高級量測體系WSNs安全防御技術(shù)研究
[Abstract]:The intelligent power grid is a brand-new energy management mode, and the development of the intelligent power grid is one of the national strategies of our country, and the advanced measurement system (AMI) is the first step to implement the intelligent power grid. An important feature of AMI is to use a secure and reliable communication network to realize the two-way data exchange between the user and the power supply, and to effectively implement the interactive power utilization. The low-cost wireless sensor network (WSNs) is a common wireless communication technology between the smart meter and the data concentrator in the AMI. In view of the critical position of AMI in the intelligent power grid, the security of WSNs communication is the key problem to be solved urgently. The security defense technology is a common means to guarantee the communication safety of WSNs. The passive defense technology, which is represented by key management and encryption technology, is called the first line of defense to guarantee the information security, while the active defense technology, which is represented by the intrusion detection, is the second barrier to guarantee the information security. Therefore, this paper studies the security defense technology in the aspects of key management, security data aggregation, trust management and intrusion detection in the high-level measurement system WSNs. On the basis of analyzing the network structure and the information transmission mode of the high-level measurement system WSNs, a key management scheme based on the improved elliptic curve Diffie-Hellman key exchange protocol (ECDH) is proposed, and the distribution of the public key and the private key of the node is given. The invention relates to an updating method and a data integrity verification method of an authentication function based on a hash operation. The proposed key management scheme can solve the problems of establishing, distributing and updating the session key in the WSNs unicast communication and multicast communication. In order to verify the security of the session key and the ability to deal with the man-in-the-middle attack, the security performance of the scheme is analyzed. In order to verify that the scheme can be applied to the hardware resources such as smart meter and sink node and the AMI device with limited computing capacity, the time consumption and key storage consumption of the proposed scheme are analyzed. In order to reduce the resource overhead of the smart meter in the data transmission, and to ensure the security of data transmission, a secure data aggregation algorithm (HECDA) based on symmetric homomorphic encryption is proposed. In this paper, the confidentiality of data aggregation is guaranteed by adding homomorphic encryption algorithm, and data integrity verification is realized by using the Chinese remainder theorem (CRT). A safe data aggregation algorithm (ERCDA) for data recovery is proposed in order to obtain the data of each smart meter for the function of the generation of the customer's bill in the AMI, the analysis of the quality of the electric energy and the optimization. In the method, the plaintext data is first coded by adopting an effective serial-zero coding method, and the coded data is encrypted by the addition homomorphic encryption algorithm. In order to verify whether these two algorithms have better data confidentiality, integrity and freshness protection, the security performance of the two algorithms is analyzed. In order to show whether the network state of each node in AMI is normal, a trust management mechanism based on the optimization of Beta distribution theory is proposed. based on the optimized Beta distribution theory, the mechanism realizes the calculation of the trust value of each node, and by comprehensively considering the definition of the trust attribute of the typical network attack and the main characteristic of the WSNs, the mechanism adopts an adaptive method to acquire the trust attribute, Judging whether the trust attribute is abnormal based on the Markov distance, and taking a punishment measure to the condition that the trust attribute is continuously abnormal and the alternate abnormality when the trust value is calculated. The effectiveness of this mechanism is verified by the simulation analysis and the comparison with the RFSN scheme. in ord to solve that problem of serious electromagnetic interference and multiple wireless communication in the working environment of the AMI, it is not possible to determine whether the decrease in the trust value of the node is caused by interference or attack, and the time dependence and the spatial correlation of the node trust value in the AMI are analyzed, A hierarchical intrusion detection scheme based on node trust value anomaly is proposed. The scheme includes the point anomaly detection and the sequence anomaly detection of the node trust value, and proposes a method (TCM-KNN) based on the combination of the direct-push reliability machine and the K-neighbor to detect the point anomaly of the node trust value, A single class support vector machine (QS-OCSVM) algorithm based on 1/4 supersphere is proposed to detect the sequence of the node trust value. The simulation analysis shows that the scheme has better detection performance (including higher detection rate and lower error rate).
