摘要: 非侵入式負(fù)荷監(jiān)測技術(shù)有助于用電精細(xì)化管理,但細(xì)粒度的電力消費(fèi)數(shù)據(jù)也導(dǎo)致了用戶隱私信息暴露在攻擊者面前。首先分析了非侵入式負(fù)荷監(jiān)測數(shù)據(jù)所面臨的安全風(fēng)險(xiǎn),并從密碼學(xué)角度提出了基于AES+RSA的混合加解密信息安全方案。方案采用對稱算法AES加密數(shù)據(jù)、非對稱算法RSA加密AES密鑰來實(shí)現(xiàn)高效的密鑰管理。利用Visio Studio 2017+Qt軟件開發(fā)測試界面,通過數(shù)據(jù)總線將算法寫入STM32單片機(jī)進(jìn)行方案性能測試,優(yōu)選出最佳的運(yùn)行模式,同時(shí)驗(yàn)證了混合加解密方案的有效性??偨Y(jié)得到,方案的耗時(shí)長短取決于RSA算法的加解密或簽名驗(yàn)簽的效率。
中圖分類號: TN606 文獻(xiàn)標(biāo)識碼: A DOI:10.16157/j.issn.0258-7998.201112 中文引用格式: 陳子秋,馮瑞玨,鄭揚(yáng)富,等. 非侵入式負(fù)荷監(jiān)測系統(tǒng)數(shù)據(jù)隱私保護(hù)方法研究[J].電子技術(shù)應(yīng)用,2021,47(12):116-119,125. 英文引用格式: Chen Ziqiu,F(xiàn)eng Ruijue,Zheng Yangfu,et al. Research on data privacy protection method of NILM[J]. Application of Electronic Technique,2021,47(12):116-119,125.
Research on data privacy protection method of NILM
1.College of Electrical Engineering,Guangzhou College of South China University of Technology,Guangzhou 510800,China; 2.Research Center for Smart Energy Technology,School of Electric Power Engineering,South China University of Technology, Guangzhou 510640,China
Abstract: Non-invasive load monitoring technology is helpful to fine management of electricity consumption, but the fine-grained power consumption data also leads to the exposure of users′ private information to attackers. This paper firstly analyzes the security risks faced by non-intrusive load monitoring data, and proposes a mixed encryption and decryption information security scheme based on AES+RSA from the perspective of cryptography. In this scheme, symmetric algorithm AES is used to encrypt data, and asymmetric algorithm RSA encrypts AES keys to realize efficient key management. Using Visio Studio 2017+Qt software development and test interface, the algorithm was written to STM32 microcontroller through the data bus for scheme performance test, the best operation mode was optimized, and the effectiveness of the mixed encryption and decryption scheme was verified. It is concluded that the time of the scheme depends on the efficiency of RSA encryption and decryption or signature verification.