智能電網(wǎng)安全與隱私保護(hù)相關(guān)問題研究
本文選題:智能電網(wǎng) + 高級(jí)量測(cè)體系 ; 參考:《國(guó)防科學(xué)技術(shù)大學(xué)》2014年博士論文
【摘要】:隨著信息和通信技術(shù)的飛速發(fā)展,中國(guó)、美國(guó)、加拿大等世界各國(guó)都正在將陳舊的電力系統(tǒng)升級(jí)為智能電網(wǎng)。智能電網(wǎng)擁有雙向通信、高可靠性、實(shí)時(shí)需求響應(yīng)、自愈以及用戶參與等特點(diǎn),具有很高的研究?jī)r(jià)值和應(yīng)用價(jià)值。其中,安全和隱私是智能電網(wǎng)設(shè)計(jì)和實(shí)現(xiàn)的關(guān)鍵問題之一,直接影響智能電網(wǎng)的正常運(yùn)行和人們對(duì)智能電網(wǎng)技術(shù)的接受程度。從智能電網(wǎng)的組成成分、分布地域以及設(shè)計(jì)對(duì)象來看,智能電網(wǎng)是個(gè)非常復(fù)雜的系統(tǒng),隨著智能電網(wǎng)在全世界范圍內(nèi)的部署,越來越多的安全和隱私問題也暴露出來。由于智能電網(wǎng)的復(fù)雜性和不斷有新技術(shù)的應(yīng)用,傳統(tǒng)的安全和隱私保護(hù)機(jī)制無法直接應(yīng)用,亟待新的保護(hù)機(jī)制解決這些問題。本文在系統(tǒng)研究智能電網(wǎng)安全和隱私保護(hù)問題的基礎(chǔ)上,針對(duì)智能電網(wǎng)中新涌現(xiàn)的安全和隱私問題:電網(wǎng)用戶隱私問題和關(guān)鍵設(shè)備組通信問題,進(jìn)行了深入的研究,提出了相應(yīng)的解決方案。本文的主要工作和創(chuàng)新點(diǎn)如下:1.研究了智能電網(wǎng)中用戶多維測(cè)量數(shù)據(jù)隱私保護(hù)問題,設(shè)計(jì)了一種基于云的用戶數(shù)據(jù)快速安全查詢機(jī)制(第二章)智能電網(wǎng)快速發(fā)展導(dǎo)致測(cè)量數(shù)據(jù)的井噴式爆發(fā),給電力公司帶來了沉重的負(fù)擔(dān)。如何進(jìn)行安全高效且保護(hù)用戶隱私的多維測(cè)量數(shù)據(jù)查詢是智能電網(wǎng)面臨的嚴(yán)峻問題。因此,本文提出了一個(gè)保護(hù)隱私的多維測(cè)量數(shù)據(jù)查詢機(jī)制并在hadoop分布式環(huán)境下用Mapreduce程序?qū)崿F(xiàn)了原型系統(tǒng)。在本文所提出的查詢機(jī)制中,多維測(cè)量數(shù)據(jù)以密文的形式存放在云服務(wù)器中,為了在保護(hù)用戶隱私的同時(shí)提高數(shù)據(jù)的可用性,查詢者通過本文設(shè)計(jì)的搜索算法可以獲得前K個(gè)最相似數(shù)據(jù)的ID。對(duì)于搜索結(jié)果,為了加強(qiáng)數(shù)據(jù)所有者對(duì)數(shù)據(jù)的控制,本文使用一種改進(jìn)的基于屬性的密文策略加密方法實(shí)現(xiàn)對(duì)數(shù)據(jù)的訪問控制,只有滿足特定屬性的查詢者才能計(jì)算出數(shù)據(jù)密文的密鑰從而獲得所查詢的數(shù)據(jù)。安全分析表明本文提出的查詢機(jī)制可以有效保護(hù)測(cè)量數(shù)據(jù)的機(jī)密性以及用戶的隱私。通過對(duì)測(cè)試數(shù)據(jù)進(jìn)行實(shí)驗(yàn)表明該機(jī)制在保證不損失搜索質(zhì)量的情況下,能夠較大的縮短搜索時(shí)間和提高搜索效率,使其更適合于智能電網(wǎng)中的海量多維測(cè)量數(shù)據(jù)搜索。2.研究了智能電網(wǎng)中電車用戶的隱私問題,設(shè)計(jì)了電車到電網(wǎng)(V2G)中具有可控鏈接和保護(hù)隱私屬性的安全通信模型(第三章)V2G是智能電網(wǎng)的重要組成部分,能極大提高電網(wǎng)的效率和促進(jìn)清潔能源的應(yīng)用,然而參與V2G用戶的隱私問題卻沒有得到很好的解決,制約著V2G的進(jìn)一步發(fā)展。本文針對(duì)V2G中用戶的隱私保護(hù)與V2G管理者調(diào)度優(yōu)化之間的矛盾,設(shè)計(jì)了具有可控鏈接和保護(hù)隱私屬性的安全通信模型。為了保護(hù)電動(dòng)汽車用戶的敏感數(shù)據(jù),我們基于隱藏向量加密的查詢謂詞方法設(shè)計(jì)了用戶信息查詢方案,使得V2G管理者可以在不獲取用戶確切敏感數(shù)據(jù)的情況下對(duì)電動(dòng)汽車進(jìn)行充放電調(diào)度。另外,V2G操作者可以通過鏈接服務(wù)器根據(jù)實(shí)際需求對(duì)用戶參與V2G的情況進(jìn)行匿名統(tǒng)計(jì),并可向可信授權(quán)申請(qǐng)對(duì)破壞V2G系統(tǒng)的惡意用戶進(jìn)行追蹤。安全分析表明,本文提出的模型可以有效地保護(hù)用戶身份和位置隱私、狀態(tài)信息隱私。性能分析表明,該模型的計(jì)算開銷和通信開銷都比較適中,完全適用于V2G系統(tǒng)中。3.研究了智能電網(wǎng)中監(jiān)測(cè)控制和數(shù)據(jù)采集(SCADA)系統(tǒng)的安全可靠組通信問題,提出了一種高效的自愈群組密鑰管理機(jī)制(第四章)本文根據(jù)智能電網(wǎng)中SCADA系統(tǒng)的實(shí)時(shí)性、資源受限性等特點(diǎn),提出了一種高效的自愈組密鑰管理機(jī)制。