[go: up one dir, main page]

CN109117651B - Metering data safety protection method - Google Patents

Metering data safety protection method Download PDF

Info

Publication number
CN109117651B
CN109117651B CN201810845278.7A CN201810845278A CN109117651B CN 109117651 B CN109117651 B CN 109117651B CN 201810845278 A CN201810845278 A CN 201810845278A CN 109117651 B CN109117651 B CN 109117651B
Authority
CN
China
Prior art keywords
matrix
users
security
consistency
metering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810845278.7A
Other languages
Chinese (zh)
Other versions
CN109117651A (en
Inventor
周峰
冯凌
侯兴哲
程瑛颖
周华勇
肖冀
杜杰
张家铭
常仕亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
State Grid Corp of China SGCC
Original Assignee
Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd, State Grid Corp of China SGCC filed Critical Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
Priority to CN201810845278.7A priority Critical patent/CN109117651B/en
Publication of CN109117651A publication Critical patent/CN109117651A/en
Application granted granted Critical
Publication of CN109117651B publication Critical patent/CN109117651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/12Remote or cooperative charging

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种计量数据安全防护方法,它包括:对用户、充电桩、双向计量用户的表计进行分级,将用户的计量数据单独作为区块链标签节点;对用户供电合约、社会充电桩合约采用分级安全校核;按照电压等级、供电质量要求与容量分类型;对于用户采用安全域方法进行校核;对通过安全域评估的用户直供和电动汽车的交易采用区块链智能合约进行交易;对用户进行计量,计量数据采用区块链进行标记与运输;采用FAHP算法进行影响因素分析,再进行网络整体安全性评估。引入运行在区块链上的智能合约降低电力市场交易的信任成本,提高清结算效率,同时采用安全域方法对合约的网络约束与合规性进行校验,实现计量与交易的安全保证与智能化。

Figure 201810845278

The invention discloses a metering data security protection method, which includes: grading the meters of users, charging piles and bidirectional metering users, and using the user's metering data as a block chain label node alone; The pile contract adopts hierarchical security verification; it is classified according to voltage level, power supply quality requirements and capacity; for users, the security domain method is used for verification; the transaction of direct supply to users and electric vehicle transactions that have passed the security domain assessment adopts blockchain smart contracts Conduct transactions; measure users, and use blockchain to mark and transport measurement data; use FAHP algorithm to analyze influencing factors, and then conduct overall network security assessment. The introduction of smart contracts running on the blockchain reduces the trust cost of electricity market transactions and improves the efficiency of clearing and settlement. At the same time, the security domain method is used to verify the network constraints and compliance of the contract, so as to realize the security assurance and intelligence of measurement and transaction. change.

Figure 201810845278

Description

一种计量数据安全防护方法A kind of measurement data security protection method

技术领域technical field

本发明涉及电能表计量技术领域,特别是一种计量数据安全防护方法。The invention relates to the technical field of electric energy meter measurement, in particular to a measurement data safety protection method.

背景技术Background technique

区块链(Block Chain,BC)是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。所谓共识机制是区块链系统中实现不同节点之间建立信任、获取权益的数学算法。Block Chain (BC) is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. The so-called consensus mechanism is a mathematical algorithm that realizes the establishment of trust between different nodes and the acquisition of rights and interests in the blockchain system.

安全域(Security Region,SR)方法是在逐点法基础上发展起来的新方法,它从域的角度出发考虑问题,描述的是整体可安全稳定运行的区域。The Security Region (SR) method is a new method developed on the basis of the point-by-point method. It considers the problem from the point of view of the domain, and describes the overall safe and stable operation area.

计量是电网的基础功能之一。计量就是把所用的电量(电能)记录下来,作为收费的依据,有高压计量和低压计量,有直接接表计量和经互感器接表计量,计量的核心装置就是电度表。目前一般是电能供应商提供计量服务,但是随着智能电网、微网、分布式能源等技术的发展与推广应用以及电力行业改革的推进,计量的权威性越来越需要权威的第三方与新技术和安全机制来保证。Metering is one of the basic functions of the power grid. Metering is to record the amount of electricity (electric energy) used, as the basis for charging, there are high-voltage metering and low-voltage metering, direct meter metering and metering via a transformer. The core device of metering is the watt-hour meter. At present, electricity suppliers generally provide metering services, but with the development and application of technologies such as smart grids, microgrids, and distributed energy, as well as the advancement of power industry reforms, the authority of metering increasingly requires authoritative third parties and new technology and safety mechanisms to ensure.

目前直供用户往往仅依赖电网计量、通过电网企业的信用来背书,不适合将来多主体、多模式的电力市场下的计量身份、计量数据的安全性管理。At present, direct supply users often only rely on grid metering and endorsement through the credit of grid companies, which is not suitable for the security management of metering identity and metering data in the future multi-subject and multi-mode power market.

目前的电动汽车与社会充电桩缺乏互相,更缺少双方信任的计量手段。另一方面,大量电动汽车负荷将对电网安全稳定运行带来威胁与冲击,需要在交易时及时按照规约进行校核,才能实现合约与充放电。At present, electric vehicles and social charging piles lack each other, and there is a lack of measurement methods that both parties trust. On the other hand, a large number of electric vehicle loads will threaten and impact the safe and stable operation of the power grid. It is necessary to timely check according to the regulations during the transaction, so as to realize the contract and charge and discharge.

主要缺点是:The main disadvantages are:

(1)没有考虑到很多电表的数据是电网企业采集的,缺乏第三方认证而且对于大量电动汽车等用户来说,采集的可靠性比较低。(1) It is not considered that the data of many electricity meters are collected by power grid companies, lacking third-party certification, and for a large number of users such as electric vehicles, the reliability of the collection is relatively low.

(2)没有采用融合安全域的方法,仅仅对用户进行了基本匹配,缺乏对安全边界的认知,可能造成对电网稳定的影响与冲击。(2) The method of integrating the security domain is not adopted, and only the basic matching is performed for users, and the lack of awareness of the security boundary may cause influence and impact on the stability of the power grid.

对于新能源的双向计量、大用户的用能计量以及基于电网的多网合一的计量等都需要新型安全机制来保证,并且对于智能合约以及电动汽车、社会力量的充电桩共享等不仅仅需要可信的计量还需要其满足电网的运行约束,因此,提出融合区块链与安全域技术的计量安全方法。The two-way metering of new energy, the energy consumption metering of large users, and the metering of multi-network integration based on the power grid all require a new security mechanism to ensure, and for smart contracts, electric vehicles, and the sharing of charging piles with social forces are not only required. Trusted metering also needs to meet the operational constraints of the power grid. Therefore, a metering security method integrating blockchain and security domain technology is proposed.

发明内容SUMMARY OF THE INVENTION

有鉴于现有技术的上述缺陷,本发明的目的就是提供一种计量数据安全防护方法,基于区块链技术可以实现直供用户的智能合约、充电桩与电动汽车的智能合约,针对未来放开两端的电力交易市场具有多主体、多模式、多规则的特点,面向大用户和电动汽车等用户设计电力市场交易智能合约安全方法,同时分析了关键技术难点,并有针对性的给出了解决方案。提出引入运行在区块链上的智能合约降低电力市场交易的信任成本,提高清结算效率,同时采用安全域方法对合约的网络约束与合规性进行校验,实现计量与交易的安全保证与智能化。In view of the above-mentioned defects of the prior art, the purpose of the present invention is to provide a measurement data security protection method, which can realize the smart contract directly supplied to the user, the smart contract of the charging pile and the electric vehicle based on the blockchain technology. The electricity trading market at both ends has the characteristics of multi-subject, multi-mode and multi-rule. The security method of electricity market transaction smart contract is designed for users such as large users and electric vehicles. At the same time, the key technical difficulties are analyzed, and targeted solutions are given. Program. It is proposed to introduce smart contracts running on the blockchain to reduce the trust cost of electricity market transactions and improve the efficiency of clearing and settlement. At the same time, the security domain method is used to verify the network constraints and compliance of the contract, so as to realize the security guarantee of measurement and transaction. Intelligent.

