Study on the Key Distribution Mechanism of Feeder Automation System

Article Preview

Abstract:

Along with the development of information technology, the information security of power industry is becoming an important problem in the stability of power systems. In order to solve the key distribution problems of feeder automation system, a key agreement and mutual authentication scheme based on elliptic curve cryptograph techniques is proposed. The mutual authentication and agreement on a secure session key is realized, between feeder terminal unit (FTU) and regional substation. By using the ECC techniques, greater security with fewer bits is provided. As the result, the requirement of bandwidth is decreased, furthermore, computational burden and storage requirement is also lowered on the FTU.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

546-549

Citation:

Online since:

June 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hu Yan, Dong Mingchui, Han yingduo, Consideration of informatin security for electric power industry, Automation of Electric Power Systems, 2002, 26(7), pp.1-4.

Google Scholar

[2] Li Shusen, Yang Yingjian, Wu Xike, Overview and Development Trend of Distribution Technology, High Voltage Engineering, 2008, (01), pp.22-24.

Google Scholar

[3] Dong Xinzhou, Shi Shenxing, Wang Bin, Novel Distribution Line Automation Mode, Proceedings of the Chinese Society of Universities for Electric Power System and Automation, 2007, 19(3), pp.1-7.

Google Scholar

[4] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, 48 (1987), 203-209.

DOI: 10.1090/s0025-5718-1987-0866109-5

Google Scholar

[5] V. Miller, Uses of elliptic curves in cryptography", Advances in Cryptology – Crypto , 85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417-426.

DOI: 10.1007/3-540-39799-x_31

Google Scholar

[6] Hong Li, Du Yaozong, ECC-based key agreement and mutual authentication scheme, Computer Engineering and Design, 2007, 28(13), pp.3076-3077.

Google Scholar

[7] Zhao Yunfeng, Zhi Ming, Zhai Zhenhua, An Identity-based Group Signature Scheme from Weil Pairings, Application Research of Computers, 2005, pp.124-125.

Google Scholar