus protecting the user's privacy without revealing the plaintext of the user's power consumption. However, in the smart grid application system, in the application scenarios of accidental data communication errors and malicious tampering of communication data by internal and external attackers, data integrity assurance is also very important. The scheme of Peng Liu et al. does not have the function of data integrity checking. Therefore, it is impossible to detect occasional data packet transmission errors in network transmission, to ensure that users truthfully submit real power consumption data, and to resist attackers from intercepting and maliciously tampering with data.
Fengjun Li等,对Peng Liu等人方案的部分缺陷进行了改进,提出了一个保护用户隐私,及用电量完整性的数据聚合方案。其数据聚合系统的整体架构如图1所示。图中的根节点作为电能控制中心,发起数据聚合的请求,并收集最终的处理结果。系统从下而上收集和聚合用电总量,每一个节点将所有子节点的用电量进行聚合,叠加本节点的用电量,并汇报给对应的父节点。例如,节点5对节点7、节点8和节点5自身的数据进行聚合,并报告给节点2。Fengjun Li et al. improved some of the shortcomings of Peng Liu et al.'s scheme, and proposed a data aggregation scheme that protects user privacy and power consumption integrity. The overall architecture of its data aggregation system is shown in Figure 1. The root node in the figure acts as the power control center, initiates a request for data aggregation, and collects the final processing results. The system collects and aggregates the total power consumption from bottom to top. Each node aggregates the power consumption of all child nodes, superimposes the power consumption of its own node, and reports to the corresponding parent node. For example, node 5 aggregates the data of node 7, node 8, and node 5 itself, and reports to node 2.
首先,该系统基于同态签名提出了端到端数字签名方案,并基于具体应用场景下的特定拓扑结构,沿着网络链路,依次产生和更新各网络节点数据聚合结果的校验码。校验码用于保证聚合数据的完整性。其次,设计了一个基于一跳节点的数字签名方案,和一个增量验证机制,以抵抗通信数据包被非法截获并修改。First of all, the system proposes an end-to-end digital signature scheme based on homomorphic signatures, and based on the specific topology in specific application scenarios, along the network links, the check codes of the data aggregation results of each network node are sequentially generated and updated. Checksums are used to ensure the integrity of aggregated data. Secondly, a digital signature scheme based on one-hop nodes and an incremental verification mechanism are designed to resist illegal interception and modification of communication data packets.
该系统存在以下缺陷:The system has the following flaws:
(1)每个用户对各自的输出数据进行数字签名,并将结果保存于父节点,造成了巨大的额外数据通信开销以及存储开销。(1) Each user digitally signs their own output data and saves the result in the parent node, resulting in huge additional data communication overhead and storage overhead.
(2)他们声称电能控制中心,可在数据可能遭受攻击后,事后启动增量验证数字签名系统,找出可疑数据,从而保证了数据的可信性和不可否认性。然后,由于所采用技术本身的缺陷性,对可疑数据的特征不能进行准确描述和定义。因此,该系统不能准确判断启动和执行计算和通信开销巨大的增量验证数字签名系统的时间点;而且,由于可疑数据特性的模糊性,实际可操作性较差,实验表明,很多场景下不能有效精确定位(经常误判或漏判)潜在的数据完整性攻击。(2) They claim that the power control center can start the incremental verification digital signature system afterwards to find suspicious data after the data may be attacked, thereby ensuring the credibility and non-repudiation of the data. However, due to the inherent flaws of the technology used, the characteristics of suspicious data cannot be accurately described and defined. Therefore, the system cannot accurately judge the time point of starting and executing the incremental verification digital signature system with huge calculation and communication overhead; moreover, due to the ambiguity of suspicious data characteristics, the actual operability is poor, and experiments show that it cannot be used in many scenarios. Effectively pinpoint (often misjudged or missed) potential data integrity attacks.
(3)该系统中,电能控制中心在检查可疑数据时,通过启动数据完整性检查程序,可获取每个用户的用电量明文数据,不能有效防止电能控制中心滥用权限,从而不能从技术上保护用户的隐私信息。(3) In this system, when the power control center checks suspicious data, it can obtain the plain text data of each user's power consumption by starting the data integrity check program, which cannot effectively prevent the power control center from abusing authority, so it cannot be technically Protect user privacy information.
(4)他们声称可防止内部用户改变提交的数据。在追踪数据是否被内部用户修改时,电能控制中心对各节点提交并存放于父节点的数字签名进行逐个验证,检查可能的数据篡改。然而,该方法不能有效抵抗合谋攻击。例如,某节点和其父节点串通起来,可恶意改变提交的数据并捏造对应的伪证据,最终绕开并能通过电能控制中心的追踪程序。(4) They claim to prevent internal users from altering submitted data. When tracking whether the data has been modified by internal users, the power control center verifies the digital signatures submitted by each node and stored in the parent node one by one to check for possible data tampering. However, this method cannot effectively resist collusion attacks. For example, a node colludes with its parent node to maliciously change the submitted data and fabricate corresponding false evidence, and finally bypass and pass the tracking program of the power control center.
发明内容Contents of the invention
针对现有技术中存在的缺陷,本发明的目的在于提供一种智能电网中用电隐私及完整性保护的聚合方法及系统。In view of the defects existing in the prior art, the object of the present invention is to provide an aggregation method and system for electricity privacy and integrity protection in a smart grid.
所述的智能电网中用电隐私及完整性保护的聚合方法,其特征在于该方法由安装在用户中的智能电表实时记录并汇报用户的用电量;由具有计算能力的网关负责数据聚合功能和中继功能;由控制中心负责收集、处理和分析各用户的实时用电量数据,并提供可靠服务;由可信中心负责管理整个系统。具体步骤如下:The aggregation method for electricity privacy and integrity protection in the smart grid is characterized in that the smart meter installed in the user records and reports the user's electricity consumption in real time; the gateway with computing power is responsible for the data aggregation function and relay functions; the control center is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system. Specific steps are as follows:
(1)系统初始化阶段:(1) System initialization stage:
1)可信中心根据输入的安全参数k,运行以下算法Gen(k),获得参数其中是长度为k的安全大素数,并选择群的生成元;1) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain the parameter in is a large safe prime of length k and chooses the group generator of ;
Gen(k):选择介为大素数的两个循环群,在和 上定义非退化和高效的双线性运算并满足:Gen(k): Choose between large prime numbers Two cyclic groups of ,exist and A non-degenerate and efficient bilinear operation defined on and satisfy:
双线性:对于所有,满足和 ;Bilinear: for all ,Satisfy and ;
非退化性:对于所有的,存在高效的计算的算法;Non-degenerate: for all , there is an efficient computational algorithm;
可计算性:对于所有的,存在高效的计算e(P,Q)的算法;Computability: for all , there is an efficient algorithm for computing e(P,Q);
2)可信中心随机选择;2) The trusted center randomly selects ;
3)可信中心选择两个密码学意义安全的哈希函数h和h1,其中,3) The trusted center selects two cryptographically secure hash functions h and h 1 , where,
; ;
4)可信中心随机选择n个,其中并满足,并将每一个分别分发给每一用户;4) The trusted center randomly selects n ,in and meet , and each distributed to each user individually ;
5)可信中心分别随机选择n个,和,其中并将每一个和分别分发给每一个用户,可信中心同时计算和;5) The trusted center randomly selects n , and ,in and add each and Distributed to each user separately , the trusted center simultaneously calculates and ;
6)可信中心随机选择,并计算和 ,其中;6) The trusted center randomly selects , and calculate and ,in ;
7)最后,每个用户获得并保密;7) Finally, each user obtain and keep secret ;
GW获得并保密 ;GW obtained and kept secret ;
CC获得并保密;CC obtained and kept secret ;
系统的公开信息为和,其中;The public information of the system is and ,in ;
(2)用户数据汇报阶段(2) User data reporting stage
在数据汇报时间点t,用户执行以下操作,将用电量汇报给网关:At the data reporting time point t, the user Do the following to reduce power consumption Report to the gateway:
1)计算1) Calculate
2)将和发送给网关;2) Will and sent to the gateway;
(3)安全数据聚合阶段(3) Security data aggregation stage
网关接收到和以后,执行下面的操作:gateway received and Afterwards, do the following:
1)计算 1) Calculate
2)检查是否满足。如果不满足,可检测出用户用电量的完整性已被破坏;如果满足,将发送给控制中心,以上等式验证的详细过程如下:2) check Is it satisfied. If it is not satisfied, it can be detected that the integrity of the user's power consumption has been destroyed; if it is satisfied, it will Send to the control center, the detailed process of the above equation verification is as follows:
(4)聚合数据恢复阶段(4) Aggregated data recovery stage
控制中心接收到以后,根据其掌握的秘密信息,计算基于为底的对数,从而获得用户的聚合用电量。The control center receives In the future, according to the secret information it possesses ,calculate based on base logarithm, so as to obtain the user's aggregate power consumption .
