首页 | 官方网站   微博 | 高级检索  
     

智能电网安全认证架构建模
引用本文:李军.智能电网安全认证架构建模[J].电力信息化,2013,11(7):44-50.
作者姓名:李军
作者单位:国网能源研究院,北京,100052
基金项目:国家电网公司《能源电力发展与公司经营管理综合研究支撑平台》
摘    要:分析并提出了智能电网的网络架构模型、其相应的敌手模型和安全需求,总结了智能电网和物联网相关安全研究现状,在此基础上,针对智能电网中典型安全问题——电力通信设备间匿名认证问题,给出一系列认证协议的设计方案,包括基于散列函数的单向认证、带有伪造检测的基于散列函数的单向认证、防御重放攻击的带有伪造检测的基于散列函数的单向认证,防御重放攻击的带有伪造检测的基于散列函数的双向认证、防御重放攻击的带有伪造检测的基于身份(ID)的双向认证,比较了各种方案的性能,说明了每种方案的设计理由和适用范围。

关 键 词:智能电网安全  网络安全  认证协议  哈希函数

Security Certification Architecture Modeling for Smart Grids
LI Jun.Security Certification Architecture Modeling for Smart Grids[J].Electric Power Information Technology,2013,11(7):44-50.
Authors:LI Jun
Affiliation:LI Jun (State Grid Energy Research Institute, Beijing 100052, China)
Abstract:In this paper, the network security model of smart grids is presented. The adversary models and security requirements are also analyzed. The state-of-the-art of security researches relating smart grids and the Internet of things are also summarized. On this basis, a typical and unsolved brand security problem is pointed out--anonymous authentication in smart grids. A bunch of authentication protocols are designed and proposed, including hash-based authentication, hash-based forgery-detected authentication, hash-based forgery-detected with defending replay attack, hash-based forgery-detected mutual authentication with defending reply attack, and ID-based forgery-detected mutual authentication with defending reply attack. The protocols are compared in performance with design motives and applied scopes given.
Keywords:smart grid security  network security  authentication protocol  hash function
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号