| Peer-Reviewed

Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3

Received: 1 June 2022    Accepted:     Published: 9 June 2022
Views:       Downloads:
Abstract

Distributed energy has the characteristics of wide geographical distribution. Fuoh-distributed energy needs to use various communication methods to access grid information exercise. For remote control and other key information, this information is vulnerable to third-party attacks, attacks can cause grid operations to malfunction. This paper proposes a message integrity authentication method about distributed new energy remote control system, it is designed based on SM3 message. First of all, analysis of the content of the transmitted telecontrol message, use SM3 hash calculation to generate the corresponding hash value, the hash value in this article is 1. And sent to the opposite side together with the remote control message. The receiver will receive the sent information, when the receiver has completely received the sent content and continue to calculate the remote control message information, the calculation process is to use the hash operation to process and get the hash value 2, compare this value with the hash value of 1, and continue to transmit together with the remote control message. This paper exemplifies the specific operation steps, provide reference for readers to use. And developed special test software, the designed method was tested with this software, the test results show that the designed method is feasible, meet the design requirements, realize the safe communication of power grid information.

Published in Science Discovery (Volume 10, Issue 3)
DOI 10.11648/j.sd.20221003.24
Page(s) 168-172
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

SM3 Operation, Integrity Verification, Power Network Information Security

References
[1] 张长泽.SM3算法在硬件加密模块中的实现与应用[J].信息通信, 2019 (09): 15-16。
[2] 谢敏敏,王勇,周林.基于SM2-SM3的IEC61850通信报文加密算法[J].自动化博览, 2021, 38 (01): 108-112。
[3] 李丹枫,王飞,赵国鸿.一种大流量报文HMAC-SM3认证实时加速引擎[J].计算机工程与科学, 2021, 43 (01): 82-88。
[4] 吴克河,程瑞,郑碧煌,崔文超.电力物联网安全通信协议研究[J].信息网络安全, 2021, 21 (09): 8-15。
[5] 张喜铭,李金,邱荣福,许艾.国密体系在智能变电站的研究与应用[J].南方电网技术, 2020, 14 (01): 39-45. DOI: 10.13648/j.cnki.issn1674-0629.2020.01.006。
[6] 沈雯婷,张惠刚,李忠安.智能变电站GOOSE报文数字签名实现[J].南京工程学院学报(自然科学版), 2019, 17 (03): 38-44. DOI: 10.13960/j.issn.1672-2558.2019.03.007。
[7] 杨庆成.数据加密技术在计算机网络安全中的应用[J].网络安全技术与应用, 2021 (09): 23-24。
[8] 陈清. 基于国密算法的智能变电站信息安全研究[D].东南大学, 2019: 1-20。
[9] 孙杨.基于MD5加密算法的系统安全登录研究[J].计算机光盘软件与应用, 2013, 16 (06): 228-229。
[10] 安子畅,杨硕,郑景.电力系统信息通信的网络安全及防护研究[J].通信电源技术, 2020, 37 (05): 216-217。
[11] 牛晓刚.电力自动化通信技术如何确保信息安全研究[J].科技创新导报, 2017, 14 (35): 91-92。
[12] 冯瑞珏,曾献煜,刘飘,等.高级加密标准算法在智能电网数据保护中的应用分析[J].广东电力, 2021, 34 (06): 98-104。
[13] 侯宪锋,韩磊,王兴元,等.国密算法在智能家居数据安全应用研究[J].中国新通信, 2021, 23 (20): 49-51。
[14] 曾献煜,刘飘,冯瑞珏,等.SM3算法在GOOSE报文中的安全应用[J].广西电力, 2021, 44 (04): 38-43。
[15] 王小云,于红波.SM3密码杂凑算法[J].信息安全研究, 2016, 2 (11): 983-994。
Cite This Article
  • APA Style

    Chen Yingda, Heng Xingchen, Ou Yongtong, Chen Chongchen, Lin Junhong, et al. (2022). Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3. Science Discovery, 10(3), 168-172. https://doi.org/10.11648/j.sd.20221003.24

    Copy | Download

    ACS Style

    Chen Yingda; Heng Xingchen; Ou Yongtong; Chen Chongchen; Lin Junhong, et al. Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3. Sci. Discov. 2022, 10(3), 168-172. doi: 10.11648/j.sd.20221003.24

    Copy | Download

    AMA Style

    Chen Yingda, Heng Xingchen, Ou Yongtong, Chen Chongchen, Lin Junhong, et al. Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3. Sci Discov. 2022;10(3):168-172. doi: 10.11648/j.sd.20221003.24

    Copy | Download

  • @article{10.11648/j.sd.20221003.24,
      author = {Chen Yingda and Heng Xingchen and Ou Yongtong and Chen Chongchen and Lin Junhong and Deng Ke},
      title = {Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3},
      journal = {Science Discovery},
      volume = {10},
      number = {3},
      pages = {168-172},
      doi = {10.11648/j.sd.20221003.24},
      url = {https://doi.org/10.11648/j.sd.20221003.24},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.sd.20221003.24},
      abstract = {Distributed energy has the characteristics of wide geographical distribution. Fuoh-distributed energy needs to use various communication methods to access grid information exercise. For remote control and other key information, this information is vulnerable to third-party attacks, attacks can cause grid operations to malfunction. This paper proposes a message integrity authentication method about distributed new energy remote control system, it is designed based on SM3 message. First of all, analysis of the content of the transmitted telecontrol message, use SM3 hash calculation to generate the corresponding hash value, the hash value in this article is 1. And sent to the opposite side together with the remote control message. The receiver will receive the sent information, when the receiver has completely received the sent content and continue to calculate the remote control message information, the calculation process is to use the hash operation to process and get the hash value 2, compare this value with the hash value of 1, and continue to transmit together with the remote control message. This paper exemplifies the specific operation steps, provide reference for readers to use. And developed special test software, the designed method was tested with this software, the test results show that the designed method is feasible, meet the design requirements, realize the safe communication of power grid information.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Distributed New Energy Remote Control Message Integrity Authentication Method Based on SM3
    AU  - Chen Yingda
    AU  - Heng Xingchen
    AU  - Ou Yongtong
    AU  - Chen Chongchen
    AU  - Lin Junhong
    AU  - Deng Ke
    Y1  - 2022/06/09
    PY  - 2022
    N1  - https://doi.org/10.11648/j.sd.20221003.24
    DO  - 10.11648/j.sd.20221003.24
    T2  - Science Discovery
    JF  - Science Discovery
    JO  - Science Discovery
    SP  - 168
    EP  - 172
    PB  - Science Publishing Group
    SN  - 2331-0650
    UR  - https://doi.org/10.11648/j.sd.20221003.24
    AB  - Distributed energy has the characteristics of wide geographical distribution. Fuoh-distributed energy needs to use various communication methods to access grid information exercise. For remote control and other key information, this information is vulnerable to third-party attacks, attacks can cause grid operations to malfunction. This paper proposes a message integrity authentication method about distributed new energy remote control system, it is designed based on SM3 message. First of all, analysis of the content of the transmitted telecontrol message, use SM3 hash calculation to generate the corresponding hash value, the hash value in this article is 1. And sent to the opposite side together with the remote control message. The receiver will receive the sent information, when the receiver has completely received the sent content and continue to calculate the remote control message information, the calculation process is to use the hash operation to process and get the hash value 2, compare this value with the hash value of 1, and continue to transmit together with the remote control message. This paper exemplifies the specific operation steps, provide reference for readers to use. And developed special test software, the designed method was tested with this software, the test results show that the designed method is feasible, meet the design requirements, realize the safe communication of power grid information.
    VL  - 10
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • China Southern Power Grid Digital Grid Group Co., Ltd, Guangzhou, China

  • Sections