所述的智能电网中用电隐私及完整性保护的聚合系统,其特征在于包括:The aggregation system for electricity privacy and integrity protection in the smart grid is characterized in that it includes:
可信中心:负责管理整个系统,包括对系统进行初始化、注册新的用户、发布密钥;Trusted Center: Responsible for managing the entire system, including initializing the system, registering new users, and issuing keys;
控制中心:负责收集、处理和分析各用户的实时用电量数据,并提供可靠的服务,包括实时监控用户的用电情况、预测系统整体的用电趋势、偷电监测、数据篡改检测;Control Center: responsible for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services, including real-time monitoring of the user's power consumption, prediction of the overall power consumption trend of the system, power theft monitoring, and data tampering detection;
网关:用于连接可信中心和住户区,包括数据聚合功能,负责将可信中心中各用户的数据进行聚合;中继功能,负责在控制中心和各用户间进行安全数据转发;Gateway: used to connect the trusted center and the residential area, including the data aggregation function, which is responsible for aggregating the data of each user in the trusted center; the relay function, which is responsible for secure data forwarding between the control center and each user;
用户:住户区中共有n个用户,每个用户都安装一个智能电表,用于实时记录并汇报用户的用电量。User: There are n users in the residential area, and each user installs a smart meter to record and report the user's electricity consumption in real time.
所述的智能电网中用电隐私及完整性保护的聚合系统,其特征在于该聚合系统还包括:The aggregation system for electricity privacy and integrity protection in the smart grid is characterized in that the aggregation system also includes:
(1)系统初始化模块(1) System initialization module
1)在可信中心的控制下,采用分布式的技术,n个用户,共享n个秘密信息,并满足 ,用于保护用户个人用电量隐私性和完整性的方法;1) Under the control of the trusted center, using distributed technology, n users share n secret information , and satisfy , a method for protecting the privacy and integrity of the user's personal electricity consumption;
2)在可信中心的控制下,网关获得的技术,用于保护用户个人用电量隐私性和完整性的方法;2) Under the control of the trusted center, the gateway obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;
3)在可信中心的控制下,产生系统的公开验证参数和 的技术,其中,用于在模块中验证用户用电量完整性的方法;3) Under the control of the trusted center, generate public verification parameters of the system and technology, among which , a method for verifying the integrity of user power consumption in the module;
4)在可信中心的控制下,控制中心获得的技术,用于保护用户个人用电量隐私性和完整性的方法;4) Under the control of the trusted center, the control center obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;
(2)用户数据汇报模块(2) User data reporting module
1)高效的用于所有用户,汇报用电量时自动时间同步的方法;1) Efficiently used for all users, automatic time synchronization method when reporting power consumption;
2)分布式的同时保证数据隐私性及完整性的安全数据聚合的方法;2) Distributed method of secure data aggregation while ensuring data privacy and integrity;
(3)安全数据聚合模块(3) Security data aggregation module
1)网关通过结合及去除盲因子的分布式的用于保护用户个人用电量隐私性和完整性的数据聚合方法;1) The gateway is combined by and deblinding factor A distributed data aggregation method for protecting the privacy and integrity of users' personal electricity consumption;
2)同时实现保护用户个人用电量隐私性和完整性的加密及数字签名的方法;包括:产生相互关联的公开参数的方法;利用双线性性的特性,高效验证数据完整性的方法;2) Simultaneously realize the encryption and digital signature method to protect the privacy and integrity of the user's personal electricity consumption; including: generating interrelated public parameters The method; the method of efficiently verifying the integrity of data by using the characteristics of bilinearity;
(4)聚合数据恢复模块(4) Aggregate data recovery module
基于秘密信息,计算离散对数的技术,从而获取用户聚合用电量的方法。based on secret information , the technology of calculating discrete logarithm, so as to obtain the user's aggregate power consumption Methods.
本发明与现有技术相比,存在以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:
(1)同时保证了用户用电量的隐私性和完整性,实现了安全数据聚合功能,并实现了所有用户的自动时间同步;(1) At the same time, the privacy and integrity of the user's electricity consumption are guaranteed, the security data aggregation function is realized, and the automatic time synchronization of all users is realized;
(2)每次用电量汇报时,每个用户只需传送两种数据:和,通信和计算效率优于所有现有系统;(2) Each user only needs to transmit two kinds of data when reporting electricity consumption: and , communication and computational efficiency are superior to all existing systems;
(3)数据遭受攻击(包括通信出错、外部攻击者截获并篡改、内部用户冒充其他用户非法修改数据等)后,可随时、自动、主动发现数据的完整性已被破坏;(3) After the data is attacked (including communication errors, external attackers intercepting and tampering, internal users impersonating other users to illegally modify data, etc.), the integrity of the data can be found to be damaged at any time, automatically and actively;
(4)彻底防止了网关和控制中心滥用权限,获取单个用户的隐私数据。其中,网关只能获取用户用电量的密文数据和聚合数据;控制中心只能获取总的用电量。(4) Completely prevent the gateway and the control center from abusing their authority and obtaining the private data of a single user. Among them, the gateway can only obtain the ciphertext data and aggregated data of the user's power consumption; the control center can only obtain the total power consumption.
(5)可有效抵抗用户的合谋攻击。用户不能通过相互串通,修改数据而不被发现;用户也不能通过恶意修改其他用户的数据,栽赃其他用户,以达到欺骗电能控制中心采取错误控制决策的目的。(5) It can effectively resist user collusion attacks. Users cannot modify data without being discovered through collusion with each other; users cannot maliciously modify other users' data and frame other users to achieve the purpose of deceiving the power control center to take wrong control decisions.
附图说明Description of drawings
图1为现有技术中数据聚合系统架构结构示意图;FIG. 1 is a schematic diagram of the architecture of a data aggregation system in the prior art;
图2为本发明整体系统架构结构示意图。FIG. 2 is a schematic diagram of the overall system architecture of the present invention.
具体实施方式Detailed ways
本发明下面结合具体实施方式予以进一步详述。The present invention will be further described in detail below in combination with specific embodiments.
一种智能电网中用电隐私及完整性保护的聚合方法,该方法由安装在用户中的智能电表实时记录并汇报用户的用电量;由具有计算能力的网关负责数据聚合功能和中继功能;由控制中心负责收集、处理和分析各用户的实时用电量数据,并提供可靠服务;由可信中心负责管理整个系统,具体步骤如下:An aggregation method for electricity privacy and integrity protection in a smart grid, in which the smart meter installed in the user records and reports the user's electricity consumption in real time; the gateway with computing power is responsible for the data aggregation function and relay function ;The control center is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system, the specific steps are as follows:
系统初始化阶段:System initialization phase:
1)可信中心根据输入的安全参数k,运行以下算法Gen(k),获得参数,其中q是长度为k的安全大素数,并选择群G1的生成元;1) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain the parameter , where q is a large safe prime of length k, and chooses the generator of the group G1 ;
Gen(k):选择介为大素数q的两个循环群,在和上定义非退化和高效的双线性运算并满足:Gen(k): Select two cyclic groups between a large prime number q ,exist and A non-degenerate and efficient bilinear operation defined on and satisfy:
双线性:对于所有,满足和 ;Bilinear: for all ,Satisfy and ;
非退化性:存在,使得 ;Non-degenerate: present , making ;
可计算性:对于所有的,存在高效的计算的算法Computability: for all , there is an efficient computational Algorithm
2)可信中心随机选择;2) The trusted center randomly selects ;
3)可信中心选择两个密码学意义安全的哈希函数和,其中,3) The trusted center selects two cryptographically secure hash functions and ,in,
; ;
4)可信中心随机选择n个,其中,并满足,并将每一个分别分发给每一用户;4) The trusted center randomly selects n ,in , and satisfy , and each distributed to each user individually ;
5)可信中心分别随机选择n个,和,其中并将每一个和分别分发给每一个用户,可信中心同时计算和;5) The trusted center randomly selects n , and ,in and add each and Distributed to each user separately , the trusted center simultaneously calculates and ;
6)可信中心随机选择,并计算和 ,其中;6) The trusted center randomly selects , and calculate and ,in ;
7)最后,每个用户获得并保密;7) Finally, each user obtain and keep secret ;
GW获得并保密 ;GW obtained and kept secret ;
CC获得并保密;CC obtained and kept secret ;
系统的公开信息为和,其中;The public information of the system is and ,in ;
用户数据汇报阶段User data reporting stage
在数据汇报时间点t,用户执行以下操作,将用电量汇报给网关:At the data reporting time point t, the user Do the following to reduce power consumption Report to the gateway:
1)计算1) Calculate
2)将和发送给网关;2) Will and sent to the gateway;
安全数据聚合阶段Secure Data Aggregation Phase
网关接收到和以后,执行下面的操作:gateway received and Afterwards, do the following:
1)计算 1) Calculate
2)检查是否满足,如果不满足,可检测出用户用电量的完整性已被破坏,如果满足,将发送给控制中心,以上等式验证的详细过程如下:2) check Whether it is satisfied, if it is not satisfied, it can be detected that the integrity of the user's power consumption has been damaged, if it is satisfied, it will Send to the control center, the detailed process of the above equation verification is as follows:
聚合数据恢复阶段Aggregate Data Recovery Phase
控制中心接收到以后,根据其掌握的秘密信息,计算基于为底的对数,从而获得用户的聚合用电量。The control center receives In the future, according to the secret information it possesses ,calculate based on base logarithm, so as to obtain the user's aggregate power consumption .
一种智能电网中用电隐私及完整性保护的聚合系统,包括可信中心:负责管理整个系统,包括对系统进行初始化、注册新的用户、发布密钥;控制中心:负责收集、处理和分析各用户的实时用电量数据,并提供可靠的服务,包括实时监控用户的用电情况、预测系统整体的用电趋势、偷电监测、数据篡改检测; 网关:用于连接可信中心和住户区,包括数据聚合功能,负责将可信中心中各用户的数据进行聚合。中继功能,负责在控制中心和各用户间进行安全数据转发;用户:住户区中共有n个用户,每个用户都安装一个智能电表,用于实时记录并汇报用户的用电量。该聚合系统还包括:An aggregation system for electricity privacy and integrity protection in a smart grid, including a trusted center: responsible for managing the entire system, including initializing the system, registering new users, and issuing keys; a control center: responsible for collecting, processing and analyzing Real-time electricity consumption data of each user, and provide reliable services, including real-time monitoring of the user's electricity consumption, prediction of the overall electricity consumption trend of the system, electricity theft monitoring, and data tampering detection; Gateway: used to connect the trusted center and residents Zone, including the data aggregation function, is responsible for aggregating the data of each user in the trusted center. The relay function is responsible for secure data forwarding between the control center and each user; user: There are n users in the residential area, and each user is equipped with a smart meter for real-time recording and reporting of the user's electricity consumption. The aggregation system also includes:
系统初始化模块System initialization module
1)在可信中心的控制下,采用分布式的技术,n个用户,共享n个秘密信息,并满足 ,用于保护用户个人用电量隐私性和完整性的方法;1) Under the control of the trusted center, using distributed technology, n users share n secret information , and satisfy , a method for protecting the privacy and integrity of the user's personal electricity consumption;
2)在可信中心的控制下,网关获得的技术,用于保护用户个人用电量隐私性和完整性的方法;2) Under the control of the trusted center, the gateway obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;
3)在可信中心的控制下,产生系统的公开验证参数和 的技术,其中,用于在模块中验证用户用电量完整性的方法;3) Under the control of the trusted center, generate public verification parameters of the system and technology, among which , a method for verifying the integrity of user power consumption in the module;
4)在可信中心的控制下,控制中心获得的技术,用于保护用户个人用电量隐私性和完整性的方法;4) Under the control of the trusted center, the control center obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;
用户数据汇报模块User Data Reporting Module
1)高效的用于所有用户,汇报用电量时自动时间同步的方法;1) Efficiently used for all users, automatic time synchronization method when reporting power consumption;
2)分布式的同时保证数据隐私性及完整性的安全数据聚合的方法;2) Distributed method of secure data aggregation while ensuring data privacy and integrity;
安全数据聚合模块Secure Data Aggregation Module
1)网关通过结合及去除盲因子的分布式的用于保护用户个人用电量隐私性和完整性的数据聚合方法;1) The gateway is combined by and deblinding factor A distributed data aggregation method for protecting the privacy and integrity of users' personal electricity consumption;
2)同时实现保护用户个人用电量隐私性和完整性的加密及数字签名的方法;包括:产生相互关联的公开参数的方法;利用双线性性的特性,高效验证数据完整性的方法;2) Simultaneously realize the encryption and digital signature method to protect the privacy and integrity of the user's personal electricity consumption; including: generating interrelated public parameters The method; the method of efficiently verifying the integrity of data by using the characteristics of bilinearity;
聚合数据恢复模块Aggregate Data Recovery Module
基于秘密信息,计算离散对数的技术,从而获取用户聚合用电量的方法。based on secret information , the technology of calculating discrete logarithm, so as to obtain the user's aggregate power consumption Methods.
智能电网建立在集成、高速双向通信网络的基础上,通过先进的传感和测量技术、先进的设备及控制与决策支持技术,实现电网可靠、安全、经济、高效。智能电网中的先进测量体系(AMI)已成为电能消费端的一种重要的标准架构。AMI中,通过在用户中安装具有计算和通信能力的智能电表,将所有的智能电表与电力公司的电能控制中心连成网络,实现收集、监测实时用电量,并实现电能的最优化分配以及远程智能控制。智能电网中,通过对各个用户用电量的数据聚合,可高效利用网络带宽,并且通过隐藏用户的个人用电量,保护用户的用电隐私。然而,为了实现电能的智能分配与管理,电能控制中心需要频繁(通常“秒”级)获取用户的用电量信息,这就带来了空前的安全和隐私问题。因此,该发明实现了一个安全的数据聚合系统,一方面用于保护用户的用电隐私;同时,也用于确保数据的完整性,即:从技术上检测汇报数据通信差错,防止用户冒名非法汇报,以及汇报的用电量被非法截获、修改、伪造等。The smart grid is built on the basis of an integrated, high-speed two-way communication network, through advanced sensing and measurement technology, advanced equipment and control and decision support technology, the grid is reliable, safe, economical and efficient. The advanced measurement system (AMI) in the smart grid has become an important standard framework for the power consumption end. In AMI, by installing smart meters with computing and communication capabilities in users, all smart meters are connected to the power company's power control center to form a network, so as to realize the collection and monitoring of real-time power consumption, and realize the optimal distribution of power and Remote intelligent control. In the smart grid, through the data aggregation of the power consumption of each user, the network bandwidth can be efficiently used, and the privacy of the user's power consumption can be protected by hiding the user's personal power consumption. However, in order to realize the intelligent distribution and management of electric energy, the electric energy control center needs to frequently (usually "second" level) obtain the user's electricity consumption information, which brings unprecedented security and privacy issues. Therefore, this invention implements a safe data aggregation system, which is used to protect the privacy of users’ electricity consumption on the one hand; at the same time, it is also used to ensure the integrity of data, that is, technically detect and report data communication errors, and prevent users from impersonating and illegally report, and the reported electricity consumption is illegally intercepted, modified, forged, etc.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510012106.8A CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104639311A CN104639311A (en) | 2015-05-20 |
CN104639311B true CN104639311B (en) | 2018-10-12 |
Family
ID=53217669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510012106.8A Active CN104639311B (en) | 2015-01-12 | 2015-01-12 | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104639311B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790024B (en) * | 2016-12-14 | 2020-10-20 | 西安邮电大学 | Privacy protection method based on power injection under AMI and 5G intelligent power grid |
CN108960552B (en) * | 2017-05-27 | 2022-04-29 | 华为技术有限公司 | A charging method and related equipment based on real-time electricity price |
CN108683493B (en) * | 2018-05-04 | 2021-02-12 | 西安电子科技大学 | Data aggregation method for providing privacy protection in smart power grid |
CN108964894B (en) * | 2018-06-28 | 2021-04-30 | 上海电力学院 | Power grid electricity stealing detection method based on state estimation and with privacy protection |
CN109889501B (en) * | 2019-01-18 | 2021-10-26 | 浙江工商大学 | Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things |
CN110049000B (en) * | 2019-01-24 | 2021-11-23 | 浙江工商大学 | Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces |
CN109640299B (en) * | 2019-01-31 | 2021-09-21 | 浙江工商大学 | Aggregation method and system for ensuring M2M communication integrity and fault tolerance |
CN112019338B (en) * | 2019-05-31 | 2024-10-15 | 浙江工商大学 | Lightweight safe smart grid communication method and system based on blockchain |
CN110661771B (en) * | 2019-06-21 | 2022-03-04 | 浙江工商大学 | A secure smart grid access control method and system against differential attacks |
CN111131148B (en) * | 2019-11-11 | 2022-03-22 | 重庆邮电大学 | A smart grid-oriented privacy-protectable data aggregation method and system |
