Node safety authentication method in smart grid

A technology for smart grid and security authentication, applied in the field of security authentication, can solve the problems of decreased trust in verification results, shortened node life, and reduced server service efficiency, so as to improve basic security and detection efficiency, increase security assurance, The effect of saving communication resources

Inactive Publication Date: 2014-03-19
STATE GRID CHONGQING ELECTRIC POWER
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If it is not possible to solve the problem that nodes and servers are in a safe state every time they request / provide services, the most basic security of users will not be guaranteed
Since the security authentication technology of smart grid nodes and services is not perfect enough, the existing security authentication technology may have the following problems: (1) The openness of the wireless channel makes it more likely that the nodes installed in a specific environment will be replaced , the possibility of a malicious attacker impersonating a node increases, and the attacker may steal the service of a legitimate user according to the functional characteristics and service type of the node, and bring unnecessary trouble to the user's life
(2) During the communication process, the node and the server are always in the state of being required to authenticate, which will increase the service traffic, bring a heavier burden to the already limited bandwidth, increase the cost of interactive information services, shorten the life of the node, and reduce the server service efficiency
(3) Most of the security authentication between nodes and grid servers is done through mutual authentication, which is generally not efficient and the security cannot be well guaranteed
[0005] At present, the traditional node security authentication technology can be completed through the traditional PKI identity authentication model, but the traditional PKI model has the following problems: the key verification and certificate validity verification services are separated, which will lead to a decrease in the trust of the verification results ; Supporting multiple certifications is poor in implementability, and it is not suitable for the survival of this model in a complex power system network structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node safety authentication method in smart grid
  • Node safety authentication method in smart grid
  • Node safety authentication method in smart grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention are described in detail below, examples of said embodiments are shown in the accompanying drawings, and the embodiments described below by referring to the accompanying drawings are exemplary, are only used to explain the present invention, and cannot be construed as explanations for the present invention limit.

[0042] In the description of the present invention, unless otherwise specified and limited, it should be noted that the terms "deployment", "connection" and "connection" should be understood in a broad sense, for example, it can be mechanical connection or electrical connection, or two The internal communication of each element may be directly connected or indirectly connected through an intermediary. Those skilled in the art can understand the specific meanings of the above terms according to specific situations.

[0043] The invention provides a node security authentication method in a smart grid, which includes the follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a node safety authentication method in a smart grid. The node safety authentication method in the smart grid comprises the steps of: deploying each node in a smart grid node authentication system and presetting symmetrical private keys according to a hierarchical structure; initializing the smart grid node authentication system; authenticating nodes newly added in a sampling node layer; authenticating each server; performing information interaction on authenticated nodes and a power server and finishing node safety authentication. The node safety authentication method in the smart grid improves simplicity and extendibility of system network deployment as the smart grid node authentication system is structurally layered, reduces identity authentication frequentness of the nodes or the power server to a certain extent and increases efficiency of the whole system as a verification server is added in the system. Besides being able to verify identity of the nodes and the power server, the node safety authentication method in the smart grid also can guarantee the authentication process to be safe and efficient, and can enhance operation fluency of the whole system.

Description

technical field [0001] The invention belongs to the technical field of security authentication, and relates to a security authentication technology for nodes and servers in a smart grid in a power system, in particular to a node security authentication method in a smart grid. Background technique [0002] As the mainstream of the future power system, the smart grid has attracted more and more attention. The construction of a strong smart grid characterized by informatization, automation, and interaction requires not only robust network communication support, but also distributed state perception capabilities, advanced metering infrastructure, and real-time demand response. In a safe state, it is a key technical point to ensure that the smart grid will enter the homes of ordinary people in the future. [0003] China's smart grid construction proposes to use the UHV grid as the backbone grid, based on a strong smart grid, supported by a communication information platform, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 杨云吕跃春罗春雷吴彬徐光侠
Owner STATE GRID CHONGQING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products