高级量测体系WSNs安全防御技术研究
[Abstract]:The intelligent power grid is a brand-new energy management mode, and the development of the intelligent power grid is one of the national strategies of our country, and the advanced measurement system (AMI) is the first step to implement the intelligent power grid. An important feature of AMI is to use a secure and reliable communication network to realize the two-way data exchange between the user and the power supply, and to effectively implement the interactive power utilization. The low-cost wireless sensor network (WSNs) is a common wireless communication technology between the smart meter and the data concentrator in the AMI. In view of the critical position of AMI in the intelligent power grid, the security of WSNs communication is the key problem to be solved urgently. The security defense technology is a common means to guarantee the communication safety of WSNs. The passive defense technology, which is represented by key management and encryption technology, is called the first line of defense to guarantee the information security, while the active defense technology, which is represented by the intrusion detection, is the second barrier to guarantee the information security. Therefore, this paper studies the security defense technology in the aspects of key management, security data aggregation, trust management and intrusion detection in the high-level measurement system WSNs. On the basis of analyzing the network structure and the information transmission mode of the high-level measurement system WSNs, a key management scheme based on the improved elliptic curve Diffie-Hellman key exchange protocol (ECDH) is proposed, and the distribution of the public key and the private key of the node is given. The invention relates to an updating method and a data integrity verification method of an authentication function based on a hash operation. The proposed key management scheme can solve the problems of establishing, distributing and updating the session key in the WSNs unicast communication and multicast communication. In order to verify the security of the session key and the ability to deal with the man-in-the-middle attack, the security performance of the scheme is analyzed. In order to verify that the scheme can be applied to the hardware resources such as smart meter and sink node and the AMI device with limited computing capacity, the time consumption and key storage consumption of the proposed scheme are analyzed. In order to reduce the resource overhead of the smart meter in the data transmission, and to ensure the security of data transmission, a secure data aggregation algorithm (HECDA) based on symmetric homomorphic encryption is proposed. In this paper, the confidentiality of data aggregation is guaranteed by adding homomorphic encryption algorithm, and data integrity verification is realized by using the Chinese remainder theorem (CRT). A safe data aggregation algorithm (ERCDA) for data recovery is proposed in order to obtain the data of each smart meter for the function of the generation of the customer's bill in the AMI, the analysis of the quality of the electric energy and the optimization. In the method, the plaintext data is first coded by adopting an effective serial-zero coding method, and the coded data is encrypted by the addition homomorphic encryption algorithm. In order to verify whether these two algorithms have better data confidentiality, integrity and freshness protection, the security performance of the two algorithms is analyzed. In order to show whether the network state of each node in AMI is normal, a trust management mechanism based on the optimization of Beta distribution theory is proposed. based on the optimized Beta distribution theory, the mechanism realizes the calculation of the trust value of each node, and by comprehensively considering the definition of the trust attribute of the typical network attack and the main characteristic of the WSNs, the mechanism adopts an adaptive method to acquire the trust attribute, Judging whether the trust attribute is abnormal based on the Markov distance, and taking a punishment measure to the condition that the trust attribute is continuously abnormal and the alternate abnormality when the trust value is calculated. The effectiveness of this mechanism is verified by the simulation analysis and the comparison with the RFSN scheme. in ord to solve that problem of serious electromagnetic interference and multiple wireless communication in the working environment of the AMI, it is not possible to determine whether the decrease in the trust value of the node is caused by interference or attack, and the time dependence and the spatial correlation of the node trust value in the AMI are analyzed, A hierarchical intrusion detection scheme based on node trust value anomaly is proposed. The scheme includes the point anomaly detection and the sequence anomaly detection of the node trust value, and proposes a method (TCM-KNN) based on the combination of the direct-push reliability machine and the K-neighbor to detect the point anomaly of the node trust value, A single class support vector machine (QS-OCSVM) algorithm based on 1/4 supersphere is proposed to detect the sequence of the node trust value. The simulation analysis shows that the scheme has better detection performance (including higher detection rate and lower error rate).
【学位授予单位】:哈尔滨工业大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TM76;TM73
【相似文献】
相关期刊论文 前7条
1 刘彬;陈特放;张仁津;;基于属性比较和信任传递的信任启动[J];四川大学学报(工程科学版);2013年06期
2 龙雨;朱宁波;;网格任务调度中的信任值计算算法研究[J];科学技术与工程;2009年01期
3 吴银锋;周翔;冯仁剑;万江文;许小丰;;基于节点信任值的无线传感器网络安全路由[J];仪器仪表学报;2012年01期
4 李治军;廖明宏;;一种能快速收敛的对等网络信任值计算算法[J];哈尔滨工业大学学报;2007年03期
5 巫冬;;无线传感器网络中节点信任值计算下的安全路由问题分析[J];科技视界;2014年25期
6 刘治来;石祥滨;;一种P2P环境下的信任值计算算法[J];沈阳航空工业学院学报;2009年05期
7 ;[J];;年期
相关会议论文 前2条
1 黄银锋;朱春鸽;谷利泽;杨义先;;网格环境中的一种基于推荐的信任值的计算方法[A];第一届中国高校通信类院系学术研讨会论文集[C];2007年
2 李鹏;李长云;饶居华;;基于信誉度的可信服务发现研究[A];2008年全国开放式分布与并行计算机学术会议论文集(上册)[C];2008年
相关博士学位论文 前5条
1 梁建权;高级量测体系WSNs安全防御技术研究[D];哈尔滨工业大学;2016年
2 冯景瑜;开放式P2P网络环境下的信任管理技术研究[D];西安电子科技大学;2011年
3 鲍翊平;P2P环境下演化的信誉系统及其关键技术研究[D];国防科学技术大学;2011年
4 左申正;基于机器学习的网络异常分析及响应研究[D];北京邮电大学;2010年
5 苏志远;面向服务网络环境中信任机制的研究[D];大连理工大学;2014年
相关硕士学位论文 前10条
1 路浩;基于声誉的电子商务动态信任研究[D];青岛理工大学;2015年
2 那超;P2P网络中可信异地数据备份模型的研究与设计[D];大连海事大学;2015年
3 龙雨;用于网格任务调度的信任值计算算法研究[D];湖南大学;2008年
4 高磊;对等网络中节点间推荐信任值的计算方法研究[D];北京邮电大学;2013年
5 邢艳艳;P2P社区的形成及演化研究[D];西安电子科技大学;2013年
6 冯真;P2P环境下文件共享的声誉系统研究[D];解放军信息工程大学;2006年
7 陈海宝;基于忠诚度具有激励机制的信任和信誉模型的研究[D];西南大学;2007年
8 张明生;基于信任的访问控制模型研究[D];哈尔滨理工大学;2011年
9 贺银慧;社会网络中用户信任关系的研究及其应用[D];电子科技大学;2011年
10 沈舫涛;面向云服务的信任演化仿真模型研究[D];南京大学;2013年
,本文编号:2505417
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2505417.html