[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105245326A - A secure communication method for smart grid based on combined cipher - Google Patents

A secure communication method for smart grid based on combined cipher Download PDF

Info

Publication number
CN105245326A
CN105245326A CN201510575551.5A CN201510575551A CN105245326A CN 105245326 A CN105245326 A CN 105245326A CN 201510575551 A CN201510575551 A CN 201510575551A CN 105245326 A CN105245326 A CN 105245326A
Authority
CN
China
Prior art keywords
transfer station
ciphertext
mdms
signature
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510575551.5A
Other languages
Chinese (zh)
Other versions
CN105245326B (en
Inventor
李发根
韩亚楠
洪姣姣
郑朝慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201510575551.5A priority Critical patent/CN105245326B/en
Publication of CN105245326A publication Critical patent/CN105245326A/en
Application granted granted Critical
Publication of CN105245326B publication Critical patent/CN105245326B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明公开了一种基于组合密码的智能电网安全通信方法。本发明采用组合密码,用一个密钥对完成会话密钥协商、加密、签名等操作,并且此方法采用离线/在线方式,对于智能电表这种存储空间和计算能力受限的环境来说,能够降低所需存储空间和提升计算速度。在智能电表和电表数据管理中心(MDMS)之间设定一个中转站,由密钥生成中心(PKG)生成电表、中转站和MDMS对应的私钥。电表和中转站之间首先生成会话密钥,利用会话密钥实现双向认证并进行通信。然后采用链式传输方式,将中转站对其管辖范围内的电表数据收集后进行一些安全操作并传递给与其相邻的下一个中转站,以此类推,直到到达MDMS。

The invention discloses a method for safe communication of smart grid based on combined cipher. The present invention adopts a combined cipher, and uses a key pair to complete operations such as session key negotiation, encryption, and signature, and this method adopts an offline/online mode, which can be used in an environment such as a smart meter with limited storage space and computing power. Reduce required storage space and increase computing speed. A transfer station is set between the smart meter and the meter data management center (MDMS), and the private key corresponding to the meter, transfer station and MDMS is generated by the key generation center (PKG). The session key is first generated between the meter and the transfer station, and the session key is used to realize two-way authentication and communication. Then adopt the chain transmission method, after the transfer station collects the meter data within its jurisdiction, it performs some security operations and transmits it to the next transfer station adjacent to it, and so on, until it reaches MDMS.

Description

一种基于组合密码的智能电网安全通信方法A secure communication method for smart grid based on combined cipher

技术领域technical field

本发明属于保密通信技术领域,具体涉及智能电网中智能电表和MDMS之间的安全通信方法。The invention belongs to the technical field of secure communication, and in particular relates to a safe communication method between a smart meter and MDMS in a smart grid.

背景技术Background technique

智能电网作为新时代的产物,未来将完全取代目前的电网架构,为人类生活提供更可靠、更安全、更便利的服务。智能电网的一大特色就是实现了用户和电力公司的双向通信,因此能够更加客观的预测用户的能源需求,避免了生产过量的电力造成的浪费。与此同时,随着通信的增加和整合,智能电网中的网络漏洞也应运而生,例如,如果用户的用电信息被非法用户窃听,攻击者就可以根据这些信息猜测用户的生活习惯,从而实现智能窃取和智能跟踪。智能电网的目标之一就是接近实时的向消费者提供他们的能源消费信息,比如消费者每个小时都可以得到他们的能源消费情况,从而使他们能够为了削减电力账单而改变消费习惯,而现在的消费者一个月才可以看到这些消费信息。然而,这就使得攻击者可以监测访问这些私密信息,通过用户的用电信息推测用户的生活习惯,从而实现智能窃取和跟踪。此外,智能电网还需要具备完整性和认证性,来避免恶意用户篡改通信消息以及乱发消息从而对智能电网造成威胁。因此为了保护信息的机密性、完整性和认证性,密码学在智能电网中的应用成为研究的热点。As a product of the new era, the smart grid will completely replace the current grid architecture in the future and provide more reliable, safer and more convenient services for human life. A major feature of the smart grid is the realization of two-way communication between the user and the power company, so it can predict the energy demand of the user more objectively and avoid the waste caused by excessive power production. At the same time, with the increase and integration of communication, network loopholes in the smart grid also emerge as the times require. Realize smart stealing and smart tracking. One of the goals of the smart grid is to provide consumers with information about their energy consumption in near real-time. For example, consumers can get their energy consumption every hour, so that they can change their consumption habits in order to reduce electricity bills. Now Consumers can only see the consumption information for one month. However, this allows attackers to monitor and access these private information, and speculate on the user's living habits through the user's electricity consumption information, thereby achieving intelligent theft and tracking. In addition, the smart grid also needs to have integrity and authentication to prevent malicious users from tampering with communication messages and randomly sending messages, thereby posing threats to the smart grid. Therefore, in order to protect the confidentiality, integrity and authentication of information, the application of cryptography in smart grid has become a research hotspot.

传统的密码体制要求不同的密码算法使用不同的密钥对,例如加密时使用一个密钥对,签名就要使用另一个密钥对。但是在实际的应用中,人们希望能够在不同的密码体制中使用相同的密钥对对来实现加密体制和签名体制以适用存储资源和计算能力有限的系统环境,即组合公钥密码体制的出现。这种密码体制打破了传统的密钥分割原则,将一个密钥对用于不同的密码体制,例如加密体制和签名体制,并且保证这两种密码体制的独立安全性。因此组合公钥密码体制并不是简单的将加密体制和签名体制组合起来。使用组合公钥密码体制能够有效地减少密钥的存储,公钥证书的存储,以及公钥证书验证所需要的时间,所以这种密码体制在存储资源和计算资源有限的环境中具有广泛的应用。然而使用这种方法给密码体制带来的安全问题是不可忽视的。例如广泛使用的RSA体制,如果仅仅使用一个密钥对来实现加密和签名,则本来安全的加密和签名体制都不再安全。换句话说,独立安全的密码体制构一旦使用相同的或相关的密钥对则会损害其本来的安全性。Traditional cryptographic systems require different cryptographic algorithms to use different key pairs. For example, one key pair is used for encryption and another key pair is used for signature. However, in practical applications, people hope to use the same key pair in different cryptographic systems to implement encryption and signature systems to apply to the system environment with limited storage resources and computing power, that is, the emergence of combined public key cryptosystems. . This cryptosystem breaks the traditional principle of key splitting, uses a key pair for different cryptosystems, such as encryption and signature, and ensures the independent security of these two cryptosystems. Therefore, combined public key cryptography is not a simple combination of encryption system and signature system. The use of combined public key cryptography can effectively reduce the storage of keys, the storage of public key certificates, and the time required for public key certificate verification, so this cryptography has a wide range of applications in environments with limited storage and computing resources. . However, the security problems brought by this method to the cryptosystem cannot be ignored. For example, the widely used RSA system, if only one key pair is used to implement encryption and signature, the originally secure encryption and signature system is no longer safe. In other words, once the same or related key pairs are used in independently secure cryptographic structures, their inherent security will be compromised.

