[go: up one dir, main page]

CN104639311B - The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid - Google Patents

The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Download PDF

Info

Publication number
CN104639311B
CN104639311B CN201510012106.8A CN201510012106A CN104639311B CN 104639311 B CN104639311 B CN 104639311B CN 201510012106 A CN201510012106 A CN 201510012106A CN 104639311 B CN104639311 B CN 104639311B
Authority
CN
China
Prior art keywords
user
data
gateway
integrity
power consumption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510012106.8A
Other languages
Chinese (zh)
Other versions
CN104639311A (en
Inventor
鲍海勇
陆荣幸
陈乐�
曹珍富
董晓蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunyuan Shengli Technology Co Ltd
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201510012106.8A priority Critical patent/CN104639311B/en
Publication of CN104639311A publication Critical patent/CN104639311A/en
Application granted granted Critical
Publication of CN104639311B publication Critical patent/CN104639311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses electricity consumption privacy in a kind of intelligent grid and the polymerizations and system of integrity protection; this method is recorded in real time by the intelligent electric meter in user and is reported the electricity consumption of user, by having the function of that the gateway of computing capability is responsible for data aggregate and relay function, is responsible for collecting, handle and analyzing the real-time electricity consumption data of each user by control centre; and reliability services are provided, whole system is responsible for by trusted party, it is as follows:(1)System initialisation phase;(2)User data reports the stage;(3)The secure data aggregation stage;(4)Aggregated data restores extreme.The invention realizes the data aggregate system of a safety, on the one hand is used to protect the electricity consumption privacy of user;Meanwhile also serving to ensure that the integrality of data, i.e.,:Technically detection report data communication errors, prevent user from assuming another's name illegally to report, and the electricity consumption reported is by illegal intercepting and capturing, modification, forgery etc..

Description

一种智能电网中用电隐私及完整性保护的聚合方法及系统Aggregation method and system for electricity privacy and integrity protection in smart grid

技术领域technical field

本发明属于智能电网技术领域,具体涉及一种智能电网中用电隐私及完整性保护的聚合方法及系统。The invention belongs to the technical field of smart grids, and in particular relates to an aggregation method and system for electricity privacy and integrity protection in smart grids.

背景技术Background technique

在智能电网技术领域中,Peng Liu等人提出了基于网络拓扑关联机制的数据聚合方案,可有效收集用户的用电量。首先,通过设计数据聚合树,电能控制中心可自下而上收集所有用户的用电量。其次,通过采用同态加密技术,树中每个节点可在密文空间对其所有子节点的数据进行聚合,从而在不泄露用户用电量明文的基础上,保护了用户的隐私。然而,智能电网应用系统中,在偶然的数据通信错误、内部和外部攻击者恶意篡改通信数据的应用场景下,数据的完整性保证同样非常重要。Peng Liu等人的方案,不具有数据完整性检查功能。因此,不能发现网络传输中的偶然性数据包传输错误,不能保证用户如实提交真正的用电量数据,也不能抵抗攻击者截获并恶意篡改数据。In the field of smart grid technology, Peng Liu et al. proposed a data aggregation scheme based on the network topology association mechanism, which can effectively collect the electricity consumption of users. First, by designing a data aggregation tree, the power control center can collect the power consumption of all users from bottom to top. Secondly, by adopting homomorphic encryption technology, each node in the tree can aggregate the data of all its child nodes in the ciphertext space, thus protecting the user's privacy without revealing the plaintext of the user's power consumption. However, in the smart grid application system, in the application scenarios of accidental data communication errors and malicious tampering of communication data by internal and external attackers, data integrity assurance is also very important. The scheme of Peng Liu et al. does not have the function of data integrity checking. Therefore, it is impossible to detect occasional data packet transmission errors in network transmission, to ensure that users truthfully submit real power consumption data, and to resist attackers from intercepting and maliciously tampering with data.

Fengjun Li等,对Peng Liu等人方案的部分缺陷进行了改进,提出了一个保护用户隐私,及用电量完整性的数据聚合方案。其数据聚合系统的整体架构如图1所示。图中的根节点作为电能控制中心,发起数据聚合的请求,并收集最终的处理结果。系统从下而上收集和聚合用电总量,每一个节点将所有子节点的用电量进行聚合,叠加本节点的用电量,并汇报给对应的父节点。例如,节点5对节点7、节点8和节点5自身的数据进行聚合,并报告给节点2。Fengjun Li et al. improved some of the shortcomings of Peng Liu et al.'s scheme, and proposed a data aggregation scheme that protects user privacy and power consumption integrity. The overall architecture of its data aggregation system is shown in Figure 1. The root node in the figure acts as the power control center, initiates a request for data aggregation, and collects the final processing results. The system collects and aggregates the total power consumption from bottom to top. Each node aggregates the power consumption of all child nodes, superimposes the power consumption of its own node, and reports to the corresponding parent node. For example, node 5 aggregates the data of node 7, node 8, and node 5 itself, and reports to node 2.

首先,该系统基于同态签名提出了端到端数字签名方案,并基于具体应用场景下的特定拓扑结构,沿着网络链路,依次产生和更新各网络节点数据聚合结果的校验码。校验码用于保证聚合数据的完整性。其次,设计了一个基于一跳节点的数字签名方案,和一个增量验证机制,以抵抗通信数据包被非法截获并修改。First of all, the system proposes an end-to-end digital signature scheme based on homomorphic signatures, and based on the specific topology in specific application scenarios, along the network links, the check codes of the data aggregation results of each network node are sequentially generated and updated. Checksums are used to ensure the integrity of aggregated data. Secondly, a digital signature scheme based on one-hop nodes and an incremental verification mechanism are designed to resist illegal interception and modification of communication data packets.