通過巧妙構(gòu)造的自愈結(jié)構(gòu),本文所提機(jī)制可以保證系統(tǒng)在設(shè)備出現(xiàn)故障的情況下仍然能夠繼續(xù)安全運(yùn)行。群組密鑰的前向安全性和后向安全性由雙向哈希鏈所保證。安全分析表明本文所提出的密鑰管理機(jī)制能夠滿足組密鑰的安全需求,并且具有動(dòng)態(tài)撤銷被俘獲節(jié)點(diǎn)、抗同謀攻擊等特性。性能分析表明該機(jī)制的存儲(chǔ)開銷和通信開銷都比較適中,能夠滿足SCADA系統(tǒng)中的性能要求。4.研究了智能電網(wǎng)數(shù)據(jù)采集端的安全組通信問題,基于邏輯路由樹提出了一種高效的組密鑰管理機(jī)制(第五章)針對(duì)負(fù)責(zé)智能電網(wǎng)中的重要設(shè)備與關(guān)鍵線路數(shù)據(jù)采集的無線傳感器網(wǎng)絡(luò),本文提出了一種基于分層和分簇的安全并可擴(kuò)展的組密鑰管理機(jī)制。根據(jù)通信安全需求的不同,本文根據(jù)無線傳感器網(wǎng)絡(luò)的路由拓?fù)浞謩e為簇頭和簇成員設(shè)計(jì)了兩種密鑰管理方案。在本文提出的密鑰管理機(jī)制中,由于一個(gè)層或簇中位置相鄰的節(jié)點(diǎn)共享相同的密鑰加密密鑰,密鑰更新的開銷可以顯著降低,此外,懶惰更新策略的應(yīng)用進(jìn)一步降低了密鑰更新的開銷。在本文提出的密鑰管理機(jī)制中,每個(gè)節(jié)點(diǎn)只需要存儲(chǔ)少量的密鑰,密鑰存儲(chǔ)開銷很低,滿足傳感器節(jié)點(diǎn)存儲(chǔ)空間有限的要求。安全分析表明該機(jī)制從密鑰建立階段至密鑰更新都滿足組密鑰管理方案的安全需求,并可以有效降低女巫攻擊、Rep拒絕服務(wù)和節(jié)點(diǎn)俘獲攻擊的危害。仿真結(jié)果表明,在成員節(jié)點(diǎn)變化很大的情況下,該機(jī)制可以極大地減少密鑰更新時(shí)的能量消耗,因此可以延長(zhǎng)整個(gè)網(wǎng)絡(luò)的生命周期,具有很好的可拓展性。綜上所述,本文針對(duì)智能電網(wǎng)中用戶隱私問題和關(guān)鍵設(shè)備安全組通信問題這兩大關(guān)鍵技術(shù)難題提出新的解決方案,并且從性能開銷和安全性兩個(gè)方面保證了本文所提出算法的有效性。
[Abstract]:With the rapid development of information and communication technology, all countries such as China, the United States, Canada and other countries are upgrading the old power system to smart grid. The smart grid has the characteristics of two-way communication, high reliability, real-time demand response, self-healing and user participation. It has high research value and application value. It is one of the key problems in the design and Realization of smart grid, which directly affects the normal operation of smart grid and the acceptance of smart grid technology. From the components of the smart grid, the distribution region and the design object, the smart grid is a very complex system. With the deployment of smart grid throughout the world, the more it is deployed, the more the smart grid is deployed in the world The more security and privacy issues are exposed. Because of the complexity of the smart grid and the application of new technology, the traditional security and privacy protection mechanism cannot be applied directly, and the new protection mechanism is urgently needed to solve these problems. On the basis of systematic research on the security of smart grid and privacy protection, this paper aims at the smart grid. The emerging security and privacy issues: network users' privacy issues and key device group communication problems, carry out in-depth research and propose corresponding solutions. The main work and innovation points of this paper are as follows: 1. the problem of user multi-dimensional measurement