首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于RAHRM的电表数据安全采集传输方法
引用本文:董伟伟,王勇,曹康华,周林. 一种基于RAHRM的电表数据安全采集传输方法[J]. 上海电力学院学报, 2020, 36(4): 336-340
作者姓名:董伟伟  王勇  曹康华  周林
作者单位:上海电力大学 计算机科学与技术学院
基金项目:国家自然科学基金(61772327);奇安信大数据协同安全国家工程实验室开放课题(QAX-201803);浙江大学工业控制技术国家重点实验室开放式基金(ICT1800380)。
摘    要:电表数据经数据采集器采集、数据聚合器收集后传输给数据存储中心,而当前的用电数据采集方法存在数据泄露、中间人攻击,且攻击者不易被发现等风险。针对这一系列问题,提出了RAHRM的方法,采用RSA-AES-HASH签名认证,并采用RSA对智能电表传输的数据进行加密,同时对服务器端进行流量监控和异常报警,为电表数据传输提供一个安全、可靠的通道。实验结果表明,此电表数据采集方法可以降低智能电表通信中的中间人攻击与攻击者不易被发现的风险,保证通信线路的安全。

关 键 词:用电信息  数据泄露  签名认证  流量监控
收稿时间:2020-03-18

A Method for Resisting Man-in-the-middle Attacks in Data Collection of Smart Meters
DONG Weiwei,WANG Yong,CAO Kanghu,ZHOU Lin. A Method for Resisting Man-in-the-middle Attacks in Data Collection of Smart Meters[J]. Journal of Shanghai University of Electric Power, 2020, 36(4): 336-340
Authors:DONG Weiwei  WANG Yong  CAO Kanghu  ZHOU Lin
Affiliation:School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China
Abstract:The data of the meter is collected by the data collector and data aggregator,which is transmitted to the data storage center.The current method of collecting electricity data has data leakage,man-in-the-middle attacks,and the problem that attackers are not easy to find.To solve this problem,a method called RAHRM is proposed,adopting RSA-AES-HASH authentication.In the authentication process,the information is summarized by the HASH function,and the data transmitted by the smart meter is encrypted,using RSA encryption algorithm.At the same time,traffic monitoring and abnormal alarm on the server.Praide a safe and reliable channel eusuring the need for real-time intelligent data collection of smart meters.The experimental results show that this security protection method can reduce the man-in-the-middle attacks in the process of smart meter communication and solve the problem that attackers are not easy to be discovered.It can ensure the safety of communication lines.
Keywords:power information  data leakage  signature authentication  traffic monitoring
本文献已被 CNKI 等数据库收录!
点击此处可从《上海电力学院学报》浏览原始摘要信息
点击此处可从《上海电力学院学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号