该系统存在以下缺陷:The system has the following flaws:

(1)每个用户对各自的输出数据进行数字签名,并将结果保存于父节点,造成了巨大的额外数据通信开销以及存储开销。(1) Each user digitally signs their own output data and saves the result in the parent node, resulting in huge additional data communication overhead and storage overhead.

(2)他们声称电能控制中心,可在数据可能遭受攻击后,事后启动增量验证数字签名系统,找出可疑数据,从而保证了数据的可信性和不可否认性。然后,由于所采用技术本身的缺陷性,对可疑数据的特征不能进行准确描述和定义。因此,该系统不能准确判断启动和执行计算和通信开销巨大的增量验证数字签名系统的时间点;而且,由于可疑数据特性的模糊性,实际可操作性较差,实验表明,很多场景下不能有效精确定位(经常误判或漏判)潜在的数据完整性攻击。(2) They claim that the power control center can start the incremental verification digital signature system afterwards to find suspicious data after the data may be attacked, thereby ensuring the credibility and non-repudiation of the data. However, due to the inherent flaws of the technology used, the characteristics of suspicious data cannot be accurately described and defined. Therefore, the system cannot accurately judge the time point of starting and executing the incremental verification digital signature system with huge calculation and communication overhead; moreover, due to the ambiguity of suspicious data characteristics, the actual operability is poor, and experiments show that it cannot be used in many scenarios. Effectively pinpoint (often misjudged or missed) potential data integrity attacks.

(3)该系统中,电能控制中心在检查可疑数据时,通过启动数据完整性检查程序,可获取每个用户的用电量明文数据,不能有效防止电能控制中心滥用权限,从而不能从技术上保护用户的隐私信息。(3) In this system, when the power control center checks suspicious data, it can obtain the plain text data of each user's power consumption by starting the data integrity check program, which cannot effectively prevent the power control center from abusing authority, so it cannot be technically Protect user privacy information.

(4)他们声称可防止内部用户改变提交的数据。在追踪数据是否被内部用户修改时,电能控制中心对各节点提交并存放于父节点的数字签名进行逐个验证,检查可能的数据篡改。然而,该方法不能有效抵抗合谋攻击。例如,某节点和其父节点串通起来,可恶意改变提交的数据并捏造对应的伪证据,最终绕开并能通过电能控制中心的追踪程序。(4) They claim to prevent internal users from altering submitted data. When tracking whether the data has been modified by internal users, the power control center verifies the digital signatures submitted by each node and stored in the parent node one by one to check for possible data tampering. However, this method cannot effectively resist collusion attacks. For example, a node colludes with its parent node to maliciously change the submitted data and fabricate corresponding false evidence, and finally bypass and pass the tracking program of the power control center.

发明内容Contents of the invention

针对现有技术中存在的缺陷,本发明的目的在于提供一种智能电网中用电隐私及完整性保护的聚合方法及系统。In view of the defects existing in the prior art, the object of the present invention is to provide an aggregation method and system for electricity privacy and integrity protection in a smart grid.

所述的智能电网中用电隐私及完整性保护的聚合方法,其特征在于该方法由安装在用户中的智能电表实时记录并汇报用户的用电量;由具有计算能力的网关负责数据聚合功能和中继功能;由控制中心负责收集、处理和分析各用户的实时用电量数据,并提供可靠服务;由可信中心负责管理整个系统。具体步骤如下:The aggregation method for electricity privacy and integrity protection in the smart grid is characterized in that the smart meter installed in the user records and reports the user's electricity consumption in real time; the gateway with computing power is responsible for the data aggregation function and relay functions; the control center is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system. Specific steps are as follows:

(1)系统初始化阶段:(1) System initialization stage:

1)可信中心根据输入的安全参数k,运行以下算法Gen(k),获得参数其中是长度为k的安全大素数,并选择群的生成元1) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain the parameter in is a large safe prime of length k and chooses the group generator of ;

Gen(k):选择介为大素数的两个循环群,在 上定义非退化和高效的双线性运算并满足:Gen(k): Choose between large prime numbers Two cyclic groups of ,exist and A non-degenerate and efficient bilinear operation defined on and satisfy:

双线性:对于所有,满足 Bilinear: for all ,Satisfy and ;

非退化性:对于所有的,存在高效的计算的算法;Non-degenerate: for all , there is an efficient computational algorithm;

可计算性:对于所有的,存在高效的计算e(P,Q)的算法;Computability: for all , there is an efficient algorithm for computing e(P,Q);

2)可信中心随机选择2) The trusted center randomly selects ;

3)可信中心选择两个密码学意义安全的哈希函数h和h1,其中,3) The trusted center selects two cryptographically secure hash functions h and h 1 , where,

;

4)可信中心随机选择n个,其中并满足,并将每一个分别分发给每一用户4) The trusted center randomly selects n ,in and meet , and each distributed to each user individually ;

5)可信中心分别随机选择n个,其中并将每一个分别分发给每一个用户,可信中心同时计算5) The trusted center randomly selects n , and ,in and add each and Distributed to each user separately , the trusted center simultaneously calculates and ;

6)可信中心随机选择,并计算 ,其中6) The trusted center randomly selects , and calculate and ,in ;

7)最后,每个用户获得并保密7) Finally, each user obtain and keep secret ;

GW获得并保密GW obtained and kept secret ;

CC获得并保密CC obtained and kept secret ;

系统的公开信息为,其中The public information of the system is and ,in ;

(2)用户数据汇报阶段(2) User data reporting stage

在数据汇报时间点t,用户执行以下操作,将用电量汇报给网关:At the data reporting time point t, the user Do the following to reduce power consumption Report to the gateway:

1)计算1) Calculate

2)将发送给网关;2) Will and sent to the gateway;

(3)安全数据聚合阶段(3) Security data aggregation stage

网关接收到以后,执行下面的操作:gateway received and Afterwards, do the following:

1)计算 1) Calculate

2)检查是否满足。如果不满足,可检测出用户用电量的完整性已被破坏;如果满足,将发送给控制中心,以上等式验证的详细过程如下:2) check Is it satisfied. If it is not satisfied, it can be detected that the integrity of the user's power consumption has been destroyed; if it is satisfied, it will Send to the control center, the detailed process of the above equation verification is as follows:

(4)聚合数据恢复阶段(4) Aggregated data recovery stage

控制中心接收到以后,根据其掌握的秘密信息,计算基于为底的对数,从而获得用户的聚合用电量The control center receives In the future, according to the secret information it possesses ,calculate based on base logarithm, so as to obtain the user's aggregate power consumption .

所述的智能电网中用电隐私及完整性保护的聚合系统,其特征在于包括:The aggregation system for electricity privacy and integrity protection in the smart grid is characterized in that it includes:

可信中心:负责管理整个系统,包括对系统进行初始化、注册新的用户、发布密钥;Trusted Center: Responsible for managing the entire system, including initializing the system, registering new users, and issuing keys;

控制中心:负责收集、处理和分析各用户的实时用电量数据,并提供可靠的服务,包括实时监控用户的用电情况、预测系统整体的用电趋势、偷电监测、数据篡改检测;Control Center: responsible for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services, including real-time monitoring of the user's power consumption, prediction of the overall power consumption trend of the system, power theft monitoring, and data tampering detection;

网关:用于连接可信中心和住户区,包括数据聚合功能,负责将可信中心中各用户的数据进行聚合;中继功能,负责在控制中心和各用户间进行安全数据转发;Gateway: used to connect the trusted center and the residential area, including the data aggregation function, which is responsible for aggregating the data of each user in the trusted center; the relay function, which is responsible for secure data forwarding between the control center and each user;

用户:住户区中共有n个用户,每个用户都安装一个智能电表,用于实时记录并汇报用户的用电量。User: There are n users in the residential area, and each user installs a smart meter to record and report the user's electricity consumption in real time.

所述的智能电网中用电隐私及完整性保护的聚合系统,其特征在于该聚合系统还包括:The aggregation system for electricity privacy and integrity protection in the smart grid is characterized in that the aggregation system also includes:

(1)系统初始化模块(1) System initialization module

1)在可信中心的控制下,采用分布式的技术,n个用户,共享n个秘密信息,并满足 ,用于保护用户个人用电量隐私性和完整性的方法;1) Under the control of the trusted center, using distributed technology, n users share n secret information , and satisfy , a method for protecting the privacy and integrity of the user's personal electricity consumption;

2)在可信中心的控制下,网关获得的技术,用于保护用户个人用电量隐私性和完整性的方法;2) Under the control of the trusted center, the gateway obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;

3)在可信中心的控制下,产生系统的公开验证参数 的技术,其中,用于在模块中验证用户用电量完整性的方法;3) Under the control of the trusted center, generate public verification parameters of the system and technology, among which , a method for verifying the integrity of user power consumption in the module;

4)在可信中心的控制下,控制中心获得的技术,用于保护用户个人用电量隐私性和完整性的方法;4) Under the control of the trusted center, the control center obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;

(2)用户数据汇报模块(2) User data reporting module

1)高效的用于所有用户,汇报用电量时自动时间同步的方法;1) Efficiently used for all users, automatic time synchronization method when reporting power consumption;

2)分布式的同时保证数据隐私性及完整性的安全数据聚合的方法;2) Distributed method of secure data aggregation while ensuring data privacy and integrity;

(3)安全数据聚合模块(3) Security data aggregation module

1)网关通过结合及去除盲因子的分布式的用于保护用户个人用电量隐私性和完整性的数据聚合方法;1) The gateway is combined by and deblinding factor A distributed data aggregation method for protecting the privacy and integrity of users' personal electricity consumption;

2)同时实现保护用户个人用电量隐私性和完整性的加密及数字签名的方法;包括:产生相互关联的公开参数的方法;利用双线性性的特性,高效验证数据完整性的方法;2) Simultaneously realize the encryption and digital signature method to protect the privacy and integrity of the user's personal electricity consumption; including: generating interrelated public parameters The method; the method of efficiently verifying the integrity of data by using the characteristics of bilinearity;

(4)聚合数据恢复模块(4) Aggregate data recovery module

基于秘密信息,计算离散对数的技术,从而获取用户聚合用电量的方法。based on secret information , the technology of calculating discrete logarithm, so as to obtain the user's aggregate power consumption Methods.

本发明与现有技术相比,存在以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:

(1)同时保证了用户用电量的隐私性和完整性,实现了安全数据聚合功能,并实现了所有用户的自动时间同步;(1) At the same time, the privacy and integrity of the user's electricity consumption are guaranteed, the security data aggregation function is realized, and the automatic time synchronization of all users is realized;

(2)每次用电量汇报时,每个用户只需传送两种数据:,通信和计算效率优于所有现有系统;(2) Each user only needs to transmit two kinds of data when reporting electricity consumption: and , communication and computational efficiency are superior to all existing systems;

(3)数据遭受攻击(包括通信出错、外部攻击者截获并篡改、内部用户冒充其他用户非法修改数据等)后,可随时、自动、主动发现数据的完整性已被破坏;(3) After the data is attacked (including communication errors, external attackers intercepting and tampering, internal users impersonating other users to illegally modify data, etc.), the integrity of the data can be found to be damaged at any time, automatically and actively;

(4)彻底防止了网关和控制中心滥用权限,获取单个用户的隐私数据。其中,网关只能获取用户用电量的密文数据和聚合数据;控制中心只能获取总的用电量。(4) Completely prevent the gateway and the control center from abusing their authority and obtaining the private data of a single user. Among them, the gateway can only obtain the ciphertext data and aggregated data of the user's power consumption; the control center can only obtain the total power consumption.

(5)可有效抵抗用户的合谋攻击。用户不能通过相互串通,修改数据而不被发现;用户也不能通过恶意修改其他用户的数据,栽赃其他用户,以达到欺骗电能控制中心采取错误控制决策的目的。(5) It can effectively resist user collusion attacks. Users cannot modify data without being discovered through collusion with each other; users cannot maliciously modify other users' data and frame other users to achieve the purpose of deceiving the power control center to take wrong control decisions.

附图说明Description of drawings

图1为现有技术中数据聚合系统架构结构示意图;FIG. 1 is a schematic diagram of the architecture of a data aggregation system in the prior art;

图2为本发明整体系统架构结构示意图。FIG. 2 is a schematic diagram of the overall system architecture of the present invention.

具体实施方式Detailed ways

本发明下面结合具体实施方式予以进一步详述。The present invention will be further described in detail below in combination with specific embodiments.

一种智能电网中用电隐私及完整性保护的聚合方法,该方法由安装在用户中的智能电表实时记录并汇报用户的用电量;由具有计算能力的网关负责数据聚合功能和中继功能;由控制中心负责收集、处理和分析各用户的实时用电量数据,并提供可靠服务;由可信中心负责管理整个系统,具体步骤如下:An aggregation method for electricity privacy and integrity protection in a smart grid, in which the smart meter installed in the user records and reports the user's electricity consumption in real time; the gateway with computing power is responsible for the data aggregation function and relay function ;The control center is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system, the specific steps are as follows:

系统初始化阶段:System initialization phase:

1)可信中心根据输入的安全参数k,运行以下算法Gen(k),获得参数,其中q是长度为k的安全大素数,并选择群G1的生成元1) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain the parameter , where q is a large safe prime of length k, and chooses the generator of the group G1 ;

Gen(k):选择介为大素数q的两个循环群,在上定义非退化和高效的双线性运算并满足:Gen(k): Select two cyclic groups between a large prime number q ,exist and A non-degenerate and efficient bilinear operation defined on and satisfy:

双线性:对于所有,满足 Bilinear: for all ,Satisfy and ;

非退化性:存在,使得 Non-degenerate: present , making ;

可计算性:对于所有的,存在高效的计算的算法Computability: for all , there is an efficient computational Algorithm

2)可信中心随机选择2) The trusted center randomly selects ;

3)可信中心选择两个密码学意义安全的哈希函数,其中,3) The trusted center selects two cryptographically secure hash functions and ,in,

;

4)可信中心随机选择n个,其中,并满足,并将每一个分别分发给每一用户4) The trusted center randomly selects n ,in , and satisfy , and each distributed to each user individually ;

5)可信中心分别随机选择n个,其中并将每一个分别分发给每一个用户,可信中心同时计算5) The trusted center randomly selects n , and ,in and add each and Distributed to each user separately , the trusted center simultaneously calculates and ;

6)可信中心随机选择,并计算 ,其中6) The trusted center randomly selects , and calculate and ,in ;

7)最后,每个用户获得并保密7) Finally, each user obtain and keep secret ;

GW获得并保密GW obtained and kept secret ;

CC获得并保密CC obtained and kept secret ;

系统的公开信息为,其中The public information of the system is and ,in ;

用户数据汇报阶段User data reporting stage

在数据汇报时间点t,用户执行以下操作,将用电量汇报给网关:At the data reporting time point t, the user Do the following to reduce power consumption Report to the gateway:

1)计算1) Calculate

2)将发送给网关;2) Will and sent to the gateway;

安全数据聚合阶段Secure Data Aggregation Phase

网关接收到以后,执行下面的操作:gateway received and Afterwards, do the following:

1)计算 1) Calculate

2)检查是否满足,如果不满足,可检测出用户用电量的完整性已被破坏,如果满足,将发送给控制中心,以上等式验证的详细过程如下:2) check Whether it is satisfied, if it is not satisfied, it can be detected that the integrity of the user's power consumption has been damaged, if it is satisfied, it will Send to the control center, the detailed process of the above equation verification is as follows:

聚合数据恢复阶段Aggregate Data Recovery Phase

控制中心接收到以后,根据其掌握的秘密信息,计算基于为底的对数,从而获得用户的聚合用电量The control center receives In the future, according to the secret information it possesses ,calculate based on base logarithm, so as to obtain the user's aggregate power consumption .

一种智能电网中用电隐私及完整性保护的聚合系统,包括可信中心:负责管理整个系统,包括对系统进行初始化、注册新的用户、发布密钥;控制中心:负责收集、处理和分析各用户的实时用电量数据,并提供可靠的服务,包括实时监控用户的用电情况、预测系统整体的用电趋势、偷电监测、数据篡改检测; 网关:用于连接可信中心和住户区,包括数据聚合功能,负责将可信中心中各用户的数据进行聚合。中继功能,负责在控制中心和各用户间进行安全数据转发;用户:住户区中共有n个用户,每个用户都安装一个智能电表,用于实时记录并汇报用户的用电量。该聚合系统还包括:An aggregation system for electricity privacy and integrity protection in a smart grid, including a trusted center: responsible for managing the entire system, including initializing the system, registering new users, and issuing keys; a control center: responsible for collecting, processing and analyzing Real-time electricity consumption data of each user, and provide reliable services, including real-time monitoring of the user's electricity consumption, prediction of the overall electricity consumption trend of the system, electricity theft monitoring, and data tampering detection; Gateway: used to connect the trusted center and residents Zone, including the data aggregation function, is responsible for aggregating the data of each user in the trusted center. The relay function is responsible for secure data forwarding between the control center and each user; user: There are n users in the residential area, and each user is equipped with a smart meter for real-time recording and reporting of the user's electricity consumption. The aggregation system also includes:

系统初始化模块System initialization module

1)在可信中心的控制下,采用分布式的技术,n个用户,共享n个秘密信息,并满足 ,用于保护用户个人用电量隐私性和完整性的方法;1) Under the control of the trusted center, using distributed technology, n users share n secret information , and satisfy , a method for protecting the privacy and integrity of the user's personal electricity consumption;

2)在可信中心的控制下,网关获得的技术,用于保护用户个人用电量隐私性和完整性的方法;2) Under the control of the trusted center, the gateway obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;

3)在可信中心的控制下,产生系统的公开验证参数 的技术,其中,用于在模块中验证用户用电量完整性的方法;3) Under the control of the trusted center, generate public verification parameters of the system and technology, among which , a method for verifying the integrity of user power consumption in the module;

4)在可信中心的控制下,控制中心获得的技术,用于保护用户个人用电量隐私性和完整性的方法;4) Under the control of the trusted center, the control center obtains The technology used to protect the privacy and integrity of the user's personal electricity consumption;

用户数据汇报模块User Data Reporting Module

1)高效的用于所有用户,汇报用电量时自动时间同步的方法;1) Efficiently used for all users, automatic time synchronization method when reporting power consumption;

2)分布式的同时保证数据隐私性及完整性的安全数据聚合的方法;2) Distributed method of secure data aggregation while ensuring data privacy and integrity;

安全数据聚合模块Secure Data Aggregation Module

1)网关通过结合及去除盲因子的分布式的用于保护用户个人用电量隐私性和完整性的数据聚合方法;1) The gateway is combined by and deblinding factor A distributed data aggregation method for protecting the privacy and integrity of users' personal electricity consumption;

2)同时实现保护用户个人用电量隐私性和完整性的加密及数字签名的方法;包括:产生相互关联的公开参数的方法;利用双线性性的特性,高效验证数据完整性的方法;2) Simultaneously realize the encryption and digital signature method to protect the privacy and integrity of the user's personal electricity consumption; including: generating interrelated public parameters The method; the method of efficiently verifying the integrity of data by using the characteristics of bilinearity;

聚合数据恢复模块Aggregate Data Recovery Module

基于秘密信息,计算离散对数的技术,从而获取用户聚合用电量的方法。based on secret information , the technology of calculating discrete logarithm, so as to obtain the user's aggregate power consumption Methods.

智能电网建立在集成、高速双向通信网络的基础上,通过先进的传感和测量技术、先进的设备及控制与决策支持技术,实现电网可靠、安全、经济、高效。智能电网中的先进测量体系(AMI)已成为电能消费端的一种重要的标准架构。AMI中,通过在用户中安装具有计算和通信能力的智能电表,将所有的智能电表与电力公司的电能控制中心连成网络,实现收集、监测实时用电量,并实现电能的最优化分配以及远程智能控制。智能电网中,通过对各个用户用电量的数据聚合,可高效利用网络带宽,并且通过隐藏用户的个人用电量,保护用户的用电隐私。然而,为了实现电能的智能分配与管理,电能控制中心需要频繁(通常“秒”级)获取用户的用电量信息,这就带来了空前的安全和隐私问题。因此,该发明实现了一个安全的数据聚合系统,一方面用于保护用户的用电隐私;同时,也用于确保数据的完整性,即:从技术上检测汇报数据通信差错,防止用户冒名非法汇报,以及汇报的用电量被非法截获、修改、伪造等。The smart grid is built on the basis of an integrated, high-speed two-way communication network, through advanced sensing and measurement technology, advanced equipment and control and decision support technology, the grid is reliable, safe, economical and efficient. The advanced measurement system (AMI) in the smart grid has become an important standard framework for the power consumption end. In AMI, by installing smart meters with computing and communication capabilities in users, all smart meters are connected to the power company's power control center to form a network, so as to realize the collection and monitoring of real-time power consumption, and realize the optimal distribution of power and Remote intelligent control. In the smart grid, through the data aggregation of the power consumption of each user, the network bandwidth can be efficiently used, and the privacy of the user's power consumption can be protected by hiding the user's personal power consumption. However, in order to realize the intelligent distribution and management of electric energy, the electric energy control center needs to frequently (usually "second" level) obtain the user's electricity consumption information, which brings unprecedented security and privacy issues. Therefore, this invention implements a safe data aggregation system, which is used to protect the privacy of users’ electricity consumption on the one hand; at the same time, it is also used to ensure the integrity of data, that is, technically detect and report data communication errors, and prevent users from impersonating and illegally report, and the reported electricity consumption is illegally intercepted, modified, forged, etc.

Claims (2)

1.一种智能电网中用电隐私及完整性保护的聚合方法,其特征在于该方法由安装在用户中的智能电表实时记录并汇报用户的用电量;由具有计算能力的网关负责数据聚合功能和中继功能;由控制中心负责收集、处理和分析各用户的实时用电量数据,并提供可靠服务;由可信中心负责管理整个系统,具体步骤如下:1. An aggregation method for electricity privacy and integrity protection in a smart grid, characterized in that the method records and reports the user's electricity consumption in real time by a smart meter installed in the user; the gateway with computing power is responsible for data aggregation function and relay function; the control center is responsible for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system, the specific steps are as follows: (1)系统初始化阶段(1) System initialization phase 1)可信中心根据输入的安全参数k,运行以下算法Gen(k),获得参数(q,g,G1,G2,e),其中q是长度为k的安全大素数,并选择群G1的生成元g∈G11) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain parameters (q, g, G 1 , G 2 , e), where q is a large secure prime number of length k, and selects the group Generator g∈G 1 of G 1 ; Gen(k):选择阶为大素数q的两个循环群{G1,G2},在G1和G2上定义非退化和高效的双线性运算e:G1×G1→G2并满足:Gen(k): Select two cyclic groups {G 1 , G 2 } whose order is a large prime number q, and define a non-degenerate and efficient bilinear operation e on G 1 and G 2 : G 1 ×G 1 →G 2 and satisfy: 双线性:对于所有P,Q∈G1满足和e(Pa,Qb)=e(P,Q)ab∈G2Bilinear: For all P, Q ∈ G 1 , Satisfy and e(P a , Q b ) = e(P, Q) ab ∈ G 2 ; 非退化性:存在P,Q∈G1,使得 Non-degenerate: there exists P, Q∈G 1 such that 可计算性:对于所有的P,Q∈G1,存在高效的计算e(P,Q)的算法;Computability: For all P, Q∈G 1 , there is an efficient algorithm for computing e(P, Q); 2)可信中心随机选择g1∈G12) The trusted center randomly selects g 1 ∈ G 1 ; 3)可信中心选择两个密码学意义安全的哈希函数h和h1,其中,3) The trusted center selects two cryptographically secure hash functions h and h 1 , where, h:{0,1}*→G1,h1:{0,1}*→G1h: {0, 1} * → G 1 , h 1 : {0, 1} * → G 1 ; 4)可信中心随机选择n个其中i=1,2,...,n,并满足并将每一个zi分别分发给每一用户Ui4) The trusted center randomly selects n Where i=1, 2,..., n, and satisfy And distribute each z i to each user U i respectively; 5)可信中心分别随机选择n个其中i=1,2,...,n并将每一个ui,vi和xi分别分发给每一个用户Ui,可信中心同时计算 5) The trusted center randomly selects n and where i=1, 2, ..., n and each u i , v i and x i are distributed to each user U i respectively, and the trusted center calculates at the same time and 6)可信中心随机选择并计算其中i=1,2,...,n;6) The trusted center randomly selects and calculate and where i = 1, 2, ..., n; 7)最后,每个用户Ui获得并保密<ui,υi,zi,xi>;7) Finally, each user U i obtains and keeps secret < u i , υ i , zi , xi >; 网关获得并保密w;The gateway obtains and keeps w secret; 控制中心获得并保密υ;The control center obtains and keeps υ secret; 系统的公开信息为<g,g1,h,h1,Y>和Mi,其中i=1,2,...,n;The public information of the system is <g, g 1 , h, h 1 , Y> and M i , where i=1, 2, ..., n; (2)用户数据汇报阶段(2) User data reporting stage 在数据汇报时间点t,用户Ui执行以下操作,将用电量mi汇报给网关:At the data reporting time point t, the user U i performs the following operations to report the power consumption m i to the gateway: 1)计算1) calculate 2)将ci和σi发送给网关;2) Send c i and σ i to the gateway; (3)安全数据聚合阶段(3) Safety data aggregation stage 网关接收到ci和σi以后,执行下面的操作:After the gateway receives c i and σ i , it performs the following operations: 1)计算 1) calculate 2)检查是否满足,如果不满足,可检测出用户用电量的完整性已被破坏;如果满足,将c发送给控制中心,以上等式验证的详细过程如下:2) check Whether it is satisfied, if it is not satisfied, it can be detected that the integrity of the user's power consumption has been destroyed; if it is satisfied, c is sent to the control center, the detailed process of the above equation verification is as follows: (4)聚合数据恢复阶段(4) Aggregate data recovery phase 控制中心接收到c以后,根据其掌握的秘密信息先计算再计算对数从而获得用户的聚合用电量 After the control center receives c, according to the secret information it has calculate first recalculate the logarithm In order to obtain the user's aggregate power consumption 2.一种实施权利要求1所述的智能电网中用电隐私及完整性保护的聚合方法的聚合系统,其特征在于聚合系统包括:2. an aggregation system implementing the aggregation method of electricity privacy and integrity protection in the smart grid claimed in claim 1, characterized in that the aggregation system comprises: 可信中心:负责管理整个系统,包括对系统进行初始化、注册新的用户、发布密钥;Trusted Center: Responsible for managing the entire system, including initializing the system, registering new users, and issuing keys; 控制中心:负责收集、处理和分析各用户的实时用电量数据,并提供可靠的服务,包括实时监控用户的用电情况、预测系统整体的用电趋势、偷电监测、数据篡改检测;Control Center: responsible for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services, including real-time monitoring of the user's power consumption, prediction of the overall power consumption trend of the system, power theft monitoring, and data tampering detection; 网关:用于连接可信中心和住户区,包括数据聚合功能,负责将可信中心中各用户的数据进行聚合;中继功能,负责在控制中心和各用户间进行安全数据转发;Gateway: used to connect the trusted center and the residential area, including the data aggregation function, which is responsible for aggregating the data of each user in the trusted center; the relay function, which is responsible for secure data forwarding between the control center and each user; 用户:住户区中共有n个用户,每个用户都安装一个智能电表,用于实时记录并汇报用户的用电量;User: There are n users in the residential area, and each user installs a smart meter for real-time recording and reporting of the user's electricity consumption; 聚合系统还包括:The aggregation system also includes: (1)系统初始化模块(1) System initialization module 1)在可信中心的控制下,采用分布式,n个秘密信息zi由可信中心在系统初始化时进行选取,并分别分配给n个用户,并满足在系统初始化模块中,1) Under the control of the trusted center, distributed, n secret information z i are selected by the trusted center during system initialization, and distributed to n users respectively, and satisfy In the system initialization module, 可信中心随机选择满足条件的n个并将每一个zi分别分发给每一个用户Ui,在安全数据聚合模块中,网关通过隐含条件以及网关掌握的秘密信息消去盲化部分,并进行完整性验证;The trusted center randomly chooses to satisfy n of conditions And each z i is distributed to each user U i respectively. In the security data aggregation module, the gateway passes the implicit condition and the secret information held by the gateway Eliminate the blinding part and perform integrity verification; 2)在可信中心的控制下,网关获得在系统初始化模块中,可信中心计算并将w分配给网关,作为网关的秘密信息,用于在安全数据聚合模块中,网关消去盲化部分,以保护用户个人用电量隐私性和数据完整性;2) Under the control of the trusted center, the gateway obtains In the system initialization module, the trusted center calculates And assign w to the gateway as the secret information of the gateway, which is used in the secure data aggregation module to eliminate the blinding part of the gateway to protect the privacy and data integrity of the user's personal power consumption; 3)在可信中心的控制下,产生系统的公开验证参数其中i=1,2,...,n,用于验证用户用电量完整性的方法:在系统初始化模块中,可信中心计算并公开Y和Mi,用于在安全数据聚合模块中,网关进行用户用电量完整性检查;3) Under the control of the trusted center, generate public verification parameters of the system and Where i=1, 2,..., n, the method used to verify the integrity of the user's electricity consumption: in the system initialization module, the trusted center calculates and discloses Y and M i , which are used in the secure data aggregation module , the gateway checks the integrity of the user's power consumption; 4)在可信中心的控制下,控制中心获得在系统初始化模块中,可信中心计算并将v分配给控制中心,作为控制中心的秘密信息,用于在聚合数据恢复模块中,控制中心恢复用户的聚合用电量,以保护用户个人用电量隐私性和数据完整性;4) Under the control of the trusted center, the control center obtains In the system initialization module, the trusted center calculates And v is assigned to the control center as the secret information of the control center, which is used in the aggregated data recovery module, the control center restores the aggregated power consumption of the user, so as to protect the privacy and data integrity of the user's personal power consumption; (2)用户数据汇报模块(2) User data reporting module 1)高效的用于所有用户,汇报用电量时自动时间同步的方法:在用户数据汇报模块中,在数据汇报时间点t,住户区中所有n个用户,同时分别计算ci和σi,并同步将ci和σi发送给网关;1) An efficient method for all users to automatically time-synchronize when reporting electricity consumption: In the user data reporting module, at the data reporting time point t, all n users in the residential area calculate ci and σ i respectively at the same time , and synchronously send ci and σ i to the gateway; 2)分布式的同时保证数据隐私性及完整性的安全数据聚合的方法:在用户数据汇报模块中,各用户分别计算和汇报ci以及σi给网关,在安全数据聚合模块中,网关接收到ci和σi以后,计算并检查是否满足,如果不满足,可检测出用户用电量的完整性已被破坏;如果满足,表示用户汇报的用电量数据是完整性的信息,则将c发送给控制中心;2) Distributed secure data aggregation method that guarantees data privacy and integrity at the same time: in the user data reporting module, each user calculates and reports ci and σ i to the gateway respectively, and in the secure data aggregation module, the gateway receives After reaching c i and σ i , calculate and check Whether it is satisfied, if it is not satisfied, it can be detected that the integrity of the user's power consumption has been destroyed; if it is satisfied, it means that the power consumption data reported by the user is complete information, and c is sent to the control center; (3)安全数据聚合模块(3) Security data aggregation module 1)网关通过结合及去除盲因子的分布式的用于保护用户个人用电量隐私性和完整性的数据聚合方法:在系统初始化模块中,可信中心计算zi以及w,并分别分配给所有用户以及网关,在安全数据聚合模块中,网关通过隐含条件以及网关掌握的秘密信息消去盲化部分,并进行完整性验证,以保护用户个人用电量隐私性和数据完整性;1) The gateway is combined by and deblinding factor A distributed data aggregation method used to protect the privacy and integrity of users' personal electricity consumption: in the system initialization module, the trusted center calculates z i and w, and distributes them to all users and gateways respectively. In the secure data aggregation module, the gateway passes the implicit condition and the secret information held by the gateway Eliminate the blinding part and perform integrity verification to protect the privacy and data integrity of users' personal electricity consumption; 2)同时实现保护用户个人用电量隐私性和完整性的加密及数字签名的方法;包括:产生相互关联的公开参数c,Y,σi,Mi的方法;利用双线性的特性,高效验证数据完整性的方法:在系统初始化模块中,可信中心计算并公开Y以及Mi,在安全数据聚合模块中,网关利用自身的秘密信息w计算c,并结合各用户的汇报信息σi,进行完整性验证,以保护用户个人用电量隐私性和数据完整性;2) Simultaneously realize the method of encryption and digital signature to protect the privacy and integrity of the user's personal electricity consumption; including: the method of generating interrelated public parameters c, Y, σ i , M i ; using the bilinear characteristics, A method for efficiently verifying data integrity: In the system initialization module, the trusted center calculates and discloses Y and M i , in the secure data aggregation module, the gateway uses its own secret information w to calculate c, and combines the reported information σ of each user i , to perform integrity verification to protect the privacy and data integrity of the user's personal power consumption; (4)聚合数据恢复模块(4) Aggregate data recovery module 基于秘密信息计算离散对数的技术,从而获取用户聚合用电量的方法:在系统初始化模块中,可信中心计算并将v分配给控制中心,作为控制中心的秘密信息,用于在聚合数据恢复模块中,控制中心恢复用户的聚合用电量 based on secret information The technique of calculating the discrete logarithm, so as to obtain the user's aggregate power consumption method: in the system initialization module, the trusted center calculates And v is assigned to the control center as the secret information of the control center, which is used in the aggregated data recovery module to restore the user's aggregated power consumption by the control center
CN201510012106.8A 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid Active CN104639311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510012106.8A CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Publications (2)

Publication Number Publication Date
CN104639311A CN104639311A (en) 2015-05-20
CN104639311B true CN104639311B (en) 2018-10-12

Family

ID=53217669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510012106.8A Active CN104639311B (en) 2015-01-12 2015-01-12 The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid

Country Status (1)

Country Link
CN (1) CN104639311B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790024B (en) * 2016-12-14 2020-10-20 西安邮电大学 Privacy protection method based on power injection under AMI and 5G intelligent power grid
CN108960552B (en) * 2017-05-27 2022-04-29 华为技术有限公司 A charging method and related equipment based on real-time electricity price
CN108683493B (en) * 2018-05-04 2021-02-12 西安电子科技大学 Data aggregation method for providing privacy protection in smart power grid
CN108964894B (en) * 2018-06-28 2021-04-30 上海电力学院 Power grid electricity stealing detection method based on state estimation and with privacy protection
CN109889501B (en) * 2019-01-18 2021-10-26 浙江工商大学 Method and system for multi-dimensional data aggregation and multi-function analysis in internet of things
CN110049000B (en) * 2019-01-24 2021-11-23 浙江工商大学 Internet of things communication method and system for plaintext aggregation and difference security in large and small spaces
CN109640299B (en) * 2019-01-31 2021-09-21 浙江工商大学 Aggregation method and system for ensuring M2M communication integrity and fault tolerance
CN112019338B (en) * 2019-05-31 2024-10-15 浙江工商大学 Lightweight safe smart grid communication method and system based on blockchain
CN110661771B (en) * 2019-06-21 2022-03-04 浙江工商大学 A secure smart grid access control method and system against differential attacks
CN111131148B (en) * 2019-11-11 2022-03-22 重庆邮电大学 A smart grid-oriented privacy-protectable data aggregation method and system
CN110968892A (en) * 2019-11-18 2020-04-07 广东卓维网络有限公司 Data encryption system based on electric quantity data query
CN112532389B (en) * 2020-12-01 2023-02-28 南京邮电大学 A lightweight privacy-preserving data aggregation method for smart grid based on blockchain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921384A (en) * 2006-09-12 2007-02-28 上海交通大学 Public key infrastructure system, local safety apparatus and operation method
KR101647567B1 (en) * 2010-03-05 2016-08-10 인터디지탈 패튼 홀딩스, 인크 Method and apparatus for providing security to devices
CN102638345B (en) * 2012-05-09 2015-07-15 四川师范大学 DAA (Data Access Arrangement) authentication method and system based on elliptical curve divergence logarithm intractability assumption
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"An Ef f icient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption";柴震川等;《Journal of Shanghai Jiaotong University(Science)》;20050704;第271-278页 *
"一种基于身份的智能电网认证模式";郭非等;《黑龙江大学自然科学学报》;20120430;第152-158页 *
"智能电网中若干安全和隐私问题的研究";张木玲;《CNKI优秀硕士学位论文全文库》;20141231;第13-56页 *

Also Published As

Publication number Publication date
CN104639311A (en) 2015-05-20

Similar Documents

Publication Publication Date Title
CN104639311B (en) The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid
CN109302405B (en) Industrial data detection block chain network system based on edge calculation and detection method
Kumar et al. Smart grid metering networks: A survey on security, privacy and open research issues
Volkova et al. Security challenges in control network protocols: A survey
Jokar et al. A survey on security issues in smart grids
Liu et al. Cyber security and privacy issues in smart grids
Liu et al. Achieving accountability in smart grid
Li et al. Preserving data integrity for smart grid data aggregation
Komninos et al. Survey in smart grid and smart home security: Issues, challenges and countermeasures
CN110120868B (en) A smart grid security data aggregation method and system based on blockchain technology
Deng et al. A secure and privacy-preserving communication scheme for advanced metering infrastructure
CN104580061B (en) The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid
CN114117515B (en) Disaster-tolerant traceable intelligent ammeter data security aggregation method
CN118573606B (en) BIM-based multi-target building construction data sharing transmission method and system
CN104636672A (en) Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies
CN117614604A (en) Power grid data privacy protection and sharing system and method based on blockchain technology
CN118282732A (en) Smart grid data aggregation system and method based on edge calculation and blockchain
CN117793708A (en) A secure communication method for wireless sensor networks based on decentralized identity
Lalle et al. A privacy-protection scheme for smart water grid based on blockchain and machine learning
Zhang et al. Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and RLWE
Hameed et al. Secure provenance in wireless sensor networks-a survey of provenance schemes
Zhao et al. BPRM: Blockchain-based privacy-preserving and robust data aggregation supporting multi-functionality for fog-assisted smart grid
Beijia et al. Blockchain-Based Key Management and Security Decisions in the Internet of Vehicles
CN116346474A (en) A secure access method and system for virtual power plant distributed energy
CN113904788A (en) Block chain-based network frame security verification method and SDN switch

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190304

Address after: Room 1102, Wanli Science Park, 398 Jianghong South Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Yunyuan Shengli Technology Co., Ltd.

Address before: 310018 18 learning street, Xiasha Higher Education Park, Hangzhou, Zhejiang

Patentee before: Zhejiang Gongshang University

TR01 Transfer of patent right