data privacy protection in smart grid is studied, and a kind of user data based on cloud is designed. Quick security query mechanism (second chapter) the rapid development of smart grid leads to blowout of measured data, which brings heavy burden to power companies. How to carry out multidimensional data query that is safe and efficient and to protect users' privacy is a serious problem facing smart grid. Therefore, this paper proposes a multi-dimensional measurement for privacy protection. The data query mechanism is implemented with Mapreduce program in the Hadoop distributed environment. In the query mechanism proposed in this paper, the multidimensional measurement data is stored in the cloud server in the form of ciphertext. In order to protect the user's privacy and improve the availability of the data, the query can be obtained through the search algorithm designed in this paper. In order to strengthen the data owner's control of the data, the ID. of the most similar data of the most similar K data is used to control the data. In this paper, an improved attribute based cipher strategy encryption method is used to control the data access control. Only the query that satisfies the specific attribute can calculate the data of the ciphertext to obtain the query data. The full analysis shows that the query mechanism proposed in this paper can effectively protect the confidentiality of the measured data and the privacy of the users. Experiments on the test data show that the mechanism can greatly shorten the search time and improve the search efficiency without losing the quality of the search, so that it is more suitable for the mass in the smart grid. .2. to study the privacy of tramcar users in smart grid and design a secure communication model with controlled links and protection of privacy in the power grid (V2G). V2G is an important part of the smart grid. It can greatly improve the efficiency of the power grid and promote the application of clean energy. However, V2G is involved in the V2G use. The privacy problem of the household has not been solved well, which restricts the further development of V2G. In this paper, a secure communication model with controllable link and privacy protection is designed to protect the sensitive data of the electric vehicle users, based on the hidden direction in order to protect the sensitive data of the electric vehicle users. The user information query scheme is designed by the amount of encrypted query predicate, which enables the V2G manager to charge and discharge the electric vehicle without obtaining the exact sensitive data of the user. In addition, the V2G operator can make anonymous statistics of the user's reference to the V2G according to the actual requirements and can be trusted to be trusted. The application of authorization to trace the malicious users that destroy the V2G system. Security analysis shows that the proposed model can effectively protect the user's identity and location privacy and state information privacy. The performance analysis shows that the computational overhead and communication overhead of the model are relatively moderate, and are fully applicable to the study of the smart grid in the V2G system by.3.. The security and reliability group communication problem of the measurement control and data acquisition (SCADA) system, a efficient self-healing group key management mechanism (fourth chapter) is proposed in this paper. Based on the characteristics of the real-time and resource constraints of the SCADA system in the smart grid, a efficient self-healing group key management mechanism is proposed. The proposed mechanism can ensure that the system can continue to operate safely when the equipment fails. The forward security and backward security of the group key are guaranteed by the two-way hash chain. The security analysis shows that the key management mechanism proposed in this paper can satisfy the security requirements of the group key and has dynamic revocation and capture. The performance analysis shows that the memory overhead and communication overhead of the mechanism are moderate, and can meet the performance requirements of the SCADA system..4. studies the security group communication problem in the data acquisition terminal of the smart grid. A high effective group key management mechanism (fifth chapter) based on the logical routing tree is proposed. In this paper, a secure and extensible group key management mechanism based on hierarchical and clustering is proposed in this paper. According to the different requirements of communication security, this paper designs two kinds of cluster heads and cluster members according to the Lu Youtuo flutter of wireless sensor networks. In the key management scheme, in the key management mechanism proposed in this paper, the cost of key update can be reduced significantly due to the sharing of the same key encryption key in one layer or the adjacent nodes in the cluster. In addition, the application of lazy update strategy further reduces the opening of the key update. In the key management mechanism proposed in this paper, each section The point only needs to store a small number of keys, and the key storage cost is very low to meet the limited storage space requirements of the sensor nodes. Security analysis shows that the mechanism meets the security requirements of the group key management scheme from the key establishment stage to the key update, and can effectively reduce the harm of witch attack, Rep denial of service and node capture attack. The simulation results show that the mechanism can greatly reduce the energy consumption of key update when the member nodes have great changes. Therefore, it can extend the life cycle of the whole network and have good expansibility. In summary, this paper focuses on the two major problems of the privacy problems of the users and the communication problems of the key equipment security groups in the smart grid. The key technical problems put forward new solutions, and guaranteed the effectiveness of the proposed algorithm from two aspects of performance overhead and security.
【學(xué)位授予單位】:國(guó)防科學(xué)技術(shù)大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TM76;TP309
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 謝開;劉永奇;朱治中;于爾鏗;;面向未來的智能電網(wǎng)[J];中國(guó)電力;2008年06期
2 王方方;高賜威;;智能電網(wǎng)的技術(shù)內(nèi)容及比較[J];高科技與產(chǎn)業(yè)化;2009年05期
3 肖世杰;;構(gòu)建中國(guó)智能電網(wǎng)技術(shù)思考[J];電力系統(tǒng)自動(dòng)化;2009年09期
4 ;“智能電網(wǎng)技術(shù)”專欄征稿啟事[J];電力建設(shè);2009年05期
5 十方;;歐美智能電網(wǎng)戰(zhàn)略計(jì)劃[J];中外能源;2009年06期
6 ;終結(jié)大停電的智能電網(wǎng)[J];天津電力技術(shù);2009年02期
7 余紅光;;“隨需應(yīng)變”的智能電網(wǎng)[J];中國(guó)電力企業(yè)管理;2009年12期
8 本刊編輯部;;國(guó)外智能電網(wǎng)研究與應(yīng)用[J];華北電力技術(shù);2009年06期
9 陳春霖;陳琰;;信息化服務(wù)“智能電網(wǎng)”的初步探索[J];華東電力;2009年06期
10 苗新;張愷;陳希;章欣;孫聲波;吳國(guó)良;周昭茂;田世明;李建歧;;建設(shè)智能電網(wǎng)的發(fā)展對(duì)策[J];電力建設(shè);2009年06期
相關(guān)會(huì)議論文 前10條
1 金之儉;;國(guó)家能源智能電網(wǎng)研發(fā)中心建設(shè)簡(jiǎn)介[A];2010電工測(cè)試技術(shù)學(xué)術(shù)交流會(huì)論文集[C];2010年
2 劉俊;;智能電網(wǎng)統(tǒng)計(jì)指標(biāo)研究[A];2010電工測(cè)試技術(shù)學(xué)術(shù)交流會(huì)論文集[C];2010年
3 王銳;謝蘭;吳文凱;楊昆;;智能電網(wǎng)及其發(fā)展態(tài)勢(shì)分析[A];2010年西南三省一市自動(dòng)化與儀器儀表學(xué)術(shù)年會(huì)論文集[C];2010年
4 張熹;;智能電網(wǎng)配用電通信技術(shù)的現(xiàn)在時(shí)與將來時(shí)[A];2011電力通信管理暨智能電網(wǎng)通信技術(shù)論壇論文集[C];2011年
5 魏林;李博;李楊;;智能電網(wǎng)發(fā)展現(xiàn)狀及探討[A];重慶市電機(jī)工程學(xué)會(huì)2010年學(xué)術(shù)會(huì)議論文集[C];2010年
6 王雁雄;;新加坡智能電網(wǎng)技術(shù)對(duì)大理智能電網(wǎng)建設(shè)的啟示[A];戰(zhàn)略性新興產(chǎn)業(yè)的培育和發(fā)展——首屆云南省科協(xié)學(xué)術(shù)年會(huì)論文集[C];2011年
7 錢澤文;王克儉;;淺析智能電網(wǎng)建設(shè)輸電環(huán)節(jié)的關(guān)鍵技術(shù)[A];2011年通信與信息技術(shù)新進(jìn)展——第八屆中國(guó)通信學(xué)會(huì)學(xué)術(shù)年會(huì)論文集[C];2011年
8 汪永華;汪鳳鳳;;面向21世紀(jì)的我國(guó)統(tǒng)一堅(jiān)強(qiáng)智能電網(wǎng)及應(yīng)用[A];2011年安徽省智能電網(wǎng)技術(shù)論壇論文集[C];2011年
9 王正風(fēng);高濤;;智能電網(wǎng)及國(guó)內(nèi)外發(fā)展概述[A];2011年安徽省智能電網(wǎng)技術(shù)論壇論文集[C];2011年
10 楊勁松;;智能電網(wǎng)的進(jìn)展及關(guān)鍵技術(shù)的綜述[A];2011年安徽省智能電網(wǎng)技術(shù)論壇論文集[C];2011年
相關(guān)重要報(bào)紙文章 前10條
1 張燕華;智能電網(wǎng)提升電網(wǎng)控制與管理能力[N];國(guó)家電網(wǎng)報(bào);2007年
2 陸振華;智能電網(wǎng)的“數(shù)字化魔法”[N];21世紀(jì)經(jīng)濟(jì)報(bào)道;2008年
3 本報(bào)記者 包鵬;就智能電網(wǎng)領(lǐng)域合作達(dá)成共識(shí)[N];華東電力報(bào);2008年
4 本報(bào)記者 張琦;“智能電網(wǎng)”引發(fā)科技界委員集體關(guān)注[N];科技日?qǐng)?bào);2009年
5 劉姝池;美國(guó):“智能電網(wǎng)”能效高[N];中國(guó)煤炭報(bào);2009年
6 本報(bào)記者 魏宗凱;智能電網(wǎng)——離中國(guó)有多遠(yuǎn)[N];經(jīng)濟(jì)參考報(bào);2009年
7 國(guó)家電力監(jiān)管委員會(huì)首席工程師 顧峻源;我國(guó)應(yīng)大力發(fā)展智能電網(wǎng)[N];中國(guó)電力報(bào);2009年
8 本報(bào)評(píng)論員;智能電網(wǎng) 路徑新?lián)馵N];中國(guó)電力報(bào);2009年
9 中國(guó)能源網(wǎng)CIO 韓曉平 本報(bào)記者 顏新華 成都電業(yè)局黨委書記、副局長(zhǎng) 左宇龍;我們?yōu)槭裁葱枰悄茈娋W(wǎng)[N];中國(guó)電力報(bào);2009年
10 廣州萬隆;智能電網(wǎng)投資機(jī)會(huì)正在發(fā)酵[N];證券日?qǐng)?bào);2009年
相關(guān)博士學(xué)位論文 前10條
1 周黎莎;智能電網(wǎng)低碳效益關(guān)鍵指標(biāo)選取與評(píng)價(jià)模型研究[D];華北電力大學(xué);2013年
2 黃立新;智能電網(wǎng)條件下輸電檢修優(yōu)化模式與實(shí)施方案研究[D];華北電力大學(xué);2013年
3 蘆翔;智能電網(wǎng)中安全可靠的通信系統(tǒng)的構(gòu)建[D];西安電子科技大學(xué);2013年
4 李乾;智能電網(wǎng)中的通信網(wǎng)絡(luò)資源管理關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2015年
5 黎春nf;大型工業(yè)企業(yè)智能電網(wǎng)構(gòu)建研究[D];華中科技大學(xué);2012年
6 曲朝陽;智能電網(wǎng)知識(shí)可視化引擎的研究[D];華北電力大學(xué)(河北);2010年
7 畢艷冰;面向智能電網(wǎng)的通信中間件的關(guān)鍵技術(shù)研究[D];山東大學(xué);2013年
8 魏亞楠;智能電網(wǎng)中多種發(fā)電模式聯(lián)合調(diào)度模型及效益評(píng)價(jià)研究[D];華北電力大學(xué);2014年
9 孫偉卿;智能電網(wǎng)規(guī)劃與運(yùn)行控制的柔性評(píng)價(jià)及分析方法[D];上海交通大學(xué);2013年
10 郭皓池;智能電網(wǎng)中基于負(fù)荷分析的需求側(cè)管理體系發(fā)展研究[D];華北電力大學(xué);2014年
相關(guān)碩士學(xué)位論文 前10條
1 戴菲;智能電網(wǎng)融資模式及優(yōu)化研究[D];上海交通大學(xué);2013年
2 程璐;基于配電網(wǎng)改造的智能電網(wǎng)投融資模式研究[D];北京交通大學(xué);2010年
3 于俊濤;惠州智能電網(wǎng)用戶側(cè)營(yíng)配一體化發(fā)展研究[D];華南理工大學(xué);2010年
4 荊超;智能電網(wǎng)用戶端能源管理框架及關(guān)鍵技術(shù)研究[D];上海交通大學(xué);2011年
5 胡學(xué)忠;智能電網(wǎng)技術(shù)在用電營(yíng)銷中的應(yīng)用研究[D];浙江大學(xué);2012年
6 周珊;Z市智能電網(wǎng)項(xiàng)目建設(shè)管理研究[D];山東大學(xué);2012年
7 姚道香;我國(guó)智能電網(wǎng)建設(shè)中的政府作用研究[D];廣西大學(xué);2012年
8 楊真華;智能電網(wǎng)數(shù)據(jù)處理與應(yīng)用研究[D];湖南大學(xué);2011年
9 于翔;揚(yáng)州智能電網(wǎng)信息平臺(tái)的安全防護(hù)研究[D];華北電力大學(xué);2012年
10 孫琳珂;智能電網(wǎng)信息資源規(guī)劃與管理研究[D];武漢紡織大學(xué);2013年
,本文編號(hào):1844824
本文鏈接:http://www.sikaile.net/kejilunwen/dianlilw/1844824.html