CN110968892A (en) * | 2019-11-18 | 2020-04-07 | 广东卓维网络有限公司 | Data encryption system based on electric quantity data query |
CN112532389B (en) * | 2020-12-01 | 2023-02-28 | 南京邮电大学 | A lightweight privacy-preserving data aggregation method for smart grid based on blockchain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921384A (en) * | 2006-09-12 | 2007-02-28 | 上海交通大学 | Public key infrastructure system, local safety apparatus and operation method |
KR101647567B1 (en) * | 2010-03-05 | 2016-08-10 | 인터디지탈 패튼 홀딩스, 인크 | Method and apparatus for providing security to devices |
CN102638345B (en) * | 2012-05-09 | 2015-07-15 | 四川师范大学 | DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption |
CN103825743A (en) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | Data security aggregation method with privacy protection function |
-
2015
- 2015-01-12 CN CN201510012106.8A patent/CN104639311B/en active Active
Non-Patent Citations (3)
Title |
---|
"An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption";柴震川等;《Journal of Shanghai Jiaotong University(Science)》;20050704;第271-278页 * |
"一种基于身份的智能电网认证模式";郭非等;《黑龙江大学自然科学学报》;20120430;第152-158页 * |
"智能电网中若干安全和隐私问题的研究";张木玲;《CNKI优秀硕士学位论文全文库》;20141231;第13-56页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104639311A (en) | 2015-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639311B (en) | The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid | |
CN109302405B (en) | Industrial data detection block chain network system based on edge calculation and detection method | |
Kumar et al. | Smart grid metering networks: A survey on security, privacy and open research issues | |
Volkova et al. | Security challenges in control network protocols: A survey | |
Jokar et al. | A survey on security issues in smart grids | |
Liu et al. | Cyber security and privacy issues in smart grids | |
Liu et al. | Achieving accountability in smart grid | |
Li et al. | Preserving data integrity for smart grid data aggregation | |
Komninos et al. | Survey in smart grid and smart home security: Issues, challenges and countermeasures | |
CN110120868B (en) | A smart grid security data aggregation method and system based on blockchain technology | |
Deng et al. | A secure and privacy-preserving communication scheme for advanced metering infrastructure | |
CN104580061B (en) | The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid | |
CN114117515B (en) | Disaster-tolerant traceable intelligent ammeter data security aggregation method | |
CN118573606B (en) | BIM-based multi-target building construction data sharing transmission method and system | |
CN104636672A (en) | Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies | |
CN117614604A (en) | Power grid data privacy protection and sharing system and method based on blockchain technology | |
CN118282732A (en) | Smart grid data aggregation system and method based on edge calculation and blockchain | |
CN117793708A (en) | A secure communication method for wireless sensor networks based on decentralized identity | |
Lalle et al. | A privacy-protection scheme for smart water grid based on blockchain and machine learning | |
Zhang et al. | Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and RLWE | |
Hameed et al. | Secure provenance in wireless sensor networks-a survey of provenance schemes | |
Zhao et al. | BPRM: Blockchain-based privacy-preserving and robust data aggregation supporting multi-functionality for fog-assisted smart grid | |
Beijia et al. | Blockchain-Based Key Management and Security Decisions in the Internet of Vehicles | |
CN116346474A (en) | A secure access method and system for virtual power plant distributed energy | |
CN113904788A (en) | Block chain-based network frame security verification method and SDN switch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190304 Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd. Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang Patentee before: Zhejiang Gongshang University |
|
TR01 | Transfer of patent right |