CN115037490B - Cross-network communication system for detecting malicious codes of transformer substation - Google Patents
Cross-network communication system for detecting malicious codes of transformer substation Download PDFInfo
- Publication number
- CN115037490B CN115037490B CN202111340916.8A CN202111340916A CN115037490B CN 115037490 B CN115037490 B CN 115037490B CN 202111340916 A CN202111340916 A CN 202111340916A CN 115037490 B CN115037490 B CN 115037490B
- Authority
- CN
- China
- Prior art keywords
- malicious code
- platform
- malicious
- proxy
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 23
- 238000001514 detection method Methods 0.000 claims abstract description 44
- 238000000034 method Methods 0.000 claims description 8
- 230000004927 fusion Effects 0.000 abstract 1
- 238000009434 installation Methods 0.000 abstract 1
- 230000002265 prevention Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a cross-network communication system for detecting malicious codes of a transformer substation, which comprises a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substation is provided with a malicious code terminal and a malicious code proxy platform, a secure communication link is established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms are encrypted by using an encryption algorithm, and the malicious code proxy platform and the malicious code terminal realize network intercommunication through a switch. According to the invention, the master station is communicated with all the substations through the intermediate proxy platform, information fusion and master station of all the substations are realized, malicious code detection and malicious code installation and upgrading prevention are uniformly carried out on all the substations by the master station, the upgrading efficiency is high, the real-time performance is realized, and all the substations are effectively protected.
Description
Technical Field
The invention relates to the technical field of malicious code detection, in particular to a cross-network communication system for detecting malicious codes of a transformer substation.
Background
With the widespread use of computer and network communication technologies in power monitoring systems, the network security threat situation of the power industry is becoming more and more severe, and the large-scale outage event caused by hacking attacks due to several causes of exposure in the last two years is also corroborated. Moreover, from the moment, the electric power industry is vulnerable when facing security threat, and the influence range is wide once the electric power industry is in the middle of the market, so that the security management of the electric power monitoring system is enhanced, attack and infringement of hackers, malicious codes and the like on the electric power monitoring system are prevented, the safe and stable operation of the electric power system is ensured, network security products in the electric power industry are also widely popularized, the network security is mainly protected from two dimensions of active and passive, active vulnerability scanning is active, and the protection products such as firewalls are passive. In practical application, direct communication cannot be realized between a malicious code platform of a master station and a malicious code terminal of a transformer substation, the master station cannot issue detection instructions to the transformer substations, each transformer substation is like a sealed information island, malicious codes detected by one transformer substation cannot inform other transformer substations at the same time, other transformer substations are updated in time, the same malicious codes can invade other transformer substations, protection information cannot be unified, each transformer substation independently carries out malicious code updating, certain hysteresis exists, and the updating efficiency is low.
Disclosure of Invention
The invention solves the problems of non-intercommunication of information of transformer substations, certain hysteresis of malicious code upgrading and low upgrading efficiency in the prior art, and provides a cross-network communication system for detecting the malicious codes of the transformer substations.
In order to achieve the above purpose, the following technical scheme is provided:
the utility model provides a cross-network communication system for malicious code detection of transformer substation, includes master website and a plurality of transformer substation, the master website is equipped with malicious code platform, the transformer substation is equipped with malicious code terminal and malicious code proxy platform, use SSL protocol to establish safe communication link between malicious code platform and the malicious code proxy platform to use encryption algorithm to encrypt the data of interaction between malicious code platform and the malicious code proxy platform, malicious code proxy platform and malicious code terminal pass through the switch and realize the network intercommunication.
According to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
Preferably, the encryption algorithm is an SM2 asymmetric algorithm. The SM2 asymmetric algorithm is based on an ECC elliptic curve cryptography theory, a 256-bit curve is recommended as a standard curve in the general rule of the cryptographic industry standard GMT 0003.1-2012SM2, and a digital signature algorithm, a key exchange protocol and a public key encryption algorithm all generate a key pair according to a finite field and an elliptic curve selected by the general rule of SM 2; a safer mechanism is adopted in the aspects of digital signature and key exchange, and the calculation amount and complexity are improved.
Preferably, the malicious code platform is used for issuing a malicious code detection instruction and an upgrade instruction, the malicious code detection instruction and the upgrade instruction are transmitted to a malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrade operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform.
Through the system provided by the invention, the master station can uniformly issue malicious code detection instructions to all substations, the detection efficiency is high, and once a certain malicious code is found, an upgrade package aiming at the malicious code can be directly sent to all substations by the master station, so that all substations are uniformly upgraded, the upgrade efficiency is high, and the real-time performance is strong.
Preferably, the process of establishing the secure communication link using SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
Preferably, the malicious code platform issues the malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
the SC, after receiving the data, the malicious code agent platform decrypts the received data to obtain detection task details;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
Preferably, the malicious code platform issues the upgrade instruction as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.