本发明的目的是通过这样的技术方案实现的,一种计量数据安全防护方法,它包括有:The purpose of the present invention is to realize through such technical scheme, a kind of metering data security protection method, it comprises:

S1:对用户、充电桩、双向计量用户的表计进行分级,将高等级用户(220kV及以上贸易结算用电能计量装置,500kV级以上考核用电能计量装置,计量单机容量300MW级以上发电机发电量的电能计量装置)的计量数据单独作为区块链标签节点,将低等级用户的(10kV-220kV及以上贸易结算用电能计量装置,10kV-500kV级以上考核用电能计量装置,计量单机容量300MW以下发电机发电量、发电企业厂(站)用电量的电能计量装置,380V-10kV电能计量装置,220V单相电能计量装置)计量数据按照网络拓扑整合后作为区块链标签节点;S1: Classify the meters of users, charging piles, and two-way metering users, and classify high-level users (electricity metering device for trade settlement of 220kV and above, electric energy metering device for assessment of 500kV and above, and single-unit capacity of 300MW and above to generate electricity The metering data of the electric energy metering device for electromechanical power generation is used as a block chain tag node alone, and the low-level users (electric energy metering device for trade settlement of 10kV-220kV and above, electric energy metering device for assessment of 10kV-500kV level and above, Electric energy metering devices that measure the power generation of generators with a single unit capacity of less than 300MW and the power consumption of power generation enterprises (stations), 380V-10kV energy metering devices, 220V single-phase energy metering devices) The metering data is integrated according to the network topology as a blockchain tag node;

S2:对用户供电合约、社会充电桩合约采用分级安全校核;按照电压等级、供电质量要求与容量分类型;对于高等级用户直接采用安全域方法进行校核;对于低等级用户按照网络拓扑整合后作为虚拟用户后,再通过安全域方法进行校核;S2: Hierarchical security check is adopted for user power supply contracts and social charging pile contracts; according to voltage level, power supply quality requirements and capacity classification; for high-level users, the security domain method is directly used for verification; for low-level users, it is integrated according to the network topology After being used as a virtual user, check it through the security domain method;

S3:对通过安全域评估的用户直供和电动汽车的交易采用区块链智能合约进行交易;S3: Use blockchain smart contracts for transactions of user-directed supply and electric vehicles that have passed the security domain assessment;

S4:对用户进行计量,计量数据采用区块链进行标记与运输;S4: Measure users, and the measurement data is marked and transported by blockchain;

S5:采用FAHP算法(模糊层次分析法)进行影响因素分析,再进行网络整体安全性评估。S5: Use FAHP algorithm (Fuzzy Analytic Hierarchy Process) to analyze influencing factors, and then conduct overall network security assessment.

进一步,所述步骤S2中的安全域方法具体步骤如下:Further, the specific steps of the security domain method in the step S2 are as follows:

S21:建立私有/混合区块链平台,提供数据安全与智能合约基础能力支撑;S21: Establish a private/hybrid blockchain platform to provide data security and basic capability support for smart contracts;

S22:对计量数据进行标记、安全存储及传输;对相关交易进行安全校核;S22: Mark, securely store and transmit metering data; perform security check on related transactions;

S23:进行安全域分析;S23: Perform security domain analysis;

S24:分析影响因素,给出交易决策交易。S24: Analyze the influencing factors and give a transaction decision transaction.

进一步,所述步骤S5中采用FAHP算法进行影响因素分析的具体步骤如下:Further, in the step S5, the specific steps of using the FAHP algorithm to analyze the influencing factors are as follows:

S51:确定影响因素系统目标;S51: Determine the target of the influencing factor system;

S52:建立影响因素层次结构模型;S52: Establish a hierarchy model of influencing factors;

S53:构造影响因素指标的模糊互补判断矩阵R;S53: construct the fuzzy complementary judgment matrix R of the influencing factor indexes;

S54:对模糊判断矩阵R进行一致性检验及调整;S54: Consistency test and adjustment are performed on the fuzzy judgment matrix R;

S55:计算层次结构模型中各层元素对上层元素的权重,进行层次排序,以确定递阶结构图中最底层各个元素在影响因素系统总目标中的重要程度。S55: Calculate the weight of each layer element in the hierarchical structure model to the upper layer element, and perform hierarchical sorting to determine the importance of each element at the bottom in the hierarchical structure diagram in the overall objective of the influencing factor system.

进一步,所述步骤S52中建立影响因素层次结构模型的具体步骤如下:Further, the specific steps of establishing the influencing factor hierarchy model in the step S52 are as follows:

S521:设影响因素系统的评价目标G有n个影响因素,则因素集为U={U1,U2,…,Un};S521: Suppose the evaluation target G of the influencing factor system has n influencing factors, then the factor set is U={U1, U2, . . . , Un};

S522:评价目标体系U第i个子集Ui满足条件:Ui={Ui1,Ui2,…,Uin}。S522: The ith subset Ui of the evaluation target system U satisfies the condition: Ui={Ui1, Ui2, . . . , Uin}.

进一步,所述步骤S54对模糊判断矩阵进行一致性检验及调整的具体步骤如下:Further, the specific steps of performing consistency check and adjustment on the fuzzy judgment matrix in the step S54 are as follows:

S541:确定模糊互补判断矩阵R加性一致性程度的指标ρ;S541: Determine the index ρ of the additive consistency degree of the fuzzy complementary judgment matrix R;

S542;根据ρ的值检验判断模糊互补矩阵R是否具有达到目标要求的加性一致性,且ρ的值越大,则模糊互补判断矩阵R的加性一致性越差;其中:S542: Judging whether the fuzzy complementary matrix R has the additive consistency that meets the target requirements according to the value test of ρ, and the larger the value of ρ is, the worse the additive consistency of the fuzzy complementary judgment matrix R is; wherein:

Figure GDA0003337811760000041
Figure GDA0003337811760000041

进一步,调整一致性的具体步骤如下:Further, the specific steps for adjusting consistency are as follows:

S543:求出模糊互补判断矩阵R的加性一致性指标值ρ,若小于预先给定的阀值σ,则转入步骤S549,否则,进入步骤S544;S543: Find the additive consistency index value ρ of the fuzzy complementary judgment matrix R, if it is less than the preset threshold σ, then go to step S549, otherwise, go to step S544;

S544:分别根据模糊互补判断矩阵R的各行构造n个加性一致性的矩阵

Figure GDA0003337811760000042
S544: Construct n matrixes of additive consistency according to each row of the fuzzy complementary judgment matrix R respectively
Figure GDA0003337811760000042

其中,

Figure GDA0003337811760000043
R(k)表示根据模糊互补判断矩阵R的第k行构造的加性一致性矩阵;in,
Figure GDA0003337811760000043
R (k) represents the additive consistency matrix constructed according to the kth row of the fuzzy complementary judgment matrix R;

S545:分别计算模糊互补判断矩阵R与加性一致性矩阵R(k)的贴近度

Figure GDA0003337811760000051
S545: Calculate the closeness of the fuzzy complementary judgment matrix R and the additive consistency matrix R (k) respectively
Figure GDA0003337811760000051

S546:令α(l)=min{α(1)(2),…,α(n)},确定出R(k)(k=1,2,3……n)中和模糊互补判断矩阵R最贴近的加性一致性模糊互补矩阵R(l),并记为R*S546: Let α (l) =min{α (1)(2) ,...,α (n) }, determine the neutral and fuzzy complementarity in R (k) (k=1,2,3...n) Judgment matrix R is the closest additive consistency fuzzy complementary matrix R (l) , and denoted as R * ;

S547:求出判断矩阵R和R*的偏差矩阵C=(cij)n×n,其中

Figure GDA0003337811760000052
找出偏差矩阵C中使cij的绝对值达到最大的值i和j,分别记为s和t;S547: Find the deviation matrix C=( ci j) n×n of the judgment matrix R and R*, where
Figure GDA0003337811760000052
Find the values i and j that maximize the absolute value of c ij in the deviation matrix C, and denote them as s and t respectively;

S548:若cst>0,令r′st=rst-λ,r′ts=rts+λ;若cst<0,令r′st=rst+λ,r′ts=rts-λ;Q其中λ为调整系数,一般取为0.05;将此矩阵记为R,转步骤S543;S548: If c st >0, let r' st =r st -λ, r' ts =r ts +λ; if c st <0, let r' st =r st +λ, r' ts =r ts - λ; Q where λ is an adjustment coefficient, generally taken as 0.05; denote this matrix as R, and go to step S543;

S549:结束。S549: End.

进一步,所述步骤S55中层次排序的具体步骤如下:Further, the specific steps of the hierarchical sorting in the step S55 are as follows:

S551:设模糊互补判断矩阵R=(rij)n×n,对矩阵R按行求和,记

Figure GDA0003337811760000053
对矩阵R*行和归一化得到单层排序向量w=(w1,w2,…,wn)T,其中:S551: Set the fuzzy complementary judgment matrix R=(r ij ) n×n , sum the matrix R row by row, record
Figure GDA0003337811760000053
Normalize the matrix R * row sum to get the single-level sorting vector w=(w 1 ,w 2 ,...,w n ) T , where:

Figure GDA0003337811760000061
Figure GDA0003337811760000061

S552:第k层对第一层的组合权向量满足下式:S552: The combined weight vector of the kth layer to the first layer satisfies the following formula:

w(k)=W(k)w(k-1),k=3,4,…,s;w (k) = W (k) w (k-1) , k = 3,4,...,s;

其中W(k)是以第k层对第k-1层的权向量为列向量组成的矩阵;Wherein W (k) is a matrix composed of the weight vector of the kth layer to the k-1th layer as a column vector;

S553:第S层对最上层的组合权向量为:S553: The combined weight vector of the S-th layer to the top layer is:

w(s)=W(s)W(s-1)…W(3)w(2)w (s) = W (s) W (s-1) ... W (3) w (2) .

进一步,所述方法还包括有:Further, the method also includes:

S6:引入变权公式:S6: Introduce the variable weight formula:

Figure GDA0003337811760000062
Figure GDA0003337811760000062

式中,wi为初始指标权重,xi为对应指标评分值,a1、a2、a3、a4为经验型变权系数。In the formula, w i is the initial index weight, xi is the corresponding index score value, and a 1 , a 2 , a 3 , and a 4 are empirical variable weight coefficients.

进一步,状态评估得分S的计算公式为:

Figure GDA0003337811760000063
Further, the calculation formula of the state evaluation score S is:
Figure GDA0003337811760000063

由于采用了上述技术方案,本发明具有如下的优点:Owing to adopting the above-mentioned technical scheme, the present invention has the following advantages:

(1)区块链技术可以对计量装置获取的信息进行标记,并且所以信息具有一旦生成不能修改、删除的特性。另一方面,基于区块链技术可以实现直供用户的智能合约、充电桩与电动汽车的智能合约等。(1) The blockchain technology can mark the information obtained by the metering device, and so the information has the characteristics that once it is generated, it cannot be modified or deleted. On the other hand, based on blockchain technology, smart contracts for direct supply to users, smart contracts for charging piles and electric vehicles can be realized.

(2)智能电网可以方便的采集到各级电能表的各种数据,为提高电网状态估计精度,提高可靠性提供了可能。电网中的电能表集群一般构成树形拓扑。在电网中,往往存在损耗(电能表损耗、漏电损耗、线路电阻损耗等)。为了与实际系统的运行一致,引入虚拟支路提高估计的精度,该支路包括虚拟电表和虚拟负荷。采用这样的方法,就可以把电表集群的总损耗等效成虚拟负荷的能耗,将一般的系统安全域模型扩展为支持计量网络状态估计,并且允许系统中存在各种损耗的广义安全域模型。(2) The smart grid can easily collect various data of electric energy meters at all levels, which provides the possibility to improve the accuracy of grid state estimation and reliability. The energy meter clusters in the grid generally form a tree topology. In the power grid, there are often losses (electric energy meter loss, leakage loss, line resistance loss, etc.). In order to be consistent with the operation of the actual system, a virtual branch is introduced to improve the estimation accuracy, and the branch includes a virtual meter and a virtual load. Using this method, the total loss of the meter cluster can be equivalent to the energy consumption of the virtual load, the general system security domain model can be extended to support the state estimation of the metering network, and the generalized security domain model that allows various losses in the system .

(3)将上述技术融合,可以为计量数据提供数据安全保障,可以为智能合约符合电网运行约束提供安全检查与合规检查。此外,社会性充电桩的计量可靠性与用户间共享充电桩将大大减少建设成本,也减少电网建设投资。(3) Integrating the above technologies can provide data security guarantee for metering data, and can provide security inspection and compliance inspection for smart contracts to comply with grid operation constraints. In addition, the metering reliability of social charging piles and the sharing of charging piles among users will greatly reduce construction costs and reduce grid construction investment.

(4)针对未来放开两端的电力交易市场具有多主体、多模式、多规则的特点,面向大用户和电动汽车等用户设计电力市场交易智能合约安全方法,同时分析了关键技术难点,并有针对性的给出了解决方案。提出引入运行在区块链上的智能合约降低电力市场交易的信任成本,提高清结算效率,同时采用安全域方法对合约的网络约束与合规性进行校验,实现计量与交易的安全保证与智能化。(4) In view of the multi-subject, multi-mode and multi-rule characteristics of the power trading market that will be opened at both ends in the future, a smart contract security method for power market transactions is designed for users such as large users and electric vehicles, and the key technical difficulties are analyzed at the same time. Targeted solutions are given. It is proposed to introduce smart contracts running on the blockchain to reduce the trust cost of electricity market transactions and improve the efficiency of clearing and settlement. At the same time, the security domain method is used to verify the network constraints and compliance of the contract, so as to realize the security guarantee of measurement and transaction. Intelligent.

本发明的其他优点、目标和特征在某种程度上将在随后的说明书中进行阐述,并且在某种程度上,基于对下文的考察研究对本领域技术人员而言将是显而易见的,或者可以从本发明的实践中得到教导。Other advantages, objects, and features of the present invention will be set forth in the description that follows, and will be apparent to those skilled in the art based on a study of the following, to the extent that is taught in the practice of the present invention.

附图说明Description of drawings

本发明的附图说明如下:The accompanying drawings of the present invention are described as follows:

图1为计量数据安全防护方法的流程示意图。FIG. 1 is a schematic flowchart of a method for security protection of metering data.

图2为FAHP的原理框图。Fig. 2 is the principle block diagram of FAHP.

具体实施方式Detailed ways

下面结合附图和实施例对本发明作进一步说明。The present invention will be further described below with reference to the accompanying drawings and embodiments.

