| 研究生: |
林忠寶 Lin, Chung-Pao |
|---|---|
| 論文名稱: |
同態加密應用於安全智慧電網電力監控部署和模擬 Secure Smart Grid Power Monitoring Deployment and Simulations Based on Homomorphic Encryption |
| 指導教授: |
廖德祿
Liao, Teh-Lu |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系碩士在職專班 Department of Engineering Science (on the job class) |
| 論文出版年: | 2022 |
| 畢業學年度: | 110 |
| 語文別: | 中文 |
| 論文頁數: | 51 |
| 中文關鍵詞: | 智慧電網 、同態加密 、Paillier Cryptosystem 、數位指紋 、資訊安全 |
| 外文關鍵詞: | Smart Grid, Homomorphic Encryption, Paillier Cipher, Digital Signature, Information Security |
| 相關次數: | 點閱:94 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
智慧電網為先進的電力網路系統,兼具自動化及資訊化的優點,主要為整合發電、輸電、配電給用戶的先進電網系統,同時也具備自我檢視、診斷及修復等功能。然而,智慧電網使用大量的網路資訊技術進行資料傳輸,為防止在收集或分享數據時可能遭受網路攻擊,如何採取數據安全機密性(Confidentiality)、完整性(Integrity)、可用性(Availability)的預防措施,成為建構智慧電網的重要議題。
傳統電力所使用的資訊系統存在無法實現資源和數據共享,而雲服務(Cloud Service)在公共基礎設施能夠解決數據應用共享的問題。但是,用雲服務的架構來管理智慧電網中的傳感器數據,會對數據安全性和消費者隱私構成重大風險。
為了解決這些安全和隱私問題,又因數據和資源的即時聚合計算是智慧電網中的重要功能。因此,同態加密(Homeomorphic Encryption)演算法就被運用在即時的聚合計算,並同時解決機敏資料的安全和隱私問題。
因此本論文將結合雲服務系統,使用Paillier Cryptosystem將資料進行加解密來確保資料安全性,本論文將利用Pallier隨機整數r結合數位指紋與身份驗證的機制設計一套,電力監控仿真系統。最後,由透過實際設計驗證實驗,進行資訊安全的測試與實驗結果,驗證此系統在實際電力監控與分配上,除了解決資源共享、機敏資料隱私問題,也具備智慧電網在資訊安全機密性、完整性與不可否認性特點。
This thesis proposes a secure smart gird power monitoring simulation system (SSGPMSS) that mainly uses cloud platform as the monitoring platform to solve the problem of sharing monitoring resources (data) and increase the security and stability of the cyber physical system. We apply the characteristics of data aggregation of the homomorphic Paillier cipher with random variables to solve the privacy problem of sensitive data. We also use the non-repudiation function of digital signature to enhance the security and accuracy of data transmission to achieve real-time power load distribution and control feedback simulation system. Finally, through the verification of numerical value and hacker attack modes, the designed system has high information security and feasibility in practical applications.
[1] X. Fang, S. Misra, G. Xue and D. Yang, "Smart grid—The new and improved power grid: A survey", IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944-980, Dec. 2012.
[2] H. Chockler and G. Weissenbache, Computer Aided Verification Springer, 1999.
[3] M. Zekeriya Gunduz, Resul Das, “Analysis of cyber-attacks on smart grid applications”, 2018 International Conference on Artificial Intelligence and Data Processing
[4] V. Y. Pillitteri and T. L. Brewer, "NIST Guidelines for Smart Grid Cybersecurity", NIST Interagency/Internal Report (NISTIR) - 7628 Rev 1, Sept. 2014.
[5] Khalid Nawaf Alharbi, Xiaodong Lin, Jun Shao, “A Privacy-Preserving Data-Sharing Framework for Smart Grid”, IEEE Internet of Things Journal 2017 | Volume: 4, Issue: 2 | Journal Article
[6] Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, “Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure”, IET Wireless Sensor Systems ( Volume: 7, Issue: 6, 12 2017)
[7] Li, F., Luo, B., Liu, P., “Secure information aggregation for smart grids using homomorphic encryption”, 2010 First IEEE Int. Conf. Smart Grid Communications, 2010, pp. 327–332
[8] Liehuang Zhu, Meng Li, Zijian Zhang, Chang Xu, Ruonan Zhang, Xiaojiang Du, and Nadra Guizani , “Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid” , IEEE Communications Magazine ( Volume: 57, Issue: 6, June 2019)
[9] Haya Shajaiah, Ahmed Abdelhadi and Charles Clancy Bradley “Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption “, 2017 IEEE International Conference on Big Data (Big Data)
[10] J. Morales and A. F. Riveros, “The generalization of the binomial theorem,” Journal of Mathematical Physics, vol 30, no. 2, pp. 393-397, 1989.
[11] S. -C. Yip, C. Tan, W. -N. Tan, M. -T. Gan, K. Wong and R. C. -W. Phan, “Detection of Energy Theft and Metering Defects in Advanced Metering Infrastructure Using Analytics,” 2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), pp. 15-22 ,2018.
[12] Nico Saputro and Kemal Akkaya, “Performance Evaluation of Smart Grid Data Aggregation via Homomorphic Encryption”, 2012 IEEE Wireless Communications and Networking Conference (WCNC)
[13] Jinju Zhou, Lina He, Canbing Li, Yijia Cao, Xubin Liu, Yinghui Geng, “What's the difference between traditional power grid and smart grid? — From dispatching perspective”, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC)
[14] Jeffrey Fischer, “Messaging with MQTT”, https://micropython-iot-hackathon.readthedocs.io/en/latest/mqtt.html
[15] Sushmita Rujand Amiya Nayak, “A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids”, IEEE Transactions on Smart Grid ( Volume: 4, Issue: 1, March 2013)
[16] Liping Chen, Jun Liu, Weitao Ha, “Cloud Service Risk in the Smart Grid”, 2018 14th International Conference on Computational Intelligence and Security (CIS)
[17] Shuangjie Bai, Geng Yang, Jingqi Shi, Guoxiu Liu, Zhaoe Min, "Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme", Security and Communication Networks, vol. 2018, Article ID 2363928, 14 pages, 2018
[18] Ben Howes, “A Brief, but Practical Introduction to the MQTT Protocol and its Application to IoT”, https://kknews.cc/tech/k8gqgq.html”.
[19] 台灣智慧型電網產業協會(TSGIA) , http://www.smart-grid.org.tw/content/smart_grid/smart_grid.aspx
[20] M. Zekeriya Gunduz and Resul Das, “Analysis of cyber-attacks on smart grid applications”, 2018 International Conference on Artificial Intelligence and Data Processing (IDAP)
[21] P. Paillier, Public-Key Cryptosystems Based on Discrete Logarithms Residues. In Eurocrypt '99, LNCS 1592. Springer-Verlag, 1999.