| With the deep integration of Internet of Things(IoT)technology and the development of power systems,the power distribution system has access to distributed,large and widely interconnected power Internet of Things terminals.Due to the variety of power distribution IoT terminals and the characteristics of limited computing resources,traditional protection measures such as physical isolation and encryption authentication are difficult to cover all types of terminals.Attackers can use the IoT terminal as a springboard to bypass the border security-based protection system,thereby causing damage to the power system.Based on the above background,the thesis focuses on the security protection of the power distribution Internet of Things terminal.The main research contents include:(1)The security risk of the power distribution Internet of Things terminal is analyzed.Firstly,the security challenges and risk characteristics of the power Internet of Things terminals are summarized,and the existing terminal security protection mechanisms are further summarized and analyzed.Then,by analyzing the security protection vulnerabilities of traditional power grids,the typical security problems and related security threat protection of the Internet of Things terminals is analyzed and summarized from multiple perspectives.Finally combined with the specific application scenarios of the terminals,the consequences of cyber attacks are analyzed.(2)Taking the open meter system of IoT terminals as an example,the specific protection research is carried out.The lightweight identity authentication scheme was proposed for terminals such as resource-constrained water meters,and the protection research is carried out to detect whether the data uploaded by the open meter system of IoT terminals has false data injection attack—a)The research focuses on lightweight identity authentication of the open meter system of IoT terminals.This thesis analyzes the cyber security risk of the open meter system,and points out that meter terminals such as resource constrained water meters are vulnerable to network attacks such as counterfeiting due to lack of identity authentication measures;Based on this,a SM9 threshold signature lightweight authentication scheme for resource constrained IoT terminals is proposed.b)The research focuses on the detection of false data injection attacks on the open meter system of IoT terminals.A false data injection attack detection method based on the centralized reading data of the open meter system of IoT terminals is proposed.A false data injection attack detection method based on the water and electricity consumption ratio method and a false data injection attack detection method based on the living energy consumption state are proposed respectively,which can effectively identify the abnormal energy consumption behavior of residential users.The simulation results verify the effectiveness of the proposed SM9 threshold signature scheme and the detection method of terminal false data injection attack.The proposed scheme can realize identity authentication between the resource-constrained electronic remote water meter,gas meter IoT terminal and the main station/edge computing terminal,as well as detecting false data injection attacks from multi-dimensional energy use such as residential water and electricity use,and identifying residential users’ abnormal behaviors such as electricity theft and water theft,which can effectively improve the security protection level of the open meter system of IoT terminals. |