期刊文献+

基于NB-IOT的孤岛式微电网密钥协商协议研究 被引量:10

Research on key agreement protocol for isolated microgrid based on NB-IOT
下载PDF
导出
摘要 针对当前日益突出的电力系统网络安全问题,尤其是较容易接近的孤岛式微电网,在基于公钥密码系统的双方密钥协商协议基础上,设计了孤岛式微电网密钥协商协议。在该微电网中,考虑到监测终端的覆盖范围广、深的要求,采用NB-IOT技术进行通信。然后对该密钥协商协议进行了安全性分析、关键代码的实现与仿真。在大量的实验数据分析下得出密钥协商三个阶段分别只需要40 ms、23 ms和4 ms的计算时间,证明了该协议可以高效快速地实现双方的身份认证与密钥的协商,防止数据篡改、重放、伪造等攻击。 Aiming at the prominent network security problems of electric power system,especially the islanded microgrid,based on key agreement protocol between two parties of public key cryptosystem,a key agreement protocol is designed for islanded microgrid.Considering the requirement of wide and deep monitoring terminals coverage,the NB-IOT is used to communicate.Then the security of the key agreement protocol is analyzed.Besides,the key code is implemented and simulated.Lastly,a large number of experimental data analysis show that the three stages of key agreement only need 40 milliseconds,23 milliseconds and 4 milliseconds,respectively.Therefore,the protocol can efficiently and quickly realize the identity authentication and key negotiation between two parties to prevent data tampering,replay,forgery attack and so on.
作者 康文洋 汤鹏志 左黎明 张捧 KANG Wenyang;TANG Pengzhi;ZUO Liming;ZHANG Peng(School of Science,East China Jiaotong University,Nanchang 330013,China;Institute of Systems Engineering and Cryptography,East China Jiaotong University,Nanchang 330013,China)
出处 《电力系统保护与控制》 EI CSCD 北大核心 2020年第5期119-126,共8页 Power System Protection and Control
基金 江西省教育厅科技项目(GJJ180323) 江西省学位与研究生教育教学改革研究项目(JXYJG-2018-095) 江西省研究生创新项目(YC2018-S250) 大学生创新创业训练计划项目(201810404003)~~
关键词 微电网 NB-IOT 密钥协商协议 公钥密码学 数字签名 microgrid NB-IOT key agreement protocol public key cryptography digital signature
  • 相关文献

参考文献8

二级参考文献82

  • 1樊东亮,霍利民.基于GPRS的农村配网自动化方案设计[J].农机化研究,2012,34(5):208-211. 被引量:6
  • 2朱良根,张玉清,雷振甲.DoS攻击及其防范[J].计算机应用研究,2004,21(7):82-84. 被引量:20
  • 3冯永青,吴文传,孙宏斌,张伯明,何云良,相年德,郭琦,王刚,吕颖.现代能量控制中心的运行风险评估研究初探[J].中国电机工程学报,2005,25(13):73-79. 被引量:67
  • 4冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 5Chaum D, Van Antwerpen H. Undeniable signatures [C] // Proceedings of the Advances in Cryptology (CRYPTO' 89). Berlin: Springer-Verlag, 1990.. 212- 216.
  • 6National Institute of Standards and Technology. NIST FIPS PUB186 Digital signature standard[S]. Depart ment of Commerce, NIST, 1994.
  • 7Goldwasser S, Micali S, Rackof f C. The knowledge com-plexity of interact ive proof-systems [C]//Pro- ceedings of the 17th Annual ACM Symposium on The ory of Comput-ing. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 1985: 291- 304.
  • 8Schnorr C P. Efficient signature generation for smart cards[J]. Advances in cryptology-crypto'89 proceed- ings, Springer-Verlag, 1991: 239-252.
  • 9Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Trans on Info Theroy, 1985,31(4):469-472.
  • 10Wang Xiao yun, Yu Hong-bo. How to break MD5 and other hash functions[C] ffCramer tL LNCS 3494: Ad vances in Cr-yptology-EURCK;RYPT, 2005. [ S. 1]: Shrinker. 2005,19-35.

共引文献375

同被引文献132

引证文献10

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部