Journal of Guangxi Normal University(Natural Science Edition) ›› 2020, Vol. 38 ›› Issue (2): 8-18.doi: 10.16088/j.issn.1001-6600.2020.02.002

Previous Articles     Next Articles

Identity Authentication of Power System Safetyand Stability Control Terminals Based on Blockchain

CHEN Xiong1, ZHU Yu1, FENG Ke1*, YU Tongwei2   

  1. 1.State Grid Electric Power Research Institute, Nanjing Jiangsu 211000, China;
    2.Research Institute of State Grid Liaoning Electric Power Company, Shenyang Liaoning 110000, China
  • Received:2019-10-08 Published:2020-04-02

Abstract: Under the background of extensive interconnection of power terminals, the traditional security and stability control architecture gradually shifts to distributed Special Protection System(SPS) with terminal intelligent collaboration. However, the identity authentication mechanism between the security and stability control terminals of the smart grid is not yet complete, thus it has become an irresistible trend to establish the mutual authentication and trust mechanism between the security and stability control terminals so as to avoid power system from cyber attacks as far as possible. This paper first analyzes the current status of SPS and the security risks SPS faced due to lack of targeted identity authentication mechanisms. On this basis, the alliance blockchain and the appropriate consensus mechanism are selected, and an identity authentication scheme based on blockchain technology that meets the characteristics of SPS is proposed. The distributed identity authentication scheme of blockchain technology uses hash chains and a distributed storage scheme to achieve lightweight authentication. Finally, the efficiency and security of the scheme are analyzed. The identity authentication mechanism proposed in this paper meets the high requirements of the power system and can defend against several common network attacks such as man-in-the-middle attacks and DoS attacks, thus ensuring the safe and stable operation of the power system.

Key words: blockchain, power system, safety and stability control terminal, identity authentication, decentralized storage

CLC Number: 

  • TM76
[1] 汤奕, 王琦, 倪明, 等. 电力信息物理融合系统中的网络攻击分析[J].电力系统自动化,2016,40(6):148-151.
[2] 罗剑波, 董希建, 崔晓丹, 等. 关于大型安全稳定控制系统可靠性研究的探讨[J].电力系统保护与控制,2018,46(8): 65-72.
[3] ZYSKIND G, NATHAN O, PENTLAND A. Decentralizing privacy:using blockchain to protect personal data[C]//IEEE Security & Privacy Workshops. San Jose, CA: IEEE Computer Society, 2015: 180-184.
[4] 刘敖迪, 杜学绘, 王娜, 等. 区块链技术及其在信息安全领域的研究进展[J].软件学报,2018,29(7): 2092-2115.
[5] KOSBA A, MILLER A, SHI E,et al. Hawk:the blockchain model of cryptography and privacy preserving smart contracts[C]//2016 IEEE Symposium on Security & Privacy(SP). San Jose, CA: IEEE Computer Society,2016: 839-858.
[6] ESFAHANI M M, MOHAMMED O A. Secure blockchain-based energy transaction framework in smart power systems[C]//IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society. Washington,DC: IEEE,2018: 260-264.
[7] 田福粮, 田秀霞, 陈希. 基于区块链的智能电表身份认证方案[J].华东师范大学学报(自然科学版),2018(5): 135-143,171.
[8] AITZHAN N Z, SVETINOVIC D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams[J].IEEE Transactions on Dependable & Secure Computing, 2016, 15(5): 840-852.
[9] 刘刚, 梁野, 李毅松, 等. 数字证书技术在电力二次系统中的实现及应用[J].电网技术,2006(S2): 71-75.
[10]阎军智, 彭晋, 左敏, 等. 基于区块链的PKI数字证书系统[J].电信工程技术与标准化,2017,30(11): 16-20.
[11]CHEN J, YAO S, YUAN Q, et al. CertChain: public and efficient certificate audit based on blockchain for TLS connections[C]//IEEE INFOCOM 2018. Honolulu, HI: IEEE, 2018: 2060-2068.
[12]李函, 闵勇, 韩英铎. 集中分层式稳定控制系统设计[J].电力系统自动化,2000,24(13): 37-40.
[13]张冉, 张千. 区域电网稳定控制系统研究[J].能源与节能,2011(12): 32-33.
[14]王保义, 杨丽. 基于安全网关的电力二次系统安全防护[J].电力系统通信,2008,29(12): 28-32.
[15]国家电力监管委员会. 电力二次系统安全防护规定[M].北京:中国电力出版社,2005:37.
[16]CACHIN C, VUKOLIC' M. Blockchain consensus protocols in the Wild[C]//Proceedings of the 31st International Symposium on Distributed Computing. Vienna, Austria: LIPICS ,2017: 1-16.
[17]韩璇, 刘亚敏. 区块链技术中的共识机制研究[J].信息网络安全,2017(9): 147-152.
[18]赵源超,李道本. 一种新颖的可再生多Hash 链的构造[J].电子与信息学报,2006,28(2):299-302.
[19]卢昕, 程雨诗, 张天晨, 等. 面向配电网分布式控制的轻量级身份认证技术[J].浙江大学学报(工学版),2018,52(6): 1177-1184, 1193.
[20]徐琳, 温蜜, 李晋国. 智能配电网中具有隐私保护的数据安全认证方案[J].电子技术应用,2015,41(12): 98-101.
[21]韩璇, 袁勇, 王飞跃. 区块链安全问题:研究现状与展望[J].自动化学报, 2019, 45(1): 206-225.
[22]DAVID B, GAZI P, KIAYIAS A, et al. Ouroboros praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain[C]//International Conference on the Theory & Applications of Cryptographic Techniques: LNCS 10821. Cham, Switzerland: Springer, 2018: 66-98.
[1] WANG Han, WANG Xu’an, ZHOU Neng, LIU Yudong. Blockchain-based Public Verifiable Scheme for Sharing Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 1-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] MENG Chunmei, LU Shiyin, LIANG Yonghong, MO Xiaomin, LI Weidong, HUANG Yuanjie, CHENG Xiaojing, SU Zhiheng, ZHENG Hua. Electron Microscopy Study on the Apoptosis and Autophagy of the Hepatic Stellate Cells Induced by Total Alkaloids[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 76 -79 .
[2] LI Yuhui, CHEN Zening, HUANG Zhonghao, ZHOU Qihai. Activity Time Budget of Assamese macaque (Macaca assamensis) during Rainy Season in Nonggang Nature Reserve, Guangxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 80 -86 .
[3] ZHANG Ru, ZHANG Bei, REN Hongrui. Spatio-temporal Dynamics Analysis and Its Affecting Factors of Cropland Loss in Xuangang Mining Area, Shanxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 121 -132 .
[4] TENG Zhijun, LÜ Jinling, GUO Liwen, XU Yuanyuan. Coverage Strategy of Wireless Sensor Network Based on Improved Particle Swarm Optimization Algorithm[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 9 -16 .
[5] MIAO Xinyan, ZHANG Long, LUO Yantao, PAN Lijun. Study on a Class of Alternative Competition-Cooperation Hybrid Population Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 25 -31 .
[6] LIN Yue. The Fault Diagnosis of Charging Piles Based on Hybrid AP-HMM Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(1): 25 -33 .
[7] XIA Haiying,LIU Weitao,ZHU Yongjian. An Improved Fast SUSAN Chessboard Corner Detection Algorithm[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(1): 44 -52 .
[8] TANG Guoji. Solvability for Generalized Mixed Variational Inequalities with Perturbation[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(1): 76 -83 .
[9] XIE Jing. Reverse Projection of the Central Nucleus of Amygdala in Mice[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(1): 149 -157 .
[10] MENG Qi,SHEN Hongtao,MAO Liqiang,LIANG Weigang,ZHAO Zizhen,LIANG Zhaoyan, LAI Mingfeng,HUANG Baojian,LI Shizhuo,HE Ming,JIANG Shan. Determination of Exposure Age of Tiankeng, Leye County of Guangxi by Accelerator Mass Spectrometry[J]. Journal of Guangxi Normal University(Natural Science Edition), 2017, 35(1): 16 -20 .