实施例1:如图1和图2所示;一种计量数据安全防护方法,它包括有:Embodiment 1: as shown in Figure 1 and Figure 2; a method for measuring data security protection, which includes:

S1:对用户、充电桩、双向计量用户的表计进行分级,将高等级用户的计量数据单独作为区块链标签节点,将低等级用户的计量数据按照网络拓扑整合后作为区块链标签节点;所述高等级用户是指:220kV及以上贸易结算用电能计量装置、500kV级以上考核用电能计量装置或者计量单机容量300MW级以上发电机发电量的电能计量装置。所述低等级用户是指:10kV-220kV及以上贸易结算用电能计量装置、10kV-500kV级以上考核用电能计量装置、计量单机容量300MW以下发电机发电量、发电企业厂(站)用电量的电能计量装置、380V-10kV电能计量装置或220V单相电能计量装置S1: Classify the meters of users, charging piles, and two-way metering users, use the metering data of high-level users as blockchain label nodes alone, and integrate the metering data of low-level users according to the network topology as blockchain label nodes The high-level users refer to: 220kV and above electric energy metering devices for trade settlement, 500kV and above assessment energy metering devices, or electric energy metering devices for measuring the power generation of generators with a single unit capacity of 300MW and above. The low-level users refer to: 10kV-220kV and above power metering devices for trade settlement, 10kV-500kV and above power metering devices for assessment, measuring the power generation of generators with a single unit capacity of less than 300MW, and power generation enterprises (stations) Electric energy metering device, 380V-10kV energy metering device or 220V single-phase energy metering device

S2:对用户供电合约、社会充电桩合约采用分级安全校核;按照电压等级、供电质量要求与容量分类型;对于高等级用户直接采用安全域方法进行校核;对于低等级用户按照网络拓扑整合后作为虚拟用户后,再通过安全域方法进行校核;S2: Hierarchical security check is adopted for user power supply contracts and social charging pile contracts; according to voltage level, power supply quality requirements and capacity classification; for high-level users, the security domain method is directly used for verification; for low-level users, it is integrated according to the network topology After being used as a virtual user, check it through the security domain method;

S3:对通过安全域评估的用户直供和电动汽车的交易采用区块链智能合约进行交易;S3: Use blockchain smart contracts for transactions of user-directed supply and electric vehicles that have passed the security domain assessment;

S4:对用户进行计量,计量数据采用区块链进行标记与运输;S4: Measure users, and the measurement data is marked and transported by blockchain;

S5:采用FAHP算法(模糊层次分析法)进行影响因素分析,再进行网络整体安全性评估。S5: Use FAHP algorithm (Fuzzy Analytic Hierarchy Process) to analyze influencing factors, and then conduct overall network security assessment.

所述步骤S2中的安全域方法具体步骤如下:The specific steps of the security domain method in the step S2 are as follows:

S21:建立私有/混合区块链平台,提供数据安全与智能合约基础能力支撑;S21: Establish a private/hybrid blockchain platform to provide data security and basic capability support for smart contracts;

S22:对计量数据进行标记、安全存储及传输;对相关交易进行安全校核;S22: Mark, securely store and transmit metering data; perform security check on related transactions;

S23:进行安全域分析;S23: Perform security domain analysis;

S24:分析影响因素,给出交易决策交易。S24: Analyze the influencing factors and give a transaction decision transaction.

所述步骤S5中采用FAHP算法进行影响因素分析的具体步骤如下:The specific steps of adopting the FAHP algorithm to analyze the influencing factors in the step S5 are as follows:

S51:确定影响因素系统目标;S51: Determine the target of the influencing factor system;

S52:建立影响因素层次结构模型;S52: Establish a hierarchy model of influencing factors;

S53:构造影响因素指标的模糊互补判断矩阵R;S53: construct the fuzzy complementary judgment matrix R of the influencing factor indexes;

S54:对模糊判断矩阵R进行一致性检验及调整;S54: Consistency test and adjustment are performed on the fuzzy judgment matrix R;

S55:计算层次结构模型中各层元素对上层元素的权重,进行层次排序,以确定递阶结构图中最底层各个元素在影响因素系统总目标中的重要程度。S55: Calculate the weight of each layer element in the hierarchical structure model to the upper layer element, and perform hierarchical sorting to determine the importance of each element at the bottom in the hierarchical structure diagram in the overall objective of the influencing factor system.

所述步骤S52中建立影响因素层次结构模型的具体步骤如下:The specific steps of establishing the influencing factor hierarchy model in the step S52 are as follows:

S521:设影响因素系统的评价目标G有n个影响因素,则因素集为U={U1,U2,…,Un};S521: Suppose the evaluation target G of the influencing factor system has n influencing factors, then the factor set is U={U1, U2, . . . , Un};

S522:评价目标体系U第i个子集Ui满足条件:Ui={Ui1,Ui2,…,Uin}。S522: The ith subset Ui of the evaluation target system U satisfies the condition: Ui={Ui1, Ui2, . . . , Uin}.

所述步骤S54对模糊判断矩阵进行一致性检验及调整的具体步骤如下:The specific steps of performing consistency check and adjustment on the fuzzy judgment matrix in step S54 are as follows:

S541:确定模糊互补判断矩阵R加性一致性程度的指标ρ;S541: Determine the index ρ of the additive consistency degree of the fuzzy complementary judgment matrix R;

S542;根据ρ的值检验判断模糊互补矩阵R是否具有达到目标要求的加性一致性,且ρ的值越大,则模糊互补判断矩阵R的加性一致性越差;其中:S542: Judging whether the fuzzy complementary matrix R has the additive consistency that meets the target requirements according to the value test of ρ, and the larger the value of ρ is, the worse the additive consistency of the fuzzy complementary judgment matrix R is; wherein:

Figure GDA0003337811760000091
Figure GDA0003337811760000091

调整一致性的具体步骤如下:The specific steps to adjust the consistency are as follows:

S543:求出模糊互补判断矩阵R的加性一致性指标值ρ,若小于预先给定的阀值σ,则转入步骤S549,否则,进入步骤S544;S543: Find the additive consistency index value ρ of the fuzzy complementary judgment matrix R, if it is less than the preset threshold σ, then go to step S549, otherwise, go to step S544;

S544:分别根据模糊互补判断矩阵R的各行构造n个加性一致性的矩阵

Figure GDA0003337811760000101
S544: Construct n matrixes of additive consistency according to each row of the fuzzy complementary judgment matrix R respectively
Figure GDA0003337811760000101

其中,

Figure GDA0003337811760000102
R(k)表示根据模糊互补判断矩阵R的第k行构造的加性一致性矩阵;in,
Figure GDA0003337811760000102
R (k) represents the additive consistency matrix constructed according to the kth row of the fuzzy complementary judgment matrix R;

S545:分别计算模糊互补判断矩阵R与加性一致性矩阵R(k)的贴近度

Figure GDA0003337811760000103
S545: Calculate the closeness of the fuzzy complementary judgment matrix R and the additive consistency matrix R (k) respectively
Figure GDA0003337811760000103

S546:令α(l)=min{α(1)(2),…,α(n)},确定出R(k)(k=1,2,3……n)中和模糊互补判断矩阵R最贴近的加性一致性模糊互补矩阵R(l),并记为R*S546: Let α (l) =min{α (1)(2) ,...,α (n) }, determine the neutral and fuzzy complementarity in R (k) (k=1,2,3...n) Judgment matrix R is the closest additive consistency fuzzy complementary matrix R (l) , and denoted as R * ;

S547:求出判断矩阵R和R*的偏差矩阵C=(cij)n×n,其中

Figure GDA0003337811760000104
找出偏差矩阵C中使cij的绝对值达到最大的值i和j,分别记为s和t;S547: Find the deviation matrix C=(c ij ) n×n of the judgment matrix R and R*, where
Figure GDA0003337811760000104
Find the values i and j that maximize the absolute value of c ij in the deviation matrix C, and denote them as s and t respectively;

S548:若cst>0,令r′st=rst-λ,r′ts=rts+λ;若cst<0,令r′st=rst+λ,r′ts=rts-λ;Q其中λ为调整系数,一般取为0.05;将此矩阵记为R,转步骤S543;S548: If c st >0, let r' st =r st -λ, r' ts =r ts +λ; if c st <0, let r' st =r st +λ, r' ts =r ts - λ; Q where λ is an adjustment coefficient, generally taken as 0.05; denote this matrix as R, and go to step S543;

S549:结束。S549: End.