The beneficial effects of the invention are as follows: according to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
Drawings
FIG. 1 is a system configuration diagram of an embodiment;
figure 2 is a process diagram of an embodiment negotiating the generation of keys for SM2 asymmetric algorithms;
FIG. 3 is a diagram of an embodiment SM2 asymmetric algorithm encryption process;
fig. 4 is a diagram of an embodiment SM2 asymmetric algorithm decryption process.
Detailed Description
Examples:
the embodiment provides a cross-network communication system for detecting malicious codes of a transformer substation, referring to fig. 1, the cross-network communication system comprises a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substation is provided with a malicious code terminal and a malicious code proxy platform, a secure communication link is established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms is encrypted by using an SM2 asymmetric algorithm, and network intercommunication between the malicious code proxy platform and the malicious code terminal is realized through a switch. The SM2 asymmetric algorithm is based on an ECC elliptic curve cryptography theory, a 256-bit curve is recommended as a standard curve in the general rule of the cryptographic industry standard GMT 0003.1-2012SM2, and a digital signature algorithm, a key exchange protocol and a public key encryption algorithm all generate a key pair according to a finite field and an elliptic curve selected by the general rule of SM 2; a safer mechanism is adopted in the aspects of digital signature and key exchange, and the calculation amount and complexity are improved.
The process of establishing a secure communication link using the SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and referring to FIG. 2, S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
According to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
The malicious code platform is used for issuing malicious code detection instructions and upgrading instructions, the malicious code detection instructions and the upgrading instructions are transmitted to the malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrading operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform. Through the system provided by the invention, the master station can uniformly issue malicious code detection instructions to all substations, the detection efficiency is high, and once a certain malicious code is found, an upgrade package aiming at the malicious code can be directly sent to all substations by the master station, so that all substations are uniformly upgraded, the upgrade efficiency is high, and the real-time performance is strong.
The malicious code platform issues a malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm, refer to figure 3;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
SC, after receiving the data, the malicious code agent platform decrypts the received data, and obtains detection task details by referring to FIG. 4;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
The process of issuing the upgrade instruction by the malicious code platform is as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.
Claims (3)
1. The cross-network communication system for detecting the malicious codes of the transformer substation is characterized by comprising a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substations are provided with malicious code terminals and malicious code proxy platforms, secure communication links are established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms are encrypted by using an encryption algorithm, the malicious code proxy platforms and the malicious code terminals are communicated with each other through a switch, malicious code information of the transformer substations is fused through the master station, and after the malicious codes detected by the transformer substations are detected, an upgrade packet aiming at the malicious codes is sent to other transformer substations; the encryption algorithm is an SM2 asymmetric algorithm; the malicious code platform is used for issuing malicious code detection instructions and upgrading instructions, the malicious code detection instructions and upgrading instructions are transmitted to the malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrading operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform; the process of establishing a secure communication link using SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
2. The cross-network communication system for detecting malicious codes of transformer substations according to claim 1, wherein the malicious code platform issues the malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
the SC, after receiving the data, the malicious code agent platform decrypts the received data to obtain detection task details;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
3. The cross-network communication system for detecting malicious codes of a transformer substation according to claim 1, wherein the process of issuing the upgrade instruction by the malicious code platform is as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111340916.8A CN115037490B (en) | 2021-11-12 | 2021-11-12 | Cross-network communication system for detecting malicious codes of transformer substation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111340916.8A CN115037490B (en) | 2021-11-12 | 2021-11-12 | Cross-network communication system for detecting malicious codes of transformer substation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115037490A CN115037490A (en) | 2022-09-09 |
CN115037490B true CN115037490B (en) | 2023-12-15 |
Family
ID=83118157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111340916.8A Active CN115037490B (en) | 2021-11-12 | 2021-11-12 | Cross-network communication system for detecting malicious codes of transformer substation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115037490B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006214767A (en) * | 2005-02-01 | 2006-08-17 | Kansai Electric Power Co Inc:The | Measurement apparatus, measurement method, measurement program, and computer-readable storage medium storing measurement program |
JP2012234540A (en) * | 2011-05-04 | 2012-11-29 | Nhn Business Platform Corp | Malicious code detection system and malicious code detection method |
CN104038481A (en) * | 2014-05-22 | 2014-09-10 | 国家电网公司 | Communication method of power asset management master station system and RFID (radio frequency identification device) terminal |
CN106787163A (en) * | 2016-11-10 | 2017-05-31 | 国家电网公司 | A kind of centralized configuration and long distance control system for substation network communication device |
CN107241224A (en) * | 2017-06-09 | 2017-10-10 | 珠海市鸿瑞软件技术有限公司 | The network risks monitoring method and system of a kind of transformer station |
CN108964264A (en) * | 2018-06-22 | 2018-12-07 | 国电南瑞科技股份有限公司 | The wireless realization of debugging method of intelligent substation site device |
CN208227074U (en) * | 2018-02-09 | 2018-12-11 | 鼎信信息科技有限责任公司 | Electric power monitoring system network security monitors terminal |
CN109842624A (en) * | 2019-02-01 | 2019-06-04 | 南京国电南自软件工程有限公司 | A kind of interchanger security agency communication method and system |
CN112153031A (en) * | 2020-09-15 | 2020-12-29 | 深圳供电局有限公司 | Network security risk monitoring system and method of power monitoring system |
CN112422560A (en) * | 2020-11-17 | 2021-02-26 | 中国电力科学研究院有限公司 | Lightweight substation secure communication method and system based on secure socket layer |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6996841B2 (en) * | 2001-04-19 | 2006-02-07 | Microsoft Corporation | Negotiating secure connections through a proxy server |
US20120203874A1 (en) * | 2011-02-08 | 2012-08-09 | General Electric Company | Smart substation management |
-
2021
- 2021-11-12 CN CN202111340916.8A patent/CN115037490B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006214767A (en) * | 2005-02-01 | 2006-08-17 | Kansai Electric Power Co Inc:The | Measurement apparatus, measurement method, measurement program, and computer-readable storage medium storing measurement program |
JP2012234540A (en) * | 2011-05-04 | 2012-11-29 | Nhn Business Platform Corp | Malicious code detection system and malicious code detection method |
CN104038481A (en) * | 2014-05-22 | 2014-09-10 | 国家电网公司 | Communication method of power asset management master station system and RFID (radio frequency identification device) terminal |
CN106787163A (en) * | 2016-11-10 | 2017-05-31 | 国家电网公司 | A kind of centralized configuration and long distance control system for substation network communication device |
CN107241224A (en) * | 2017-06-09 | 2017-10-10 | 珠海市鸿瑞软件技术有限公司 | The network risks monitoring method and system of a kind of transformer station |
CN208227074U (en) * | 2018-02-09 | 2018-12-11 | 鼎信信息科技有限责任公司 | Electric power monitoring system network security monitors terminal |
CN108964264A (en) * | 2018-06-22 | 2018-12-07 | 国电南瑞科技股份有限公司 | The wireless realization of debugging method of intelligent substation site device |
CN109842624A (en) * | 2019-02-01 | 2019-06-04 | 南京国电南自软件工程有限公司 | A kind of interchanger security agency communication method and system |
CN112153031A (en) * | 2020-09-15 | 2020-12-29 | 深圳供电局有限公司 | Network security risk monitoring system and method of power monitoring system |
CN112422560A (en) * | 2020-11-17 | 2021-02-26 | 中国电力科学研究院有限公司 | Lightweight substation secure communication method and system based on secure socket layer |
Also Published As
Publication number | Publication date |
---|---|
CN115037490A (en) | 2022-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104158653B (en) | A kind of safety communicating method based on the close algorithm of business | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
CN112104604B (en) | System and method for realizing secure access service based on electric power Internet of things management platform | |
CN102685119A (en) | Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server | |
CN102111273B (en) | Pre-sharing-based secure data transmission method for electric load management system | |
CN104811427B (en) | A kind of safe industrial control system communication means | |
CN108900540B (en) | Service data processing method of power distribution terminal based on double encryption | |
CN112118106B (en) | Lightweight end-to-end secure communication authentication method based on identification password | |
CN104219217A (en) | SA (security association) negotiation method, device and system | |
CN111711625A (en) | Power system information security encryption system based on power distribution terminal | |
CN103441983A (en) | Information protection method and device based on link layer discovery protocol | |
CN111756627A (en) | Cloud platform security access gateway of electric power monitored control system | |
Premnath et al. | Application of NTRU cryptographic algorithm for SCADA security | |
KR101448866B1 (en) | Security apparatus for decrypting data encrypted according to the web security protocol and operating method thereof | |
CN100376092C (en) | Firewall and invasion detecting system linkage method | |
CN112202773B (en) | Computer network information security monitoring and protection system based on internet | |
CN115037490B (en) | Cross-network communication system for detecting malicious codes of transformer substation | |
CN105187453A (en) | Security encryption communication method of fault indicator | |
CN112995140B (en) | Safety management system and method | |
CN111935112B (en) | Cross-network data security ferrying device and method based on serial | |
CN103888438A (en) | Train data communication system using information safety technology | |
CN113472539A (en) | Method for carrying out national encryption by using RDMA R _ Key | |
KR20220036141A (en) | Security device and method for power control system | |
Mohamed et al. | Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis | |
CN111212018A (en) | Multi-link transmission method and system based on link selection and fragmentation recombination |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |