Disclosure of Invention
The invention aims to provide an information security architecture of an electric mobile internet of things and a using method thereof, so as to solve one or more technical problems. The information security architecture of the electric mobile Internet of things can improve the operation security of a power grid and avoid the safety threat of the electric mobile Internet of things.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides an information security architecture of an electric mobile Internet of things, which comprises the following components:
the sensing layer is designed based on a block chain and is used for sensing, collecting and identifying data;
the network layer is designed based on dynamic security association and is used for data access and transmission;
the platform layer is designed based on data desensitization and big data processing and is used for mining, calculating and storing data;
and the application layer is designed based on the confrontation sample detection model and is used for data processing and data application.
In a further improvement of the present invention, the sensing layer based on the block chain design comprises:
the sensor equipment is used for sensing and acquiring data;
the system comprises a consensus node, a feedback mechanism and a feedback mechanism, wherein the consensus node is a network structure with a plurality of node branches; the consensus node is used for carrying out multiple times of security verification on data transmitted by the sensor equipment and carrying out consistency verification on the data according to a preset formula or an evaluation mechanism; the return mechanism is used for returning data which passes security verification and consistency check;
the verification node is used for verifying information between the inside and the outside of the sensor equipment;
and the storage node is a node network capable of storing information and is used for connecting the sensor equipment with the data center.
In a further improvement of the present invention, the sensing layer based on the blockchain design further comprises:
a synchronization node, which is a display mechanism processed by the information security system, for displaying the security of the information.
The invention is further improved in that the network layer based on the dynamic security association design adopts a security association authentication architecture based on the sharing dynamics;
the security association authentication architecture based on the sharing dynamic state comprises distributed heterogeneous wireless networks, and each heterogeneous wireless network is provided with an authentication server for authenticating the mobile terminal.
A further improvement of the present invention is that the step of authenticating the mobile terminal specifically comprises:
the authentication server in the network where the subscription service of the mobile terminal is located is the home authentication server of the mobile terminal; when the mobile terminal roams to an external network, an authentication server of a network where the mobile terminal is located is a local authentication server; in a heterogeneous wireless network, each access router shares the same static security association with an authentication server in the network, and all local authentication servers are connected with each other through dynamic security associations;
when the mobile terminal is positioned in a home network, establishing static security association with a local authentication server; when the mobile terminal roams to an external network, the mobile terminal establishes dynamic security association with the local authentication server.
A further development of the invention is that the validity period T of the dynamic security associationSAExpressed as:
TSA=Tau+TS+Tth,
in the formula, TauFor required authentication time, TSFor service time, TthIs a time threshold for dynamic security associations.
In a further improvement of the present invention, in the platform layer designed based on data desensitization and big data processing,
a data desensitization method is adopted to realize platform layer privacy protection;
converting the structured data storage into semi-structured or unstructured data storage, and compressing all existing data information; alternatively, the information is converted into a preset structure through a big data calculation mode.
A further refinement of the invention is that the data desensitization method is one or more of data aggregation, data sampling and data sampling.
In the application layer designed based on the confrontation sample detection model,
the confrontation-based sample detection model is constructed by using an artificial intelligence algorithm, and the algorithm is a method based on neural network training or threshold value;
in the countermeasure sample-based detection model, countermeasure samples are added into a training set; decreasing the magnitude of the network gradient using a defensive distillation method; the input is randomly adjusted.
The invention provides a use method of an information security architecture of an electric mobile Internet of things, which comprises the following steps:
the sensing layer captures data related to flow state or environmental condition, and verifies and identifies the transmitted data based on a block chain technology to ensure the safety and consistency of the data;
the network layer acquires data from the sensing layer and realizes the transmission and switching of the data in different networks based on dynamic security association;
the platform layer acquires data from the network layer, and mining, calculating and storing of the data are realized based on data desensitization and big data processing;
the application layer obtains data from the platform layer, unified safety detection is carried out on the data based on the countermeasure sample detection model, and the data passing through the safety detection are used for various preset intelligent terminals.
Compared with the prior art, the invention has the following beneficial effects:
the existing information security architecture of the power internet of things cannot process complex data and simultaneously ensure the overall security, so that the information security evaluation parameters are low; in order to enhance the information security of the electric power Internet of things, the invention discloses an electric power mobile Internet of things information security architecture, which is provided with a sensing layer based on a block chain technology, a network layer based on a dynamic security association technology, a platform layer based on a big data technology and an application layer based on a countermeasure sample detection model, so that the whole electric power Internet of things architecture has the advantages of high security performance and high data processing efficiency, the information security of an electric power Internet of things terminal can be ensured, the electric power Internet of things is prevented from being threatened by security, the operation security of a power grid is improved, and the economic benefit of an electric power enterprise is maintained.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention is described in further detail below with reference to the accompanying drawings:
the electric power internet of things terminals are various in types and can be divided into a distribution transformer terminal, an FTU/DTU, a primary and secondary fusion terminal of a power distribution system, a meter metering terminal of an electric power system and a post-user-metering intelligent home terminal according to service scenes; according to asset attribution and attack damage consequences, the method can be mainly divided into a power distribution and utilization terminal belonging to power grid assets and a user intelligent home terminal belonging to user assets. The consequences of the attack damage of the internet of things terminal are obviously different, wherein the attack damage to the power distribution and utilization terminal affects the power supply of a direct-associated user on the light side and invades a production control area on the heavy side to cause power failure of a large number of users, and the attack damage to the intelligent home terminal mainly relates to the leakage of user privacy information.
An important characteristic of the power internet of things is the ubiquitous power communication network, a large number of public network protocols are deployed in the power communication network, the power grid supervision level is improved, and meanwhile, an applicable platform is provided for most internet attack means. And the identity authentication risk faced by the power Internet of things is analyzed by combining the power Internet of things architecture. Along with the evolution of the open interconnection of the power internet of things, the power internet of things has massive network connection, especially under the environment of mobile, ubiquitous, hybrid and wide area interconnection, a large amount of internal and external network data acquisition, control and management equipment such as a sensing device, a mobile terminal, video monitoring, an intelligent electric meter, a charging pile and an office computer are deployed in the power internet of things, so that the identity recognition is realized, the accurate positioning of a service system on massive power equipment is realized, and the problem that the false identity recognition and the malicious counterfeit access must be faced is solved.
The block chain mainly comprises a point-to-point networking part, an account book structure and a consensus mechanism. The distributed general ledger is disclosed in the whole network, a decentralized mode is adopted for management, user nodes in the whole network are agreed through a consensus mechanism, the network is controlled by all users together, and only when most users agree to make a certain change, the change can be effective. Each node locally stores a copy of the distributed general ledger, records all legal and commonly recognized transactions in the point-to-point network, and any node can find the transaction information of a certain user through the local ledger.
The electric power internet of things terminal is located at the bottommost layer of a cloud pipe side end system, is a key node for connecting a physical world and a digital world, realizes state perception in various heterogeneous network environments by adopting various types of sensing equipment, is complex in safety condition, and faces the challenge of access safety. With the development of the smart power grid, the power grid faces the problem of processing mass data, and the block chain and the mass data have great potential value in the smart power grid. In the electric power internet of things information security architecture disclosed by the embodiment of the invention, the concepts of a block chain, big data and artificial intelligence are fused, and the whole architecture is built in a computer device in a stage division manner, so that the information acquisition effect of a data center can be enhanced, and the data calculation and processing capability of the internet of things device is stably improved.
The architecture provided by the embodiment of the invention can be applied to the business requirements in the fields of public security, police service application and police service informatization, and a police Internet of things system can be constructed based on the proposed system architecture.
Referring to fig. 1, an information security architecture of an electric mobile internet of things according to an embodiment of the present invention includes:
a sensing layer comprising: the device comprises a data acquisition module, an edge calculation module and a sensing equipment module; the sensing layer is used for sensing, collecting, identifying and the like of data;
a network layer, comprising: wired transmission and wireless transmission; the network layer is used for data access, transmission and the like;
a platform layer comprising: data mining, data storage and data calculation; the platform layer is used for starting and stopping the data, and comprises data mining, data storage and the like;
an application layer comprising: various intelligent terminals; the application layer is used for data processing and data application.
(1) In the embodiment of the invention, the sensing layer design based on the block chain technology comprises the following steps:
the information security design of the sensing layer is mainly used for preventing the sensor device from being attacked maliciously, and in general, a node device connected with each other may be designed to connect the sensor device with the data center, as shown in fig. 2.