所述步骤S55中层次排序的具体步骤如下:The specific steps of the hierarchical sorting in the step S55 are as follows:

S551:设模糊互补判断矩阵R=(rij)n×n,对矩阵R按行求和,记

Figure GDA0003337811760000111
对矩阵R*行和归一化得到单层排序向量w=(w1,w2,…,wn)T,其中:S551: Set the fuzzy complementary judgment matrix R=(r ij ) n×n , sum the matrix R row by row, record
Figure GDA0003337811760000111
Normalize the matrix R * row sum to get the single-level sorting vector w=(w 1 ,w 2 ,...,w n ) T , where:

Figure GDA0003337811760000112
Figure GDA0003337811760000112

S552:第k层对第一层的组合权向量满足下式:S552: The combined weight vector of the kth layer to the first layer satisfies the following formula:

w(k)=W(k)w(k-1),k=3,4,…,s;w (k) = W (k) w (k-1) , k = 3,4,...,s;

其中W(k)是以第k层对第k-1层的权向量为列向量组成的矩阵;Wherein W (k) is a matrix composed of the weight vector of the kth layer to the k-1th layer as a column vector;

S553:第S层对最上层的组合权向量为:S553: The combined weight vector of the S-th layer to the top layer is:

w(s)=W(s)W(s-1)…W(3)w(2)w (s) = W (s) W (s-1) ... W (3) w (2) .

所述方法还包括有:The method also includes:

S6:引入变权公式:S6: Introduce the variable weight formula:

Figure GDA0003337811760000113
Figure GDA0003337811760000113

式中,wi为初始指标权重,xi为对应指标评分值,a1、a2、a3、a4为经验型变权系数。In the formula, w i is the initial index weight, xi is the corresponding index score value, and a 1 , a 2 , a 3 , and a 4 are empirical variable weight coefficients.

所述状态评估得分S的计算公式为:

Figure GDA0003337811760000121
The calculation formula of the state evaluation score S is:
Figure GDA0003337811760000121

实施例2,针对现有技术中影响大规模计量安全及交易校核的问题,我们对相关因素进行了分析,提出了一些针对性的技术手段来解决数据不够,影响因素众多、相互关联等突出不利条件,并且给出了下面的改进的安全计量与交易过程:Example 2: In view of the problems affecting large-scale metering security and transaction verification in the prior art, we analyzed the relevant factors and proposed some targeted technical means to solve the problem of insufficient data, numerous influencing factors, and interrelatedness. unfavorable conditions, and gives the following improved security measurement and transaction process:

如图1和图2所示;一种计量数据安全防护方法,它包括有:As shown in Figure 1 and Figure 2; a measurement data security protection method, which includes:

S1:对用户、充电桩、双向计量用户的表计进行分级,将高等级用户的计量数据单独作为区块链标签节点,将低等级用户的计量数据按照网络拓扑整合后作为区块链标签节点;步骤S1为了降低区块链技术的计算复杂性,对计量数据进行分级。只对特定的大用户和对电网稳定性影响大的较大规模充电桩群直接作为区块链处理对象。其他用户,特别是充电桩计量数据按照网络拓扑结构进行数据聚合,聚合后再进行区块链标记处理。这样可以减少一个数量级的处理需求。S1: Classify the meters of users, charging piles, and two-way metering users, use the metering data of high-level users as blockchain label nodes alone, and integrate the metering data of low-level users according to the network topology as blockchain label nodes ; Step S1 grades the measurement data in order to reduce the computational complexity of the blockchain technology. Only specific large users and large-scale charging pile groups that have a great impact on the stability of the power grid are directly used as the object of blockchain processing. Other users, especially the charging pile metering data, aggregate data according to the network topology, and then perform blockchain tagging processing after aggregation. This reduces processing requirements by an order of magnitude.

S2:对用户供电合约、社会充电桩合约采用分级安全校核;按照电压等级、供电质量要求与容量分类型;对于高等级用户直接采用安全域方法进行校核;对于低等级用户按照网络拓扑整合后作为虚拟用户后,再通过安全域方法进行校核;步骤S2为了进一步保障系统稳定与电网安全,同时减少计算能力需要,对安全校核也采用分级方法。只对特定的大用户和对电网稳定性影响大的较大规模充电桩群直接进行安全域校核。其他用户,特别是充电桩计量数据按照网络拓扑结构进行数据聚合,聚合后再进行安全校核。这样可以减少一个数量级的处理需求。S2: Hierarchical security check is adopted for user power supply contracts and social charging pile contracts; according to voltage level, power supply quality requirements and capacity classification; for high-level users, the security domain method is directly used for verification; for low-level users, it is integrated according to the network topology After being used as a virtual user, the security domain method is used for verification; in step S2, in order to further ensure system stability and power grid security, and at the same time reduce computing power requirements, a hierarchical method is also used for security verification. Only specific large users and large-scale charging pile groups that have a great impact on the grid stability are directly checked for the safety domain. Other users, especially the charging pile metering data, aggregate data according to the network topology, and then perform security check after aggregation. This reduces processing requirements by an order of magnitude.

通过上述2级的分级处理,估算计算能力需求可以减少2个数量级,这样就可以基于区块链技术达到实时对数据进行保护,并且实现智能合约及时处理了。Through the above-mentioned 2-level hierarchical processing, the estimated computing power requirements can be reduced by 2 orders of magnitude, so that real-time data protection can be achieved based on blockchain technology, and smart contracts can be processed in a timely manner.

S3:对通过安全域评估的用户直供和电动汽车的交易采用区块链智能合约进行交易;S3: Use blockchain smart contracts for transactions of user-directed supply and electric vehicles that have passed the security domain assessment;

S4:对用户进行计量,计量数据采用区块链进行标记与运输;S4: Measure users, and the measurement data is marked and transported by blockchain;

S5:采用FAHP算法(模糊层次分析法)进行影响因素分析,再进行网络整体安全性评估。步骤S5为了分析获得主要影响状态的关键因素,TOPSIS分析算法建立FAHP分析影响因素所需的指标体系:计量装置自身的影响状态的指标体系和计量装置形成网络结构的指标体系。S5: Use FAHP algorithm (Fuzzy Analytic Hierarchy Process) to analyze influencing factors, and then conduct overall network security assessment. In step S5, in order to analyze and obtain the key factors that mainly affect the state, the TOPSIS analysis algorithm establishes the index system required for FAHP to analyze the influencing factors: the index system of the influence state of the metering device itself and the index system of the network structure formed by the metering device.

理想的计量数据采集与社会充电桩管理应该有比较充分的安全机制,从可信数据源,智能合约以及电网安全校核等方面综合考虑和并且面向未来灵活多样的电力市场化新业务提供计量与安全分析能力。针对具有区块链基础设施、融合综合安全域方法的计量数据安全域交易保证方法,可以采用下面的主要步骤来进行:The ideal metering data collection and social charging pile management should have a relatively sufficient security mechanism, comprehensively consider from the aspects of trusted data sources, smart contracts and grid security checks, and provide metering and new services for flexible and diverse electricity marketization in the future. Security analysis capabilities. For the measurement data security domain transaction assurance method with blockchain infrastructure and integrated security domain method, the following main steps can be used:

所述步骤S2中的安全域方法具体步骤如下:The specific steps of the security domain method in the step S2 are as follows:

S21:建立私有/混合区块链平台,提供数据安全与智能合约基础能力支撑;S21: Establish a private/hybrid blockchain platform to provide data security and basic capability support for smart contracts;

S22:对计量数据进行标记、安全存储及传输;对相关交易进行安全校核;S22: Mark, securely store and transmit metering data; perform security check on related transactions;

S23:进行安全域分析;S23: Perform security domain analysis;

S24:分析影响因素,给出交易决策交易。S24: Analyze the influencing factors and give a transaction decision transaction.

所述步骤S5中采用FAHP算法进行影响因素分析的具体步骤如下:The specific steps of adopting the FAHP algorithm to analyze the influencing factors in the step S5 are as follows:

S51:确定影响因素系统目标;S51: Determine the target of the influencing factor system;

S52:建立影响因素层次结构模型;S52: Establish a hierarchy model of influencing factors;

S53:构造影响因素指标的模糊互补判断矩阵R;S53: construct the fuzzy complementary judgment matrix R of the influencing factor indexes;

S54:对模糊判断矩阵R进行一致性检验及调整;S54: Consistency test and adjustment are performed on the fuzzy judgment matrix R;

S55:计算层次结构模型中各层元素对上层元素的权重,进行层次排序,以确定递阶结构图中最底层各个元素在影响因素系统总目标中的重要程度。S55: Calculate the weight of each layer element in the hierarchical structure model to the upper layer element, and perform hierarchical sorting to determine the importance of each element at the lowest level in the hierarchical structure diagram in the overall objective of the influencing factor system.

(一)建立层次结构模型U(1) Establish a hierarchical structure model U

层次结构模型的建立是层次分析法的基础,如前面所述,五层树形结构的电能计量装置状态管理评价体系实际上构成了层次结构模型。评价体系的层次结构也决定了采用层次分析法进行权重计算、分析是比较合适的。The establishment of the hierarchical structure model is the basis of the AHP. As mentioned above, the state management and evaluation system of the electric energy metering device with a five-layer tree structure actually constitutes a hierarchical structure model. The hierarchical structure of the evaluation system also determines that it is more appropriate to use AHP for weight calculation and analysis.

设评价目标G有n个影响因素,则因素集为U={U1,U2,…,Un}。Assuming that the evaluation target G has n influencing factors, the factor set is U={U 1 , U 2 , . . . , Un}.

评价指标体系U的第i个子集Ui满足条件:Ui={Ui1,Ui2,…,Uin}。The i-th subset U i of the evaluation index system U satisfies the condition: U i ={U i1 , U i2 ,...,Uin}.

(二)构造指标权重判断矩阵R(2) Constructing the index weight judgment matrix R

模糊层次分析法要求逐层计算相互联系的元素之间影响的相对重要性,并予以量化,组成模糊互补判断矩阵,作为分析的基础。The fuzzy analytic hierarchy process requires calculating the relative importance of the influence of the interrelated elements layer by layer, and quantifying them to form a fuzzy complementary judgment matrix as the basis of the analysis.

以对质量评价体系中“电能表运行状态”这一指标进行权重系数分析为例,该指标包含了离线信息、在线信息、重要性因素三个指标,因此如何判定这些影响因素对“电能表运行状态”的影响并赋予适当的权重,是需要解决的问题。在此例中,我们将“电能表运行状态”作为分析目标G,将具体的影响因素之间的相对重要层度作为构成判断矩阵的元素rij,构造的矩阵称为对目标G的影响元素判断矩阵,如表1所示。Taking the weight coefficient analysis of the indicator "operating state of electric energy meter" in the quality evaluation system as an example, this indicator includes three indicators: offline information, online information and important factors. The influence of state” and giving appropriate weights are issues that need to be addressed. In this example, we take the "operating state of the electric energy meter" as the analysis target G, and take the relative importance level between the specific influencing factors as the element r ij constituting the judgment matrix, and the constructed matrix is called the influence element on the target G The judgment matrix is shown in Table 1.

表1对目标G的影响元素模糊判断矩阵Table 1 Fuzzy judgment matrix of elements affecting target G

Figure GDA0003337811760000141
Figure GDA0003337811760000141

Figure GDA0003337811760000151
Figure GDA0003337811760000151

其中得分xk(k=1,2,…n)表示构成目标G的各影响因素,rij表示相对G而言因素得分xi对得分xj的相对重要性。下表2所示为给判断矩阵元素赋值标准,The score x k (k=1, 2, ... n) represents each influencing factor that constitutes the target G, and ri ij represents the relative importance of the factor score x i to the score x j relative to G. The following table 2 shows the assignment criteria for the elements of the judgment matrix,

表2给判断矩阵元素赋值标准Table 2 assigns criteria to the elements of the judgment matrix

Figure GDA0003337811760000152
Figure GDA0003337811760000152

(三)一致性检验及调整(3) Consistency inspection and adjustment

给出了一个确定判断矩阵加性一致性程度的指标ρ,用ρ的值检验判断矩阵是否具有满意的加性一致性,ρ的值越大,则判断矩阵R的加性一致性越差,其中,An index ρ is given to determine the degree of additive consistency of the judgment matrix. The value of ρ is used to test whether the judgment matrix has satisfactory additive consistency. The larger the value of ρ, the worse the additive consistency of the judgment matrix R. in,

Figure GDA0003337811760000161
Figure GDA0003337811760000161

调整一致性的具体步骤:Specific steps to adjust consistency:

步骤1:求出矩阵R的加性一致性指标值ρ,若ρ小于预先给定的阀值σ,则转步骤7,否则进行下一步;Step 1: Find the additive consistency index value ρ of the matrix R, if ρ is less than the preset threshold σ, go to step 7, otherwise go to the next step;

步骤2:分别根据R的各行构造n个加性一致性的矩阵

Figure GDA0003337811760000162
Step 2: Construct n additively consistent matrices according to each row of R respectively
Figure GDA0003337811760000162

其中

Figure GDA0003337811760000163
R(k)表示根据R的第k行构造的加性一致性矩阵;in
Figure GDA0003337811760000163
R (k) represents the additive consistency matrix constructed according to the kth row of R;

步骤3:分别计算R与R(k)的贴近度

Figure GDA0003337811760000164
Figure GDA0003337811760000165
Step 3: Calculate the closeness of R and R (k) separately
Figure GDA0003337811760000164
Figure GDA0003337811760000165

步骤4:令α(l)=min{α(1)(2),…,α(n)},确定出R(k)(k=1,2,3……n)中和R最贴近的加性一致性模糊互补矩阵R(l),并记为R*Step 4: Let α (l) =min{α (1)(2) ,...,α (n) }, determine R (k) (k=1,2,3...n) and neutralize R The nearest additive consistent fuzzy complementary matrix R (l) , and denoted as R * ;

步骤5:求出判断矩阵R和R*的偏差矩阵C=(cij)n×n,其中

Figure GDA0003337811760000166
找出偏差矩阵C中使cij的绝对值达到最大的值i、j,记为s、t;Step 5: Find the deviation matrix C=(c ij ) n×n of the judgment matrix R and R*, where
Figure GDA0003337811760000166
Find the values i and j that maximize the absolute value of cij in the deviation matrix C, denoted as s and t;

步骤6:若cst>0,令r′st=rst-λ,r′ts=rts+λ;若cst<0,令r′st=rst+λ,r′ts=rts-λ;Q其中λ为调整系数,一般取为0.05。将此矩阵记为R,转步骤1;Step 6: If c st >0, let r' st =r st -λ, r' ts =r ts +λ; if c st <0, let r' st =r st +λ, r' ts =r ts -λ; Q where λ is the adjustment coefficient, generally taken as 0.05. Denote this matrix as R, go to step 1;

步骤7:结束。Step 7: End.

(四)指标层次排序(4) Ranking of indicators

设模糊互补判断矩阵R=(rij)n×n,对矩阵R按行求和,记

Figure GDA0003337811760000171
对矩阵R*行和归一化得到单层排序向量w=(w1,w2,…,wn)T,其中:Set the fuzzy complementary judgment matrix R=(r ij ) n×n , sum the matrix R row by row, and denote
Figure GDA0003337811760000171
Normalize the matrix R * row sum to get the single-level sorting vector w=(w 1 ,w 2 ,...,w n ) T , where:

Figure GDA0003337811760000172
Figure GDA0003337811760000172

本发明中,共有四层指标体系,第k层对第一层的组合权向量满足下式:In the present invention, there are four-layer index systems in total, and the combined weight vector of the kth layer to the first layer satisfies the following formula:

w(k)=W(k)w(k-1),k=3,4,…,s;w (k) = W (k) w (k-1) , k = 3,4,...,s;

其中是以第k层对第k-1层的权向量为列向量组成的矩阵。于是最下层(第s层)对最上层的组合权向量为:Among them is a matrix composed of the weight vector of the kth layer to the k-1th layer as the column vector. So the combined weight vector of the lowermost layer (the sth layer) to the uppermost layer is:

w(s)=W(s)W(s-1)...W(3)w(2)w (s) = W (s) W (s-1) ... W (3) w (2) ;

本发明利用模糊层次分析法求得了不同类型计量装置的最底层指标对目标层的权重。The present invention obtains the weight of the lowest index of different types of metering devices to the target layer by using the fuzzy analytic hierarchy process.

(五)常权优化为变权(5) The constant weight is optimized to the variable weight

模糊层次分析法属于常权评估,其缺点不仅表现在权重本身具有较大主观性,更严重的是,常值权重常常导致评估的非公正性。这是由于因素之间的重要程度往往会随各因素状态值的不同而发生变化。即在状态评估中,有些因素需要激励,即它们的权重应随因素状态值的增大而增大;而有些因素可能需要惩罚,即它们的权重应随因素状态值的增大而减小。为此,引入变权公式:Fuzzy AHP belongs to constant weight evaluation, and its shortcomings are not only that the weight itself is highly subjective, but more seriously, the constant weight often leads to the injustice of the evaluation. This is because the importance of factors tends to change with the different state values of each factor. That is, in the state evaluation, some factors need to be motivated, that is, their weights should increase with the increase of the state value of the factors; while some factors may need to be punished, that is, their weights should decrease with the increase of the state value of the factors. To this end, the variable weight formula is introduced:

Figure GDA0003337811760000181
Figure GDA0003337811760000181

式中wi为初始指标权重,xi为对应指标评分值,a1、a2、a3、a4为经验型变权系数。在本发明中,为了得到合适变权系数,对电能计量装置状态评估进行了大量的仿真模拟试验,设置各种异常情况,计算评估得分,根据评估结果的合理性不断调整变权系数,最终取a1=-4.19×10-4;a2=9.63×10-2;a3=-12.07;a4=666.1。In the formula, wi is the initial index weight, xi is the corresponding index score value, and a 1 , a 2 , a 3 , and a 4 are empirical variable weight coefficients. In the present invention, in order to obtain the appropriate variable weight coefficient, a large number of simulation tests are carried out for the state evaluation of the electric energy metering device, various abnormal conditions are set, the evaluation score is calculated, and the variable weight coefficient is continuously adjusted according to the rationality of the evaluation result. a 1 =−4.19×10 −4 ; a 2 =9.63×10 −2 ; a 3 =−12.07; a 4 =666.1.

(六)计算状态评估得分S:(6) Calculate the state evaluation score S:

Figure GDA0003337811760000182
Figure GDA0003337811760000182

应当理解的是,本说明书未详细阐述的部分均属于现有技术。最后说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换,而不脱离本技术方案的宗旨和范围,其均应涵盖在本发明的权利要求范围当中。It should be understood that the parts not described in detail in this specification belong to the prior art. Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention and not to limit them. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be Modifications or equivalent replacements, without departing from the spirit and scope of the technical solution, should all be included in the scope of the claims of the present invention.

Claims (7)

1. A metering data safety protection method is characterized by comprising the following specific steps:
s1: classifying meters of users, charging piles and bidirectional metering users, taking metering data of high-grade users as block chain label nodes independently, and taking metering data of low-grade users as block chain label nodes after integrating according to network topology;
s2: adopting grading safety check on a user power supply contract and a social charging pile contract; classifying according to voltage grade, power supply quality requirement and capacity; for high-level users, a security domain method is directly adopted for checking; after the low-level users are integrated according to the network topology and then serve as virtual users, checking is carried out through a security domain method;
s3: adopting a block chain intelligent contract to trade the user direct supply and the electric vehicle which are evaluated through the security domain;
s4: metering the user, and marking and transporting metering data by adopting a block chain;
s5: analyzing influence factors by adopting an FAHP algorithm, and then evaluating the overall security of the network;
the security domain method in step S2 includes the following specific steps:
s21: establishing a private/mixed block chain platform to provide data security and intelligent contract basic capability support;
s22: marking, safely storing and transmitting the metering data; performing security check on the related transaction;
s23: performing security domain analysis;
s24: analyzing the influence factors and giving a transaction decision transaction;
the specific steps of analyzing the influence factors by using the FAHP algorithm in the step S5 are as follows:
s51: determining an influence factor system target;
s52: establishing an influence factor hierarchical structure model;
s53: constructing a fuzzy complementary judgment matrix R of the influence factor indexes;
s54: carrying out consistency check and adjustment on the fuzzy judgment matrix R;
s55: and calculating the weight of each layer of element in the hierarchical structure model to the upper layer of element, and performing hierarchical sequencing to determine the importance degree of each element at the bottommost layer in the hierarchical structure diagram in the total target of the influence factor system.
2. The metering data security protection method according to claim 1, wherein the step S52 of establishing the hierarchical model of the influencing factors comprises the following steps:
s521: if the evaluation target G of the influence factor system has n influence factors, the factor set is U ═ U1,U2,…,Un};
S522: the ith subset Ui of the evaluation target system U meets the condition: ui ═ Ui1, Ui2, …, Uin }.
3. The metering data security protection method of claim 1, wherein the step S54 of performing consistency check and adjustment on the fuzzy judgment matrix comprises the following specific steps:
s541: determining an index rho of the consistency degree of the additivity of the fuzzy complementary judgment matrix R;
s542; checking and judging whether the fuzzy complementary matrix R has additive consistency meeting the target requirement according to the value of rho, wherein the larger the value of rho is, the worse the additive consistency of the fuzzy complementary judgment matrix R is; wherein:
Figure FDA0003337811750000021
4. the metering data security protection method of claim 3, wherein the specific steps of adjusting the consistency are as follows:
s543: solving an additive consistency index value rho of the fuzzy complementary judgment matrix R, if the additive consistency index value rho is smaller than a preset threshold value sigma, turning to a step S549, otherwise, turning to the step S544;
s544: n matrixes with additive consistency are constructed according to each row of the fuzzy complementary judgment matrix R respectively
Figure FDA0003337811750000022
Wherein,
Figure FDA0003337811750000023
R(k)the additive consistency matrix constructed according to the k-th row of the fuzzy complementary judgment matrix R is represented;
s545: respectively calculating a fuzzy complementary judgment matrix R and an additive consistency matrix R(k)Degree of closeness of
Figure FDA0003337811750000024
S546: let alpha(l)=min{α(1)(2),…,α(n)Determining R(k)(k ═ 1,2,3 … … n) and the additive consistency fuzzy complementary matrix R closest to the fuzzy complementary judging matrix R(l)And is denoted by R*
S547: calculating a deviation matrix C ═ (C) of the judgment matrices R and R-ij)n×nWherein
Figure FDA0003337811750000025
Finding the value C in the deviation matrix CijThe absolute values of i and j which reach the maximum are respectively marked as s and t;
s548: if c isst>0, r'st=rst-λ,r′ts=rts+ lambda; if c isst<0, r'st=rst+λ,r′ts=rts- λ; wherein lambda is an adjustment coefficient and is generally 0.05; marking the matrix as R, turning to step S543;
s549: and (6) ending.
5. The metering data security protection method according to claim 4, wherein the specific steps of the hierarchical ordering in the step S55 are as follows:
s551: let fuzzy complementary judging matrix R ═ (R)ij)n×nSumming the matrix R by rows and recording
Figure FDA0003337811750000031
For matrix R*The row and normalization result in a single-layer ordering vector w ═ (w)1,w2,…,wn)TWherein:
Figure FDA0003337811750000032
s552: the combined weight vector of the k-th layer to the first layer satisfies the following formula:
w(k)=W(k)w(k-1),k=3,4,…,s;
wherein W(k)A matrix which is formed by taking the weight vector of the kth layer to the kth-1 layer as a column vector;
s553: the combined weight vector of the S layer to the uppermost layer is as follows:
w(s)=W(s)W(s-1)…W(3)w(2)
6. the metering data security method of claim 1, further comprising:
s6: introducing a variable weight formula:
Figure FDA0003337811750000033
in the formula, wiIs an initial index weight, xiA score value for the corresponding index, a1、a2、a3、a4Is an empirical weight coefficient.
7. The metering data security protection method of claim 6, wherein the status is assessedThe calculation formula of the score S is as follows:
Figure FDA0003337811750000041
CN201810845278.7A 2018-07-27 2018-07-27 Metering data safety protection method Active CN109117651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810845278.7A CN109117651B (en) 2018-07-27 2018-07-27 Metering data safety protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810845278.7A CN109117651B (en) 2018-07-27 2018-07-27 Metering data safety protection method

Publications (2)

Publication Number Publication Date
CN109117651A CN109117651A (en) 2019-01-01
CN109117651B true CN109117651B (en) 2022-01-25

Family

ID=64863438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810845278.7A Active CN109117651B (en) 2018-07-27 2018-07-27 Metering data safety protection method

Country Status (1)

Country Link
CN (1) CN109117651B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309657A (en) * 2019-06-20 2019-10-08 四川大学 Blockchain security risk assessment method
CN110673084A (en) * 2019-11-19 2020-01-10 国网重庆市电力公司电力科学研究院 Method, device and readable storage medium for evaluating state of electric energy metering device
CN114148202B (en) * 2021-12-15 2023-10-17 华人运通(江苏)技术有限公司 Method and device for identifying charge matching property of vehicle and charging pile and vehicle
CN115330161A (en) * 2022-08-03 2022-11-11 国网江苏省电力有限公司南通供电分公司 Power infrastructure and subcontractor credit management method and system based on block chain technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105938609A (en) * 2016-04-28 2016-09-14 国家电网公司 Power grid operation assessment method for realizing multilayer indicator system
CN107423978A (en) * 2017-06-16 2017-12-01 郑州大学 A kind of distributed energy business confirmation method based on alliance's block chain
CN108092412A (en) * 2018-02-02 2018-05-29 珠海格力电器股份有限公司 Energy information processing method and equipment and energy internet system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496069B (en) * 2011-12-07 2015-05-20 山东电力集团公司青岛供电公司 Cable multimode safe operation evaluation method based on fuzzy analytic hierarchy process (FAHP)
US9513648B2 (en) * 2012-07-31 2016-12-06 Causam Energy, Inc. System, method, and apparatus for electric power grid and network management of grid elements
CN104866921B (en) * 2015-05-22 2019-03-22 天津大学 A kind of feeder reconfiguration methods in distribution system based on security domain
CN105139287A (en) * 2015-09-01 2015-12-09 国网重庆市电力公司电力科学研究院 Comprehensive electric energy metering device state assessment method integrating safety domain
CN106487003A (en) * 2016-05-10 2017-03-08 国网江苏省电力公司南京供电公司 A kind of method of main Distribution Network Failure recovery and optimization scheduling
US11146535B2 (en) * 2016-10-12 2021-10-12 Bank Of America Corporation System for managing a virtual private ledger and distributing workflow of authenticated transactions within a blockchain distributed network
CN106940833A (en) * 2017-01-13 2017-07-11 国网浙江省电力公司经济技术研究院 A kind of power grid enterprises' sale of electricity side methods of risk assessment based on fuzzy number and improved AHP method
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN107423945B (en) * 2017-04-13 2020-12-29 葛武 Intelligent energy transaction management system and method based on block chain technology
CN107481141A (en) * 2017-07-25 2017-12-15 浙江大学 Electric energy metrical and transaction terminal based on block chain technology
CN107681675A (en) * 2017-09-27 2018-02-09 赫普科技发展(北京)有限公司 Block chain electricity transaction peak-frequency regulation system based on distributed electric power storage facility

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105938609A (en) * 2016-04-28 2016-09-14 国家电网公司 Power grid operation assessment method for realizing multilayer indicator system
CN107423978A (en) * 2017-06-16 2017-12-01 郑州大学 A kind of distributed energy business confirmation method based on alliance's block chain
CN108092412A (en) * 2018-02-02 2018-05-29 珠海格力电器股份有限公司 Energy information processing method and equipment and energy internet system

Also Published As

Publication number Publication date
CN109117651A (en) 2019-01-01

Similar Documents

Publication Publication Date Title
CN109117651B (en) Metering data safety protection method
CN102496069B (en) Cable multimode safe operation evaluation method based on fuzzy analytic hierarchy process (FAHP)
CN105975735A (en) Modeling method for assessing health state of power equipment
CN104021300B (en) Comprehensive assessment method based on effect of distribution type electrical connection on power distribution network
CN110232490A (en) A kind of appraisal procedure and system of distribution network engineering investment effect
CN104700321A (en) Analytical method of state running tendency of transmission and distribution equipment
CN104376413A (en) Power grid planning scheme evaluation system based on analytic hierarchy process and data envelopment analysis
CN106548272A (en) A kind of electric automobile fills the evaluation methodology of facility combination property soon
CN106203875A (en) A kind of model for power equipment health state evaluation
Minli et al. Research on the application of artificial neural networks in tender offer for construction projects
CN107832950A (en) A kind of power distribution network investment effect evaluation method based on improvement Interval Fuzzy evaluation
CN110059913A (en) A kind of quantitative estimation method counted and the power failure of future-state is planned
CN108256772A (en) A kind of user side flexible resource scheduling uncertainty methods of risk assessment and system
CN116827807B (en) Power communication network node importance evaluation method based on multi-factor evaluation index
CN109345090A (en) A kind of rack evaluation method promoted based on distribution network reliability
CN112308305B (en) Multi-model synthesis-based electricity sales amount prediction method
CN114742415A (en) Operation effect evaluation method, device and system suitable for charging station
Ren et al. A universal defense strategy for data-driven power system stability assessment models under adversarial examples
CN103488911A (en) Investment risk assessment method of photovoltaic power generation project
CN105931133A (en) Distribution transformer replacement priority evaluation method and device
CN105488337A (en) Service capability assessment method for electric vehicle battery charging and replacement network
CN114547821A (en) Schedulable flexible resource identification method based on grey correlation theory and storage medium
CN108288170A (en) A kind of evaluation method of the Demand Side Response project based on analytic hierarchy process (AHP)
CN117522224A (en) A method, system and electronic equipment for determining the operation and maintenance effect of highway microgrid
CN116050912A (en) Health status evaluation method of energy station considering distance coupling and prospect theory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant