摘要: 非侵入式負(fù)荷監(jiān)測(cè)技術(shù)有助于用電精細(xì)化管理,,但細(xì)粒度的電力消費(fèi)數(shù)據(jù)也導(dǎo)致了用戶(hù)隱私信息暴露在攻擊者面前,。首先分析了非侵入式負(fù)荷監(jiān)測(cè)數(shù)據(jù)所面臨的安全風(fēng)險(xiǎn),并從密碼學(xué)角度提出了基于AES+RSA的混合加解密信息安全方案,。方案采用對(duì)稱(chēng)算法AES加密數(shù)據(jù),、非對(duì)稱(chēng)算法RSA加密AES密鑰來(lái)實(shí)現(xiàn)高效的密鑰管理。利用Visio Studio 2017+Qt軟件開(kāi)發(fā)測(cè)試界面,,通過(guò)數(shù)據(jù)總線(xiàn)將算法寫(xiě)入STM32單片機(jī)進(jìn)行方案性能測(cè)試,,優(yōu)選出最佳的運(yùn)行模式,同時(shí)驗(yàn)證了混合加解密方案的有效性??偨Y(jié)得到,,方案的耗時(shí)長(zhǎng)短取決于RSA算法的加解密或簽名驗(yàn)簽的效率。
中圖分類(lèi)號(hào): TN606 文獻(xiàn)標(biāo)識(shí)碼: A DOI:10.16157/j.issn.0258-7998.201112 中文引用格式: 陳子秋,,馮瑞玨,,鄭揚(yáng)富,等. 非侵入式負(fù)荷監(jiān)測(cè)系統(tǒng)數(shù)據(jù)隱私保護(hù)方法研究[J].電子技術(shù)應(yīng)用,,2021,,47(12):116-119,125. 英文引用格式: Chen Ziqiu,,F(xiàn)eng Ruijue,,Zheng Yangfu,et al. Research on data privacy protection method of NILM[J]. Application of Electronic Technique,,2021,,47(12):116-119,125.
Research on data privacy protection method of NILM
1.College of Electrical Engineering,Guangzhou College of South China University of Technology,,Guangzhou 510800,,China; 2.Research Center for Smart Energy Technology,School of Electric Power Engineering,South China University of Technology,, Guangzhou 510640,,China
Abstract: Non-invasive load monitoring technology is helpful to fine management of electricity consumption, but the fine-grained power consumption data also leads to the exposure of users′ private information to attackers. This paper firstly analyzes the security risks faced by non-intrusive load monitoring data, and proposes a mixed encryption and decryption information security scheme based on AES+RSA from the perspective of cryptography. In this scheme, symmetric algorithm AES is used to encrypt data, and asymmetric algorithm RSA encrypts AES keys to realize efficient key management. Using Visio Studio 2017+Qt software development and test interface, the algorithm was written to STM32 microcontroller through the data bus for scheme performance test, the best operation mode was optimized, and the effectiveness of the mixed encryption and decryption scheme was verified. It is concluded that the time of the scheme depends on the efficiency of RSA encryption and decryption or signature verification.