In the device shown in fig. 2, the consensus node is a network structure with a plurality of node branches, and the data security is ensured by repeatedly verifying the data transmitted in the sensor device. Meanwhile, the consensus node can also perform consistency check on the data conducted through the transmission node according to a certain formula or an evaluation mechanism, and a return mechanism is needed at the tail of the consensus node to return the data passing through the consensus node to the original sample. The main function of the verification node is to verify information between the inside and the outside of the sensor, so that an information processing device in the sensor can correctly process the relationship between hardware and software, and data generated by combining the hardware and the software is transmitted to the node.
When the access control policy is uploaded in clear text, it may reveal some sensitive information about the data user. If the mapping function from the attributes to the access control matrix can be removed, the entire attribute will be hidden in the anonymous access control structure, and the mapping function is reconstructed when the data user decrypts the data.
The storage node is a node network capable of temporarily storing information, and in general, the storage mode can temporarily connect the data center and the sensor equipment and establish a communication bridge between the data center and the sensor equipment. The last synchronization node is a display mechanism processed by the information security system, if the security of the information is displayed in the synchronization node, the information can be completely transmitted to the data center, otherwise, the hidden danger of the information is indicated, and the information needs to be verified repeatedly or deleted directly.
(2) In the embodiment of the invention, the network layer design based on the dynamic security association technology comprises the following steps:
the design starting point of the network layer is the safe access of the terminal under the heterogeneous network, and a dynamic safety association technology is introduced to improve a mobile authentication architecture.
When a mobile terminal is switched in a traditional Authentication architecture based on static security association, an external Network Agent FA (FA, Foreign Agent) sends out consultation information, the mobile terminal adds a Network Access Identifier (NAI, Network Access Identifier) and a challenge response and other messages into a mobile IP request, the external Network Agent starts an Authentication and authorization protocol through an external Network Authentication Center (FAC) to generate a VAC mobile registration request message, wherein the VAC mobile registration request message contains a registration request message of the mobile terminal, the FAC analyzes the NAI, finds a Home Authentication Center (HAC) address of the mobile terminal, starts an AAA protocol and waits for the approval of the HAC. The HAC verifies the certificate information of the mobile terminal and if the verification is successful, the mobile terminal is assigned a home address. Essentially, the problem of Security Association (SA) still exists between two different static networks. In the embodiment of the invention, an authentication architecture based on sharing dynamic security association rather than static security association is adopted. The architecture mainly comprises a distributed heterogeneous wireless network, wherein each network is provided with an authentication server so as to authenticate the mobile terminal. A mobile terminal subscribes to a service in a network, where an Authentication Server is a Home Authentication Server (HAS) of the mobile terminal, and when the mobile terminal roams to an external network, the Authentication Server of the network where the mobile terminal is located is called a Local Authentication Server (LAS).
In a wireless network, each Access Router (AR) shares the same static security association with an authentication server in the network. When the mobile terminal is positioned in a home network, establishing static security association with the HAS; but when the mobile terminal roams to an external network, a dynamic security association is established with the LAS and all LAS are also connected to each other through the dynamic association.
Alternatively, the mobile terminals in the heterogeneous network may show different mobility states, which are summarized as high mobility and low mobility. Since a low Mobility Terminal (MTLM) may cover a smaller area than a high mobility node (MTLM) for a certain period of time, it may generate less inter-domain handover authentication than a high mobility terminal, and generate more intra-domain handover authentication than a high mobility node. The high mobility node always frequently accesses a new external network, establishes a new security association for inter-domain handover authentication, and the low mobility terminal can dynamically reuse the established SA during intra-domain authentication.
The validity period of the SA may be expressed as:
TSA=Tau+TS+Tth (1)
in the formula, TauFor required authentication time, TSFor service time, TthIs the time threshold for dynamic SA.
The T of the low-mobility terminal is enabled to be higher by setting a higher time threshold value for the low-mobility terminal and setting a lower time threshold value for the high-mobility nodeSAT of longer, high mobility nodeSAShorter.
The variable time threshold is set for the validity period of the security association, so that the authentication delay is reduced at the low-mobility node, and the bandwidth efficiency is improved, and for the high-mobility node, the average value and the privacy exposure possibility of the security association are reduced under the condition of maintaining certain authentication delay and bandwidth efficiency, and the security performance of the mobile terminal in switching among different networks is effectively improved.
