电信科学 ›› 2020, Vol. 36 ›› Issue (1): 134-138.doi: 10.11959/j.issn.1000-0801.2020002

• 电力信息化专栏 • 上一篇    下一篇

基于组合密钥的智能电网多源数据安全保护

高建,陈文彬,庞建民,于华东,宋国瑞   

  1. 北京智芯微电子科技有限公司,北京 102200
  • 修回日期:2020-01-08 出版日期:2020-01-20 发布日期:2020-02-13
  • 作者简介:高建(1982- ),男,北京智芯微电子科技有限公司高级工程师,主要研究方向为电力系统自动化|陈文彬(1972- ),男,北京智芯微电子科技有限公司高级工程师,主要研究方向为信息通信|庞建民(1973- ),男,北京智芯微电子科技有限公司工程师,主要研究方向为通信技术及应用

Multi-source data security protection of smart grid based on combination key

Jian GAO,Wenbin CHEN,Jianmin PANG,Huadong YU,Guorui SONG   

  1. Beijing Smartchip Microelectronics Technology Co.,Ltd.,Beijing 102200,China
  • Revised:2020-01-08 Online:2020-01-20 Published:2020-02-13

摘要:

电力通信网是电力系统的重要基础设施,对于数量庞大、分布广泛的各类业务终端、通信终端,其数据保护关系着整个电网的安全稳定运行。如何解决大量节点需要的大量密钥问题,避免大量节点因密钥不足而无法安全交换信息的情况,提出基于密钥的分片组合技术实现有限密钥的扩展,基本思想是根据不同条件获得分片方案,把一个密钥分成若干个互不相同的子密钥片,然后把这些密钥分片组合生成新的密钥,分配到系统中的不同终端上。足够的对称密钥有利于密钥更新,可以保证数据业务一次一密,可有效增强通信系统抗破坏和抗入侵的能力。通过分析计算,进一步验证了该方法在利用有限密钥实现大量终端业务数据保密传输中的有效性。

关键词: 配用电大数据, 通信安全, 多源数据, 密钥分片组合

Abstract:

As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized.

Key words: power distribution and utilization, communication security, multi-source data, quantum key distribution

中图分类号: 

No Suggested Reading articles found!