【學(xué)位授予單位】:哈爾濱工業(yè)大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2016
【分類號】:TM76;TM73
【相似文獻(xiàn)】
相關(guān)期刊論文 前7條
1 劉彬;陳特放;張仁津;;基于屬性比較和信任傳遞的信任啟動[J];四川大學(xué)學(xué)報(工程科學(xué)版);2013年06期
2 龍雨;朱寧波;;網(wǎng)格任務(wù)調(diào)度中的信任值計算算法研究[J];科學(xué)技術(shù)與工程;2009年01期
3 吳銀鋒;周翔;馮仁劍;萬江文;許小豐;;基于節(jié)點信任值的無線傳感器網(wǎng)絡(luò)安全路由[J];儀器儀表學(xué)報;2012年01期
4 李治軍;廖明宏;;一種能快速收斂的對等網(wǎng)絡(luò)信任值計算算法[J];哈爾濱工業(yè)大學(xué)學(xué)報;2007年03期
5 巫冬;;無線傳感器網(wǎng)絡(luò)中節(jié)點信任值計算下的安全路由問題分析[J];科技視界;2014年25期
6 劉治來;石祥濱;;一種P2P環(huán)境下的信任值計算算法[J];沈陽航空工業(yè)學(xué)院學(xué)報;2009年05期
7 ;[J];;年期
相關(guān)會議論文 前2條
1 黃銀鋒;朱春鴿;谷利澤;楊義先;;網(wǎng)格環(huán)境中的一種基于推薦的信任值的計算方法[A];第一屆中國高校通信類院系學(xué)術(shù)研討會論文集[C];2007年
2 李鵬;李長云;饒居華;;基于信譽(yù)度的可信服務(wù)發(fā)現(xiàn)研究[A];2008年全國開放式分布與并行計算機(jī)學(xué)術(shù)會議論文集(上冊)[C];2008年
相關(guān)博士學(xué)位論文 前5條
1 梁建權(quán);高級量測體系WSNs安全防御技術(shù)研究[D];哈爾濱工業(yè)大學(xué);2016年
2 馮景瑜;開放式P2P網(wǎng)絡(luò)環(huán)境下的信任管理技術(shù)研究[D];西安電子科技大學(xué);2011年
3 鮑翊平;P2P環(huán)境下演化的信譽(yù)系統(tǒng)及其關(guān)鍵技術(shù)研究[D];國防科學(xué)技術(shù)大學(xué);2011年
4 左申正;基于機(jī)器學(xué)習(xí)的網(wǎng)絡(luò)異常分析及響應(yīng)研究[D];北京郵電大學(xué);2010年
5 蘇志遠(yuǎn);面向服務(wù)網(wǎng)絡(luò)環(huán)境中信任機(jī)制的研究[D];大連理工大學(xué);2014年
相關(guān)碩士學(xué)位論文 前10條
1 路浩;基于聲譽(yù)的電子商務(wù)動態(tài)信任研究[D];青島理工大學(xué);2015年
2 那超;P2P網(wǎng)絡(luò)中可信異地數(shù)據(jù)備份模型的研究與設(shè)計[D];大連海事大學(xué);2015年
3 龍雨;用于網(wǎng)格任務(wù)調(diào)度的信任值計算算法研究[D];湖南大學(xué);2008年
4 高磊;對等網(wǎng)絡(luò)中節(jié)點間推薦信任值的計算方法研究[D];北京郵電大學(xué);2013年
5 邢艷艷;P2P社區(qū)的形成及演化研究[D];西安電子科技大學(xué);2013年
6 馮真;P2P環(huán)境下文件共享的聲譽(yù)系統(tǒng)研究[D];解放軍信息工程大學(xué);2006年
7 陳海寶;基于忠誠度具有激勵機(jī)制的信任和信譽(yù)模型的研究[D];西南大學(xué);2007年
8 張明生;基于信任的訪問控制模型研究[D];哈爾濱理工大學(xué);2011年
9 賀銀慧;社會網(wǎng)絡(luò)中用戶信任關(guān)系的研究及其應(yīng)用[D];電子科技大學(xué);2011年
10 沈舫濤;面向云服務(wù)的信任演化仿真模型研究[D];南京大學(xué);2013年
,本文編號:2505417
本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2505417.html