{"title":"Data Security and Encryption Technology Research on Smart Grid Communication System","authors":"Wenhao Zhu, Qiyi Guo","doi":"10.1109/ICMTMA.2016.52","DOIUrl":null,"url":null,"abstract":"This paper studies the system structure of smart distribution grid. It establishes group communication model according to the structure characteristics of smart distribution grid. Based on the analysis on information security of smart distribution grid, integrated with cryptography theory we design a security group communication scheme. The scheme adopt the method of hierarchical group key management, which can achieves identity authentication and message integrity authentication during the group key generation process. It effectively avoids the behavior such as illegal access, eavesdropping and camouflage. The experiment provides the security analysis and performance analysis of our scheme. The simulation results show the scheme in this paper is technically feasible.","PeriodicalId":318523,"journal":{"name":"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA.2016.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
This paper studies the system structure of smart distribution grid. It establishes group communication model according to the structure characteristics of smart distribution grid. Based on the analysis on information security of smart distribution grid, integrated with cryptography theory we design a security group communication scheme. The scheme adopt the method of hierarchical group key management, which can achieves identity authentication and message integrity authentication during the group key generation process. It effectively avoids the behavior such as illegal access, eavesdropping and camouflage. The experiment provides the security analysis and performance analysis of our scheme. The simulation results show the scheme in this paper is technically feasible.