CN106211136A - A Naming-Based Secure Communication Mechanism in Smart Grid - Google Patents
A Naming-Based Secure Communication Mechanism in Smart Grid Download PDFInfo
- Publication number
- CN106211136A CN106211136A CN201610795483.8A CN201610795483A CN106211136A CN 106211136 A CN106211136 A CN 106211136A CN 201610795483 A CN201610795483 A CN 201610795483A CN 106211136 A CN106211136 A CN 106211136A
- Authority
- CN
- China
- Prior art keywords
- naming
- ndo
- network
- data
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种智能电网中基于命名的安全通信机制。The invention relates to a naming-based secure communication mechanism in a smart grid.
背景技术Background technique
随着互联网的迅猛发展,当前基于TCP/IP协议的网络已经不能很好的适应发展需求,可扩展性、移动性和安全性等问题需要解决。不再基于TCP/IP协议的网络架构,例如信息中心网络(ICN),已经成为下一代网络的趋势。智能电网作为一个未来电网基础架构中的理念,在自动控制和无线网络等的现代通信技术的支持下,它具有高效性、可靠性和安全性。IEC 61850标准被广泛应用于变电站通信网络中。另外,取样值(SV)、通用的面向对象的变电站事件(GOOSE)等在IEC 61850标准中的部分协议也不是基于TCP/IP架构的。IEC61850标准基于智能变电站,它使用无线网络通信,极大地提升了变电站设备的互操作性和互连接性。然而,随着智能电子设备(IED)节点的数量增多和开放性发展,新的效率、可靠性和安全性挑战随之而生,特别是在无线网络中。With the rapid development of the Internet, the current network based on the TCP/IP protocol can no longer meet the needs of development, and issues such as scalability, mobility, and security need to be resolved. A network architecture that is no longer based on the TCP/IP protocol, such as an Information Centric Network (ICN), has become a trend of the next generation network. As a concept in the future grid infrastructure, smart grid has high efficiency, reliability and security under the support of modern communication technologies such as automatic control and wireless network. The IEC 61850 standard is widely used in substation communication networks. In addition, some protocols in the IEC 61850 standard, such as sampled value (SV) and general object-oriented substation event (GOOSE), are not based on the TCP/IP architecture. The IEC61850 standard is based on smart substations, which use wireless network communication, which greatly improves the interoperability and interconnectivity of substation equipment. However, with the increasing number and openness of intelligent electronic device (IED) nodes, new efficiency, reliability, and security challenges arise, especially in wireless networks.
IEC 61850在1995年由IEC提出,并在2004年由IEC TC57颁布。IEC 61850中定义了IED之间通信的层次、方法和协议。此外,变电站中也设计了数据对象、格式和配置语言。从馈电装置和设备中获得的信息的传送基于SAV、GOOSE和MMS通信协议。通过特定通信服务映射(SCSM,Special Communication Service Mapping),消息发送到消息队列并被抽象通信服务接口(ACSI,Abstract Communication Service Interface)服务接收。ACSI不依赖于下面的系统。通信应用基于ACSI服务完成。一些针对变电站无线网络的研究工作已经证明了它在IEC 61850第5部分中规定的时延需求的性能。无线网络占用很低的安装代价,并且能够提供足够的数据速率,在大规模内容分布的智能电网中调度自如。IEC 61850 was proposed by IEC in 1995 and promulgated by IEC TC57 in 2004. IEC 61850 defines the communication layers, methods and protocols between IEDs. In addition, data objects, formats and configuration languages are also designed in the substation. The transfer of information obtained from feeders and equipment is based on SAV, GOOSE and MMS communication protocols. Through the specific communication service mapping (SCSM, Special Communication Service Mapping), the message is sent to the message queue and received by the abstract communication service interface (ACSI, Abstract Communication Service Interface) service. ACSI does not depend on the underlying system. Communication applications are based on ACSI services. Some research work on wireless networks in substations has demonstrated its performance against the latency requirements specified in IEC 61850 Part 5. The wireless network occupies a very low installation cost and can provide sufficient data rate to be easily dispatched in the smart grid with large-scale content distribution.
当前的网络架构已经被提出并且工作了数十年,目前在多种通信需求的发展还存在问题。为了解决这些问题,ICN的出现是未来网络架构的希望。ICN在网络层对信息进行命名,高效地及时地通过网络内的缓存和多路广播机制向用户传递信息。ICN采用基于信息命名的协议栈架构代替传统的基于TCP/IP的架构。IP地址仅在本地运输签署的时候工作。用户向网络发送请求,并且很可能可以得到来自缓存的响应。在基于IP的网络中,信息安全与主机的安全密切相关。然而,ICN提供面向信息本身的安全保护并且能够达到更高的细粒度安全。正如EU FP7的一个基金项目,发布-订阅互联网路由模式(PSIRP)是ICN中一个很热门的方法。PSIRP项目针对发展实施和验证基于发布-订阅模式的信息中心网络架构,这可能是解决当前网络中很多挑战和问题的最有前途的方法之一。这其中,最主要的概念就是指定数据对象(NDO)。The current network architecture has been proposed and worked for decades, and there are still problems in the development of various communication needs. In order to solve these problems, the emergence of ICN is the hope of future network architecture. ICN names information at the network layer, and delivers information to users efficiently and timely through cache and multicast mechanisms within the network. ICN uses a protocol stack architecture based on information naming to replace the traditional TCP/IP-based architecture. IP addresses only work when signed for local transport. A user sends a request to the network and will most likely get a response from the cache. In an IP-based network, information security is closely related to the security of hosts. However, ICN provides information-oriented security protection and can achieve higher fine-grained security. As a funded project of EU FP7, the Publish-Subscribe Internet Routing Pattern (PSIRP) is a very popular approach in ICN. The PSIRP project is aimed at the development, implementation and verification of an information-centric network architecture based on the publish-subscribe model, which may be one of the most promising approaches to solve many challenges and problems in current networks. Among them, the most important concept is designated data object (NDO).
如表1所示,IEC 61850标准中的GOOSE和SV制定了发布/订阅通信模型。PSIRP是在ICN中建立的一个发布/订阅模式的方法,当客户端登记订阅之后在资源可用的时候会得到通知。在通信中,这具有很高的可扩展性。GOOSE和SV仅涉及到物理层和符合基于命名的ICN设计的数据链路层。ICN引入可能会增强智能电网中基于IEC 61850的通信的安全性能。As shown in Table 1, GOOSE and SV in the IEC 61850 standard have developed a publish/subscribe communication model. PSIRP is a method of publish/subscribe mode established in ICN. When the client registers and subscribes, it will be notified when the resource is available. In communication, this is highly scalable. GOOSE and SV only refer to the physical layer and the data link layer conforming to the naming-based ICN design. The introduction of ICN may enhance the security performance of IEC 61850-based communication in smart grids.
表1 IEC 61850和ICN的比较Table 1 Comparison between IEC 61850 and ICN
IEC 61850标准是变电站自动化和带电操作系统的重要标准之一,它定义了设备和器件的语义实体。大量智能电子设备(IED)都具有变电站自动化系统(SAS)来收集、监控和处理电力数据。IEC 61850中对SAS进行三级划分,包括进程层、中间层和变电站层。IEC61850标准中的部分通信协议也不是基于TCP/IP协议的,比如进程级网络通信中的SV和GOOSE。对于SAS来说,进程层网络的可靠性和安全性非常重要,因为它是连接进程层和中间层的唯一网络。通过标准模型,IEC 61850标准支持应用的独立性,并且实现了SAS中通信的高度发放性。The IEC 61850 standard is one of the important standards for substation automation and live operating system, which defines the semantic entities of equipment and devices. A large number of intelligent electronic devices (IEDs) have substation automation systems (SAS) to collect, monitor and process power data. In IEC 61850, SAS is divided into three levels, including process level, middle level and substation level. Some communication protocols in the IEC61850 standard are not based on the TCP/IP protocol, such as SV and GOOSE in process-level network communication. For SAS, the reliability and security of the process layer network is very important, because it is the only network connecting the process layer and the middle layer. Through the standard model, the IEC 61850 standard supports the independence of applications and realizes a high degree of distribution of communication in SAS.
随着网络攻击的不断演变和发展,SAS遭受到互操作性、系统功能开放性和无线网络环境带来的安全威胁。据报道,由于IEC 61850的安全问题导致的事故已经造成了巨大的损失。基于IEC 61850标准的变电站安全性依赖于一个特定的位置。电网用户的私密信息有可能会泄漏。非法节点或者恶意节点可能会发布一些非法的、错误的信息。另外,传统的IEC61850网络在数据扩张的时候效率很低。无线网络的应用和IED节点增长使得IEC 61850智能电网可能遭受到Dos等多种攻击。与此同时,实时通信中需要用到SV和GOOSE。严格的时间需求使得对抗网络攻击中重量级安全协议的使用受到限制。然而,IEC 61850标准中传统的安全保护都是基于TCP/IP协议的,这已经不能处理新的效率、可靠性和安全性问题。当前面向统一的SAS平台的处理主要是基于网络覆盖提出的。TCP/IP协议固有的低效性在处理现有问题特别是可扩展性和安全性问题时限制了系统的性能。With the continuous evolution and development of network attacks, SAS suffers from security threats brought by interoperability, system function openness and wireless network environment. Accidents due to safety issues of IEC 61850 have been reported to have caused huge losses. Substation security based on the IEC 61850 standard relies on a specific location. The private information of grid users may be leaked. Illegal nodes or malicious nodes may publish some illegal and wrong information. In addition, the traditional IEC61850 network is very inefficient when data expands. The application of wireless networks and the growth of IED nodes make IEC 61850 smart grids likely to suffer from Dos and other attacks. At the same time, SV and GOOSE are needed in real-time communication. Strict timing requirements limit the use of heavyweight security protocols in combating cyberattacks. However, the traditional security protection in the IEC 61850 standard is based on the TCP/IP protocol, which cannot deal with the new problems of efficiency, reliability and security. The current processing for a unified SAS platform is mainly proposed based on network coverage. The inherent inefficiency of the TCP/IP protocol limits the performance of the system when dealing with existing problems, especially scalability and security issues.
发明内容Contents of the invention
针对现有技术中的缺陷,本发明的目的是提供一种智能电网中基于命名的安全通信机制,该机制应用无线网络并具有安全服务,可以适用于不是基于TCP/IP协议的SV和GOOSE通信。该机制增强了安全性能并提高了通信效率,适用于分散的大规模的智能电网中的数据共享。为在变电站的间隔层和进程层之间创建具有更高安全性的无线网络,基于命名的通信架构,利用ICN的高安全性。Aiming at the deficiencies in the prior art, the purpose of the present invention is to provide a security communication mechanism based on naming in a smart grid, which applies to wireless networks and has security services, and can be applied to SV and GOOSE communications that are not based on the TCP/IP protocol . This mechanism enhances security performance and improves communication efficiency, and is suitable for data sharing in decentralized large-scale smart grids. In order to create a wireless network with higher security between the bay level and the process level of the substation, based on the named communication architecture, the high security of ICN is utilized.
为达到上述目的,本发明所采用的技术方案如下:In order to achieve the above object, the technical scheme adopted in the present invention is as follows:
一种智能电网中基于命名的安全通信机制,应用无线网络并具有安全服务,适用于非TCP/IP协议的通信,从数据链路层到表示层的数据传输通过ICN的命名、路由和缓存过程,具体包括:A secure communication mechanism based on naming in the smart grid, which applies wireless networks and has security services, and is suitable for communication of non-TCP/IP protocols. The data transmission from the data link layer to the presentation layer passes through the naming, routing and caching process of ICN , including:
步骤1:创建通信后,指定数据对象即NDO源向网络中发布NDO;Step 1: After creating the communication, specify the data object that is the NDO source to publish NDO to the network;
步骤2:接收器根据NDO需求进行订阅;Step 2: The receiver subscribes according to NDO requirements;
步骤3:对接系统构建匹配发布平台;Step 3: Docking system to build a matching publishing platform;
步骤4:对接系统构建匹配订阅平台;Step 4: Docking system to build a matching subscription platform;
步骤5:将用于命名NDO的范围标识符SI和会合标识符RI生成一个转发标识符FI,该FI被发送给NS;Step 5: Generate a forwarding identifier FI from the scope identifier SI and the rendezvous identifier RI used to name the NDO, and send the FI to NS;
步骤6:根据FI,NDO通过PSIRP运输到NS。Step 6: According to FI, NDO is transported to NS via PSIRP.
所述ICN的命名具有三个方案,由层次、自我认证和属性值划分。The naming of the ICN has three schemes, divided by hierarchy, self-certification and attribute value.
所述自我认证的命名方案中,一个是它的格式为P:L,另一个是元数据,P和L代表公钥的密码散列值和所有者各自的内容标签,数字签名由所有者签署并且元数据中包含了完整的公钥。Among the self-certified naming schemes, one is its format P:L, and the other is metadata, P and L represent the cryptographic hash value of the public key and the owner's respective content label, and the digital signature is signed by the owner And the metadata contains the complete public key.
所述路由是在ICN的内容传送中,异步的发布和订阅为网络建立基础,增加额外的开销以保证分布式数据状态的一致性,内容路由的完整性和正确性依赖于ICN的基础设施。The routing is in the content transmission of the ICN. Asynchronous publish and subscribe establishes the foundation for the network, adding additional overhead to ensure the consistency of the distributed data state. The integrity and correctness of the content routing depends on the infrastructure of the ICN.
所述缓存是将网络中获取到的内容缓存在ICN中,所有的内容提供商均能发布内容,并且能被所有的网络节点获得。The cache is to cache the content obtained in the network in the ICN, and all content providers can publish the content, and can be obtained by all network nodes.
期望的NDO由范围标识符SI和会合标识符RI共同命名,该两个标识符由订阅需求说明,该两个标识符再被转发到一个匹配的程序生成一个转发标识符FI。The desired NDO is jointly named by the scope identifier SI and the rendezvous identifier RI, which are specified by the subscription requirements, and then forwarded to a matching program to generate a forwarding identifier FI.
