Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Potential Function Based Malicious Node Identification Method for Smart Meter System

A smart meter and malicious node technology, applied in the direction of measuring electrical variables, measuring devices, instruments, etc., can solve problems such as attacks, achieve low calculation and additional traffic, high recognition degree, and improve the detection success rate.

Inactive Publication Date: 2015-08-12
YUNNAN POWER GRID CORP TONGFANG TECHCO
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The smart meter system penetrates into thousands of households, and at the same time, it is usually a device with very limited resources. However, the existing malicious node judgment method usually adopts the threshold method, such as figure 1 As shown, the square node is captured by the meter ca i Generated malicious meter cl i , apparently, the captured meter ca i and malicious meter cl i In different locations, waiting for them but only one ID number, for example, malicious electric meter cl 1 and cl 3 is the captured meter ca 1 Generated, if you can know that they are in different locations but have the same ID number, then a malicious node attack called Sybil has occurred

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Potential Function Based Malicious Node Identification Method for Smart Meter System
  • A Potential Function Based Malicious Node Identification Method for Smart Meter System
  • A Potential Function Based Malicious Node Identification Method for Smart Meter System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0029] A potential function-based smart meter system malicious node identification method, it includes the following steps:

[0030] S1: Divide the smart meters in the smart meter system into a test group and a witness group, denoted as test nodes and witness nodes The smart meter in the smart meter system periodically plays the role of the node to be tested and the witness node;

[0031] S2: The witness node broadcasts request information R to the nodes under test within the communication range w , the node to be tested replies with the response message R in the following format c :

[0032] R c = {node ID, pilot}; (2)

[0033] S3: node cl i and cl j The proximity of the position at time t is represented by Indicates that the w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a potential function-based method for identifying the malicious nodes of an intelligent electric meter system. The method comprises the following steps: dividing an intelligent electric meter into an electric meter to be measured and a witness electric meter; reflecting the characteristics of the positions of electric meter nodes by utilizing physical layer channel information; extracting the channel information of the electric meter to be measured by communication between the electric meter to be measured and the witness electric meter; calculating the position values of the electric meter to be measured according to the channel information; processing the position values by a potential function so that the potential function of the electric meter node reflects the position information of all electric meter nodes with the identity (ID) the same as that of the electric meter node; integrating the position values of all the electric meter nodes, thus realizing the identification of the malicious nodes of the intelligent electric meter system. The method is high in recognition rate; the calculation quantity and the additional communication rate of all intelligent electric meters are very low, and most calculation quantity is completed in a control center, thus the method is especially suitable for the intelligent electric meter system.

Description

technical field [0001] The invention relates to a smart grid, in particular to a method for identifying a malicious node in a smart meter system based on a potential function. Background technique [0002] The problems of traditional power grid in terms of energy utilization efficiency and environmental protection are more prominent, such as: "power shortage" during peak use, a series of problems of low equipment utilization caused by untimely information acquisition, and a series of problems that affect the energy deployment of power resources and Energy delivery is a big hindrance. In this context, smart grid technology emerges as the times require. Smart grid closely links the production, transmission, distribution and use of electric energy through digitalization and informationization, and realizes "economical, efficient, flexible and efficient" through intelligent control. Interactive, friendly and open, clean and environmentally friendly" new generation power system,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G01R35/04
Inventor 文红蔡磊傅戈宋春
Owner YUNNAN POWER GRID CORP TONGFANG TECHCO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products