Jinyu Xu, Tianhao Yu, Xuesong Shao, Qi Li, Kun Shi
{"title":"Research on Interactive Communication Information Security between Residents and Power Grid","authors":"Jinyu Xu, Tianhao Yu, Xuesong Shao, Qi Li, Kun Shi","doi":"10.1109/EI256261.2022.10116698","DOIUrl":null,"url":null,"abstract":"In order to restrain security risk in interactive communication between residents and power grid, this article designs a set of communication security scheme that does not rely on ESAM. First, analyzes the security issue in interactive communication between residents and power grid. Second, hierarchical authentication and data object access authority control mechanisms are designed to safeguard data access security. Third, the communication security scheme for public network and private network is designed. Encryption key transmission flow is also designed. This scheme is of great significance in guiding communication security between residents and power grid and the secure access of downstream equipment.","PeriodicalId":413409,"journal":{"name":"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)","volume":"591 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EI256261.2022.10116698","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to restrain security risk in interactive communication between residents and power grid, this article designs a set of communication security scheme that does not rely on ESAM. First, analyzes the security issue in interactive communication between residents and power grid. Second, hierarchical authentication and data object access authority control mechanisms are designed to safeguard data access security. Third, the communication security scheme for public network and private network is designed. Encryption key transmission flow is also designed. This scheme is of great significance in guiding communication security between residents and power grid and the secure access of downstream equipment.