[1] |
张木玲. 智能电网中若干安全和隐私问题的研究[D]. 上海:上海交通大学, 2014.
|
[2] |
GUNGOR V C, LU B, HANCKE G P, et al. Opportunities and challenges of wireless sensor networks in smart grid[J]. IEEE Transactions on Industrial Electronics, 2010,57(10):3557-3564.
|
[3] |
FANG X, MISRA S, XUE G, et al. Smart grid—The new and improved power Grid: A Survey[J]. IEEE Communications Surveys and Tutorials, 2012,14(4):944-980.
|
[4] |
田秀霞, 李丽莎, 孙超超, 等. 面向智能电表的隐私保护综述[J]. 华东师范大学学报(自然科学版). 2015(5):46-60.
|
|
TIAN Xiuxia, LI Lisha, SUN Chaochao, et al. Review on privacy protection approaches in smart meter[J]. Journal of East China Normal University(Natural Science), 2015(5):46-60.
|
[5] |
张航, 王振岳, 陈星. 基于智能电表的低压电网故障预判系统[J]. 华电技术, 2019,41(2):14-17.
|
|
ZHANG Hang, WANG Zhenyue, CHEN Xing. Fault prediction system for low voltage power grid based on smart meters[J]. Huadian Technology, 2019,41(2):14-17.
|
[6] |
WANG W, LU Z. Survey cyber security in the smart grid: Survey and challenges[J]. Computer Networks, 2013,57(5):1344-1371.
|
[7] |
DENG R, XIAO G, LU R, et al. False data injection on state estimation in power systems—Attacks, Impacts, and Defense: A survey[J]. IEEE Transactions on Industrial Informatics, 2017,13(2):411-423.
|
[8] |
XIAO J, ZU G, GONG X, et al. Observation of security region boundary for smart distribution grid[J]. IEEE Transactions on Smart Grid, 2017,8(4):1731-1738.
doi: 10.1109/TSG.2015.2505325
|
[9] |
WANG K, YU J, YU Y, et al. A Survey on energy internet:Architecture, approach, and emerging technologies[J]. IEEE Systems Journal, 2018,12(3):2403-2416.
|
[10] |
贾悠, 叶常华, 卢宇浩, 等. 一种基于安全标签的单向身份认证技术[J]. 通信技术, 2020,53(5):1231-1234.
|
|
JIA You, YE Changhua, LU Yuhao, et al. One-way identity authentication technology based on security label[J]. Communications Technology, 2020,53(5):1231-1234.
|
[11] |
周权, 许舒美, 杨宁滨. 一种基于ABGS的智能电网隐私保护方案[J]. 信息网络安全, 2019(7):25-30.
|
|
ZHOU Quan, XU Shumei, YANG Ningbin. A privacy protection scheme for smart grid base on attribute-based group signature[J]. Net Information Security, 2019,19(7):25-30.
|
[12] |
PORAMBAGE P, SCHMITT C, KUMAR P, et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications[C]// IEEE Wireless Communication and Networking Conference, 2014:2728-2733.
|
[13] |
SUH G E, DEVADAS S. Physical unclonable functions for device authentication and secret key generation[C]// IEEE Design Automation Conference, 2007:9-14.
|
[14] |
MAES R. Physically Unclonable Functions: Constructions, properties and applications[M]. Hoboken, NJ, USA: Springer, 2013.
|
[15] |
LESZCZYNA R. Cybersecurity and privacy in standards for smart grids: A comprehensive survey[J]. Computer Standards & Interfaces, 2018: 62-73.
|
[16] |
BURROWS M, ABADI M, NEEDHAM R M, et al. A logic of authentication[J]. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 1989,426(1871):233-271.
|
[17] |
MAO W, BOYD C. Towards formal analysis of security protocols[C]/ /IEEE Computer Security Foundations Symposium, 1993: 147-158.
|