Multi-source data security protection of smart grid based on combination key
As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020002/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530637304987648 |
---|---|
author | Jian GAO Wenbin CHEN Jianmin PANG Huadong YU Guorui SONG |
author_facet | Jian GAO Wenbin CHEN Jianmin PANG Huadong YU Guorui SONG |
author_sort | Jian GAO |
collection | DOAJ |
description | As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized. |
format | Article |
id | doaj-art-fab36e99b9b64c74b5a9eac293928480 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-01-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-fab36e99b9b64c74b5a9eac2939284802025-01-15T03:01:22ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-01-013613413859585425Multi-source data security protection of smart grid based on combination keyJian GAOWenbin CHENJianmin PANGHuadong YUGuorui SONGAs an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020002/power distribution and utilizationcommunication securitymulti-source dataquantum key distribution |
spellingShingle | Jian GAO Wenbin CHEN Jianmin PANG Huadong YU Guorui SONG Multi-source data security protection of smart grid based on combination key Dianxin kexue power distribution and utilization communication security multi-source data quantum key distribution |
title | Multi-source data security protection of smart grid based on combination key |
title_full | Multi-source data security protection of smart grid based on combination key |
title_fullStr | Multi-source data security protection of smart grid based on combination key |
title_full_unstemmed | Multi-source data security protection of smart grid based on combination key |
title_short | Multi-source data security protection of smart grid based on combination key |
title_sort | multi source data security protection of smart grid based on combination key |
topic | power distribution and utilization communication security multi-source data quantum key distribution |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020002/ |
work_keys_str_mv | AT jiangao multisourcedatasecurityprotectionofsmartgridbasedoncombinationkey AT wenbinchen multisourcedatasecurityprotectionofsmartgridbasedoncombinationkey AT jianminpang multisourcedatasecurityprotectionofsmartgridbasedoncombinationkey AT huadongyu multisourcedatasecurityprotectionofsmartgridbasedoncombinationkey AT guoruisong multisourcedatasecurityprotectionofsmartgridbasedoncombinationkey |