全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电网技术  2014 

面向用电信息采集系统的双向认证协议

DOI: 10.13335/j.1000-3673.pst.2014.09.003, PP. 2328-2335

Keywords: 用电信息采集,数字签名,形式化分析,去同步攻击,有色Petri网,安全性分析

Full-Text   Cite this paper   Add to My Lib

Abstract:

用电信息采集系统涉及计费信息、居民用电隐私等核心数据,对数据的产生、传输及存储等方面具有较高的保密性、完整性和可用性需求。基于国家电网公司的认证授权(certificateauthority,CA)系统,利用数字签名和挑战应答思想,并结合MAC动态密钥协商及签名校验,提出一种适用于用电信息采集系统的双向认证协议。利用非形式化方法和基于有色Petri网理论的形式化分析方法对提出的协议进行了状态转移分析和安全性论证,证明该协议在能够成功达到预期运行状态的前提下满足多重认证、前向安全及后向安全等安全属性,此外该协议能够在有效抵抗伪造、恶意重放及去同步攻击的情况下实时高效地完成实体认证和动态密钥协商。最后,对该协议在用电信息采集系统中的适用性及有效性进行了分析。

References

[1]  胡炎,董明垂.用SSL协议加强电力系统网络应用的安全性[J].电力系统自动化,2002,26(15):70-77.
[2]  Hu Yan,Dong Mingchui.Strengthening the security of network applications with SSL protocol[J].Automation of Electric Power Systems,2002,26(15):70-77(in Chinese).
[3]  邱治国.一类SSL加密算法的攻击[D].济南:山东大学,2007.
[4]  Kim M,Kim K.A new identification scheme based on the bilinear Diffie-Hellman group[C]//7th Australasian Conference on Information Security and Privacy,ACISP 2002.Melboume,Australia:Deakin University and iCORE,Alberta,Canada and the Australian Computer Society,2002:362-378.
[5]  冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学E辑,2007,37(2):223-237.
[6]  GB15629.11—2003无线局域网媒体访问控制和物理层规范[S].
[7]  Sui A,Hui L,Yiu S,et al.An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication[C]//IEEE Wireless and Communications and Networking Conference,WCNC 2005.New ORLEANS,LA USA:IEEE Communications Society,2005:88-93.
[8]  赵兵,高欣,郜盼盼,等.适用于用电信息采集的轻量级认证密钥协商协议[J].电力系统自动化,2013,37(10):10-16.
[9]  Zhao Bing,Gao Xin,Gao Panpan,et al.A lightweight authenticated protocol with key agreement for power utilization information collecting[J].Automation of Electric Power Systems,2013,37(10):10-16(in Chinese).
[10]  杨寅,关佶红,田涛.一种基于国密SM1算法的CPU卡多应用解决方案[J].计算机科学,2011,1:16-26.
[11]  Yang Yin,Guan Jihong,Tian Tao.A CPU card solution based on the SM1 cryptographic algorithm for multi-applications[J].Computer Science,2011,1:16-26(in Chinese).
[12]  薛锐.冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20.
[13]  Xue Rui,Feng Dengguo.The approaches and technologies for formal verification of security protocols[J].Chinese Journal of Computers,2006,29(1):1-20(in Chinese).
[14]  GaoLijun,Ma Maode,Shu Yantai,et al.A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems[J].Wireless Personal Communications,2013,68(4):1943-1959.
[15]  Peris-Lopez,Hernandez-Castro P,Tapiador J C,et al.Advances in ultralightweight cryptography for low-cost RFID tags:Gossamer protocol[C]//9th International workshop,WISA 2008.Jeju Island,Korea:University Trier,2008:23-25.
[16]  Sun Hung-Min,Ting Wei-Chih,Wang King-Hang.On the security of Chien’s ultralightweight RFID authentication protocol[J].IEEE Transactions on Dependable and Secure Computing,2011,2(8):315-317.
[17]  杨成月.基于物联网与空间信息技术的电网应急指挥系统[J].电网技术,2013,37(6):1632-1638.
[18]  Yang Chengyue.Power grid emergency command system based on internet of things and spatial information technologies[J].Power System Technology,2013,37(6):1632-1638(in Chinese).
[19]  路保辉,马永红.智能电网AMI通信系统及其数据安全策略研究[J].电网技术,2013,37(8):2244-2249.
[20]  Lu Baohui,Ma Yonghong.Research on communication system of advanced metering infrastructure for smart grid and its data security measures[J].Power System Technology,2013,37(8):2244-2249(in Chinese).
[21]  朱征,顾中坚,吴金龙,等.云计算在电力系统数据灾备业务中的应用研究[J].电网技术,2012,36(9):44-50.
[22]  Zhu Zheng,Gu Zhongjian,Wu Jinlong,et al.Application of cloud computing in electric power system data recovery[J].Power System Technology,2012,36(9):44-50(in Chinese).
[23]  宋新立,汤涌,卜广全,等.大电网安全分析的全过程动态仿真技术[J].电网技术,2008,32(22):23-28.
[24]  Song Xinli,Tang Yong,Bu Guangquan,et al.Full dynamic simulation for the stability analysis of large power system[J].Power System Technology,2008,32(22):23-28(in Chinese).
[25]  徐茹枝,王宇飞.面向电力信息网络的安全态势感知研究[J].电网技术,2013,37(1):53-57.
[26]  XuRuzhi,Wang Yufei.A study on electric power information network-oriented security situation awareness[J].Power System Technology,2013,37(1):53-57(in Chinese).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133