CN102355467A - Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission - Google Patents

Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission Download PDF

Info

Publication number
CN102355467A
CN102355467A CN2011103166683A CN201110316668A CN102355467A CN 102355467 A CN102355467 A CN 102355467A CN 2011103166683 A CN2011103166683 A CN 2011103166683A CN 201110316668 A CN201110316668 A CN 201110316668A CN 102355467 A CN102355467 A CN 102355467A
Authority
CN
China
Prior art keywords
trust chain
tcac
tcag
credible
monitoring terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103166683A
Other languages
Chinese (zh)
Other versions
CN102355467B (en
Inventor
曾荣
张涛
林为民
陈亚东
邵志鹏
马卓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Electric Power Research Institute
Original Assignee
State Grid Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Electric Power Research Institute filed Critical State Grid Electric Power Research Institute
Priority to CN201110316668.3A priority Critical patent/CN102355467B/en
Publication of CN102355467A publication Critical patent/CN102355467A/en
Application granted granted Critical
Publication of CN102355467B publication Critical patent/CN102355467B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission, which carries out credible transformation to a power transmission and transformation equipment state monitoring system through identity authentication, platform authentication, integrity measurement, trust chain transmission and other methods. A credible authentication service, an access actuation server and a centralized regulation server are deployed in a main station, and a monitoring terminal, a state information access controller, a state information access gateway machine and a state monitoring proxy are transformed into a credible monitoring terminal, a credible state information access controller, a credible state information access gateway machine and a credible state monitoring proxy, so that the whole monitoring system is constructed into a credible system. The system can effectively prevent malicious program attack, malicious code injection attack, physical data theft, network tapping, sniffing attack and the like, and protect the security of the monitoring system and an internal power grid system; and the invention also provides a trust chain transmission model which is used for proving that under trust chain transmission, as long as each level of a trust chain is credible, the whole system is credible.

