Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method based on power injection under AMI (Advanced Metering Infrastructure) and 5G smart power grid

A smart grid, privacy protection technology, applied in electrical components, network connections, transmission systems, etc., can solve the communication information integrity and privacy threats of smart grids, power companies and users’ personal economic losses, and users’ privacy information theft , tampering and other issues to achieve the effect of reducing bandwidth, reducing resource usage, and reducing transmission bandwidth

Active Publication Date: 2017-05-31
西安千喜网络科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a privacy protection method based on AMI and power injection under the 5G smart grid, aiming to solve the threat to the integrity and privacy of the communication information of the smart grid, and the privacy information of users is stolen by criminals, Tampering will cause economic losses to the power company and individual users, and in severe cases will lead to the collapse of the power system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on power injection under AMI (Advanced Metering Infrastructure) and 5G smart power grid
  • Privacy protection method based on power injection under AMI (Advanced Metering Infrastructure) and 5G smart power grid
  • Privacy protection method based on power injection under AMI (Advanced Metering Infrastructure) and 5G smart power grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] Such as figure 1 As shown, the privacy protection method based on AMI and power injection under the 5G smart grid provided by the embodiment of the present invention includes the following steps:

[0039] S101: The power company initializes the system, selects random parameters in the finite field and generates a private key, and discloses a series of parameters including the public key;

[0040] S102: The communication between the power company and the storage unit passes thr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on power injection under AMI (Advanced Metering Infrastructure) and a 5G smart power grid. The method comprises the steps that a power company initializes a system, selects random parameters from a finite field, generates a private key and discloses a series of parameters; communication between the power company and storage units is carried out through a gateway, the power company generates feature parameters through utilization of one-way hash functions, establishes single-use keys, places the single-use keys into request packets and sends power purchasing requests to the gateway, and after the gateway checks the request packets, the gateway broadcasts the request packets to the storage units; after the storage units receive the request packets, the storage units cover bidding through hash point addition according to the single-use keys and generates information verification codes; response packets are returned to the gateway; the gateway collects all response packets, aggregates bidding and information verification codes and sends the biding and information verification codes to the power company; and the power company carries out unpackaging through utilization of the private key to obtain the bidding. According to the method, the privacy of a user is protected, the confidentiality of the user is protected, the occupation of the bandwidth is reduced, and resources are saved.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a privacy protection method based on AMI and power injection under 5G smart grid. Background technique [0002] The Internet of Things refers to a huge network formed by combining various information sensing devices with real-time collection of any required information such as objects or processes that need to be monitored, connected, and interacted with the Internet. With people, all items are connected to the network, which is convenient for identification, management and control. As an important part of the new generation of information technology, it occupies an increasingly important position in our daily life. With the continuous change of technology and the lack of security and update mechanism, IoT devices have gradually become the main force of botnets: in October 2016, the United States suffered the most serious DDoS attack in history, c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/66
CPCH04L12/66H04L63/20H04L67/12
Inventor 张应辉邓恺鑫郑东赵江凡吴阿新
Owner 西安千喜网络科技有限公司