Font Size: a A A

Research On Information Security Of Smart Meter Based On Trusted Computing

Posted on:2020-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:T F ZhengFull Text:PDF
GTID:2392330578965122Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,the rapid development of smart grids has brought great convenience to energy consumers.Smart meter,as the collection terminal of smart grid,undertakes many tasks such as data acquisition,power information transmission and so on.In order to monitor and predict the status of the power grid effectively in real time,smart meters need to send the power information of users to the control center frequently.However,power consumption data may contain users' privacy,e.g.,living habits and hobbies.Further,as the smart meter terminal's working environment is complex and diverse,and smart meters suffer from endless physical attacks and cyber attacks,so the trustworthiness of smart meters is under threat.How to ensure the security of smart meter terminals while protecting user privacy is a hot issue in recent years.In response to the above problems,the author combines trusted computing with smart meters,and studies the application of trusted computing technology in smart meter terminals from three aspects: trust structure,dynamic integrity measurement model and anonymous remote attestation protocol.The specific work is as follows.(1)This paper discusses the shortcomings of the current trust chain,and then designs a hybrid trust chain structure for smart meter terminal,aiming at the shortcomings of the current trust structure.We places the trusted root in the TPM hardware structure to cope with the complex and diverse working environment of the smart meter terminal in hybrid trust chain structure.Based on the idea of software behavior and strategy penetration,a dynamic integrity measurement scheme fo r behavior trajectory embedding is proposed.In the scheme,the behavior trajectory is embedded in the program to save memory resources.The introduction of process monitor solves the TOU-TOC problem effectively.(2)A ring signcryption algorithm based on attribute identity is designed.Then we improve the existing anonymous attestation protocol based on this algorithm,and the improved protocol has lower computational overhead without bilinear pairing.Compared with other ring signcryption algorithms,the signature length and computation cost of this improved protocol are independent of the number of ring members.(3)A privacy protection scheme for smart meters that can verify the terminal's trustworthiness based on the improved protocol is proposed in this paper,which on the one hand realizes privacy protection of smart meters with high efficiency,and on the other hand completes real time verification of the smart meters' trustworthiness.The specific implementation process of the scheme is given in this paper.The anonymity,privacy protection of the platform configuration,and unforgeability of the scheme are proved in theory.Corresponding experiments show that this scheme has higher computational efficiency than others.
Keywords/Search Tags:smart meter, trusted computing, privacy preserving, dynamic integrity measurement, attributes, ring signcryption
PDF Full Text Request
Related items