信息的完整性、机密性以及用户的双向认证是智能电网的关键问题。完整性和认证性可以通过数字签名来保障,机密性则主要通过加密机制来实现。智能电网大致可以划分为三层:控制中心、配电站、智能电器。配电站和智能电器以智能电表为媒介通过网络进行通信,然后配电站将智能电器的用电需求信息转发给控制中心,最后控制中心根据用户的用电需求进行智能配电。监测控制和数据采集系统可以保护控制中心和配电站之间的安全通信,但配电站和智能电器之间的通信则容易受到安全攻击,例如消息伪造、篡改和窃听。因此,当前的法的主要目标都是针对配电站和智能电器之间的安全问题。例如使用防篡改设备的方式规避该安全问题,但该案只有配电站可以认证智能电器,并且不能实现密钥协商。以及基于计算性Diffie-Hellman问题的轻量级消息认证协议,实现了双向认证并通过Diffie-Hellman实现了密钥协商。为了进一步加强安全性,基于一个相互认证和密钥建立机制,使得数据收集中心和智能设备可以通过数据收集中心的公钥证书以及事先共享的长期密钥进行相互认证,但是如何分配共享的长期密钥的技术问题使得该方案不能广泛推广。另外,出现了使用公钥证书、零知识认证和访问控制技术来实现多因素认证体制,基于椭圆曲线的认证协议等,以及使用对称密码体制实现同时具备双向认证和机密性的协议,但此协议需要大量的密钥协商过程,通信之前需要进行多次认证。Information integrity, confidentiality, and mutual authentication of users are key issues in smart grids. Integrity and authentication can be guaranteed through digital signatures, while confidentiality is mainly realized through encryption mechanisms. The smart grid can be roughly divided into three layers: control center, distribution station, and smart appliances. The distribution station and the smart appliances communicate through the network through the medium of the smart meter, and then the distribution station forwards the electricity demand information of the smart appliances to the control center, and finally the control center performs intelligent power distribution according to the user's electricity demand. The supervisory control and data acquisition system can protect the secure communication between the control center and the substation, but the communication between the substation and smart appliances is vulnerable to security attacks such as message forgery, tampering and eavesdropping. Therefore, the main goal of the current law is to address the security issues between the substation and smart appliances. For example, tamper-resistant devices are used to circumvent this security problem, but in this case only the distribution station can authenticate smart appliances, and key agreement cannot be achieved. And a lightweight message authentication protocol based on the computational Diffie-Hellman problem, which realizes two-way authentication and key agreement through Diffie-Hellman. In order to further strengthen the security, based on a mutual authentication and key establishment mechanism, the data collection center and the smart device can perform mutual authentication through the public key certificate of the data collection center and the shared long-term key in advance, but how to distribute the shared long-term key The technical problem of the key prevents the scheme from being widely promoted. In addition, the use of public key certificates, zero-knowledge authentication and access control technologies to achieve multi-factor authentication systems, authentication protocols based on elliptic curves, etc., and the use of symmetric cryptosystems to achieve both two-way authentication and confidentiality protocols, but this protocol A large number of key negotiation processes are required, and multiple authentications are required before communication.

发明内容Contents of the invention

本发明的发明目的在于:针对智能电网中通信的安全问题,提出了一种基于组合密码的智能电网用电信息保护方法,以保证智能电表和MDMS之间能实现安全可靠的通信。The purpose of the present invention is to propose a combination password-based smart grid electricity information protection method to ensure safe and reliable communication between the smart meter and MDMS.

一种基于组合密码的智能电网安全通信方法,包括下列步骤:A smart grid security communication method based on combined ciphers, comprising the following steps:

步骤1:设置n(n大于1)个中转站,每个中转站分别对应一个以上智能电表;n个中转站中仅一个中转站与电表数据管理中心MDMS直接通信,且n个中转站之间为链式通信;Step 1: Set up n (n is greater than 1) transfer stations, and each transfer station corresponds to more than one smart meter; only one transfer station in the n transfer stations communicates directly with the meter data management center MDMS, and the n transfer stations For chain communication;

步骤2:每个实体(包括智能电表、中转站和MDMS)根据自己的身份ID生成对应公钥并发送至密钥生成中心PKG,PKG基于各实体所发送的公钥生成私钥并通过安全信道发送给对应的实体;Step 2: Each entity (including smart meters, transfer stations and MDMS) generates a corresponding public key according to its own identity ID and sends it to the key generation center PKG. PKG generates a private key based on the public key sent by each entity and passes it through a secure channel. sent to the corresponding entity;

步骤3:逐跳链路传输进行智能电表与MDMS的安全通信:Step 3: hop-by-hop link transmission for secure communication between smart meters and MDMS:

步骤3-1:生成智能电表和对应中转站的会话密钥:智能电表基于对应中转站的公钥对第一预设密钥协商消息(通常可设置为智能电表和对应中转站的身份标识符、密钥协商参数w和时间戳TM1等信息)进行加密并把密文发送给对应中转站,中转站解密后基于所述智能电表的公钥对第二预设密钥协商消息进行加密并发送给该智能电表,所述第二预设密钥协商消息包括第一预设密钥协商消息,通常可设置为智能电表和对应中转站的身份标识符、密钥协商参数w、v和时间戳TM1、TM2等;基于第二预设密钥协商消息得到智能电表和对应中转站的会话密钥,例如基于实体(智能电表、中转站)的身份标识符的组合公钥密码和Diffie-Hellman协议进行安全的密钥协商,以生成对应的会话密钥;Step 3-1: Generate the session key of the smart meter and the corresponding transfer station: the smart meter is based on the public key of the corresponding transfer station to the first preset key negotiation message (usually can be set as the identity identifier of the smart meter and the corresponding transfer station , key negotiation parameter w, time stamp TM1 and other information) to encrypt and send the ciphertext to the corresponding transfer station, after the transfer station decrypts the second preset key negotiation message based on the public key of the smart meter, encrypt and send For the smart meter, the second preset key negotiation message includes the first preset key negotiation message, which can usually be set as the identity identifier of the smart meter and the corresponding transfer station, key negotiation parameters w, v and time stamp TM1, TM2, etc.; obtain the session key of the smart meter and the corresponding transfer station based on the second preset key negotiation message, for example, based on the combined public key cryptography and Diffie-Hellman protocol of the identity identifier of the entity (smart meter, transfer station) Carry out secure key negotiation to generate corresponding session keys;

步骤3-2:智能电表基于会话密钥对电表数据进行加密并发送至对应中转站,中转站基于会话密钥进行验证,若验证成功则执行步骤3-3;Step 3-2: The smart meter encrypts the data of the meter based on the session key and sends it to the corresponding transfer station. The transfer station performs verification based on the session key. If the verification is successful, execute step 3-3;

步骤3-3:基于MDMS的公钥对所接收的电表数据进行加密,得到本地密文;Step 3-3: Encrypt the received meter data based on the MDMS public key to obtain the local ciphertext;

判断当前中转站是否为与MDMS的通信跳数最大的中转站(可通过中转站的标识符进行判断,例如对所有中转站顺序编号,编号最大的中转站与MDMS直接通信,编号最小的与MDMS的通信跳数最大,或者也可以基于当前中转站上是否存在其他中转站所发送的签名和/或中转站密文来进行判断),若否,则当前中转站的中转站密文为本地密文;若是,则基于上一跳中转站(从与MDMS的通信跳数最大的中转站到MDMS的传输方向)的公钥对其发送的签名和中转站密文进行验证,若验证通过,则当前中转站的中转站密文为本地密文和所接收的中转站密文;基于当前中转站的私钥对其中转站密文进行签名,并连同中转站密文一同发送给下一跳中转站;Determine whether the current transfer station is the transfer station with the largest number of communication hops with MDMS (it can be judged by the identifier of the transfer station, for example, sequentially number all transfer stations, the transfer station with the largest number communicates directly with MDMS, and the transfer station with the smallest number communicates directly with MDMS The number of communication hops is the largest, or it can also be judged based on whether there are signatures sent by other transfer stations and/or transfer station ciphertexts on the current transfer station), if not, the transfer station ciphertext of the current transfer station is the local ciphertext If so, then based on the public key of the last hop transfer station (transmission direction from the transfer station with the largest communication hops with MDMS to MDMS), the signature and transfer station ciphertext sent by it are verified, and if the verification is passed, then The transfer station ciphertext of the current transfer station is the local ciphertext and the transfer station ciphertext received; based on the private key of the current transfer station, the transfer station ciphertext is signed and sent together with the transfer station ciphertext to the next hop transfer stand;

步骤3-4:重复步骤3-3,直到将对应签名和中转站密文发送至MDMS;MDMS基于与其直接通信的中转站的公钥对所接收的签名和中转站密文进行验证,若验证通过,则基于MDMS的私钥对每个中转站的本地密文进行解密恢复各智能电表的电表数据。Step 3-4: Repeat steps 3-3 until the corresponding signature and transfer station ciphertext are sent to MDMS; MDMS verifies the received signature and transfer station ciphertext based on the public key of the transfer station that directly communicates with it. If passed, the local ciphertext of each transfer station is decrypted based on the MDMS private key to restore the meter data of each smart meter.

基于上述步骤,本发明采用组合公钥密码体制,能够有效的减少用户保存密钥的数量。相对于基于PKI的组合密码,用户不需要在验证公钥证书的合法性,同时减少保存和维护证书所带来的开销。相对于对称密码学,采用基于身份的密码学,可以避免大量的密钥协商。Based on the above steps, the present invention adopts a combined public key cryptosystem, which can effectively reduce the number of keys stored by users. Compared with PKI-based combined ciphers, users do not need to verify the validity of public key certificates, and at the same time reduce the cost of storing and maintaining certificates. Compared with symmetric cryptography, identity-based cryptography can avoid a large number of key agreements.

进一步的,本发明还可设置MDMS与智能电表的安全通信,以实现智能电表和MDMS之间双向安全通信,即本发明还包括步骤4:逐跳链路传输进行MDMS与智能电表的安全通信:MDMS分别基于各中转站的公钥对控制消息进行加密,得到对应的控制密文,并基于MDMS的私钥对各控制密文分别签名后连同各控制密文发送至与其直接通信的中转站;当前中转站存储与本端对应的签名和控制密文,并将非对应本端的签名和控制密文发送至上一跳(从MDMS到智能电表的传输方向)中转站,直到n个中转站中与MDMS的通信跳数最大的中转站;各中转站基于MDMS的公钥验证与本端对应的签名,若验证通过,则基于本端的私钥对控制密文进行解密恢复控制消息,最后基于与智能电表的会话密钥将控制发送至各对应智能电表。Further, the present invention can also set the secure communication between MDMS and the smart meter, so as to realize the two-way secure communication between the smart meter and the MDMS, that is, the present invention also includes step 4: hop-by-hop link transmission for secure communication between the MDMS and the smart meter: MDMS encrypts the control message based on the public key of each transfer station to obtain the corresponding control ciphertext, and then signs each control ciphertext based on the private key of MDMS and sends it together with each control ciphertext to the transfer station directly communicating with it; The current transfer station stores the signature and control ciphertext corresponding to the local end, and sends the non-corresponding signature and control ciphertext of the local end to the transfer station of the previous hop (transmission direction from MDMS to the smart meter), until n transfer stations and The transfer station with the largest number of MDMS communication hops; each transfer station verifies the signature corresponding to the local end based on the MDMS public key. The meter's session key sends control to each corresponding smart meter.

为了进一步适应智能电网中各实体的计算能力有限的工作环境,提高系统处理速度,以保证智能电网的实时性,本发明的步骤3中,在处理加密和签名时,可由设置的服务器离线进行对应加密、签名的计算过程,并将计算结果发送至对应实体(如智能电表、中转站)以在线计算对应的加密、签名结果。In order to further adapt to the working environment where the computing power of each entity in the smart grid is limited, improve the system processing speed, and ensure the real-time performance of the smart grid, in step 3 of the present invention, when processing encryption and signature, the server can be set for offline correspondence The calculation process of encryption and signature, and send the calculation results to the corresponding entities (such as smart meters, transfer stations) to calculate the corresponding encryption and signature results online.

综上所述,由于采用了上述技术方案,本发明的有益效果是:In summary, owing to adopting above-mentioned technical scheme, the beneficial effect of the present invention is:

(1)将组合公钥密码体制用于智能电网中,保证了智能电网通信的认证性和机密性,并且有效的减少了智能电网中存储密钥的数量。(1) The combined public key cryptosystem is used in the smart grid, which ensures the authentication and confidentiality of the smart grid communication, and effectively reduces the number of storage keys in the smart grid.

(2)使用离线/在线的密码体制进行组合提高了通信过程的处理速度,保证了智能电网的实时性。(2) Combining the offline/online cryptographic system improves the processing speed of the communication process and ensures the real-time performance of the smart grid.

附图说明Description of drawings

图1是实施例的网络拓扑示意图;Fig. 1 is a schematic diagram of network topology of an embodiment;

图2是实施例的安全通信过程示意图。Fig. 2 is a schematic diagram of a secure communication process of an embodiment.

具体实施方式detailed description

为使本发明的目的、技术方案和优点更加清楚,下面结合实施方式和附图,对本发明作进一步地详细描述。In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

实施例1Example 1

参见图1,设置n个中转站,每个中转站用j进行标识,每个中转站分别对多个智能电表(图1中的Meter1,Metern、Meterm等);n个中转站中仅一个中转站与电表数据管理中心MDMS直接通信(图中所示的中转站n),且n个中转站之间为链式通信。Referring to Figure 1, n transfer stations are set up, and each transfer station is marked with j, and each transfer station is used for multiple smart meters (Meter1, Metern, Meterm, etc. in Figure 1); only one transfer station in n transfer stations The station communicates directly with the meter data management center MDMS (the transfer station n shown in the figure), and the n transfer stations communicate in a chain.

由PKG设定系统参数,从而生成智能电网中各个实体的基于身份环境的密钥对、密钥协商过程:The system parameters are set by the PKG, so as to generate the key pair and key agreement process based on the identity environment of each entity in the smart grid:

(1)设定系统参数,生成所需密钥对。(1) Set system parameters and generate the required key pair.

给定一个循环加法群G1,阶为素数q,G2为具有相同阶的循环乘法群。P是群G1中的一个生成元,e:G1×G1→G2是一个双线性映射。定义四个安全哈希hash函数 H3:{0,1}*→{0,1}M其中M代表明文长度,表示模q的乘法循环群(群中元素不包括0)。PKG随机选择作为主密钥,计算Ppub=sP,g=e(P,P),PKG公开系统参数(G1,G2,P,Ppub,g,e,H1,H2,H3,H4),并保存主密钥s。Given a cyclic additive group G 1 with order prime q, G 2 is a cyclic multiplicative group with the same order. P is a generator in the group G 1 , and e: G 1 ×G 1 →G 2 is a bilinear map. Define four secure hash hash functions H 3 : {0,1} * → {0,1} M , Where M represents the plaintext length, Represents the multiplicative cyclic group modulo q (the elements in the group do not include 0). PKG randomly selected As the master key, calculate P pub =sP, g=e(P,P), PKG public system parameters (G 1 ,G 2 ,P,P pub ,g,e,H 1 ,H 2 ,H 3 ,H 4 ), and save the master key s.

智能电网中的各个实体(智能电表、中转站和MDMS)将自己的身份信息ID∈{0,1}*发送给PKG,PKG根据上述生成的系统参数及主密钥s为智能电网中的每个实体生成公私钥对(QID,SID),其中私钥SID=(QID+s)-1P,公钥QID=H1(ID),最后PKG通过安全信道将私钥发送给对应的实体。Each entity in the smart grid (smart meter, transfer station, and MDMS) sends its own identity information ID∈{0,1} * to PKG, and PKG provides each entity in the smart grid with the system parameters and master key s generated above. An entity generates a public-private key pair (Q ID , S ID ), where the private key S ID = (Q ID +s) -1 P, the public key Q ID = H 1 (ID), and finally PKG sends the private key through a secure channel to the corresponding entity.

(2)密钥协商过程(2) Key negotiation process

参考图2,在智能电表和MDMS进行通信之前,智能电表和中转站之间先要进行密钥协商生成共享的会话密钥。智能电表i随机选择密钥协商参数并计算wP,然后使用中转站j的公钥Qj对密钥协商消息(i||j||wP||TM1)进行加密并把密文发送给中转战j。其中i和j分别代表智能电表i和中转站j的身份信息,TM1表示时间戳。中转战j使用自己的私钥Si(即Si=SID=(QID+s)-1P)进行解密恢复出wP,然后随机选择密钥协商参数并计算vP,然后使用智能电表i的公钥Qi(即Qi=QID=H1(ID))对密钥协商消息(i||j||w||vP||TM1||TM2)进行加密并把密文发送给智能电表i,TM2表示时间戳。智能电表i使用自己的私钥Si解密恢复出消息,由wP可以确保与其进行密钥协商的是中转站j。最后智能电表i可以根据w和vP的值生成会话密钥Ki,j=w(vP),同时中转战j可以根据v和wP的值生成会话密钥Ki,j=v(wP)。为了使中转站j确保与其通信的是智能电表i,智能电表i可以使用共享会话秘钥Ki,j加密并发送给中转站j。这样就可以保证双向认证。Referring to FIG. 2 , before the smart meter communicates with the MDMS, the smart meter and the transfer station need to perform key negotiation to generate a shared session key. Smart meter i randomly selects key negotiation parameters And calculate wP, then use the public key Q j of the transit station j to encrypt the key agreement message (i||j||wP||TM 1 ) and send the ciphertext to the transit station j. Where i and j represent the identity information of smart meter i and transfer station j respectively, and TM 1 represents the time stamp. In transit, j uses his own private key S i (that is, S i =S ID =(Q ID +s) -1 P) to decrypt and recover wP, and then randomly selects key negotiation parameters And calculate vP, and then use the public key Q i of smart meter i (that is, Q i =Q ID =H 1 (ID)) to the key agreement message (i||j||w||vP||TM 1 || TM 2 ) to encrypt and send the ciphertext to the smart meter i, where TM 2 represents the time stamp. Smart meter i uses its own private key S i to decrypt and recover the message, and wP can ensure that the key negotiation with it is the transfer station j. Finally, the smart meter i can generate the session key K i,j =w(vP) according to the values of w and vP, and the relay station j can generate the session key K i,j =v(wP) according to the values of v and wP. In order to ensure that the transfer station j communicates with the smart meter i, the smart meter i can use the shared session key K i,j to encrypt and send it to the transfer station j. This ensures two-way authentication.

(3)智能电表读数传输过程(3) Smart meter reading transmission process

智能电表i用其电表数据m(用户用电信息)以及上述过程中生成的会话密钥Ki,j生成消息认证码E代表对称加密算法,下标用于标识智能电表i和中转站j及所对应的会话密钥Ki,j,然后将(m||c)发送给中转战j,中转战j使用共享的会话密钥计算如果c'=c,则验证成功,否则丢弃该智能电表所发送的电表数据。中转战j对验证成功的所有电表数据先加密后签名,具体步骤为:首先由安全服务器计算离线密文,随机选择计算Uj=uP,Rj=gx,βj=H3(R),T1j=a-1xP,T2j=x(b+s)P,然后将离线密文φ=(u,x,a,b,Uj,Rj,T1j,T2jj)发送给中转站j,中转站j利用MDMS的公钥QMD计算在线密文t1j=a(QMD-b)modq,t2j=H2(m,Rj,Uj,T1j,T2j,t1j)x+umodq,cj=βj⊕m。中转站j的本地密文为σj=(Uj,T1j,T2j,t1j,t2j,cj)。若中转站标识符j等于1,则直接将本地密文作为其中转站密文;否则,中转站j使用中转站j-1的公钥对其发来的消息(hj-1j-1,S'j-1)和(σ1||σ2||…||σj-1)进行验证,若验证成功则执行签名处理,否则丢弃。具体步骤为:中转站j计算Sj-1=θS'j-1如果hj-1=H41||σ2||…||σj-1,rj-1,S'j-1),则接受签名(hj-1j-1,S'j-1)并对前j个中转战的本地密文进行统一签名,即将第1~j个中转站的本地密文作为中转站j的中转站密文,再对当前中转站的中转站密文进行签名处理:首先由安全服务器计算离线签名,随机选择参数l,计算rj=gl,S'j=αSKj,然后将离线签名δ=(l,α-1,rj,S'j)发送给中转站j,中转站j计算在线签名hj=H41||σ2||…||σj,rj,S'j),θj=(x+h)α-1modq,然后将签名(hjj,S'j)和密文(σ1||σ2||…||σj)发送给中转站j+1。之后后续的中转站执行类似的操作,直到链路中的最后一个中转站n将数据转交给MDMS。Smart meter i uses its meter data m (user electricity consumption information) and the session key K i,j generated in the above process to generate a message authentication code E represents a symmetric encryption algorithm, the subscript is used to identify the smart meter i and the transfer station j and the corresponding session key K i,j , and then send (m||c) to the transfer station j, and the transfer station j uses the shared Session key calculation If c'=c, the verification is successful; otherwise, the meter data sent by the smart meter is discarded. Transit Zhan j encrypts and then signs all the meter data that has been verified successfully. Calculate U j =uP, R j =g x , β j =H 3 (R), T 1j =a -1 xP, T 2j =x(b+s)P, and then convert the offline ciphertext φ=(u, x,a,b,U j ,R j ,T 1j ,T 2jj ) to transfer station j, transfer station j uses MDMS public key Q MD to calculate online ciphertext t 1j =a(Q MD -b )modq,t 2j =H 2 (m,R j ,U j ,T 1j ,T 2j ,t 1j )x+umodq,c jj ⊕m. The local ciphertext of transfer station j is σ j =(U j ,T 1j ,T 2j ,t 1j ,t 2j ,c j ). If the transfer station identifier j is equal to 1, the local ciphertext is directly used as the transfer station ciphertext; otherwise, the transfer station j uses the public key of the transfer station j-1 to send the message (h j-1 , θ j -1 ,S' j-1 ) and (σ 1 ||σ 2 ||…||σ j-1 ) are verified, and if the verification is successful, the signature processing is performed, otherwise discarded. The specific steps are: transfer station j calculates S j-1 = θS' j-1 , If h j-1 =H 41 ||σ 2 ||…||σ j-1 ,r j-1 ,S' j-1 ), accept the signature (h j-1j-1 ,S' j-1 ) and uniformly sign the local ciphertexts of the first j transit stations, that is, the local ciphertexts of the first to j transit stations are used as the transit station ciphertexts of the transit station j, and then the current transit station's The ciphertext of the transfer station is signed: firstly, the security server calculates the offline signature, randomly selects the parameter l, Calculate r j =g l , S' j =αSK j , and then send the offline signature δ=(l,α -1 ,r j ,S' j ) to the transfer station j, and the transfer station j calculates the online signature h j =H 41 ||σ 2 ||…||σ j ,r j ,S' j ), θ j =(x+h)α -1 modq, then the signature (h jj ,S' j ) and ciphertext (σ 1 ||σ 2 ||…||σ j ) are sent to the transfer station j+1. Subsequent transfer stations then perform similar operations until the last transfer station n in the link transfers the data to the MDMS.

