摘要
为加强变电设备信息交互的安全性,设计一种由数据采集装置和云服务中心组成的数据采集系统,提出一个可证明安全的聚合签名方案,在随机预言机模型和CDH困难问题下证明了方案的安全性。以此方案为基础设计一种适用于变电终端的数据传输协议,给出仿真代码实现,结果表明,方案计算量小、耗时较短、效率较高。与喻琇瑛等方案和罗敏等方案相比,该方案平均耗时分别减少约29.4%、19.6%,验证了其优越性和可行性,为有效解决多个变电终端数据安全传输提供了可参考方案。
To enhance the security of information interaction between substation equipments,a data acquisition system composed of data acquisition devices and cloud service center was designed,aprovable security aggregate signature scheme was proposed,and the security of the scheme was proved under the random oracle model and the CDH difficult problem.A data transmission protocol for substation terminal was designed on the basis of this scheme,and the simulation code was implemented.The results show that the scheme has smaller computation,shorter time-consuming,and higher efficiency.Compared with the scheme of Yuxiuying et al and Luomin et al,the average time-consumption of the proposed scheme is reduced by approximately 29.4% and 19.6% of that of their schemes respectively,which verifies that the proposed scheme is superior and feasible,and it provides a reference solution for effectively solving the data transmission of multiple substation terminals.
引文
[1]FAN Aiwan,YANG Zhaofeng,CHANG Qiang,et al.Application of certificateless signature scheme in electric power dispatching system[J].Automation of Electric Power Systems,2013,37(19):105-109(in Chinese).[樊爱宛,杨照峰,常强,等.电力调度系统无证书数字签名技术[J].电力系统自动化,2013,37(19):105-109.]
[2]HAN Yanan,LI Fagen.Research on combined public key cryptographic scheme for smart grid[J].Journal of Cryptologic Research,2016,3(4):340-351(in Chinese).[韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究[J].密码学报,2016,3(4):340-351.]
[3]LI Jiqiang.Research on information security authentication in the electric vehicle smart charging[D].Beijng:North China Electric Power University,2017(in Chinese).[李积强.电动汽车智能充电的信息安全认证机制研究[D].北京:华北电力大学,2017.]
[4]Fan CI,Huang SY,Lai YL.Privacy-enhanced data aggregation scheme against internal attackers in smart grid[J].IEEETransactions on Industrial Informatics,2013,10(1):666-675.
[5]Liu N,Chen J,Zhu L,et al.A key management scheme for secure communications of advanced metering infrastructure in smart grid[J].IEEE Transactions on Industrial Electronics,2013,60(10):4746-4756.
[6]LYU Liudi,ZHENG Dong,ZHANG Yinghui,et al.Identity-based aggregation signature verification in vehicular ad hoc network[J].Computer Engineering and Design,2018,39(7):1866-1871(in Chinese).[吕柳迪,郑东,张应辉,等.车联网中基于身份的聚合签名认证[J].计算机工程与设计,2018,39(7):1866-1871.]
[7]Kumar P,Kumari S,Sharma V,et al.A certificateless aggregate signature scheme for healthcare wireless sensor network[J].Sustainable Computing Informatics&Systems,2017(18):80-89.
[8]Tang J,Liu A,Zhao M,et al.An aggregate signature based trust routing for data gathering in sensor networks[J].Security&Communication Networks,2018,2018:1-30.
[9]Han Shen,Chen Jianhua,Shen Jian,et al.Cryptanalysis of a certificateless aggregate signature scheme with efficient verification[J].Security and Communication Networks,2016,9(13):715-722.
[10]YU Xiuying,HE Dake.A certificate-based aggregate proxy signature scheme[J].Journal of Central South University(Science and Technology),2015,46(12):4535-4541(in Chinese).[喻琇瑛,何大可.基于双线性对的聚合代理签名[J].中南大学学报(自然科学版),2015,46(12):4535-4541.]
[11]LUO Min,SUN Teng,ZHANG Jingyin,et al.Security analysis on two certificateless aggregate signature schemes[J].Journal of Electronics&Information Technology,2016,38(10):2695-2700(in Chinese).[罗敏,孙腾,张静茵,等.两个无证书聚合签名方案的安全性分析[J].电子与信息学报,2016,38(10):2695-2700.]