所述安全服务包括基于发布/订阅的访问控制算法,具体包括内容如下:The security service includes a publish/subscribe-based access control algorithm, specifically including the following:
角色,代表一组访问权限,与网络节点的分配是一对多的关系,一个节点仅可被授予一种执行角色,但一个角色可分配给多个节点;一个节点如果是一个发布者,那么将基于主题被授予执行角色,如果它是订阅者,将基于代理被授予执行角色,不同主题的发布者将需要不同的权限来处理数据和资源;Role, which represents a group of access rights, has a one-to-many relationship with the distribution of network nodes. A node can only be granted one execution role, but a role can be assigned to multiple nodes; if a node is a publisher, then Execution roles will be granted based on the topic, and if it is a subscriber, will be granted based on the broker, publishers of different topics will need different permissions to process data and resources;
操作,是对数据源执行的不同指令;Operations are different instructions executed on the data source;
权限,表示在一个受保护的系统和数据源中执行上述操作的许可;Permissions, which represent the permission to perform the above operations in a protected system and data source;
权限和执行角色的分配关系是多对多的,系统可以为一个角色分配多个访问权限。发布者的角色被授予发布相关的权限,订阅者被授予订阅相关的权限。The assignment relationship between permissions and execution roles is many-to-many, and the system can assign multiple access permissions to one role. Publisher roles are granted publishing-related permissions, and subscribers are granted subscription-related permissions.
所述非TCP/IP协议的通信包括SV和GOOSE通信。The communication of the non-TCP/IP protocol includes SV and GOOSE communication.
与现有技术相比,本发明具有如下的有益效果:Compared with the prior art, the present invention has the following beneficial effects:
附图说明Description of drawings
通过阅读参照以下附图对非限制性实施例所作的详细描述,本发明的其它特征、目的和优点将会变得更明显:Other characteristics, objects and advantages of the present invention will become more apparent by reading the detailed description of non-limiting embodiments made with reference to the following drawings:
图1为本发明提出的基于命名的安全通信架构;Fig. 1 is the security communication architecture based on naming that the present invention proposes;
图2为SV/GOOSE提出的安全通信模型;Figure 2 is the secure communication model proposed by SV/GOOSE;
图3为基于命名的通信架构;Figure 3 is a naming-based communication architecture;
图4为提出的基于发布/订阅的访问控制;Figure 4 shows the proposed publish/subscribe-based access control;
图5为时延和节点数量增加的关系;Figure 5 is the relationship between delay and the increase in the number of nodes;
图6为时延和仿真时间的关系;Figure 6 is the relationship between delay and simulation time;
图7为时延性能的比较;Figure 7 is a comparison of delay performance;
图8为安全性能的比较。Figure 8 is a comparison of security performance.
具体实施方式detailed description
下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变化和改进。这些都属于本发明的保护范围。The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.
本发明提出的智能电网中基于命名的安全通信架构,如图1所示,智能变电站中IED之间具有互操作性和互连接性的通信模型基于IEC 61850协议,并使用无线网络。变电站系统的传感器设备测量和记录电压和电流的实时数据,并及时把数据传输到PMU。PMU是整合所有来自不同传感器数据的单元。然后,PMU通过进程层的网络采用基于命名的通信技术发送压缩数据到IED。IED接收到数据之后便开始处理数据。通过处理结果,IED可以得到保护控制和测试整个变电站系统的函数。另外,IED也可以与远端设备进行通信,比如远程控制中心、工程师站、人机接口等其他设备。The security communication architecture based on naming in the smart grid proposed by the present invention is shown in Figure 1. The communication model with interoperability and interconnection between IEDs in the smart substation is based on the IEC 61850 protocol and uses a wireless network. The sensor equipment of the substation system measures and records real-time data of voltage and current, and transmits the data to the PMU in time. The PMU is the unit that integrates all the data from the different sensors. Then, the PMU sends the compressed data to the IED through the process-level network using a naming-based communication technique. After receiving the data, the IED starts to process the data. By processing the results, the IED can get protection control and test functions of the whole substation system. In addition, IED can also communicate with remote equipment, such as remote control center, engineer station, man-machine interface and other equipment.
以下详细描述本发明提出的基于命名的安全通信架构:The following describes in detail the naming-based secure communication architecture proposed by the present invention:
在变电站中,传感器在进程层获取数据,并在间隔层向IED传输传感数据。此外,不同IED之间的通信也是采用基于名字的通信架构。In a substation, sensors acquire data at the process level and transmit sensing data to IEDs at the bay level. In addition, the communication between different IEDs also adopts a name-based communication architecture.
