Font Size: a A A

Research On Trusted Network Connection Technology In Smart Power Grid PDA Terminal

Posted on:2021-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:X Y WuFull Text:PDF
GTID:2392330602979456Subject:Computer science and technology
Abstract/Summary:PDF Full Text Request
The shocking global power outage in Ukraine in 2015 shocked the information security field of the entire power grid,and it is extremely urgent to improve the security level of the power grid.Aiming at the problem that the smart smart grid PDA terminal lacks the necessary security check and defense means during access,this paper proposes a trusted network connection technology suitable for smart grid PDA terminals.Trusted computing technology is a time-sensitive information system security technology.The core idea of ??this technology is to rely on the trust delivery technology supported by the hardware security module to realize the security and credibility of the whole system.Therefore,the trusted network connection technology based on the trusted computing idea is introduced into the process of power communication authentication access,which can realize the security perceptibility between the application layer and the PDA terminal,and effectively improve the access time of the PDA terminal.safety.However,for the lack of security hardware and corresponding key management schemes in smart grid PDA terminals,this paper introduces a secure USBKey,which uses the secure storage area,secure computing area and security metric area of??USBKey to build an embedded trusted platform.Based on DH algorithm and key seed extraction algorithm,a key agreement algorithm based on the physical characteristics of USBKey and PDA to generate SK key is designed to ensure the security and uniqueness of key generation.Then,using the generated SK key,the SK key-based integrity authentication method and the trusted network connection method are designed.Before each connection is applied,the integrity check of the important files of the PDA terminal is performed by the security key SK to prevent the file from being tampered with.The public key and the private key required for the trusted network connection are generated by using the SK key as the root to ensure the reliability in the connection authentication process.Finally,the simulation platform construction,SK key generation,integrity metrics and trusted network connection methods are simulated by experiments.Experiments show that the key management mechanism and access authentication protocol have higher security,which effectively improves the trusted network connection level of the smart grid.
Keywords/Search Tags:Smart grid, trusted network connection, integrity metric, key
PDF Full Text Request
Related items