• CSCD核心库收录期刊
  • 中文核心期刊
  • 中国科技核心期刊

电力建设 ›› 2019, Vol. 40 ›› Issue (5): 55-62.doi: 10.3969/j.issn.1000-7229.2019.05.007

• 能源互联网中的信息-物理融合系统 ·栏目主持 汤奕副教授· • 上一篇    下一篇

电动汽车充电桩-后台服务管理中心信息安全防护方案设计与实现

王伟贤,朱洁,田贺平,陈振,袁小溪   

  1. 国网北京市电力公司,北京市100075
  • 出版日期:2019-05-01
  • 作者简介:王伟贤(1987),女,硕士,工程师,主要研究方向为电动汽车及数据分析; 朱洁(1972),女,高级工程师,主要从事电动汽车数据分析方面的研究工作; 田贺平(1991),男,硕士,工程师,主要从事电动汽车及数据分析方面的研究工作; 陈振(1989),男,硕士,助理工程师,主要研究方向为电动汽车信息化系统; 袁小溪(1993),女,硕士,助理工程师,主要研究方向为充换电设施选址规划。
  • 基金资助:
    国网北京市电力公司科技项目(520223170010)

Design and Implementation of Information Security Protection Scheme of Electric Vehicle Charging Pile-Background Service Management Center

WANG Weixian, ZHU Jie, TIAN Heping, CHEN Zhen, YUAN Xiaoxi   

  1. State Grid Beijing Electric Power Company, Beijing 100075, China
  • Online:2019-05-01
  • Supported by:
    This work is supported by State Grid Beijing Electric Power Company Research Program(No.520223170010).

摘要: 为提高分布式电动汽车充电桩的信息安全防护能力,保障充电桩与后台服务管理中心之间传输数据的机密性、完整性与真实性,分析了充电桩信息安全威胁与信息安全需求,采用高级加密标准(advanced encryption standard,AES)和HMAC-SHA256算法,设计了基于认证加密的充电桩-后台服务管理中心信息安全防护方案;基于STM32F407ZGT6芯片和嵌入式操作系统μC/OS-III,搭建了充电桩通信模拟平台;制定了充电桩-后台服务管理中心通信应用层协议,设计了充电桩-后台服务管理中心信息安全防护方案;测试了不同类型数据在明文传输、加密传输、认证传输、认证加密传输4种安全情形下的报文传输时间,量化了充电桩-后台服务管理中心信息安全防护方案的实施对充电桩通信实时性的影响。测试结果表明,所设计信息安全防护方案可满足充电桩与后台服务管理中心之间通信的机密性、完整性、真实性和实时性要求。

关键词: 分布式充电桩, 信息安全防护方案, 通信模拟平台, 安全防护方案实现

Abstract: In order to improve the capability of information security protection of the charging pile and guarantee the confidentiality, integrity and authenticity of data transmitted between charging pile and background service management center, this paper analyses the information security threat and security requirements of the charging pile and designs an information security protection scheme of charging pile-background service management center on the basis of authentication and encryption by means of using AES algorithm and HMAC-SHA256 algorithm. On the basis of STM32F407ZGT6 and embedded operating system μC/OS-III, a simulation platform of charging pile communication is built. Then, the application layer communication protocol has been formulated to implement the information security protection scheme of charging pile-background service management center. Finally, the transmission time of four security cases (plaintext transmission, encrypted transmission, authentication transmission and authentication encryption transmission) is measured and the effect of information security protection scheme on real-time transmission is quantified. The results show that the information security protection scheme designed can meet the confidentiality, integrity, authenticity and real-time requirements of communication between the charging pile and background service management center.

Key words: distributed charging pile, information security protection scheme, communication simulation platform, implementation of security protection scheme

中图分类号: