| 研究生: |
柳適學 Liu, Shih-Hsueh |
|---|---|
| 論文名稱: |
基於資料分散式服務與混合式加密演算法增強微電網之能源服務程式之安全 Security Enhancement of Energy Service Program for Microgrid by using Data Distribution Service and Hybrid Encryption Algorithm |
| 指導教授: |
廖德祿
Liao, Teh-Lu |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2019 |
| 畢業學年度: | 107 |
| 語文別: | 中文 |
| 論文頁數: | 49 |
| 中文關鍵詞: | 分散式能源 、資料分散式服務 、AES 加密 、RSA 加密 、Hénon Map |
| 外文關鍵詞: | Distributed Energy Resources, Data Distribution Service, AES, RSA, Hénon Map |
| 相關次數: | 點閱:59 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,分散式能源有著飛躍性的成長,太陽能與風力發電等再生能原滲透率日益提升,分散式能源之互聯性與互操作性受到越來越多關注。為了能確保電網系統正常運行,分散式能源與其他電力設備間的通訊至關重要;因此建立一個電力資訊即時交流的環境成為現在的重要的主題。同時,隨著物聯網技術日趨進步,物聯網的數據交換方式也變得更加靈活,各種中介層軟體的出現,正好呼應了智慧電網通訊上的需求;不過在享受便利的同時也有其隱憂:數據在進行交換時能如何防範外來的入侵干擾、保密我們的資訊,也是個必須考慮的問題。有鑑於此,本論文使用了基於發布與訂閱方式通訊的中介層軟體:資料分散式服務(Data Distribution Service, DDS);加上AES結合RSA與Hénon Map亂數產生的混合式加密,並將此技術應用於一獨立型微電網,作為電網內發電、負載、控制與儲能設備間的通訊基礎,以鞏固我們的資訊安全,提供一個實踐微電網內互操作性,且具備安全性的環境。
In recent years, distributed energy resources (DERs) have been growing rapidly. The penetration of renewable energies such as solar energy and wind power are increasing, and the interconnection and interoperability of distributed energy resources are getting more and more attention. To ensure the normal operation of the grid system, communication between decentralized energy and other electrical equipment is essential. Therefore, establishing an environment for electric power communication has become an important topic. In the meantime, with the advancement of Internet of Things technology, the means to exchange data through the Internet of Things has become more flexible. The emergence of various middleware meets the needs of smart grid communication. However, while taking advantage of these conveniences, there are also hidden concerns. Such as how to prevent external intrusion interference and keep our information confidential when exchanging is also a problem that must be considered. This thesis proposes a hybrid encryption algorithm using AES, RSA, and Hénon Map pseudo-random number for publish-subscribe middleware, Data Distribution Service (DDS). The combination then is applied to a stand-alone microgrid as the basis for communication between power equipment in the microgrid to enhance our information security and provide a safe communication for interoperability in the microgrid.
[1] J. Dizdarevic, F. Carpio, A. Jukan, and X. Masip-Bruin, “A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration,” arXiv:1804.01747, 2018.
[2] F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of Things security: A survey,” J. Netw. Comput. Appl., vol. 88, pp. 10–28, Jun. 2017.
[3] Z.-K. Zhang et al., “IoT security: Ongoing challenges and research opportunities,” in Proc. IEEE 7th Int. Conf. Service Orient. Comput. Appl., pp. 230–234, Matsue, Japan, Nov. 2014.
[4] J. Rodriguez-Molina and D. M. Kammen, "Middleware architectures for the smart grid: a survey on the state-of-the-art, taxonomy and main open issues," IEEE Communications Surveys & Tutorials, 2018.
[5] A. Saad, T. Youssef, A. T. Elsayed, A. Amin, O. H. Abdalla, O. A. Mohammed, "Data-centric hierarchical distributed model predictive control for smart grid energy management," IEEE Transactions on Industrical Informatics, 2018.
[6] Object Management Group. Data Distribution Service for Real-time Systems Specification Version 1.0, Dec. 2004.
[7] Object Management Group. Data Distribution Service (DDS) Version 1.4, April 2015.
[8] ADLINK. The DDS Tutorial
[9] Object Management Group. The Real-time Publish-Subscribe Protocol DDS Interoperability Wire Protocol (DDSI-RTPS) Specification Version 2.3, April 2015.
[10] Object Management Group. C++11 Language Mapping Version 1.4, Dec 2018.
[11] Federal Information Processing Standards Publication 197, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)". Nov. 26, 2001.
[12] G. Singh, Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security," International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38, April 2013.
[13] William Stallings, “Cryptography and Network Security: Principles and Practice”, Pearson Education.
[14] M. dworkin. Recommendation for Block Cipher Modes of Operation. Special Publication 800-38A, NIST, 2001.
[15] M. Hénon, A Two-Dimensional Mapping with a Strange Attractor, Commun. Math. Phys. 5D, pp. 66-77, 1976.
[16] Single-precision floating-point format (https://en.wikipedia.org/wiki/Single-precision_floating-point_format)
[17] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, IEEE, 1997.
[18] H. Lipmaa, P. Rogaway, and D. Wagner. Comments to NIST concerning AES-modes of operations: CTR-mode encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, 2000.
[19] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, S. Vo, A statistical test suite for random and pseudorandom number generators for cryptographic applications, National Institute of Standards and Technology (NIST), special publication 800-22, rev1a, April 2010.
[20] 廖德祿、洪勁宇、郭瀚鴻、吳毓庭,能源作業系統之能源服務程式研發,行政院原子能委員會核能研究所計畫報告,93-102頁,2018.