(3) In the embodiment of the invention, a platform layer design based on a big data technology comprises the following steps:
1) privacy protection: the safety of the platform layer mainly guarantees the safety of information in the processes of calculation, storage and transmission, and the platform layer must adopt a proper safety strategy to guarantee the privacy and the safety of the information in the ubiquitous power internet of things, so that the safety requirement of platform layer privacy protection is met by adopting a data desensitization technology.
Data desensitization generally involves several methods:
and (3) data aggregation: data aggregation, which is a collection of statistical techniques (e.g., sum, count, average, maximum and minimum), when applied to attributes in micro data, produces results that are representative of all records in the original data set.
Illustratively, the use of data aggregation should note several aspects:
a) data aggregation may reduce the usefulness of the data; since statistical values are obtained, the characteristics of the individual data records cannot be reflected.
b) Data aggregation is very effective against heavy identification attacks; the output of the data aggregation is a "statistical value" that facilitates overall reporting or analysis of the data without revealing any individual records.
Data sampling: data sampling is an important method for improving the effectiveness of data desensitization techniques by selecting a representative subset of the data set to analyze and evaluate the original data set.
Illustratively, the selection and use of data sampling techniques should be addressed in several ways:
a) there are many methods for extracting samples from a data set, and the methods are very different and need to be selected according to the characteristics of the data set and the expected use scenario.
b) Data sampling is often used for pre-processing of data desensitization, and random sampling of a data set can increase the uncertainty in identifying a particular personal information data subject, thereby improving the effectiveness of other data desensitization techniques for subsequent applications.
c) Data sampling can simplify the amount of computation on a data set, so when performing data desensitization on a data set of large samples, sampling is performed first, and then data desensitization is performed by using a specific technology, and it is necessary to pay attention to that the samples should not lose important data.
Deterministic encryption: deterministic encryption is a non-random symmetric encryption; deterministic encryption replaces the identifier value in the micro data with the encryption result when applied during data desensitization.
Illustratively, the selection and use of deterministic encryption techniques should be addressed to the following:
a) deterministic encryption can ensure that data is truly usable, i.e., two identical data encrypted with the same key will produce two identical ciphertexts.
b) Deterministic encryption can guarantee the usefulness of data in the aspects of statistical processing, privacy and anti-mining to some extent, and can also generate micro-data for precise matching search, data association and analysis. The analysis of the deterministic encryption result is limited to checking whether the data values are equal.
c) The re-identification attack on the deterministic encryption mainly lies in the attack without the key use right; the correlation attack may be applied to ciphertext that is deterministically encrypted using the same key, and the success of the attack depends largely on the choice of encryption algorithm parameters.
2) Data storage
In the platform layer, in order to strengthen information security, a structured data storage needs to be converted into a semi-structured or unstructured data storage in some special ways, and all existing data information is compressed and processed, or the information is converted into a structure which is easier to process through a large data calculation mode. The data generally has the characteristics of high value, high density and high storage efficiency, and is more suitable for an internet of things system with smaller memory amount compared with the conventional data. In combination with specific information of the power mobile internet of things, the structure system of big data can be referred to.
As shown in fig. 3, the whole system can be roughly divided into four parts, which are respectively the initialization stage of the database, and in this stage, the system flow stores all the existing data information in the database, so as to prevent the data loss. The second part is an adding and storing part of data, and in the stage, a computer can add a part of data information to the power internet of things information security terminal, which is also a core part of the whole data storage model. Here, it is necessary to first calculate whether the data is larger than the capacity of the database, if the data can be stored, the third part may be entered, and if the memory is insufficient, the stage of initializing the database needs to be returned. If the database is abnormal, the database initialization stage needs to be returned, and if the database is not abnormal, the data indexing step of the fourth stage can be entered. The data indexing is mainly to really add data information into the information security terminal of the power internet of things, place the data information at a due position, update a directory file of a database and give an address of newly added data. After all the above algorithms are implemented, the storage of the network data can be primarily completed.