Description

Power transmission and transformation equipment state monitoring system safety protecting method based on the trust chain transmission
Technical field
The present invention is a kind of power transmission and transformation equipment state monitoring system safety protection technique; The trust chain transmission method is applied in the power transmission and transformation equipment state monitoring system; Mainly solve the protection of the power transmission and transformation equipment state monitoring system network information security, prevent various rogue attacks, belong to filed of network information security.
Background technology
Power transmission and transformation equipment state monitoring system (being called for short " monitoring system ") is a kind of real-time perception of utilizing various sensor technologies, wide-area communication technology and information treatment technology to realize various power transmission and transforming equipment running statuses, the monitoring system of keeping watch on early warning, analyzing and diagnosing and evaluation prediction.
Current, power transmission and transformation equipment state monitoring system representative network structure adopts main website, wide-area communication network, three grades of deployment modes of monitoring terminal, if network model is shown in Figure 1.
Monitoring terminal is divided into the electrical substation monitoring terminal and the monitoring terminal of monitoring the transmission line running status on the transmission tower of equipment operation in the monitoring substation.These two kinds of terminals are connected with the application server of main website through wide-area communication network.Monitoring terminal is uploaded to Monitoring Data the application server of main website through wide-area communication network.Application server is responsible for handling Monitoring Data, shows and data are saved to background data base.
Because monitoring terminal inserts the electric power system Intranet, cross over Wide Area Networks such as cable network, wireless network, wireless public network, the complicated network structure, security risk is high.The assailant can select monitoring terminal is attacked, and implants rogue program at monitoring terminal, and then steals the identity information of monitoring terminal, steals Monitoring Data; Also can select to attack access network, distort transmitted data on network, disturb normal monitoring; More can attack net province main station system in the analog monitoring terminal, and then electrical power system network safety is threatened.Therefore, the power transmission and transformation equipment state monitoring system safeguard procedures that need tighten security ensure electrical power system network safety.
Summary of the invention
The object of the invention just provides a kind of new power transmission and transformation equipment state monitoring system safety protection technique, solves the security risk that the power transmission and transformation equipment state monitoring system faces.
The present invention proposes a kind of power transmission and transformation equipment state monitoring system safety protecting method that transmits based on trust chain; Begin from monitoring terminal hardware source, the transmission through secure hardware, trust chain and the method for platform authentication solve the information security issue of monitoring terminal network system.On the hardware mainboard of equipment, embed the module chip of supporting that trust chain transmits, develop credible and secure parts, the software protocol in conjunction with supporting that trust chain transmits sets up new Security Architecture.Utilize technology such as credible tolerance, trust chain transmission; Can realize the safe and reliable access electric power system Intranet of power transmission and transformation equipment state monitoring system, stop that rogue program is attacked, malicious code is implanted and attacked, physical data is stolen, multiple attack patterns such as network interception and Sniffing Attack.
One, architecture
Be illustrated in figure 2 as the network architecture of the power transmission and transformation equipment state monitoring system of transmitting based on trust chain.It mainly comprises following components: server, centralized supervisory server, trusted status information access controller (TCAC), trusted status information Access Network shutdown (TCAG), trusted status monitoring agency (TCMA), credible monitoring terminal (TMT) are carried out in authentic authentication server, access.
Provide concrete introduction below:
The authentic authentication server:The authentic authentication department server is deployed on main website, and the authentic authentication server is at first submitted in the access application of monitoring equipment.The authentic authentication server carries out authentication, platform authentication, integrity measurement to the monitoring equipment that proposes the access application, judges whether proposition inserts the equipment of applying for credible.If equipment is credible, then allow monitoring equipment to insert Intranet, otherwise refusal.
Insert and carry out server:Be deployed in the main website border, the access of control monitoring equipment, function class is similar to borde gateway.After the authentic authentication server allowed application equipment to insert, notice inserted the execution server and inserts monitoring equipment.Access execution server is carried out the encryption and decryption of communicating by letter with monitoring equipment.
The centralized supervisory server:The centralized supervisory department server is deployed on insert to be carried out after the server, bears being connected between the environment and application service under the trust chain transmission.
Trusted status information access controller (TCAC):It is a kind of network application access device that possesses the trust chain transmission capacity; Be deployed in the transformer station; Can receive the standardization state information that they send, and they are carried out the device of standardization control with all kinds of state monitoring apparatus or status monitoring agency in the standard mode docking station.
Trusted status information Access Network shutdown (TCAG):Be a kind of network application access device that possesses the trust chain transmission capacity, be deployed in net and economize side, can receive the standardization state information that they send, and they are carried out the computer of standardization control with all kinds of status monitoring agencies of the long-range connection of standard mode.
Trusted status monitoring agency (TCMA):It is a kind of network application access device that possesses the trust chain transmission capacity; Be installed on the circuit or in the transformer station; Can centralized collection all kinds of status monitoring information on the line or in the station, and substitute all kinds of state monitoring apparatus and carry out the unified agent device that standardized data is communicated by letter with TCAC or TCAG.
Credible monitoring terminal (TMT):Be a kind of power transmission and transformation equipment state monitoring equipment that possesses the trust chain transmission capacity, on installation and the circuit or in the transformer station, the device of all kinds of power transmission and transformation equipment state information in perhaps standing on the centralized collection line.
The main website incoming end is provided with the authentic authentication server, and the authentic authentication server judges whether the access request at terminal meets the demands, if meet the requirements, notice inserts the execution server and accesses terminal, otherwise the refusal terminal is inserted.Insert the execution server and be positioned at the main website border, function class is similar to IAD, is used to control the access of external equipment such as TCAC/TCAG/TCMA, monitoring terminal etc.Insert to carry out server and carry out the decision of authentic authentication server on the one hand, on the other hand, insert carry out that server is born and the terminal between the function of channel data encryption and decryption, external data gets into Intranet after inserting the deciphering of carrying out server.The centralized supervisory server is responsible for the connection of main website network and state monitoring and management system.
Two, method flow
The power transmission and transformation equipment state monitoring system safety protecting method based on the trust chain transmission that this method proposes comprises monitoring terminal authentication and platform authentication, the credible and secure storage of monitoring terminal and data are leakage-preventing, monitoring terminal integrity measurement, the transmission of monitoring terminal trust chain.
1 monitoring terminal authentication and platform authentication
1.1 monitoring terminal authentication
The monitoring terminal authentication is that the authentic authentication server carries out the first step that safety is judged to monitoring terminal, and authentication is kept in the memory space at terminal self, in the non-volatile storage space like the monitoring terminal system board.Monitoring terminal have only through the authentic authentication server to its authentication of carrying out after, be allowed for access next step.
1.2 monitoring terminal platform authentication
Trust chain trusted module chip stored on the monitoring terminal mainboard the relevant information of monitoring terminal manufacturer storage.Include monitoring terminal manufacturer information, platform information, integrality certificate etc.Through platform authentication to monitoring terminal, can carry out authentication to the key message of platform, further improved the fail safe of monitoring terminal.
Credible and secure storage of 2 monitoring terminals and data are leakage-preventing
Receive the restriction of power consumption, network insertion, some monitoring terminal can't the real-time Transmission Monitoring Data.Monitoring terminal temporarily is stored in this locality with Monitoring Data, to certain set time, and the communication between monitor terminal unlatching and the main website, with data upload, how safety is stored in local monitor data is the problem that needs solve.
Can realize the leakage-preventing function of data effectively based on local trust chain trusted module chip.Trust chain trusted module chip on the monitoring terminal is supported data encryption feature, can memory protection feature be provided for monitoring terminal.The encryption of the Monitoring Data at terminal can be bound with the integrality of monitoring terminal.The data that are stored on the monitoring terminal must be carried out encryption, and the key of encryption and decryption is associated with the completeness check result of monitoring terminal.Before outside need obtains the data of storage, must carry out completeness check to monitoring terminal earlier, have only when completeness check passes through, could obtain correct decruption key.Through storing data key integrality association, can effectively realize the anti-data-leakage function, the data security of protection terminal storage in the terminal.
Monitoring terminal and main website insert that carrying out communicate by letter between the server also adopts cipher mode, and encryption key inserts the generation of execution server negotiate by monitoring terminal with main website, and coded communication can prevent that data are stolen and distort in transmission channel.
3 monitoring terminal integrity measurements
Integrity measurement to monitoring terminal is the characteristic value of obtaining about monitoring terminal that influences confidence level, and the summary of these values is deposited in the PCR register of monitoring terminal trust chain trusted module chip.Calculate the summary of certain module, and itself and desired value are compared the integrality that just can safeguard this module.
Fig. 3 representes the attack method of rogue program to target program.The rogue program target program that disguises oneself as is made amendment to the code in the target program process space, embeds malicious code.Therefore; Rogue program is attacked for credible monitoring terminal, and the operational blocks which partition system when the terminal is infected by malice, just can detect infected module through the variation of comparing digest value; And then can handle accordingly, for example use the module of backup to repair infected module.
4 monitoring terminal trust chains transmit
Based on trust chain safety want basically set up a root of trust, the credibility of root is guaranteed by physical security and Administrative Security; Set up a trust chain again; Begin to hardware platform, to operating system, again to application from root of trust; Arrive network at last; One-level authentication one-level; One-level is trusted one-level; Thereby this trust is expanded to The whole calculations machine network, to reach the purpose that strengthens fail safe and reliability, Here it is trust chain pass through mechanism.
According to the trust chain transmission method, trust chain trusted module chip is implanted in the built-in terminal system, call defencive function, integrity measurement function and the authentication function of trust chain trusted module chip, realize the secure and trusted of built-in terminal system.The startup of monitoring terminal system is begun by trust chain trusted module chip trusted root as shown in Figure 4, trust chain trusted module chip checking booting operating system process integrity, checking through after the boot that starts the operating system; The booting operating system program continues to call the power function verification operation system integrity of trust chain trusted module chip, and checking brings into operation through back operation system.Afterwards between operating system and the application program, between application program and the application program, can call the corresponding safety function of trust chain trusted module chip according to safety regulation between terminal and the main website, realize various trusted application.System's whole service flow process has guaranteed credible startup and the credible operation of bottom hardware, operating system, upper level applications.
5 monitoring terminal trust chains transmit Mathematical Modeling
The present invention proposes the Mathematical Modeling that a monitoring terminal trust chain transmits, and utilizes this model that the credibility of trust chain transmission is proved.Show that through this model then whole trust chain is credible as long as guarantee that the tolerance of each layer that trust chain is middle all is believable, integral body is credible until the terminal.
Figure 2011103166683100002DEST_PATH_IMAGE001
? trust chain metrics results
? integrity measurement trusted root
Figure 2011103166683100002DEST_PATH_IMAGE003
? level i trust chain metrics results
Figure 2011103166683100002DEST_PATH_IMAGE004
? metric function of the i layer
Figure 2011103166683100002DEST_PATH_IMAGE005
? i-th layer of the hash function measure
Figure 2011103166683100002DEST_PATH_IMAGE006
i-th layer is measured program
The model formulation that trust chain transmits is following:
System loads depth amount is the result be expressed as:
Figure 2011103166683100002DEST_PATH_IMAGE007
=
Figure 2011103166683100002DEST_PATH_IMAGE008
(1)
Booting operating system program metric function is:
Figure 2011103166683100002DEST_PATH_IMAGE009
=
Figure 2011103166683100002DEST_PATH_IMAGE010
(2)
Derive according to this, the tolerance result of i-1 layer does
=
Figure 2011103166683100002DEST_PATH_IMAGE012
(3)
The tolerance result of i layer does
Figure 190319DEST_PATH_IMAGE003
=
Figure 2011103166683100002DEST_PATH_IMAGE013
(4)
Formula (4) is carried out conversion
Figure 2011103166683100002DEST_PATH_IMAGE014
=
= (5)
According to the formula (5) analysis, as a trusted root
Figure 169777DEST_PATH_IMAGE002
is considered to be fully trusted,
Figure 949514DEST_PATH_IMAGE003
the final measurement result depends on the previous
Figure 344723DEST_PATH_IMAGE011
measure results so
Figure 159095DEST_PATH_IMAGE003
chain of trust is also dependent on the credibility
Figure 450399DEST_PATH_IMAGE011
chain of trust credibility.The reliability rating of whole trust chain depends on the integrality of each trust layer on the trust chain.As long as guarantee that each layer all is credible fully in the trust chain transmittance process, can prove that then whole trust chain is believable.
6 monitoring terminal access process
The monitoring terminal access process is:
(1) TCAC/TCAG is to inserting the server application access request of carrying out.
(2) insert the execution server authentic authentication server is given in application, the authentic authentication server at first carries out authentication to the letter of identity of TCAC/TCAG.
(3) after authentication is passed through; The authentic authentication server forwards application to TNC service end layer; Through the IF-TNCCS agreement TNC client tier of TCAC/TCAG is carried out platform authentication by the TNC service end, the certificate in the trust chain trusted module chip on the checking TCAC/TCAG mainboard.
(4) after platform authentication passed through, the authentic authentication server forwarded application to the integrity verification layer again, requires TCAC/TCAG that the integrity information of self is collected, and the authentic authentication server carries out integrity verification to the data after collecting.
(5) after checking was passed through, TCAC/TCAG was authorized in the decision of authentic authentication server corresponding confidence levels, and notice access execution server, allowed TCAC/TCAG to insert.Insert and carry out server and TCAC/TCAG negotiate encryption key, set up the encrypted transmission passage, accomplish the credible access of TCAC/TCAG.
(6) if having TCMA between TCAC/TCAG and the monitoring terminal, then TCMA also inserts main website with reference to the access way of TCAC/TCAG.
(7) after the communication port between TCAC/TCAG/TCMA and the main website was set up and accomplished, monitoring terminal (TMT) initiated to insert application through this passage to inserting the execution server.Employing is similar to the verification mode of TCAC/TCAG, and monitoring terminal is carried out authentication, platform authentication and integrity verification.After checking was accomplished, the authentic authentication server was included monitoring terminal in own trust domain, and the negotiation with monitoring terminal completion Traffic encryption key(TEK) is issued to TCAC/TCAG/TCMA with encryption key.
The inventive method has proposed a kind of power transmission and transformation equipment state monitoring system safety protecting method that transmits based on trust chain; Be mainly used in the monitoring terminal that solves the power transmission and transformation equipment state monitoring system and insert the electric power system Intranet, bring security risk for the electric power system Intranet through modes such as wireless, public networks.Through the trust chain transmission method is introduced the power transmission and transformation equipment state monitoring system, promote the ability of the preventing malice code intrusion of power transmission and transformation equipment state monitoring system.
1 monitoring terminal authentication and platform authentication
1.1 monitoring terminal authentication
The monitoring terminal authentication is that the authentic authentication server carries out the first step that safety is judged to monitoring terminal, and authentication is kept in the memory space at terminal self, in the non-volatile storage space like the monitoring terminal system board.Monitoring terminal have only through the authentic authentication server to its authentication of carrying out after, be allowed for access next step.
1.2 monitoring terminal platform authentication
Platform authentication is a kind of hardware system authentication mode.Trust chain trusted module chip stored on the monitoring terminal mainboard the relevant information of monitoring terminal manufacturer storage.Include manufacturer's information, platform information, integrality certificate etc.Through platform authentication to monitoring terminal, can carry out authentication to the key message of platform, further improved the fail safe of monitoring terminal.
Credible and secure storage of 2 monitoring terminals and data are leakage-preventing
Receive the restriction of power consumption, network insertion, some monitoring terminal can't the real-time Transmission Monitoring Data.Monitoring terminal temporarily is stored in this locality with Monitoring Data, to certain set time, and the communication between monitor terminal unlatching and the main website, with data upload, how safety is stored in local monitor data is the problem that needs solve.
Can realize the leakage-preventing function of data effectively based on local trust chain trusted module chip.Trust chain trusted module chip on the monitoring terminal is supported data encryption feature, can memory protection feature be provided for monitoring terminal.The encryption of the Monitoring Data at terminal can be bound with the integrality of monitoring terminal.The data that are stored on the monitoring terminal must be carried out encryption, and the key of encryption and decryption is associated with the completeness check result of monitoring terminal.Before outside need obtains the data of storage, must carry out completeness check to monitoring terminal earlier, have only when completeness check passes through, could obtain correct decruption key.Through storing data key integrality association, can effectively realize the anti-data-leakage function, the data security of protection terminal storage in the terminal.
Monitoring terminal and main website insert that carrying out communicate by letter between the server also adopts cipher mode, and encryption key inserts the generation of execution server negotiate by monitoring terminal with main website, and coded communication can prevent that data are stolen and distort in transmission channel.
3 monitoring terminal integrity measurements
Integrity measurement to monitoring terminal is the characteristic value of obtaining about monitoring terminal that influences confidence level, and the summary of these values is deposited in the PCR register of monitoring terminal trust chain trusted module chip.Calculate the summary of certain module, and itself and desired value are compared the integrality that just can safeguard this module.
Fig. 3 representes the attack method of rogue program to target program.The rogue program target program that disguises oneself as is made amendment to the code in the target program process space, embeds malicious code.Therefore; Rogue program is attacked for the monitoring terminal with credible anti-attack ability; Operational blocks which partition system when the terminal is infected by malice; Variation through comparing digest value just can detect infected module; And then can handle accordingly, for example use the module of backup to repair infected module.
4 monitoring terminal trust chains transmit
The method of trust chain transmission is to set up a root of trust, and the credibility of root is guaranteed by physical security and Administrative Security; Set up a trust chain again; Begin to hardware platform, to operating system, again to application from root of trust; Arrive network at last; One-level authentication one-level; One-level is trusted one-level; Thereby this trust is expanded to The whole calculations machine network, to reach the purpose that strengthens fail safe and reliability, Here it is trust chain pass through mechanism.
According to the trust chain transmission method, trust chain trusted module chip is implanted in the built-in terminal system, call defencive function, integrity measurement function and the authentication function of trust chain trusted module chip, realize the secure and trusted of built-in terminal system.The startup of monitoring terminal system is begun by trust chain trusted module chip trusted root as shown in Figure 4, trust chain trusted module chip checking booting operating system process integrity, checking through after the boot that starts the operating system; The booting operating system program continues to call the power function verification operation system integrity of trust chain trusted module chip, and checking brings into operation through back operation system.Afterwards between operating system and the application program, between application program and the application program, can call the corresponding safety function of trust chain trusted module chip according to safety regulation between terminal and the main website, realize various trusted application.System's whole service flow process has guaranteed credible startup and the credible operation of bottom hardware, operating system, upper level applications.
5 monitoring terminal trust chains transmit Mathematical Modeling
The present invention proposes the Mathematical Modeling that a monitoring terminal trust chain transmits, and utilizes this model that the credibility of trust chain transmission is proved.Show that through this model then whole trust chain is credible as long as guarantee that the tolerance of each layer that trust chain is middle all is believable, integral body is credible until the terminal.
Figure 717433DEST_PATH_IMAGE001
? trust chain metrics results
Figure 916333DEST_PATH_IMAGE002
? integrity measurement trusted root
Figure 926490DEST_PATH_IMAGE003
? level i trust chain metrics results
Figure 919853DEST_PATH_IMAGE004
? metric function of the i layer
Figure 674183DEST_PATH_IMAGE005
? i-th layer of the hash function measure
Figure 411195DEST_PATH_IMAGE006
i-th layer is measured program
The model formulation that trust chain transmits is following:
System loads depth amount is the result be expressed as:
Figure 403421DEST_PATH_IMAGE007
=
Figure 833266DEST_PATH_IMAGE008
(1)
Booting operating system program metric function is:
Figure 74891DEST_PATH_IMAGE009
= (2)
Derive according to this, the tolerance result of i-1 layer does
Figure 586961DEST_PATH_IMAGE011
= (3)
The tolerance result of i layer does
=
Figure 198705DEST_PATH_IMAGE013
(4)
Formula (4) is carried out conversion
Figure 696682DEST_PATH_IMAGE014
=
=
Figure 468329DEST_PATH_IMAGE015
(5)
According to the formula (5) analysis, as a trusted root
Figure 418968DEST_PATH_IMAGE002
is considered to be fully trusted,
Figure 645681DEST_PATH_IMAGE003
The final measurement result depends on the previous
Figure 998165DEST_PATH_IMAGE011
measure results so
Figure 940713DEST_PATH_IMAGE003
chain of trust is also dependent on the credibility
Figure 378648DEST_PATH_IMAGE011
chain of trust credibility.The reliability rating of whole trust chain depends on the integrality of each trust layer on the trust chain.As long as guarantee that each layer all is credible fully in the trust chain transmittance process, can prove that then whole trust chain is believable.
Description of drawings
Fig. 1 is a power transmission and transformation equipment state monitoring system network structure.Mainly comprise: monitoring terminal, wide-area communication network, application server.Be the power transmission and transformation equipment state monitoring system figure before not transforming;
Fig. 2 is the improved power transmission and transformation equipment state monitoring system network structure that transmits based on trust chain;
Fig. 3 is a rogue program target of attack program code sketch map;
Fig. 4 is that the terminal trust chain transmits sketch map.
Embodiment
Describe for ease, we have following application example at hypothesis:
The power transmission and transformation equipment state monitoring system is set up in certain electric power enterprise plan, and this condition monitoring system comprises power transmission and transformation equipment state monitoring terminal and application system server.The status monitoring terminal part is deployed in power transmission and transforming equipment one side; Near power transmission and transforming equipment; Monitoring equipment both can be the equipment in the transformer station; Like transformer etc.; Equipment on also can shaft tower; Like transmission line etc., monitoring equipment inserts the application server of main websites, the application server processes Monitoring Data of main website through Wide Area Networks such as cable network, wireless network, wireless public networks.
Its concrete embodiment is:
(1), monitoring terminal is transformed into supports credible tolerance, supports the credible monitoring terminal that trust chain transmits at the monitoring terminal hardware chain trusted module chip of enhancing trust.
(2) if between monitoring equipment and state information access controller or monitoring equipment and the shutdown of state information Access Network, the status monitoring agent equipment is arranged; At the status monitoring proxy hardware chain trusted module chip of enhancing trust, the status monitoring agency transform as support credible tolerance, support the trusted status monitoring agency (TCMA) that trust chain transmits.
(3) similar, the chain trusted module chip of on state information access controller and state information Access Network shutdown hardware, enhancing trust transform it as trusted status information access controller (TCAC) and trusted status information Access Network shutdown (TCAG)
(4) insert the border in main website and dispose access execution server, authentic authentication server and meta data server.Insert the execution server and be responsible for communicating, accept the access application of TCAC, TCAG, TCMA, these equipment propositions of TMT, and the authentic authentication server is given in application with TCAC, TCAG, TCMA, TMT.The authentic authentication server is responsible for application equipment is carried out authentication, platform authentication, integrity measurement, judges the credibility of application equipment.If application equipment satisfies credible requirement, the authentic authentication server notification inserts the server access application equipment of carrying out.Insert execution server and application equipment and set up communication port.Meta data server is responsible for being connected with application server the service that provides.

Claims (2)

1. the power transmission and transformation equipment state monitoring system safety protecting method that transmits based on trust chain is characterized in that, comprises following:
1) TCAC/TCAG is to inserting the server application access request of carrying out;
2) insert the execution server authentic authentication server is given in application, the authentic authentication server at first carries out authentication to the letter of identity of TCAC/TCAG;
3) after authentication is passed through; The authentic authentication server forwards application to TNC service end layer; Through the IF-TNCCS agreement TNC client tier of TCAC/TCAG is carried out platform authentication by the TNC service end, the certificate in the trust chain trusted module chip on the checking TCAC/TCAG mainboard;
4) after platform authentication passed through, the authentic authentication server forwarded application to the integrity verification layer again, requires TCAC/TCAG that the integrity information of self is collected, and the authentic authentication server carries out integrity verification to the data after collecting;
5) after checking was passed through, TCAC/TCAG was authorized in the decision of authentic authentication server corresponding confidence levels, and notice access execution server, allowed TCAC/TCAG to insert; Insert and carry out server and TCAC/TCAG negotiate encryption key, set up the encrypted transmission passage, accomplish the credible access of TCAC/TCAG;
6) if having TCMA between TCAC/TCAG and the monitoring terminal, then TCMA also inserts main website with reference to the access way of TCAC/TCAG;
7) after the communication port between TCAC/TCAG/TCMA and the main website was set up and accomplished, monitoring terminal (TMT) initiated to insert application through this passage to inserting the execution server; Employing is similar to the verification mode of TCAC/TCAG, and monitoring terminal is carried out authentication, platform authentication and integrity verification; After checking was accomplished, the authentic authentication server was included monitoring terminal in own trust domain, and the negotiation with monitoring terminal completion Traffic encryption key(TEK) is issued to TCAC/TCAG/TCMA with encryption key.
2. based on the power transmission and transformation equipment state monitoring system safety protecting method of trust chain transmission, it is characterized in that the credibility of the trust chain transmission of safety protecting method is provided by following proof:
Figure 210831DEST_PATH_IMAGE001
? trust chain metrics results
? integrity measurement trusted root
Figure 993159DEST_PATH_IMAGE003
? level i trust chain metrics results
Figure 472682DEST_PATH_IMAGE004
? metric function of the i layer
Figure 440638DEST_PATH_IMAGE005
? i-th layer of the hash function measure
Figure 536770DEST_PATH_IMAGE006
i-layer is measured in the program
The model formulation that trust chain transmits is following:
System loads depth amount is the result be expressed as:
Figure 248374DEST_PATH_IMAGE007
=
Figure 707037DEST_PATH_IMAGE008
(1)
Booting operating system program metric function is:
Figure 845895DEST_PATH_IMAGE009
=
Figure 429323DEST_PATH_IMAGE010
(2)
Derive according to this, the tolerance result of i-1 layer does
Figure 147880DEST_PATH_IMAGE011
=
Figure 133154DEST_PATH_IMAGE012
(3)
The tolerance result of i layer does
Figure 36388DEST_PATH_IMAGE003
=
Figure 575953DEST_PATH_IMAGE013
(4)
Formula (4) is carried out conversion
Figure 629360DEST_PATH_IMAGE014
=
=
Figure 469140DEST_PATH_IMAGE015
(5)
According to the formula (5) analysis, as a trusted root
Figure 949800DEST_PATH_IMAGE002
is considered to be entirely credible.
CN201110316668.3A 2011-10-18 2011-10-18 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission Active CN102355467B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110316668.3A CN102355467B (en) 2011-10-18 2011-10-18 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110316668.3A CN102355467B (en) 2011-10-18 2011-10-18 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission

Publications (2)

Publication Number Publication Date
CN102355467A true CN102355467A (en) 2012-02-15
CN102355467B CN102355467B (en) 2015-07-08

Family

ID=45578961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110316668.3A Active CN102355467B (en) 2011-10-18 2011-10-18 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission

Country Status (1)

Country Link
CN (1) CN102355467B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067368A (en) * 2012-12-24 2013-04-24 江西省电力公司 Protocol and implementation method of direct transmission of electrical power system warning message
CN103491054A (en) * 2012-06-12 2014-01-01 珠海市鸿瑞信息技术有限公司 SAM access system
CN103646214A (en) * 2013-12-18 2014-03-19 国家电网公司 Method for establishing trusted environment in power distribution terminal
CN103795541A (en) * 2013-12-13 2014-05-14 国网上海市电力公司 Secure communication method of electricity information acquisition system of 230M wireless private network channel
CN106125627A (en) * 2016-08-25 2016-11-16 浪潮电子信息产业股份有限公司 A kind of credible Internet of Things implementation method based on TPM chip
CN103684793B (en) * 2013-12-25 2017-12-05 国家电网公司 A kind of method based on trust computing enhancing communication security of power distribution network
CN111683136A (en) * 2020-06-05 2020-09-18 国网冀北电力有限公司电力科学研究院 Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system
CN112104653A (en) * 2020-09-15 2020-12-18 全球能源互联网研究院有限公司 Charging system trusted computing management method and device and storage medium
CN112347472A (en) * 2020-10-27 2021-02-09 中国南方电网有限责任公司 Behavior measurement method and device of power system
CN112511618A (en) * 2020-11-25 2021-03-16 全球能源互联网研究院有限公司 Edge Internet of things agent protection method and power Internet of things dynamic security trusted system
CN114845298A (en) * 2022-03-29 2022-08-02 国网山东省电力公司经济技术研究院 Aerial optical cable monitoring and transmitting system based on trusted WLAN

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545243A (en) * 2003-11-24 2004-11-10 华中科技大学 Method and system for certification
CN1848722A (en) * 2005-04-14 2006-10-18 联想(北京)有限公司 Method and system for establishing credible virtual special network connection
CN101039186A (en) * 2007-05-08 2007-09-19 中国科学院软件研究所 Method for auditing safely system log
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101136928A (en) * 2007-10-19 2008-03-05 北京工业大学 Reliable network access framework
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network
CN101159640A (en) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 Ternary equal identification based reliable network access control system
CN101458743A (en) * 2007-12-12 2009-06-17 中国长城计算机深圳股份有限公司 Method for protecting computer system
CN101859373A (en) * 2010-04-28 2010-10-13 国网电力科学研究院 Method for safely accessing mobile credible terminal
CN201699728U (en) * 2010-06-17 2011-01-05 宁波电业局 Trusted network management system for electric power real-time system
US20110145593A1 (en) * 2009-12-15 2011-06-16 Microsoft Corporation Verifiable trust for data through wrapper composition

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545243A (en) * 2003-11-24 2004-11-10 华中科技大学 Method and system for certification
CN1848722A (en) * 2005-04-14 2006-10-18 联想(北京)有限公司 Method and system for establishing credible virtual special network connection
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN101039186A (en) * 2007-05-08 2007-09-19 中国科学院软件研究所 Method for auditing safely system log
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101136928A (en) * 2007-10-19 2008-03-05 北京工业大学 Reliable network access framework
CN101159640A (en) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 Ternary equal identification based reliable network access control system
CN101458743A (en) * 2007-12-12 2009-06-17 中国长城计算机深圳股份有限公司 Method for protecting computer system
US20110145593A1 (en) * 2009-12-15 2011-06-16 Microsoft Corporation Verifiable trust for data through wrapper composition
CN101859373A (en) * 2010-04-28 2010-10-13 国网电力科学研究院 Method for safely accessing mobile credible terminal
CN201699728U (en) * 2010-06-17 2011-01-05 宁波电业局 Trusted network management system for electric power real-time system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TRUSTED COMPUTING GROUP, INCORPORATED: "《TCG Specification Architecture Overview》", 2 August 2007, article "TCG Specification Architecture Overview" *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491054A (en) * 2012-06-12 2014-01-01 珠海市鸿瑞信息技术有限公司 SAM access system
CN103067368A (en) * 2012-12-24 2013-04-24 江西省电力公司 Protocol and implementation method of direct transmission of electrical power system warning message
CN103795541A (en) * 2013-12-13 2014-05-14 国网上海市电力公司 Secure communication method of electricity information acquisition system of 230M wireless private network channel
CN103795541B (en) * 2013-12-13 2017-03-22 国网上海市电力公司 Secure communication method of electricity information acquisition system of 230M wireless private network channel
CN103646214A (en) * 2013-12-18 2014-03-19 国家电网公司 Method for establishing trusted environment in power distribution terminal
CN103646214B (en) * 2013-12-18 2016-08-31 国家电网公司 A kind of method setting up trusted context in distribution terminal
CN103684793B (en) * 2013-12-25 2017-12-05 国家电网公司 A kind of method based on trust computing enhancing communication security of power distribution network
CN106125627A (en) * 2016-08-25 2016-11-16 浪潮电子信息产业股份有限公司 A kind of credible Internet of Things implementation method based on TPM chip
CN111683136A (en) * 2020-06-05 2020-09-18 国网冀北电力有限公司电力科学研究院 Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system
CN111683136B (en) * 2020-06-05 2022-05-27 国网冀北电力有限公司电力科学研究院 Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system
CN112104653A (en) * 2020-09-15 2020-12-18 全球能源互联网研究院有限公司 Charging system trusted computing management method and device and storage medium
CN112104653B (en) * 2020-09-15 2023-03-14 全球能源互联网研究院有限公司 Trusted computing management method and device for charging system and storage medium
CN112347472A (en) * 2020-10-27 2021-02-09 中国南方电网有限责任公司 Behavior measurement method and device of power system
CN112511618A (en) * 2020-11-25 2021-03-16 全球能源互联网研究院有限公司 Edge Internet of things agent protection method and power Internet of things dynamic security trusted system
CN112511618B (en) * 2020-11-25 2023-03-24 全球能源互联网研究院有限公司 Edge Internet of things agent protection method and power Internet of things dynamic security trusted system
CN114845298A (en) * 2022-03-29 2022-08-02 国网山东省电力公司经济技术研究院 Aerial optical cable monitoring and transmitting system based on trusted WLAN
CN114845298B (en) * 2022-03-29 2023-11-28 国网山东省电力公司经济技术研究院 Overhead optical cable monitoring and transmitting system based on trusted WLAN

Also Published As

Publication number Publication date
CN102355467B (en) 2015-07-08

Similar Documents

Publication Publication Date Title
CN102355467B (en) Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN110691064B (en) Safety access protection and detection system for field operation terminal
KR101296483B1 (en) Validation and/or authentication of a device for communication with a network
US9246691B2 (en) System, method and apparata for secure communications using an electrical grid network
CN103595530B (en) Software secret key updating method and device
US20120137126A1 (en) Smart meter and meter reading system
CN101355459B (en) Method for monitoring network based on credible protocol
WO2008008123A3 (en) Firewall+ storage apparatus, method and system
CN105099705B (en) A kind of safety communicating method and its system based on usb protocol
Von Oheimb IT security architecture approaches for smart metering and smart grid
CN114584331A (en) Power distribution internet of things edge internet of things agent network security protection method and system
CN106295323A (en) Senior measuring system malware detection method based on cloud security
CN111711627B (en) Industrial Internet data security monitoring method and system based on block chain
CN217486505U (en) Credible terminal device based on Internet of things + block chain
Formby et al. A physical overlay framework for insider threat mitigation of power system devices
CN115879087A (en) Safe and trusted starting method and system for power terminal
CN111555857A (en) Edge network and network transmission method
Liu et al. Security risks evaluation toolbox for smart grid devices
Sharma et al. Fortified-Grid 3.0: Security by Design for Smart Grid through Hardware Security Primitives
Limbasiya et al. Attacks on authentication and authorization models in smart grid
CN113849796B (en) Intelligent communication water affair Internet of things remote monitoring control method, system and block chain system
Boyanapalli Implementation of secure dnp3 architecture of scada system for smart grids
Rowland et al. APPLICATION OF SECURE ELEMENTS TO ENHANCE REAL-TIME CONTINUOUS MONITORING AND CONFIGURATION
CN117527333A (en) Identity authentication method, server and terminal equipment
CN114079663A (en) Environment monitoring method and device based on block chain and eSIM

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant