چكيده به لاتين
Abstract:
Recently, smart grid has emerged as a promising solution in the next generation power grid system. It utilizes information and communications technology to act based on information, such as information about the behavior of suppliers and customers in order to provide better power quality, availability and security. Many telecommunications technologies proposed for the smart grid, are vulnerable to cyber attacks. These vulnerabilities can lead to the lack of reliability of system performance, unnecessary costs and even sequential disasters for energy producers and users. Network security is related to privacy preserving, authentication and availability. Various security threats can cause a violation of privacy and even widespread blackouts. Control center needs to collect information about users to predict the network status. Thus the method of data aggregation is used to improve network performance and the user’s privacy preserving. Many studies have been performed to use data aggregation for the user’s privacy in smart grid. Many of such schemes are based on homomorphic encryption and due to the use of encryption based on discrete logarithm problem impose high computational cost to the smart meter. This problem cause a violation of availability of information as one of the security requirements in smart grid. Thus, there is a need for schemes with lower computational cost. In this thesis, two efficient security protocols are proposed for user’s privacy preserving data aggregation using improved partially homomorphic encryption based on Chinese Remainder Theorem and elliptic curve cryptography. Thus, the control center can know the total energy consumption of user groups. Also, distribution blinding factors is used against internal attacker as a serious threat in the network. In addition, In order to authentication of users two new method is deployed in two proposed protocol due to the limitation of computing power processors and availability of conditions. On the other hand, attackers may analyze network traffic. By using network coding and performance algebraic operations at intermediate nodes, it is possible to defend against the network traffic analyze. A major challenge in network coding is false data injection at intermediate nodes by attackers. This false data published on the network and causes wrong recovery of data in receiver. To solve this problem, two new method will be present to defend against false data injection attacks in two proposed protocol. Simulations and comparisons show that proposed scheme based on elliptic curve cryptography provides the same level of security as RSA encryption and has significant advantages in computational and communicational overhead converting o(N^2) to o(N).