MDMS对收到的数据进行验证和解密,具体步骤为:MDMS首先利用第n个中转站的公钥Qn对签名(hnn,S'n)进行验证,计算Sn=θnS'n如果hn=H41||σ2||…||σn,rn,S'n),则接受密文(σ1||σ2||…||σn),并用自己的私钥SKMD对各个密文分别进行解密。以σj=(Uj,T1j,T2j,t1j,t2j,cj)为例,MDMS计算R=e(T2j+t1jT1j,SKMD),mj=cj⊕H3(R),H=H2(mj,R,Uj,T1j,T2j,t1j),如果满足RH=e(t2P-U,P),则接受消息mj,其中mj表示与中转站j所对应的各智能电表发送的电表数据。MDMS verifies and decrypts the received data. The specific steps are: MDMS first uses the public key Q n of the nth transfer station to verify the signature (h n , θ n , S' n ), and calculates S n = θ n S' n , If h n =H 41 ||σ 2 ||…||σ n ,r n ,S' n ), accept the ciphertext (σ 1 ||σ 2 ||…||σ n ), and use Its own private key SK MD decrypts each ciphertext respectively. Taking σ j =(U j ,T 1j ,T 2j ,t 1j ,t 2j ,c j ) as an example, MDMS calculates R=e(T 2j +t 1j T 1j ,SK MD ), m j =c j ⊕ H 3 (R), H=H 2 (m j ,R,U j ,T 1j ,T 2j ,t 1j ), if R H =e(t 2 PU,P) is satisfied, the message m j is accepted, where m j represents the electric meter data sent by each smart electric meter corresponding to the transfer station j.

(4)控制信息传输过程(4) Control information transmission process

MDMS将控制消息传输给智能电表是上述过程的一个逆过程。MDMS首先分别使用中转站的公钥对控制消息进行加密并用自己的私钥对密文分别签名然后传递给中转站n,中转战n首先将前n-1个中转站的的密文和签名以逐跳链路传输的方式传给上一个中转站n-1,中转站n-1类似地将前n-2个中转站的的密文和签名再传给上一个中转站,以此类推,直到链路中的第一个中转站。在收到密文和签名后,各个中转站首先利用MDMS的公钥对签名进行验证并利用自己的私钥进行解密,最后利用和智能电表共享的会话密钥将控制消息转发给各个电表。MDMS transmits control messages to smart meters is a reverse process of the above process. MDMS first uses the public key of the transfer station to encrypt the control message and signs the ciphertext with its own private key and then passes it to the transfer station n. The transfer station n first sends the ciphertext and signature of the first n-1 transfer stations to The hop-by-hop link transmission method is transmitted to the previous transfer station n-1, and the transfer station n-1 similarly transmits the ciphertext and signature of the first n-2 transfer stations to the previous transfer station, and so on. Up to the first transfer station in the chain. After receiving the ciphertext and signature, each transfer station first uses the MDMS public key to verify the signature and decrypts it with its own private key, and finally uses the session key shared with the smart meter to forward the control message to each meter.

以上所述,仅为本发明的具体实施方式,本说明书中所公开的任一特征,除非特别叙述,均可被其他等效或具有类似目的的替代特征加以替换;所公开的所有特征、或所有方法或过程中的步骤,除了互相排斥的特征和/或步骤以外,均可以任何方式组合。The above is only a specific embodiment of the present invention. Any feature disclosed in this specification, unless specifically stated, can be replaced by other equivalent or alternative features with similar purposes; all the disclosed features, or All method or process steps may be combined in any way, except for mutually exclusive features and/or steps.

Claims (7)

1.一种基于组合密码的智能电网安全通信方法,其特征在于,包括下列步骤:1. A smart grid security communication method based on combined cipher, is characterized in that, comprises the following steps: 步骤1:设置n个中转站,每个中转站分别对应一个以上智能电表;n个中转站中仅一个中转站与电表数据管理中心MDMS直接通信,且n个中转站之间为链式通信,其中n大于1;Step 1: Set up n transfer stations, each of which corresponds to more than one smart meter; only one transfer station in the n transfer stations communicates directly with the meter data management center MDMS, and the n transfer stations communicate in a chain, where n is greater than 1; 步骤2:每个实体根据自己的身份ID生成对应公钥并发送至密钥生成中心PKG,PKG基于各实体所发送的公钥生成私钥并通过安全信道发送给对应的实体,所述实体包括智能电表、中转站和MDMS;Step 2: Each entity generates a corresponding public key according to its own ID and sends it to the key generation center PKG. PKG generates a private key based on the public key sent by each entity and sends it to the corresponding entity through a secure channel. The entities include Smart meters, transfer stations and MDMS; 步骤3:逐跳链路传输进行智能电表与MDMS的安全通信:Step 3: hop-by-hop link transmission for secure communication between smart meters and MDMS: 步骤3-1:生成智能电表和对应中转站的会话密钥:智能电表基于对应中转站的公钥对第一预设密钥协商消息进行加密并把密文发送给对应中转站,中转站解密后基于所述智能电表的公钥对第二预设密钥协商消息进行加密并发送给该智能电表,所述第二预设密钥协商消息包括第一预设密钥协商消息;基于第二预设密钥协商消息得到智能电表和对应中转站的会话密钥;Step 3-1: Generate the session key of the smart meter and the corresponding transfer station: the smart meter encrypts the first preset key negotiation message based on the public key of the corresponding transfer station and sends the ciphertext to the corresponding transfer station, and the transfer station decrypts it Then encrypt the second preset key negotiation message based on the public key of the smart meter and send it to the smart meter, the second preset key negotiation message includes the first preset key negotiation message; based on the second The preset key negotiation message obtains the session key of the smart meter and the corresponding transfer station; 步骤3-2:智能电表基于会话密钥对电表数据进行加密并发送至对应中转站,中转站基于会话密钥进行验证,若验证成功则执行步骤3-3;Step 3-2: The smart meter encrypts the data of the meter based on the session key and sends it to the corresponding transfer station. The transfer station performs verification based on the session key. If the verification is successful, execute step 3-3; 步骤3-3:基于MDMS的公钥对所接收的电表数据进行加密,得到本地密文;Step 3-3: Encrypt the received meter data based on the MDMS public key to obtain the local ciphertext; 判断当前中转站是否为与MDMS的通信跳数最大的中转站,若否,则当前中转站的中转站密文为本地密文;若是,则基于上一跳中转站的公钥对其发送的签名和中转站密文进行验证,若验证通过,则当前中转站的中转站密文为本地密文和所接收的中转站密文;Judging whether the current transfer station is the transfer station with the largest number of communication hops with MDMS, if not, the transfer station ciphertext of the current transfer station is the local ciphertext; if so, based on the public key of the previous transfer station The signature and the transfer station ciphertext are verified. If the verification is passed, the transfer station ciphertext of the current transfer station is the local ciphertext and the received transfer station ciphertext; 基于当前中转站的私钥对其中转站密文进行签名,并连同中转站密文一同发送给下一跳中转站;Sign the ciphertext of the transit station based on the private key of the current transit station, and send it to the next-hop transit station together with the transit station ciphertext; 步骤3-4:重复步骤3-3,直到将对应签名和中转站密文发送至MDMS;MDMS基于与其直接通信的中转站的公钥对所接收的签名和中转站密文进行验证,若验证通过,则基于MDMS的私钥对每个中转站的本地密文进行解密恢复各智能电表的电表数据。Step 3-4: Repeat steps 3-3 until the corresponding signature and transfer station ciphertext are sent to MDMS; MDMS verifies the received signature and transfer station ciphertext based on the public key of the transfer station that directly communicates with it. If passed, the local ciphertext of each transfer station is decrypted based on the MDMS private key to restore the meter data of each smart meter. 2.如权利要求1所述的方法,其特征在于,还包括步骤4:逐跳链路传输进行MDMS与智能电表的安全通信:2. The method according to claim 1, further comprising step 4: hop-by-hop link transmission for secure communication between MDMS and smart meters: MDMS分别基于各中转站的公钥对控制消息进行加密,得到对应的控制密文,并基于MDMS的私钥对各控制密文分别签名后连同各控制密文发送至与其直接通信的中转站;MDMS encrypts the control message based on the public key of each transfer station to obtain the corresponding control ciphertext, and then signs each control ciphertext based on the private key of MDMS and sends it together with each control ciphertext to the transfer station directly communicating with it; 当前中转站存储与本端对应的签名和控制密文,并将非对应本端的签名和控制密文发送至上一跳中转站,直到n个中转站中与MDMS的通信跳数最大的中转站;The current transfer station stores the signature and control ciphertext corresponding to the local end, and sends the signature and control ciphertext corresponding to the local end to the previous hop transfer station until the transfer station with the largest number of communication hops with MDMS among the n transfer stations; 各中转站基于MDMS的公钥验证与本端对应的签名,若验证通过,则基于本端的私钥对控制密文进行解密恢复控制消息,最后基于与智能电表的会话密钥将控制发送至各对应智能电表。Each transfer station verifies the signature corresponding to the local end based on the MDMS public key. If the verification is passed, the control ciphertext is decrypted based on the local private key to restore the control message, and finally the control is sent to each station based on the session key with the smart meter. Compatible with smart meters. 3.如权利要求1或2所述的方法,其特征在于,步骤3-1中,所述第一预设密钥协商消息包括智能电表和对应中转站的身份标识符、密钥协商参数w和时间戳TM1,所述第二预设密钥协商消息包括智能电表和对应中转站的身份标识符、密钥协商参数w、v和时间戳TM1、TM23. The method according to claim 1 or 2, wherein, in step 3-1, the first preset key negotiation message includes the identity identifier of the smart meter and the corresponding transfer station, the key negotiation parameter w and time stamp TM 1 , the second preset key negotiation message includes the identity identifiers of the smart meter and the corresponding transfer station, key negotiation parameters w, v, and time stamps TM 1 , TM 2 . 4.如权利要求1或2所述的方法,其特征在于,步骤3中,在处理加密和签名时,由设置的服务器离线进行对应加密、签名的计算过程,并将计算结果发送至对应实体以在线计算对应的加密、签名结果。4. The method according to claim 1 or 2, characterized in that, in step 3, when processing encryption and signature, the set server performs the calculation process of corresponding encryption and signature offline, and sends the calculation result to the corresponding entity The corresponding encryption and signature results can be calculated online. 5.如权利要求4所述的方法,其特征在于,各实体涉及的离线加密、在线加密、解密、离线签名、在线签名和认证的具体过程为:5. The method according to claim 4, wherein the specific processes of offline encryption, online encryption, decryption, offline signature, online signature and authentication involved in each entity are: 离线加密:服务器随机选择参数并计算U=uP,R=gx,β=H3(R),T1=a-1xP,T2=x(b+s)P,并将离线密文φ=(u,x,a,b,U,R,T1,T2,β)发送给对应密文的发送端;Offline encryption: the server randomly selects parameters And calculate U=uP, R=g x , β=H 3 (R), T 1 =a -1 xP, T 2 =x(b+s)P, and the offline ciphertext φ=(u,x, a,b,U,R,T 1 ,T 2 ,β) are sent to the sender of the corresponding ciphertext; 在线加密:给定(m,ID,φ),发送端计算t1=a(H1(ID)-b)modq,t2=H2(m,R,U,T1,T2,t1)x+umodq,然后将生成的密文σ=(U,T1,T2,t1,t2,c)发送给解密端;Online encryption: Given (m, ID, φ), the sender calculates t 1 = a(H 1 (ID)-b) modq, t 2 = H 2 (m, R, U, T 1 , T 2 , t 1 ) x+umodq, Then send the generated ciphertext σ=(U,T 1 ,T 2 ,t 1 ,t 2 ,c) to the decryption end; 解密:给定(σ,ID,SID),接收对应密文的接收端计算R=e(T2+t1T1,SID),H=H2(m,R,U,T1,T2,t1),若RH=e(t2P-U,P),则输出m,否则拒绝;Decryption: Given (σ, ID, S ID ), the receiver receiving the corresponding ciphertext calculates R=e(T 2 +t 1 T 1 , S ID ), H=H 2 (m,R,U,T 1 ,T 2 ,t 1 ), if R H =e(t 2 PU,P), output m, otherwise reject; 离线签名:服务器随机选择参数l,并计算r=gl,S’=αSID,然后将离线密文δ=(l,α-1,r,S’)发送给对应签名的发送端;Offline signature: The server randomly selects the parameter l, And calculate r=g l , S'=αS ID , and then send the offline ciphertext δ=(l,α -1 ,r,S') to the sender of the corresponding signature; 在线签名:给定(ID,δ),发送端计算h=H4(m,r,S’),θ=(l+h)α-1modq,生成签名σ=(h,θ,S’)并发送给对应接收端;Online signature: given (ID, δ), the sender calculates h = H 4 (m, r, S'), θ = (l+h) α -1 modq, and generates a signature σ = (h, θ, S' ) and sent to the corresponding receiver; 认证:给定(m,ID,σ),接收端计算S=θS’,r=e(S,H1(ID)P+Ppub)g-h,如果h=H4(m,r,S’)接收端接受签名,否则拒绝;Authentication: Given (m, ID, σ), the receiving end calculates S=θS', r=e(S,H 1 (ID)P+P pub )g -h , if h=H 4 (m,r, S') The receiving end accepts the signature, otherwise rejects; 其中,表示模q的乘法循环群,P表示q阶加法循环群G1的生成元,g=e(P,P),其中双线性映射e为:G1×G1→G2,G2表示q阶乘法循环群,哈希函数哈希函数哈希函数H3:{0,1}*→{0,1}M,哈希函数其中M为预设明文长度,s表示系统主密钥,m表示智能电表的电表数据,ID表示对应实体的身份标识符,SID表示对应实体的私钥。in, Represents the multiplicative cyclic group modulo q, P represents the generator of the q-order additive cyclic group G 1 , g=e(P,P), where the bilinear map e is: G 1 ×G 1 →G 2 , G 2 represents Cyclic group of q factorial method, hash function hash function Hash function H 3 : {0,1} * → {0,1} M , hash function Where M is the preset plaintext length, s represents the system master key, m represents the meter data of the smart meter, ID represents the identity identifier of the corresponding entity, and S ID represents the private key of the corresponding entity. 6.如权利要求5所述的方法,其特征在于,步骤3-3中,得到本地密文的具体过程为:6. The method according to claim 5, characterized in that, in step 3-3, the specific process of obtaining the local ciphertext is: 由安全服务器计算离线密文φj=(u,x,a,b,Uj,Rj,T1j,T2jj)并发送给中转站j,其中j表示当前中转站标识符,Uj=uP,Rj=gx,βj=H3(R),T1j=a-1xP,T2j=x(b+s)P;The off-line ciphertext φ j = (u,x,a,b,U j ,R j ,T 1j ,T 2jj ) is calculated by the security server and sent to the transfer station j, where j represents the identifier of the current transfer station, U j =uP, R j =g x , β j =H 3 (R), T 1j =a -1 xP, T 2j =x(b+s)P; 中转站j基于MDMS的公钥QMD计算在线密文t1j=a(QMD-b)modq,t2j=H2(m,Rj,Uj,T1j,T2j,t1j)x+umodq,从而得到本地密文:σj=(Uj,T1j,T2j,t1j,t2j,cj);Transit station j calculates online ciphertext based on MDMS public key Q MD t 1j =a(Q MD -b)modq, t 2j =H 2 (m,R j ,U j ,T 1j ,T 2j ,t 1j )x +umodq, Thus the local ciphertext is obtained: σ j =(U j ,T 1j ,T 2j ,t 1j ,t 2j ,c j ); 中转站j使用中转站j-1的公钥对其发来的签名(hj-1j-1,S'j-1)和中转站密文(σ1||σ2||…||σj-1)进行验证:计算Sj-1=θS'j-1若hj-1=H41||σ2||…||σj-1,rj-1,S'j-1),则验证通过;Transit station j uses the public key of transit station j-1 to sign (h j-1j-1 ,S' j-1 ) and transit station ciphertext (σ 1 ||σ 2 ||… ||σ j-1 ) for verification: calculate S j-1 =θS' j-1 , If h j-1 =H 41 ||σ 2 ||…||σ j-1 ,r j-1 ,S' j-1 ), the verification is passed; 中转站j的中转站密文为(σ1||σ2||…||σj),并对其进行签名处理:由安全服务器计算离线签名,随机选择参数l,计算rj=gl,S'j=αSKj,然后将离线签名δ=(l,α-1,rj,S'j)发送给中转站j,中转站j计算在线签名hj=H41||σ2||…||σj,rj,S'j),θj=(l+h)α-1modq,然后将签名(hjj,S'j)和中转站密文(σ1||σ2||…||σj)发送给中转站j+1;The transfer station ciphertext of transfer station j is (σ 1 ||σ 2 ||…||σ j ), and it is signed: the offline signature is calculated by the security server, and the parameter l is randomly selected, Calculate r j =g l , S' j =αSK j , and then send the offline signature δ=(l,α -1 ,r j ,S' j ) to the transfer station j, and the transfer station j calculates the online signature h j =H 41 ||σ 2 ||…||σ j ,r j ,S' j ), θ j =(l+h)α -1 modq, then the signature (h jj ,S' j ) and transfer station ciphertext (σ 1 ||σ 2 ||…||σ j ) are sent to transfer station j+1; 步骤3-4中,MDMS对收到的签名和中转站密文进行验证和解密,具体步骤为:MDMS基于与其直接通信的中转站n的公钥Qn对签名(hnn,S'n)进行验证,计算Sn=θnS'n若hn=H41||σ2||…||σn,rn,S'n),则基于MDMS的私钥SKMD对各个本地密文分别进行解密。In steps 3-4, MDMS verifies and decrypts the received signature and the ciphertext of the transfer station. The specific steps are: MDMS signs (h n ,θ n , S ' n ) to verify, calculate S nn S' n , If h n =H 41 ||σ 2 ||...||σ n , r n , S' n ), each local ciphertext is decrypted based on the private key SK MD of MDMS. 7.如权利要求6所述的方法,其特征在于,所述步骤4中,MDMS将控制消息传输给智能电表的具体步骤为权利要求6中关于步骤3-3和3-4的逆过程。7. The method according to claim 6, wherein in step 4, the specific step of the MDMS transmitting the control message to the smart meter is the inverse process of steps 3-3 and 3-4 in claim 6.
CN201510575551.5A 2015-09-10 2015-09-10 A kind of smart grid security communication means based on combination pin Expired - Fee Related CN105245326B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510575551.5A CN105245326B (en) 2015-09-10 2015-09-10 A kind of smart grid security communication means based on combination pin

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510575551.5A CN105245326B (en) 2015-09-10 2015-09-10 A kind of smart grid security communication means based on combination pin

Publications (2)

Publication Number Publication Date
CN105245326A true CN105245326A (en) 2016-01-13
CN105245326B CN105245326B (en) 2018-11-13

Family

ID=55042839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510575551.5A Expired - Fee Related CN105245326B (en) 2015-09-10 2015-09-10 A kind of smart grid security communication means based on combination pin

Country Status (1)

Country Link
CN (1) CN105245326B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871837A (en) * 2016-03-30 2016-08-17 安徽工程大学 Data transmission system applied to smart power grid
CN105897416A (en) * 2016-06-29 2016-08-24 邓月霞 Forward end-to-end safe instant communication method based on identity-based password system
CN108494555A (en) * 2018-02-27 2018-09-04 深圳市海司恩科技有限公司 Information encryption and decryption method and information encryption, decryption device
CN109272384A (en) * 2018-09-11 2019-01-25 重庆邮电大学 A kind of distributed intelligence ammeter sale of electricity method and system
CN110034928A (en) * 2019-03-29 2019-07-19 国网山东省电力公司梁山县供电公司 Energy measurement information transmitting device and method
CN110110537A (en) * 2019-05-08 2019-08-09 西安电子科技大学 The polymerization of multidimensional data encryption and decryption in smart grid
CN110460570A (en) * 2019-07-03 2019-11-15 湖南匡安网络技术有限公司 A smart grid data encryption method and decryption method with forward security
CN112231770A (en) * 2020-11-03 2021-01-15 上海第二工业大学 Smart grid data transmission method
CN112511490A (en) * 2020-10-29 2021-03-16 苏州达塔库自动化科技有限公司 Smart power grid safety communication method based on combined password
CN112671927A (en) * 2020-12-31 2021-04-16 广州技象科技有限公司 Service data transmission method and device based on electric power Internet of things system change
CN112804118A (en) * 2020-12-31 2021-05-14 广州技象科技有限公司 Data transmission method and device based on data jump transmission link of intelligent electric meter
CN113094731A (en) * 2021-04-15 2021-07-09 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113556355A (en) * 2021-07-30 2021-10-26 广东电网有限责任公司 Key processing system and method for intelligent equipment of power distribution network
CN117118744A (en) * 2023-10-19 2023-11-24 三未信安科技股份有限公司 Message encryption packaging and joint authentication method and system based on identification password

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120233461A1 (en) * 2011-03-07 2012-09-13 Kabushiki Kaisha Toshiba Data transmitting apparatus and data authenticating method
CN102859945A (en) * 2010-04-30 2013-01-02 株式会社东芝 Key management device, system and method having a rekey mechanism
CN104363219A (en) * 2014-11-06 2015-02-18 江苏林洋电子股份有限公司 Three-party secret key management method based on IEC62056 data transmission safety standard

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102859945A (en) * 2010-04-30 2013-01-02 株式会社东芝 Key management device, system and method having a rekey mechanism
US20120233461A1 (en) * 2011-03-07 2012-09-13 Kabushiki Kaisha Toshiba Data transmitting apparatus and data authenticating method
CN104363219A (en) * 2014-11-06 2015-02-18 江苏林洋电子股份有限公司 Three-party secret key management method based on IEC62056 data transmission safety standard

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YE YAN,ET AL.: "An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid", 《IEEE NETWORK》 *
王先博: "基于身份的组合公钥认证体制的研究与设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871837A (en) * 2016-03-30 2016-08-17 安徽工程大学 Data transmission system applied to smart power grid
CN105897416A (en) * 2016-06-29 2016-08-24 邓月霞 Forward end-to-end safe instant communication method based on identity-based password system
CN105897416B (en) * 2016-06-29 2019-03-05 邓月霞 A kind of end-to-end security instant communication method of forward direction based on id password system
CN108494555B (en) * 2018-02-27 2024-05-24 洪贵顺 Information encryption and decryption method and information encryption and decryption equipment
CN108494555A (en) * 2018-02-27 2018-09-04 深圳市海司恩科技有限公司 Information encryption and decryption method and information encryption, decryption device
CN109272384A (en) * 2018-09-11 2019-01-25 重庆邮电大学 A kind of distributed intelligence ammeter sale of electricity method and system
CN109272384B (en) * 2018-09-11 2022-01-28 重庆邮电大学 Distributed intelligent electric meter electricity selling method and system
CN110034928A (en) * 2019-03-29 2019-07-19 国网山东省电力公司梁山县供电公司 Energy measurement information transmitting device and method
CN110034928B (en) * 2019-03-29 2021-11-02 国网山东省电力公司梁山县供电公司 Electric energy metering information transmission device and method
CN110110537A (en) * 2019-05-08 2019-08-09 西安电子科技大学 The polymerization of multidimensional data encryption and decryption in smart grid
CN110110537B (en) * 2019-05-08 2022-12-27 西安电子科技大学 Aggregation method for encrypting and decrypting multidimensional data in smart power grid
CN110460570B (en) * 2019-07-03 2021-07-23 湖南匡安网络技术有限公司 A smart grid data encryption method and decryption method with forward security
CN110460570A (en) * 2019-07-03 2019-11-15 湖南匡安网络技术有限公司 A smart grid data encryption method and decryption method with forward security
CN112511490A (en) * 2020-10-29 2021-03-16 苏州达塔库自动化科技有限公司 Smart power grid safety communication method based on combined password
CN112231770A (en) * 2020-11-03 2021-01-15 上海第二工业大学 Smart grid data transmission method
CN112804118B (en) * 2020-12-31 2023-01-31 广州技象科技有限公司 Data transmission method and device based on intelligent ammeter data jump transmission link
CN112804118A (en) * 2020-12-31 2021-05-14 广州技象科技有限公司 Data transmission method and device based on data jump transmission link of intelligent electric meter
CN112671927A (en) * 2020-12-31 2021-04-16 广州技象科技有限公司 Service data transmission method and device based on electric power Internet of things system change
CN113094731A (en) * 2021-04-15 2021-07-09 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113094731B (en) * 2021-04-15 2023-04-07 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113556355A (en) * 2021-07-30 2021-10-26 广东电网有限责任公司 Key processing system and method for intelligent equipment of power distribution network
CN113556355B (en) * 2021-07-30 2023-04-28 广东电网有限责任公司 Key processing system and method for intelligent equipment of power distribution network
CN117118744A (en) * 2023-10-19 2023-11-24 三未信安科技股份有限公司 Message encryption packaging and joint authentication method and system based on identification password
CN117118744B (en) * 2023-10-19 2024-01-26 三未信安科技股份有限公司 Message encryption packaging and joint authentication method and system based on identification password

Also Published As

Publication number Publication date
CN105245326B (en) 2018-11-13

Similar Documents

Publication Publication Date Title
CN105245326B (en) A kind of smart grid security communication means based on combination pin
CN109584978B (en) Information processing method and system based on signature aggregation medical health monitoring network model
CN101238677B (en) Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved safety
CN104270249B (en) It is a kind of from the label decryption method without certificate environment to identity-based environment
CN108234501A (en) A kind of virtual plant safety communicating method based on quantum key fusion
US11870891B2 (en) Certificateless public key encryption using pairings
CN104301108B (en) It is a kind of from identity-based environment to the label decryption method without certificate environment
CN113704736A (en) Lightweight access authentication method and system for power Internet of things equipment based on IBC system
CN104079412B (en) The threshold proxy signature method without credible PKG based on intelligent grid identity security
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN110113150A (en) The encryption method and system of deniable authentication based on no certificate environment
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN113242129A (en) End-to-end data confidentiality and integrity protection method based on lattice encryption
CN115174209B (en) A cloud-assisted identity-based group key exchange method
CN113676448B (en) Offline equipment bidirectional authentication method and system based on symmetric key
CN114070549B (en) Key generation method, device, equipment and storage medium
GB2543359A (en) Methods and apparatus for secure communication
Qin et al. Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing
CN114070570B (en) A secure communication method for power internet of things
WO2020115266A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
CN107294972B (en) Identity-based generalized multi-receiver anonymous signcryption method
CN114070550B (en) Information processing method, device, equipment and storage medium
CN110572788B (en) Wireless sensor communication method and system based on asymmetric key pool and implicit certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181113