Data authentication based on frequency watermarking for smart grid

被引:1
作者
机构
[1] Jiangsu Electric Power Company
[2] Jiangsu Taizhou Electric Power Company
[3] College of Electrical Engineering, Zhejiang University
来源
Chen, S. (chenshengtz@sina.com) | 1600年 / Electric Power Automation Equipment Press卷 / 34期
关键词
Authentication; Fourier transforms; Frequency; Security of data; Smart grid; Watermarking;
D O I
10.3969/j.issn.1006-6047.2014.07.028
中图分类号
学科分类号
摘要
According to the features of smart grid communication network, it is proposed to apply the grid frequency information in the authentication of real-time interactive data to enhance data security. The frequency watermarking of real-time grid frequency monitoring network is modeled and then embedded in the transmitting data by the fractional Fourier transform. The received data are authenticated according to the embedded frequency watermarking for secure data communication. Because the energy of embedded information is distributed in traditional time-frequency domain, the security is high. Simulations and experiments demonstrate that the watermarking embedding algorithm based on the fractional Fourier transform has higher security and resistibility to regular noise attack, low-pass filtering attack and down-sampling attack.
引用
收藏
页码:163 / 167+173
相关论文
共 16 条
[1]  
Chen S., Song S., Li L., Et al., Survey on smart grid technology, Power System Technology, 33, 8, pp. 1-6, (2009)
[2]  
Han Z., Cao Y., Power system security and its prevention, Power System Technology, 28, 9, pp. 1-6, (2004)
[3]  
Zhong J., Zheng R., Yang W., Et al., Construction of smart grid at information age, Power System Technology, 33, 13, pp. 12-18, (2009)
[4]  
dos Santos A.L.M., Torrey M.E., Ei Sheshai A., Supporting national public key infrastructures using smart cards, International Journal of Computers and Applications, 27, 1, pp. 1-6, (2005)
[5]  
Li M., Hao X., Zhang S., Vulnerability and countermeasure analysis of the public key infrastructure, Journal of Harbin Institute of Technology, 39, 4, pp. 665-668, (2007)
[6]  
Li L., Ma Y.Y., Chang C.C., Et al., Analyzing and removing suresign watermark, Signal Processing, 93, 5, pp. 1374-1378, (2013)
[7]  
Gardner R.M., Liu Y., FNET: a quickly deployable and economic system to monitor the electric grid, 2007 IEEE Conference on Technologies for Homeland Security, pp. 209-214, (2007)
[8]  
Kook K.S., Liu Y., Bang M.J., Global behavior of power system frequency in Korean power system for the application of frequency monitoring network, Generation, Transmission & Distribution, IET, 2, 5, pp. 764-774, (2008)
[9]  
Grigoras C., Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis, Forensic Science International of Science Direct, 167, 11, pp. 136-145, (2007)
[10]  
Brixen E.B., ENF-quantification of the magnetic field, 32nd International Conference of Audio Engineering, pp. 1-6, (2008)