跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.24) 您好!臺灣時間:2026/04/08 08:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林茗麒
研究生(外文):LIN, MING-CHI
論文名稱:在智慧電網中具隱私權保護的資料聚合
論文名稱(外文):Privacy Preserving Data Aggregation in Smart Grid
指導教授:洪維志洪維志引用關係
指導教授(外文):HONG, WEI-CHIH
口試委員:李榮三張貴忠
口試委員(外文):LI,RONG-SANZHANG,GUI-ZHONG
口試日期:2019-01-17
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:28
中文關鍵詞:智慧電網雜湊函數矩陣內積運算隱私保護
外文關鍵詞:Smart gridHash functionDot product operationPrivacy
相關次數:
  • 被引用被引用:0
  • 點閱點閱:266
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
在現代社會中,電力供給系統已經是民眾日常生活中不可或缺的一部分。
傳統的電力網路系統採用單向供電的方式,只能從使用電量的住家戶數或歷史
用電量來評估範圍內所需要的總用電量,造成浪費人力以及浪費配電。而近期 智慧電網(Smart Grid)的計畫與研究也越來越壯大,其中智慧電網最重要的是雙 向的電力資訊溝通技術,透過建立連結網路的智慧電錶(Smart Meters)來提供電
量資訊的儲存與應用。我們可以透過智慧電錶累計每種電器的電力使用資訊, 將使用電量資訊整合至智慧電網的中介設備再傳輸給電廠。
然而,從近期的研究中得知,絕大部分的智慧電網的資訊並無加密傳輸協
定,若電力使用資訊被攔截或是竄改,將造成使用者隱私洩漏與電廠營業虧損 的問題。
因此,本論文提出如何在智慧電網中設計一個安全的機制,首先是智慧電 表的初始化中的佈置,以及利用單向雜湊函數(Hash Function)的訊息認證碼 (Message Authentication Code, MAC)的方式進行智慧電錶與電廠的身分認證,再 來以擁有矩陣內積運算(Dot product operation)的演算法在智慧電網中達到用電資 訊的加密傳輸。 最後,本文研究也致力在於如何在智慧電錶(Meter)-電力資訊蒐集中介設備 (Sink)-電廠伺服器(Server)的三層(Three-Tier)架構下,智慧電錶和中介設備在傳 輸中的效能和安全性。
 
 
關鍵詞:智慧電網、雜湊函數、矩陣內積運算、隱私保護。
In modern society, Electricity supply has become an integral part of daily life for people. The traditional electricity network system adopts a one-way power supply method. It can only evaluate the total electricity which needed in the area from the number of households, or historical electricity consumption. This will result the waste of human resources and electricity distribution. Projects and researches of Smart grid are increasing. The most important among all in Smart grid is the bi-directionalcommunication technology. It provides electricity consumption storage and application through Smart meters which connected to network. It can accumulate electricity consumption for each type of appliance, and then collect electricity consumption to the intermediary devices and transmit to the electric power company. However, from recent research, it is known that most Smart grid transmission does not have an encrypted protocol. If the power usage is intercepted or tampered, it will cause user privacy leakage and electric power company business losses. Therefore, this paper proposes how to present a security protocol in the smart grid. First, the initial arrangement of Smart meters and Smart meters using one-way hash function in Message Authentication Code for identity confirmation between Smart meters and electric power company. Then, present encrypted transmission of power consumption based on Dot product operation algorithm. At last, in this paper also focus on analyze both performance and security on encrypted transmission in the three-tier architecture of Smart meters(meter) - intermediary devices(sink) - power company(server).

Keywords: Smart grid, Hash function, Dot product operation, Privacy.
第一章 緒論
1.1 傳統電網到智慧電網
1.2 研究動機
1.3 論文結構
第二章 相關知識及研究
2.1 智慧電網研究
2.2 矩陣內積運算研究
第三章 研究設計與實施
3.1 定義研究架構
3.2 電錶和電廠認證階段
3.3 電量傳送階段
3.4 查詢單一電錶加總電價
第四章 實驗結果與分析
4.1 實驗器材說明
4.2 實驗方法說明
4.3 產生隨機數的方式
4.4 效能之間的比較
4.5 單一電錶加總計價
4.6 安全性分析
第五章 結論與未來研究方向
參考文獻
[1] G. Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE, vol. 80, no. 12, pp. 1870–1891, Dec. 1992.
[2] Christopher Laughman, Kwangduk Lee, Robert Cox, Steven Shaw, Steven Leeb, Les Norford, and Peter Armstrong, “Power signature analysis,” IEEE Power Energy Mag., vol. 1, no. 2, pp. 56–63, Mar./Apr. 2003.
[3] T-H. Hubert Chan, Elaine Shi, and Dawn Song,”Privacy-preserving stream aggregation with fault tolerance,”in Financial Cryptography and Data Security (Lecture Notes in Computer Science 7397), A.Keromytis, Ed. Berlin, Germany: Springer-Verlag, 2012, pp.200–214.
[4] Gergely Acs and Claude Castelluccia,”I have a DREAM! (DiffeRentially privatE smArt Metering)” in Proc. 13th Inf. Hiding Conf., Berlin, Germany, 2011, pp. 118– 132.
[5] Marco Savi, Cristina Rottondi, and Giacomo Verticale. “Evaluation of the PrecisionPrivacy Tradeoff of Data Perturbation for Smart Metering,” IEEE Transactions on Smart Grid, Vol.6, No.5, pp. 2409-2417.
[6] Jiang, Wei, Mummoorthy Murugesan, Chris Clifton and Luo Si. “Similar document detection with limited information disclosure,” Data Engineering 2008, ICDE 2008, IEEE 24th International Conference on. IEEE, 2008.
[7] H. Krawczyk, M. Bellare and R. Canetti. “Network Working Group Request for Comments: 2104,” Februray 1997.
[8] Donald Knuths, “The Art of Computer Programming,” Volume 2.
[9] J.-Y. Huang, W.-C. Hong, P.-S. Tsai, I-E. Liao, “A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing,” International Journal of Distributed Sensor Networks, vol. 13, no. 5, May 2017.
[10] B.Goethals, S.Laur, H. Lipmaa, and T.Mielikainen, “On secure scalar product computation for privacy-preserving data mining,” in The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), C.Park and S.Chee, Eds., Seoul, Korea, Dec.2-3 2004, pp.104-120. [11] Fred Sissine, Coordinator Specialist in Energy Policy Resources, Science, and Industry Division,”Energy Independence and Security Act of 2007: A Summary of Major Provisions,”December 21, 2007.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top