首页 | 本学科首页   官方微博 | 高级检索  
     

基于属性基加密与阈值秘密共享的智能电表密钥管理方法
引用本文:肖勇,许卓,罗鸿轩,金鑫.基于属性基加密与阈值秘密共享的智能电表密钥管理方法[J].南方电网技术,2020,14(1):31-38.
作者姓名:肖勇  许卓  罗鸿轩  金鑫
作者单位:南方电网科学研究院,广州,510663;中国南方电网有限责任公司,广州,510663
基金项目:南方电网有限责任公司科技项目(新一代智能量测体系关键技术研究与应用示范)。
摘    要:智能电表是计量自动化中作为电力公司与用户之间计费的一种重要计量设备,而传统智能电表密钥管理方法存在效率低、通信量大且易受网络攻击等问题。为此,提出了一种基于属性基加密与阈值秘密共享的智能电表密钥管理方法。首先,采用组认证对智能电表的身份进行认证,减少了一对一认证的通信次数。然后,抄表过程中进行身份认证时采用(t,n)-阈值秘密共享技术,并且在密钥生成过程中采用属性基加密技术,以隐藏访问结构,避免智能电表信息泄露。最后,针对网络存在多种安全威胁,利用大数据技术对网络攻击类型进行挖掘,以快速识别恶意攻击者。将提出的方法进行仿真实验以验证其有效性,仿真结果表明,相比其他技术,提出的方法显著降低了系统存储负担,提高了通信效率,且识别恶意参与者耗时短,从而保证了密钥管理的安全性。

关 键 词:智能电表  密钥管理  组认证  阈值秘密共享  属性基加密  数据挖掘

Intelligent Terminal Key Management Method Based on Attribute Base Encryption and Threshold Secret Sharing
XIAO Yong,XU Zhuo,LUO Hongxuan,JIN Xin.Intelligent Terminal Key Management Method Based on Attribute Base Encryption and Threshold Secret Sharing[J].Southern Power System Technology,2020,14(1):31-38.
Authors:XIAO Yong  XU Zhuo  LUO Hongxuan  JIN Xin
Affiliation:(Electric Power Research Institute,CSG,Guangzhou 510663,China;China Southern Power Grid Co.,Ltd.,Guangzhou 510663,China)
Abstract:Smart meter is an important intelligent terminal in the measurement automation as the billing between the power company and the user,the traditional key management methods of intelligent terminals have some problems,such as low efficiency,large traffic and vulnerability to network attacks.Therefore,in this paper a key management method of intelligent terminals based on attribute base encryption and threshold secret sharing is proposed.Firstly,group authentication is used to authenticate the identity of smart meters,which reduces the number of one-to-one authentication communications.Then,(t,n)-threshold secret sharing technology is used in identity authentication,and attribute base encryption technology is used in key generation process to hide access structure and avoid leakage of smart meter information.Finally,there are many kinds of security threats in the network.Large data technology is used to mine the types of network attacks in order to quickly identify malicious attackers.The proposed method is simulated to verify its effectiveness.The simulation results show that compared with other technologies,the proposed method significantly reduces the storage burden of the system,improves the communication efficiency,and takes less time to identify malicious participants,thus ensures the security of key management.
Keywords:intelligent terminal  private key management  group authentication  threshold secret sharing  attribute base encryption  data mining
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号