本发明基于名字的通信架构设计如图4所示。物理层的格式符合标准设计。从数据链路层到表示层的数据传输通过命名、路由和缓存。当通信创建之后,NDO源向网络中发布NDO,如图3中步骤1所示。在第2步中,接收器可以根据NDO需求进行订阅。在第3和第4步骤,对接系统构建匹配发布和订阅的平台。期望的NDO由范围标识符(SI)和会合标识符(RI)共同命名,这两个标识符由订阅需求说明。标识符再被转发到一个匹配的程序生成一个转发标识符(FI)。在第5步骤,FI被发送给NS。根据FI,NDO被通过PSIRP运输到NS。The name-based communication architecture design of the present invention is shown in FIG. 4 . The format of the physical layer conforms to the standard design. Data transfer from the data link layer to the presentation layer goes through naming, routing, and caching. After the communication is established, the NDO source issues NDO to the network, as shown in step 1 in Figure 3. In step 2, receivers can subscribe based on NDO requirements. In the 3rd and 4th steps, the docking system builds a matching publishing and subscribing platform. The desired NDO is jointly named by a scope identifier (SI) and a rendezvous identifier (RI), which are specified by the subscription requirement. The identifier is then forwarded to a matching program generating a Forwarding Identifier (FI). In step 5, FI is sent to NS. According to FI, NDO is transported to NS via PSIRP.
图3中的NS(NDOs source)是NDO数据源,是ICN网络中的数据发布者;Scope是对接系统的匹配域;RN(Rendezvous Node)是汇聚节点;PR(PSIRP Router)是发布订阅互联网路由模式的路由器。NS (NDOs source) in Figure 3 is the NDO data source, which is the data publisher in the ICN network; Scope is the matching domain of the docking system; RN (Rendezvous Node) is the sink node; PR (PSIRP Router) is the publish-subscribe Internet route mode router.
至于基于IP的网络,信息安全与主机的安全密切相关。反而,ICN提供面向信息本身的安全保护并且获取更高的细粒度安全。基于名字的通信架构充分利用了ICN的高安全性。As for IP-based networks, information security is closely related to the security of hosts. Instead, ICN provides information-oriented security protection and achieves higher fine-grained security. The name-based communication architecture takes full advantage of the high security of ICN.
命名。ICN的三个命名方案由层次、自我认证和属性值划分。自我认证的命名方案中,一是它的格式为P:L,另一个部分是元数据。P和L代表公钥的密码散列值和所有者各自的内容标签。数字签名由所有者签署并且元数据中包含了完整的公钥。设计唯一的自我身份认证名字对高级安全非常有用,并且容易进行完整性检验。name. ICN's three naming schemes are divided by hierarchy, self-certification, and attribute value. In the self-certified naming scheme, one part is its format P:L, and the other part is metadata. P and L represent the cryptographic hash of the public key and the owner's respective content label. The digital signature is signed by the owner and the full public key is included in the metadata. Designing unique self-authentication names is useful for advanced security and easy integrity checks.
缓存。网络中获取到的内容缓存在ICN中。这适用于所有协议下的内容传送,所有的内容提供商均可以发布内容,并且可被所有的网络节点获得。cache. The content obtained from the network is cached in the ICN. This applies to content delivery under all protocols, all content providers can publish content, and can be obtained by all network nodes.
路由。在ICN的内容传送中,异步的发布和订阅是为网络建立基础。增加额外的开销以保证分布式数据状态的一致性。此外,内容路由的完整性和正确性依赖于ICN的基础设施。routing. In ICN's content delivery, asynchronous publish and subscribe is the foundation for the network. Additional overhead is added to ensure the consistency of the distributed data state. In addition, the integrity and correctness of content routing depends on the ICN infrastructure.
图2为SV/GOOSE提出的安全通信模型。Figure 2 shows the secure communication model proposed by SV/GOOSE.
以下详细描述本发明所提出的基于发布/订阅的访问控制算法:The publish/subscribe based access control algorithm proposed by the present invention is described in detail below:
智能电网中,变电站中的IEDs控制和保护进程层的主要设备。根据不同的功能,IEDs需要不同的相关数据。在基于名字的通信架构中,存在多种分别能够实现不同功能的节点类型。恶意节点可能会引起信息泄露或者网络攻击,比如DDoS攻击。因此,访问控制对于基于名字的通信网络架构中的IEDs和节点都是非常必须的。RBAC作为一个安全的并且有效的访问控制机制,“角色”这个概念已经被广泛应用,这使得分配和管理许可容易许多。本发明提出的访问控制算法是在基于名字的安全通信架构中以RBAC为基础设计的。In the smart grid, the IEDs in the substation control and protect the main equipment at the process level. According to different functions, IEDs require different relevant data. In the name-based communication architecture, there are multiple node types that can respectively implement different functions. Malicious nodes may cause information leakage or network attacks, such as DDoS attacks. Therefore, access control is very necessary for both IEDs and nodes in the name-based communication network architecture. RBAC is a secure and effective access control mechanism, and the concept of "role" has been widely used, which makes it much easier to assign and manage permissions. The access control algorithm proposed by the invention is designed on the basis of RBAC in the name-based secure communication framework.
