Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Aggregation method and system for electricity privacy and integrity protection in smart grid

An integrity protection, smart grid technology, applied in transmission systems, digital transmission systems, digital data protection, etc., can solve the problems of fuzzy data characteristics, inability to accurately locate data integrity, and poor operability.

Active Publication Date: 2018-10-12
杭州云渊盛旅科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the inherent flaws of the technology used, the characteristics of suspicious data cannot be accurately described and defined
Therefore, the system cannot accurately judge the time point of starting and executing the incremental verification digital signature system with huge calculation and communication overhead; moreover, due to the ambiguity of suspicious data characteristics, the actual operability is poor, and experiments show that it cannot be used in many scenarios. Effectively pinpoint (often misjudged or missed) potential data integrity attacks
[0008] (3) In this system, when the power control center checks suspicious data, it can obtain the plain text data of each user's power consumption by starting the data integrity check program, which cannot effectively prevent the power control center from abusing authority, so it cannot be technically Protect user's private information
However, this method is not effective against collusion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Aggregation method and system for electricity privacy and integrity protection in smart grid
  • Aggregation method and system for electricity privacy and integrity protection in smart grid
  • Aggregation method and system for electricity privacy and integrity protection in smart grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be further described in detail below in combination with specific embodiments.

[0068] An aggregation method for electricity privacy and integrity protection in a smart grid, in which the smart meter installed in the user records and reports the user's electricity consumption in real time; the gateway with computing power is responsible for the data aggregation function and relay function ;The control center is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services; the trusted center is responsible for managing the entire system, the specific steps are as follows:

[0069] System initialization phase:

[0070] 1) The trusted center runs the following algorithm Gen(k) according to the input security parameter k to obtain the parameter , where q is a large safe prime of length k, and chooses the generator of the group G1 ;

[0071] Gen(k): Select two cyclic group...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a combining method and system for protecting power utilization privacy and integrity in a smart power grid. According to the method, a smart electric meter arranged for a user is used for recording and reporting the power consumption of the user in real time; a gateway having computing capability is responsible for a data combining function and a relay function; a control center is used for collecting, processing and analyzing the real-time power consumption data of each user, and providing reliable services; a credible center is used for managing a whole system. The method comprises a system initialization stage (1), a user data reporting stage (2), a security data combining stage (3) and combined data recovery extremism (4). By adopting the combining method and system, a safe data combining system is implemented, and the power utilization privacy of the user is protected; meanwhile, the integrity of data is ensured, namely, data communication errors are detected and reported technically, the user is prevented from reporting illegally with a false name, and the reported power consumption is prevented from being illegally captured, modified, faked and the like.

Description

technical field [0001] The invention belongs to the technical field of smart grids, and in particular relates to an aggregation method and system for electricity privacy and integrity protection in smart grids. Background technique [0002] In the field of smart grid technology, Peng Liu et al. proposed a data aggregation scheme based on the network topology association mechanism, which can effectively collect the electricity consumption of users. First, by designing a data aggregation tree, the power control center can collect the power consumption of all users from bottom to top. Secondly, by adopting homomorphic encryption technology, each node in the tree can aggregate the data of all its child nodes in the ciphertext space, thus protecting the user's privacy without revealing the plaintext of the user's power consumption. However, in the smart grid application system, in the application scenarios of accidental data communication errors and malicious tampering of commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00G06F17/30H04L9/08G06F21/60G06F21/64
CPCY02D10/00
Inventor 鲍海勇陆荣幸陈乐曹珍富董晓蕾
Owner 杭州云渊盛旅科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products