(4) In the embodiment of the invention, the application layer design based on the confrontation sample detection model comprises the following steps:
in an application layer, the power internet of things faces massive data generated by various intelligent applications, and the importance of the safety performance of the power internet of things is self-evident. Therefore, in the design of the application layer, a confrontation sample detection model is constructed by using artificial intelligent algorithms such as machine learning and deep learning. Algorithms for detecting models are numerous and can be broadly classified into neural network training-based and threshold-based methods. The process of constructing the model based on training is that a normal sample and a malicious sample are collected firstly, and after feature extraction, the model is obtained through a certain training process. And constructing a model based on the threshold value by calculating a parameter model of the data, and performing hypothesis test according to the parameter model to determine the optimal threshold value. Finally, a plurality of constructed models are selected according to the requirements of the application scenario, and the specific flow is shown in fig. 4.
The evaluation and selection of the detection model can be considered from three directions: algorithm performance, detection capability, and complexity of the input data. The algorithm performance analysis comprises the space-time complexity of the detection algorithm and the robustness of the algorithm. The defense technology for improving the robustness of the model is established on the model which has good performance under antagonism and normal input, so that the model is less sensitive to irrelevant changes of input, the model is effectively regularized to reduce attack surfaces, and the response to non-manifold disturbance is limited. Illustratively, the following 3 types of defense methods against attacks can be introduced to enhance the robustness of the model: (1) data expansion: the countermeasure sample is added into the training set for retraining, so that the robustness of the model is improved; (2) the regularization method comprises the following steps: the size of the network gradient is reduced by using a defensive distillation method, and the discovery capability of a small-amplitude disturbance countermeasure sample is improved; (3) data randomization: a method for eliminating the disturbance by randomly adjusting the input.
The detection capability of the model can be analyzed from the false alarm rate, the false negative rate and the universality of the algorithm. The complexity of input data, i.e., the dimension, accuracy and data size of the feature data required in the process of training the model, affects the efficiency of generation and use of the model.
The use method of the information security architecture of the electric mobile Internet of things comprises the following steps:
step 1, capturing data related to a process state or an environmental condition by a sensor of a sensing layer, and repeatedly verifying the data transmitted in a sensor device of a consensus node of a network structure with a plurality of node branches to ensure the safety of the data;
step 2, data received from the sensors appear in an analog form, are collected and converted into a digital form, and transmission and switching of the data in different networks are realized through a shared dynamic security association authentication architecture;
and 3, the data enters the platform layer from the network layer, and the processes of data mining, calculation, storage and the like are completed on the platform layer supported by the data desensitization technology.
And 4, enabling the data to enter an application layer, carrying out uniform safety detection on the data by an antagonistic sample detection model of the application layer, filtering malicious data, and finally applying the malicious data to the intelligent terminal.
In summary, the embodiment of the invention specifically discloses an information security architecture of an electric mobile internet of things and a use method thereof. Specifically, in order to enhance the information security of the power internet of things, the embodiment of the invention provides a whole set of information security overall architecture of the power internet of things; the sensing layer is designed based on the block chain technology, and a consensus node, a verification node, a storage node and a synchronization node are added between the sensor and the data center, so that the sensor is prevented from being attacked easily and the information security of the sensing layer is enhanced; a network layer is designed based on a dynamic security association technology, and a variable time threshold is set for the validity period of security association, so that the authentication delay is reduced at a low-mobility node, the bandwidth efficiency is improved, the average value and the privacy exposure possibility of the security association are reduced, and the security performance of switching of a mobile terminal between different networks is effectively improved; a platform layer is designed based on a privacy protection technology and a big data technology, sensitive data in mass data are processed by using a data desensitization technology, and the abnormal rate of the data storage process is reduced, so that the data storage system has high data security and high data storage efficiency; an application layer is designed based on a constructed countermeasure sample detection model, and the countermeasure sample detection model is constructed by carrying out feature extraction on data, so that the malicious sample recognition rate of the application layer terminal is improved, and the information safety of the power internet of things terminal is enhanced. In summary, the electric power internet of things information security architecture disclosed by the embodiment of the invention is designed in a detailed layered manner, and the sensing layer, the network layer, the platform layer and the application layer are designed and improved in detail by using technologies such as a block chain, big data, dynamic security association, privacy protection and an antagonistic sample detection model, so that the whole electric power internet of things architecture has the advantages of high security performance and high data processing efficiency.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.