作为一个典型的案例,NS中基于访问控制的发布订阅算法如图4所示。角色代表一组访问权限。节点与角色的分配是多对一的关系。一个节点仅可以被授予一种执行角色,然而一个角色可以分配给多个节点。一个节点如果是一个发布者,那么将基于主题被授予执行角色,如果它是订阅者将基于代理被授予执行角色。不同主题的发布者将需要不同的权限来处理数据和资源。操作的意思是对数据源执行的不同指令,比如读取、写入、增加、删除等等。权限表示在一个受保护的系统和数据源中执行这些操作的许可,比如发布和订阅。权限和执行角色的分配关系是多对多的。因此,系统可以为一个角色分配多个访问权限。发布者的角色被授予发布相关的权限,订阅者被授予订阅相关的权限。As a typical case, the publish-subscribe algorithm based on access control in NS is shown in Figure 4. A role represents a set of access rights. The allocation of nodes and roles is a many-to-one relationship. A node can only be granted one execution role, however a role can be assigned to multiple nodes. A node is granted execution roles based on topics if it is a publisher, and based on brokers if it is a subscriber. Publishers of different topics will need different permissions to handle data and resources. Operations mean different instructions performed on a data source, such as read, write, add, delete, and so on. Permissions represent permissions to perform operations, such as publish and subscribe, within a protected system and data source. The assignment relationship between permissions and execution roles is many-to-many. Therefore, the system can assign multiple access rights to a role. Publisher roles are granted publishing-related permissions, and subscribers are granted subscription-related permissions.
本发明为解决当前基于TCP/IP协议已经不能很好适应发展需求和在无线网络中对抗网络攻击中重量级安全协议的使用受到限制的问题,针对SV和GOOSE这些非基于TCP/IP协议的通信,提出的一种基于命名的ICN安全机制,能够满足安全需求并且能够进行高效通信。本发明提出的安全机制可以满足安全需求并具有良好的通信性能。In order to solve the problem that the current TCP/IP-based protocol can no longer adapt to the development needs and the use of heavyweight security protocols in wireless networks against network attacks is limited, the invention is aimed at communications that are not based on TCP/IP protocols such as SV and GOOSE , a naming-based ICN security mechanism is proposed, which can meet the security requirements and enable efficient communication. The security mechanism proposed by the invention can meet security requirements and has good communication performance.
1.本发明提出的安全机制的设计可以满足安全需求。1. The design of the safety mechanism proposed by the present invention can meet the safety requirements.
ICN满足完整性、机密性和非否认性。轻量级加密算法的使用使得RBAC能够实现高效访问控制的同时满足认证、完整新、机密性和授权这些安全需求。ICN satisfies integrity, confidentiality and non-repudiation. The use of lightweight encryption algorithms enables RBAC to achieve efficient access control while meeting the security requirements of authentication, integrity, confidentiality, and authorization.
在基于TCP/IP的网络中,信息安全与主机密切相关。然而,ICN提供面向信息本身的安全保护,达到更高的细粒度安全。基于命名的通信架构的提出充分利用了ICN的高安全性。除了PSIRP中所设计的原有的安全措施,添加了RBAC和轻量级加密算法来保证基于命名的通信的安全。提出的安全机制中,安全方法是以服务的形式设计,另外,用安全总线和常规功能性服务对它进行复合。In a TCP/IP-based network, information security is closely related to the host. However, ICN provides information-oriented security protection to achieve higher fine-grained security. The naming-based communication architecture makes full use of the high security of ICN. In addition to the original security measures designed in PSIRP, RBAC and lightweight encryption algorithms are added to ensure the security of name-based communication. In the proposed security mechanism, the security method is designed in the form of service, and it is compounded with security bus and regular functional services.
PSIRP中支持包级别身份验证(PLA)技术,这有助于加密和签名个人数据包,保证了数据的完整性、机密性和恶意发布者的问责。FN中和它们目的地址中的数据包都可以使用PLA进行校验。对于不可变数据对象,自我认证名可以使用对象的哈希值作为集合点在扁平命名中被允许。而且,动态链接标识符可以用于路径编码到布隆过滤器,这对抗攻击者制作的布隆过滤器或登录DDoS攻击。除此之外,PSIRP中还有其他的安全设计,RBAC使得分配和管理访问控制的权限更方便。轻量级加密算法保证了数据交换过程的安全,同时它占用很低的通信代价,使得智能电网中的通信高效、安全。Packet Level Authentication (PLA) technology is supported in PSIRP, which helps to encrypt and sign individual data packets, guaranteeing data integrity, confidentiality and accountability of malicious publishers. Both packets in the FN and their destination addresses can be checked using the PLA. For immutable data objects, self-certifying names can be allowed in flat names using the object's hash value as a rendezvous point. Also, the Dynamic Link Identifier can be used for path encoding to Bloom Filters, which counters Bloom Filters crafted by attackers or logging DDoS attacks. In addition, there are other security designs in PSIRP, and RBAC makes it easier to assign and manage access control permissions. The lightweight encryption algorithm ensures the security of the data exchange process, and at the same time it occupies a very low communication cost, making the communication in the smart grid efficient and safe.
2.本发明提出的安全机制具有良好的通信性能。2. The safety mechanism proposed by the present invention has good communication performance.
GOOSE和SV被用于实时通信,因此时延就是一个通信性能中的一个重要参数。为了评估提出的通信机制的性能,我们用NS2对轻量级加密算法进行了仿真。在仿真实验中,两个NS,一个是客户端,一个是服务器。服务器每秒发送1000个经过轻量级加密算法加密的数据包。用户的ID包含在数据包中。当客户端接收到数据包的时候,它们用它的ID和密钥来解密数据包。如果译码的ID与自己的ID想匹配,则接收这个数据包,否则丢弃这个数据包。没有使用加密算法的仿真结果也在同样的条件下进行。客户端会无选择的接收所有数据包。GOOSE and SV are used for real-time communication, so delay is an important parameter in communication performance. To evaluate the performance of the proposed communication mechanism, we simulated the lightweight encryption algorithm with NS2. In the simulation experiment, there are two NSs, one is the client and the other is the server. The server sends 1000 data packets encrypted with a lightweight encryption algorithm per second. The user's ID is included in the packet. When the client receives the packet, they use its ID and key to decrypt the packet. If the decoded ID matches its own ID, the data packet is received, otherwise the data packet is discarded. The simulation results without using the encryption algorithm are also carried out under the same conditions. The client will indiscriminately receive all packets.
如图5所示,分别表示使用轻量级加密算法的平均时延随着节点数量增多的变换曲线,以及没有使用轻量级加密算法的平均时延变化曲线。图5和图6的结果表示,在节点数量和仿真时间的增加下,额外的时延降低,甚至到最后,额外的时延会变得非常低。随着IEC61850的发展,智能电网中IED的数量会增加,然而,在该通信机制下,并不会增加很多网络延时。图7表示的是延迟时间的波动。加入轻量级加密算法只会增加微小的时延,平均值几乎也都是一样的。本发明所采用的安全加密机制对网络延迟的影响不大。因此,提出的基于命名的安全通信机制能在网络时延增加很少的代价下提升安全性能。图8表示的是接收数据包的比较,结果显示该算法在安全性方面有很明显的效果。伪造的和无效的信息都会减少。As shown in Fig. 5, it respectively represents the transformation curve of the average delay using the lightweight encryption algorithm with the increase of the number of nodes, and the average delay change curve without using the lightweight encryption algorithm. The results in Fig. 5 and Fig. 6 show that with the increase of the number of nodes and the simulation time, the extra delay decreases, and even in the end, the extra delay becomes very low. With the development of IEC61850, the number of IEDs in the smart grid will increase, however, under this communication mechanism, it will not increase a lot of network delay. Fig. 7 shows the fluctuation of the delay time. Adding a lightweight encryption algorithm will only add a small delay, and the average value is almost the same. The security encryption mechanism adopted by the present invention has little influence on network delay. Therefore, the proposed naming-based secure communication mechanism can improve security performance with little increase in network delay. Fig. 8 shows the comparison of the received data packets, and the result shows that the algorithm has obvious effect in terms of security. Both falsified and invalid information will be reduced.
