{"title":"智能电网通信系统数据安全与加密技术研究","authors":"Wenhao Zhu, Qiyi Guo","doi":"10.1109/ICMTMA.2016.52","DOIUrl":null,"url":null,"abstract":"This paper studies the system structure of smart distribution grid. It establishes group communication model according to the structure characteristics of smart distribution grid. Based on the analysis on information security of smart distribution grid, integrated with cryptography theory we design a security group communication scheme. The scheme adopt the method of hierarchical group key management, which can achieves identity authentication and message integrity authentication during the group key generation process. It effectively avoids the behavior such as illegal access, eavesdropping and camouflage. The experiment provides the security analysis and performance analysis of our scheme. The simulation results show the scheme in this paper is technically feasible.","PeriodicalId":318523,"journal":{"name":"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Data Security and Encryption Technology Research on Smart Grid Communication System\",\"authors\":\"Wenhao Zhu, Qiyi Guo\",\"doi\":\"10.1109/ICMTMA.2016.52\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper studies the system structure of smart distribution grid. It establishes group communication model according to the structure characteristics of smart distribution grid. Based on the analysis on information security of smart distribution grid, integrated with cryptography theory we design a security group communication scheme. The scheme adopt the method of hierarchical group key management, which can achieves identity authentication and message integrity authentication during the group key generation process. It effectively avoids the behavior such as illegal access, eavesdropping and camouflage. The experiment provides the security analysis and performance analysis of our scheme. The simulation results show the scheme in this paper is technically feasible.\",\"PeriodicalId\":318523,\"journal\":{\"name\":\"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMTMA.2016.52\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA.2016.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Security and Encryption Technology Research on Smart Grid Communication System
This paper studies the system structure of smart distribution grid. It establishes group communication model according to the structure characteristics of smart distribution grid. Based on the analysis on information security of smart distribution grid, integrated with cryptography theory we design a security group communication scheme. The scheme adopt the method of hierarchical group key management, which can achieves identity authentication and message integrity authentication during the group key generation process. It effectively avoids the behavior such as illegal access, eavesdropping and camouflage. The experiment provides the security analysis and performance analysis of our scheme. The simulation results show the scheme in this paper is technically feasible.