Jinyu Xu, Tianhao Yu, Xuesong Shao, Qi Li, Kun Shi
{"title":"居民与电网交互通信信息安全研究","authors":"Jinyu Xu, Tianhao Yu, Xuesong Shao, Qi Li, Kun Shi","doi":"10.1109/EI256261.2022.10116698","DOIUrl":null,"url":null,"abstract":"In order to restrain security risk in interactive communication between residents and power grid, this article designs a set of communication security scheme that does not rely on ESAM. First, analyzes the security issue in interactive communication between residents and power grid. Second, hierarchical authentication and data object access authority control mechanisms are designed to safeguard data access security. Third, the communication security scheme for public network and private network is designed. Encryption key transmission flow is also designed. This scheme is of great significance in guiding communication security between residents and power grid and the secure access of downstream equipment.","PeriodicalId":413409,"journal":{"name":"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)","volume":"591 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Interactive Communication Information Security between Residents and Power Grid\",\"authors\":\"Jinyu Xu, Tianhao Yu, Xuesong Shao, Qi Li, Kun Shi\",\"doi\":\"10.1109/EI256261.2022.10116698\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to restrain security risk in interactive communication between residents and power grid, this article designs a set of communication security scheme that does not rely on ESAM. First, analyzes the security issue in interactive communication between residents and power grid. Second, hierarchical authentication and data object access authority control mechanisms are designed to safeguard data access security. Third, the communication security scheme for public network and private network is designed. Encryption key transmission flow is also designed. This scheme is of great significance in guiding communication security between residents and power grid and the secure access of downstream equipment.\",\"PeriodicalId\":413409,\"journal\":{\"name\":\"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)\",\"volume\":\"591 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EI256261.2022.10116698\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EI256261.2022.10116698","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Interactive Communication Information Security between Residents and Power Grid
In order to restrain security risk in interactive communication between residents and power grid, this article designs a set of communication security scheme that does not rely on ESAM. First, analyzes the security issue in interactive communication between residents and power grid. Second, hierarchical authentication and data object access authority control mechanisms are designed to safeguard data access security. Third, the communication security scheme for public network and private network is designed. Encryption key transmission flow is also designed. This scheme is of great significance in guiding communication security between residents and power grid and the secure access of downstream equipment.