以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变化或修改,这并不影响本发明的实质内容。在不冲突的情况下,本申请的实施例和实施例中的特征可以任意相互组合。Specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the specific embodiments described above, and those skilled in the art may make various changes or modifications within the scope of the claims, which do not affect the essence of the present invention. In the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other arbitrarily.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610795483.8A CN106211136B (en) | 2016-08-31 | 2016-08-31 | A Name-Based Secure Communication Method in Smart Grid |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610795483.8A CN106211136B (en) | 2016-08-31 | 2016-08-31 | A Name-Based Secure Communication Method in Smart Grid |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106211136A true CN106211136A (en) | 2016-12-07 |
| CN106211136B CN106211136B (en) | 2021-07-13 |
Family
ID=58086530
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610795483.8A Active CN106211136B (en) | 2016-08-31 | 2016-08-31 | A Name-Based Secure Communication Method in Smart Grid |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106211136B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106790111A (en) * | 2016-12-26 | 2017-05-31 | 上海交通大学 | Intelligent grid threat propagation defence method based on software definition multicast |
| CN110138773A (en) * | 2019-05-14 | 2019-08-16 | 北京天地和兴科技有限公司 | A kind of means of defence for goose attack |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104468515A (en) * | 2014-10-31 | 2015-03-25 | 东北大学秦皇岛分校 | Intelligent substation communication method and system based on information center network |
| CN104904186A (en) * | 2013-01-07 | 2015-09-09 | 华为技术有限公司 | contextualized information bus |
| US20160014027A1 (en) * | 2014-07-13 | 2016-01-14 | Cisco Technology, Inc. | Caching data in an information centric networking architecture |
| US20160234110A1 (en) * | 2015-02-06 | 2016-08-11 | Palo Alto Research Center Incorporated | System and method for on-demand content exchange with adaptive naming in information-centric networks |
-
2016
- 2016-08-31 CN CN201610795483.8A patent/CN106211136B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104904186A (en) * | 2013-01-07 | 2015-09-09 | 华为技术有限公司 | contextualized information bus |
| US20160014027A1 (en) * | 2014-07-13 | 2016-01-14 | Cisco Technology, Inc. | Caching data in an information centric networking architecture |
| CN104468515A (en) * | 2014-10-31 | 2015-03-25 | 东北大学秦皇岛分校 | Intelligent substation communication method and system based on information center network |
| US20160234110A1 (en) * | 2015-02-06 | 2016-08-11 | Palo Alto Research Center Incorporated | System and method for on-demand content exchange with adaptive naming in information-centric networks |
| CN105872008A (en) * | 2015-02-06 | 2016-08-17 | 帕洛阿尔托研究中心公司 | System and method for on-demand content exchange with adaptive naming in information-centric networks |
Non-Patent Citations (1)
| Title |
|---|
| 李军等: "ICN 体系结构与技术研究", 《技术研究》 * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106790111A (en) * | 2016-12-26 | 2017-05-31 | 上海交通大学 | Intelligent grid threat propagation defence method based on software definition multicast |
| CN106790111B (en) * | 2016-12-26 | 2020-07-28 | 上海交通大学 | Threat propagation defense method for smart grid based on software-defined multicast |
| CN110138773A (en) * | 2019-05-14 | 2019-08-16 | 北京天地和兴科技有限公司 | A kind of means of defence for goose attack |
| CN110138773B (en) * | 2019-05-14 | 2022-01-11 | 北京天地和兴科技有限公司 | Protection method for goose attack |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106211136B (en) | 2021-07-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Guan et al. | Data security and privacy in fog computing | |
| CN103314551B (en) | Method and apparatus for content guiding network creation and management differentiation security framework | |
| Suarez et al. | A secure IoT management architecture based on Information-Centric Networking | |
| WO2021203733A1 (en) | Power edge gateway device and device-based sensor data uplink storage method | |
| Zhao | Research on data security technology in internet of things | |
| Shang et al. | Publish-subscribe communication in building management systems over named data networking | |
| Li et al. | A distributed authentication and authorization scheme for in-network big data sharing | |
| CN110868446A (en) | Back IP main power network system architecture | |
| CN109274647A (en) | Distributed credible memory exchanges method and system | |
| CN115118756A (en) | Method and device for designing safety interaction protocol in energy internet scene | |
| Yuan et al. | Enabling secure and efficient video delivery through encrypted in-network caching | |
| CN104410635B (en) | A kind of NDN safety certifying methods based on DANE | |
| Hittini et al. | FDIPP: False data injection prevention protocol for smart grid distribution systems | |
| CN106027555B (en) | A kind of method and system improving content distributing network safety using SDN technology | |
| CN108200033A (en) | A kind of access control method based on NDN Yu open type moving health system frame | |
| CN106211136B (en) | A Name-Based Secure Communication Method in Smart Grid | |
| Leshov et al. | Content name privacy in tactical named data networking | |
| Guo et al. | A name-based secure communication mechanism for smart grid employing wireless networks | |
| Li et al. | Guest editorial special issue on security and privacy protection for big data and IoT | |
| Long et al. | A key management architecture and protocols for secure smart grid communications | |
| Hernández-Álvarez et al. | Cryptographic protocols in advanced metering infrastructures in smart grids | |
| Wu et al. | Research on access control of smart home in NDN (short paper) | |
| Tian et al. | Certificateless aggregate signature authentication scheme based on blockchain in smart home network | |
| Liu et al. | Non-interactive zero knowledge proof based access control in information-centric internet of things | |
| CN205754415U (en) | A fine-grained access control system based on multiple authorization centers in cloud storage |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |