浏览全部资源
扫码关注微信
1. 国网冀北电力有限公司信息通信分公司,北京,100053
2. 全球能源互联网研究院,北京,102209
3. 国网冀北电力有限公司,北京,100053
[ "任建伟(1980-),男,国网冀北电力有限公司信息通信分公司高级工程师,主要从事电力通信安全研究与运维工作。" ]
[ "安春燕(1987-),女,博士,全球能源互联网研究院工程师,主要从事无线通信、电力线载波通信技术研究工作。" ]
[ "刘昀(1980-),女,博士,国网冀北电力有限公司信息通信分公司高级工程师,主要从事电力市场、信息通信安全等工作。" ]
[ "李坚(1987-),男,国网冀北电力有限公司工程师,主要从事电力信息安全研究与管理工作。" ]
网络出版日期:2015-12-20,
纸质出版日期:2015-12-20
移动端阅览
任建伟, 安春燕, 刘昀, 等. 对等网络与能源互联网安全[J]. 电信科学, 2015,31(Z1):74-78.
Jianwei REN, Chunyan AN, Yun LIU, et al. Security on peer to peer networking in energy internet[J]. Telecommunications science, 2015, 31(Z1): 74-78.
任建伟, 安春燕, 刘昀, 等. 对等网络与能源互联网安全[J]. 电信科学, 2015,31(Z1):74-78. DOI: 10.11959/j.issn.1000-0801.2015387.
Jianwei REN, Chunyan AN, Yun LIU, et al. Security on peer to peer networking in energy internet[J]. Telecommunications science, 2015, 31(Z1): 74-78. DOI: 10.11959/j.issn.1000-0801.2015387.
摘要:对等网络技术在互联网中得到了广泛的应用,它具有的自愈、自组织等特性可以满足能源互联网在高可靠性、节点即插即用等方面的需求,但对等网络也带来了新的安全威胁。研究了对等网络的抽象特征,分析了在能源互联网中应用对等技术将面临的主要安全威胁,并给出了相应的安全建议。
Peer to peer systems are widely deployed in the internet.Its self-healing and self-organizing framework will facilitate plug and play
high reliability and other features of the energy internet.But it brings new threat.The abstract features were researched.The threats introduced by peer to peer networking in the energy internet scenario were analyzed
and accordingly countermeasures were given.
RIFKIN J . The third industrial revolution:how lateral power is transforming energy,the economy and the world [M ] . Berlin : Macmillan , 2011 : 27 - 68 .
田世明 , 栾文鹏 , 张东霞 , 等 . 能源互联网技术形态与关键技术 [J ] . 中国电机工程学报 , 2015 , 35 ( 14 ): 3482 - 3494 .
TIAN S M , LUAN W P , ZHANG D X , et al . Technical forms and key technologies on energy internet [J ] . Proceedings of the CSEE , 2015 , 35 ( 14 ): 3482 - 3494 .
刘振亚 . 全球能源互联网 [M ] . 北京 : 中国电力出版社 2015 .
LIU Z Y . Global energy interconnection [M ] . Beijing : China Electric Power Press 2015 .
杨新法 , 苏剑 , 吕志鹏 , 等 . 微电网技术综述 [J ] . 中国电机工程学报 , 2014 , 34 ( 1 ): 57 - 70 .
YANG X F , SU J , LV Z P , et al . Overview on micro-grid technology [J ] . Proceedings of the CSEE , 2014 , 34 ( 1 ): 57 - 70 .
赵海 , 蔡巍 , 王进法 , 等 . 能源互联网架构设计与拓扑模型 [J ] . 电工技术学报 , 2015 , 30 ( 11 ).
ZHAO H , CAI W , WANG J F , et al . An architecture design and topological model of inter grid [J ] . Transactions of China Electrotechnical Society , 2015 , 30 ( 11 ).
ZHOU J , HU R Q , QIAN Y , et al . Scalable distributed communication architectures to support advanced metering infrastructure in smart grid [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 : 23 ( 9 ): 1632 - 1642 .
WANG A , ROGERS J . Peer to peer electricity:beyond the smart grid [M ] . [S.l.]:AXL Incorporated , 2012 .
CAI F , FARANTATOS E , HUANG R , et al . Self-powered smart meter with synchronized data [C ] // 2012 IEEE Radio and Wireless Symposium(RWS) , January 15 - 18 , 2012 , Santa Clara,CA, USA . New Jersy : IEEE Press , 2012 : 395 - 398 .
YUE X , QIU X , JI Y , et al . P2P attack taxonomy and relationship analysis [C ] // The 11th International Conference on ICACT , February 15 - 18 , 2009 , Phoenix Park,Korea . New Jersy : IEEE Press , 2009 : 1207 - 1210 .
张春红 , 裘晓峰 , 弭伟 , 等 . P2P技术全面解析 [M ] . 北京 : 人民邮电出版社 , 2010 .
ZHANG C H , QIU X F , MI W , et al . Comprehensive analysis of P2P technology [M ] . Beijing : Posts and Telecom Press , 2010 .
]Khan:vulnerabilities of P2P systems and a critical look at their solutions [EB/OL ] .[ 2006 - 11 - 01 ] . http://medianet.kent.edu/techreports/TR2006-11-01-p2pvuln-EK.pdf http://medianet.kent.edu/techreports/TR2006-11-01-p2pvuln-EK.pdf .
LIANG J , KUMAR R , XI Y , et al . Pollution in P2P file sharing systems [C ] // 24th Annual Joint Conference of the IEEE Computer and Communications Societies , March 13 - 17 , 2005 , Miami,Florida,USA . New Jersy : IEEE Press , 2005 : 1174 - 1185 .
DINGER J , HARTENSTEIN H . Defending the sybil attack in P2P networks:taxonomy,challenges,and a proposal for self-registration [C ] // The 1st International Conference on Availability,Reliability and Security , April 20 - 22 , 2006 , Vienna,Austria . New Jersy : IEEE Press , 2006 .
CERRI D , GHIONO A , PARABOSCHI S , et al . ID mapping attacks in P2P networks [C ] // IEEE Global Telecommunications Conference , November 28 - December 2 , 2005 , Saint Louis,USA . New Jersy : IEEE Press , 2005 .
STUTZBACH D , REJAIE R . Understanding churn in peer-to-peer networks [C ] // The 6th ACM SIGCOMM Conference on Internet Measurement , October 25 - 27 , 2006 , Rio De Janeiro,Brazil . New York : ACM Press , 2006 : 189 - 202 .
GANESH L , ZHAO B Y . Identity theft protection in structured overlays [C ] // The 1st IEEE ICNP Workshop on Secure Network Protocols , November 6 , 2005 , Boston,Massachusetts,USA . New Jersy : IEEE Press , 2005 : 49 - 54 .
LI J , QIU X , JI Y , et al . Researches on secure proximity distance defending attack of finger table based on chord [C ] // The 11th International Conference on Advanced Communication Technology , February 15 - 18 , 2009 , Phoenix Park,Korea . New Jersy : IEEE Press , 2009 : 1923 - 1927 .
0
浏览量
292
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构