CN106452751B - Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking - Google Patents

Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking Download PDF

Info

Publication number
CN106452751B
CN106452751B CN201610930604.5A CN201610930604A CN106452751B CN 106452751 B CN106452751 B CN 106452751B CN 201610930604 A CN201610930604 A CN 201610930604A CN 106452751 B CN106452751 B CN 106452751B
Authority
CN
China
Prior art keywords
monitoring system
electric power
power monitoring
particle
definite value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610930604.5A
Other languages
Chinese (zh)
Other versions
CN106452751A (en
Inventor
王新良
黄青改
付萌萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Technology
Original Assignee
Henan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Technology filed Critical Henan University of Technology
Priority to CN201610930604.5A priority Critical patent/CN106452751B/en
Publication of CN106452751A publication Critical patent/CN106452751A/en
Application granted granted Critical
Publication of CN106452751B publication Critical patent/CN106452751B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses the mining high-voltage power grid definite value transmission methods based on quantum entanglement and channel self checking, engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers in this method, and quantum entanglement channel is established between engineer station and electric power monitoring system;Then, the safe transmission of relay protection constant value is completed based on the quantum entanglement channel having built up and channel self checking function;Mining high-voltage power grid definite value transmission method proposed by the present invention based on quantum entanglement and channel self checking, prevents the third party from eavesdropping by using quantum entanglement characteristic on the basis of guaranteeing data normal transmission, it is ensured that electric power data safety.Meanwhile by introducing channel self checking function, resource consumption is tangled in reduction.

Description

Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking
Technical field
The invention discloses the mining high-voltage power grid definite value transmission methods based on quantum entanglement and channel self checking, belong to coal Field is arranged in mine high voltage supply network relay protection constant value.
Background technique
2014, document " quantum key skill upgrading electric system secondary protection safety research " analytic demonstration quantum Feasibility of the cipher key technique in conjunction with Power Secondary guard system;Then, propose that a kind of quantum key dispatching system is indulged with electric power To the specific combination of encryption authentication device, and inquires into and set up the realization of wide area electric power quantal data network in electric system Scheme and networking thinking, but it is not directed to how using the safeties of quantum communications relay protection constant value is realized in internet Safe transmission.
In mining high-voltage power grid, electric power monitoring system by substation can complex protection device directly to high-voltage switch gear complete The functions such as relay protection constant value setting.It is electric although can be realized the setting of relay protection constant value by electric power monitoring system Power monitoring system is usually without relay protection constant value computing function, and the calculating of mining high-voltage electric grid relay protection constant value can It is completed with being calculated by relay protection constant value with administrative engineer station (abbreviation engineer station).In order to realize relay protection The automatic setting of definite value is currently mostly that value data is completed between engineer station and electric power monitoring system by network Transmission.Engineer station and electric power monitoring system are likely located at a place, it is also possible to a good distance off;When relay protection constant value data When passing through network transmission, the value data transmitted there is the possibility being ravesdropping.It is fixed in order to which relay protection is effectively ensured Value Data is not eavesdropped by other people, it is ensured that mining high-voltage electric network data safety.In document, " mine based on quantum teleportation is high A kind of mining high-voltage electric-network relay protection based on quantum teleportation is proposed in voltage electric grid relay protection constant value setting method " Definite value setting method, this method can be realized the safe transmission of value data, but its definite value by using the characteristic of quantum entanglement Setting up procedure is complex, needs to consume and more tangles resource;Meanwhile being also not set out how to pass through multichannel in the publication Quantum entanglement channel is established between engineer station and electric power monitoring system by device;In order to realize value data biography safely It on the basis of defeated, be further reduced and tangle resource consumption, the invention proposes mining based on quantum entanglement and channel self checking High-voltage fence relay protection constant value transmission method, by using quantum entanglement characteristic, on the basis of guaranteeing data normal transmission, Prevent the third party from eavesdropping, it is ensured that electric power data safety.Meanwhile by introducing channel self checking function, resource consumption is tangled in reduction.
Summary of the invention
Engineer station and electric power monitoring system complete the safe transmission of data, network topology knot by multiple quantum routers Structure is as shown in Fig. 1, and quantum entanglement channel is established between engineer station and electric power monitoring system, and specific step is as follows:
Step 1: engineer station and electric power monitoring system select a paths to complete from mulitpath according to routing rule Quantum information transmission, it is assumed that quantum router R1, quantum router R2, quantum router R3, quantum road are passed through in the path of selection By device R4, quantum router R5, engineer station passes through classical channel and sends IP datagram text to electric power monitoring system, request and electricity Power monitoring system establishes quantum entanglement channel;
Step 2: quantum router R1 is generatedTo tangling particle pairWith, wherein, generation tangles grain Son is to state to engineer station and R2, the particle that tangles of generation is distributed to;Quantum router R3 It generatesTo tangling particle pairWith, wherein, the particle that tangles of generation tangles to R2 and R4, generation is distributed to Particle is to state;Quantum router R5 is generatedTo tangling particle pairWith, wherein, the particle that tangles of generation is to state to R4 and electric power monitoring system, the particle that tangles of generation is distributed to;Wherein,
Step 3: tangling particleWithComposition system:
R2 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, system collapses are as follows:
R4 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, tangle particleWith Realization is tangled, and entangled quantum channel is established between engineer station and electric power monitoring system.
After engineer station completes relay protection calculating, need that relay protection constant value is arranged automatically.Firstly, engineering Teacher, which stands, to need to establish a TCP connection between electric power monitoring system, and wherein engineer station is as client, electric power monitoring system As server;Then, relay protection constant value is completed based on the quantum entanglement channel having built up and channel self checking function Safe transmission, the specific steps are as follows:
Step 1: engineer station carries out relay protection constant value setting for certain complex protection device, it is assumed that the complex protection device is corresponding Substation number and complex protection device number indicate with A and B respectively, calculate the quick-break definite value of acquisition, timed over-currents definite value, overload definite value, Timed over-currents delay value and overload delay value obtain amplified quick-break definite value D multiplied by 10001, timed over-currents definite value D2、 Overload definite value D3, timed over-currents delay value D4With overload delay value D5, control word D6It indicates, D6Two bytes are occupied, only Have first 3 it is significant, first 3 be respectively intended to indicate quick-break investment, timed over-currents investment and overload investment;In first 3 if Numerical value is 1, then it represents that the corresponding protection investment of this, if numerical value is 0, then it represents that the corresponding protection of this is not put into;In terms of Obtained D1- D612 byte value datas be content to be verified, according to CRC algorithm generate 16 bits CRC fixed value checking Sequence D7;Fixed value checking sequence D7For 2 bytes;
Step 2: being directed to D1- D7The data of total 112 bits, electric power monitoring system are made respectively for the data of 112 bits Standby 112 corresponding particlesIf theA bit is 0, then the particle being preparedState is;If theA ratio Specially for 1, then the particle that is preparedState is;The particle state being prepared is usedIt indicates,,;Then
Step 3: engineer station is by be prepared 112 particles() and engineer station side save 112 It is a do not measured tangle particle() the Bell state measurement is done respectively, four measured kind possible state isWith, the different conditions measured every time can indicate with 2 classical bit informations, state It is indicated with classical bit 01, stateIt is indicated with classical bit 11, stateIt is indicated with classical bit 00, stateWith Classical bit 10 indicates, is measured the classical information of rear available 224 bits;
Step 4: format being set according to definite value shown in table 1 using the metrical information of 224 obtained bits as definite value content It is packaged into a TCP message and is sent to electric power monitoring system;Wherein, data length field is 28 bytes, the low word of data length L Section is 0x1C, and data length L high byte is 0x00;
Step 5: electric power monitoring system is parsed to message is received, if the TCP message data portion received 3rd byte is equal to 0x01, then shows that this message is relay protection constant value setting command;Message lattice are arranged in definite value according to table 1 Formula, electric power monitoring system parse the data information of 224 bits from the message received, according to suitable as unit of two bits 224 bits are divided into 112 pairs by sequence, and every centering includes two bits;If receiveNumerical value to bit is 00, then to electricity Not measured the saved in power monitoring systemIt is a to tangle particleExecute corresponding Unitary transformation,; If receiveIt is 01 to the numerical value of bit, then to not measured the saved in electric power monitoring systemIt is a to tangle particleExecute corresponding Unitary transformation,;If receiveNumerical value to bit is 10, then to power monitoring Not measured the saved in systemIt is a to tangle particleExecute corresponding Unitary transformation,;If ReceivedIt is 11 to the numerical value of bit, then to not measured the saved in electric power monitoring systemIt is a to tangle particle Execute corresponding Unitary transformation,;And to transformed each particle according to basic vectorWithIt is surveyed Amount, measurement result areIndicate that corresponding bits are 0;Measurement result isIndicate that corresponding bits are 1;It may finally obtain 14 Data are arranged in the definite value of byte, wherein most latter two byte is fixed value checking sequence, are indicated with Q;
Step 6: 16 definite values are calculated based on CRC algorithm as verification object with the data of preceding 12 bytes of acquisition H is compared by verification sequence H with Q;If identical, content shown in table 2 is packaged into a TCP and reported by electric power monitoring system Text is sent to engineer station, indicates that definite value is sent successfully, executes step 7;If it is different, definite value transmission error, power monitoring system Content shown in table 3 is packaged into a TCP message and is sent to engineer station by system, is indicated that definite value sends error, is repeated step Rapid 1;
Step 7: engineer station sends definite value and solidifies message, is led to by electric power monitoring system to the definite value solidification message received Existing electric power monitoring system function is crossed to come into operation to the definite value of setting.
Detailed description of the invention
Fig. 1 is quantum communication network topology diagram.
Specific embodiment
Engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers, in engineer station Quantum entanglement channel is established between electric power monitoring system, and specific step is as follows:
Step 1: engineer station and electric power monitoring system select a paths to complete from mulitpath according to routing rule Quantum information transmission, it is assumed that quantum router R1, quantum router R2, quantum router R3, quantum road are passed through in the path of selection By device R4, quantum router R5, engineer station passes through classical channel and sends IP datagram text to electric power monitoring system, request and electricity Power monitoring system establishes quantum entanglement channel;
Step 2: quantum router R1 is generatedTo tangling particle pairWith, wherein, generation tangles grain Son is to state to engineer station and R2, the particle that tangles of generation is distributed to;Quantum router R3 It generatesTo tangling particle pairWith, wherein, the particle that tangles of generation tangles to R2 and R4, generation is distributed to Particle is to state;Quantum router R5 is generatedTo tangling particle pairWith, wherein, the particle that tangles of generation is to state to R4 and electric power monitoring system, the particle that tangles of generation is distributed to;Wherein,
Step 3: tangling particleWithComposition system:
R2 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, system collapses are as follows:
R4 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, tangle particleWith Realization is tangled, and entangled quantum channel is established between engineer station and electric power monitoring system.
After engineer station completes relay protection calculating, need that relay protection constant value is arranged automatically.Firstly, engineering Teacher, which stands, to need to establish a TCP connection between electric power monitoring system, and wherein engineer station is as client, electric power monitoring system As server;Then, relay protection constant value is completed based on the quantum entanglement channel having built up and channel self checking function Safe transmission, the specific steps are as follows:
Step 1: D of the engineer station to be calculated1- D612 byte value datas be content to be verified, according to CRC calculate Method generates the CRC fixed value checking sequence D of 16 bits7;Fixed value checking sequence D7For 2 bytes;
Step 2: being directed to D1- D7The data of total 112 bits, electric power monitoring system are made respectively for the data of 112 bits Standby 112 corresponding particlesIf theA bit is 0, then the particle being preparedState is;If theA ratio Specially for 1, then the particle that is preparedState is;The particle state being prepared is usedIt indicates,,;Then
Step 3: engineer station is by be prepared 112 particles() and engineer station side save 112 It is a do not measured tangle particle() the Bell state measurement is done respectively, four measured kind possible state isWith, the different conditions measured every time can indicate with 2 classical bit informations, state It is indicated with classical bit 01, stateIt is indicated with classical bit 11, stateIt is indicated with classical bit 00, stateWith Classical bit 10 indicates, is measured the classical information of rear available 224 bits;
Step 4: format being set according to definite value shown in table 1 using the metrical information of 224 obtained bits as definite value content It is packaged into a TCP message and is sent to electric power monitoring system;Wherein, data length field is 28 bytes, the low word of data length L Section is 0x1C, and data length L high byte is 0x00;
Step 5: electric power monitoring system is parsed to message is received, if the TCP message data portion received 3rd byte is equal to 0x01, then shows that this message is relay protection constant value setting command;Message lattice are arranged in definite value according to table 1 Formula, electric power monitoring system parse the data information of 224 bits from the message received, according to suitable as unit of two bits 224 bits are divided into 112 pairs by sequence, and every centering includes two bits;According to the bit value that receives to being protected in electric power monitoring system Not measured the depositedIt is a to tangle particleExecute corresponding Unitary transformation;And to transformed each particle according to basic vectorWithIt measures, measurement result isIndicate that corresponding bits are 0;Measurement result isIndicate that corresponding bits are 1;Most Data are arranged in the definite value of available 14 bytes eventually, wherein most latter two byte is fixed value checking sequence, are indicated with Q;
Step 6: 16 definite values are calculated based on CRC algorithm as verification object with the data of preceding 12 bytes of acquisition H is compared by verification sequence H with Q;If identical, content shown in table 2 is packaged into a TCP and reported by electric power monitoring system Text is sent to engineer station, indicates that definite value is sent successfully, executes step 7;If it is different, definite value transmission error, power monitoring system Content shown in table 3 is packaged into a TCP message and is sent to engineer station by system, is indicated that definite value sends error, is repeated step Rapid 1;
Step 7: engineer station sends definite value and solidifies message, is led to by electric power monitoring system to the definite value solidification message received Existing electric power monitoring system function is crossed to come into operation to the definite value of setting.

Claims (1)

1. the mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking, which is characterized in that described Definite value transmission method includes the following steps:
Step 11, engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers, in engineering Quantum entanglement channel is established between teacher station and electric power monitoring system;
Step 12, it after engineer station completes relay protection calculating, needs that relay protection constant value is arranged automatically;Firstly, Engineer station needs to establish a TCP connection between electric power monitoring system, and wherein engineer station is as client, power monitoring System is as server;Then, relay protection is completed based on the quantum entanglement channel having built up and channel self checking function The safe transmission of definite value;
In step 11, it is substantially carried out following steps:
Step 111: engineer station and electric power monitoring system select a paths performance according to routing rule from mulitpath Sub-information transmission, it is assumed that the path of selection is by quantum router R1, quantum router R2, quantum router R3, quantum routing Device R4, quantum router R5, engineer station pass through classical channel and send IP datagram text to electric power monitoring system, request and electric power Monitoring system establishes quantum entanglement channel;
Step 112: quantum router R1 is generatedTo tangling particle pairWith, wherein, generation tangles particle To being distributed to engineer station and R2, the particle that tangles of generation is to state;Quantum router R3 is produced It is rawTo tangling particle pairWith, wherein, the particle that tangles of generation tangles grain to R2 and R4, generation is distributed to Son is to state;Quantum router R5 is generatedTo tangling particle pairWith, wherein, the particle that tangles of generation is to state to R4 and electric power monitoring system, the particle that tangles of generation is distributed to;Wherein,
Step 113: tangling particleWithComposition system:
R2 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, system collapses are as follows:
R4 tangles particle to what is receivedWithThe measurement of Bell base is carried out, then above formula is rewritten as
It is assumed that is selected is, then particle is tangled after measuringWithState is, tangle particleWithIt realizes It tangles, entangled quantum channel is established between engineer station and electric power monitoring system;
In step 12, it is substantially carried out following steps:
Step 121: engineer station carries out relay protection constant value setting for certain complex protection device, it is assumed that corresponding point of the complex protection device Station number and complex protection device number are indicated with A and B respectively, are calculated the quick-break definite value of acquisition, timed over-currents definite value, overload definite value, are determined When overcurrent delay value and overload delay value multiplied by 1000, obtain amplified quick-break definite value D1, timed over-currents definite value D2, mistake Load definite value D3, timed over-currents delay value D4With overload delay value D5, control word D6It indicates, D6Two bytes are occupied, only First 3 significant, and first 3 are respectively intended to indicate quick-break investment, timed over-currents investment and overload investment;If number in first 3 Value is 1, then it represents that the corresponding protection investment of this, if numerical value is 0, then it represents that the corresponding protection of this is not put into;To calculate Obtained D1- D612 byte value datas be content to be verified, according to CRC algorithm generate 16 bits CRC fixed value checking sequence Arrange D7;Fixed value checking sequence D7For 2 bytes;
Step 122: being directed to D1- D7The data of total 112 bits, electric power monitoring system are prepared respectively for the data of 112 bits 112 corresponding particlesIf theA bit is 0, then the particle being preparedState is;If theA bit It is 1, then the particle being preparedState is
Step 123: engineer station is by be prepared 112 particles() and engineer station side save 112 What is do not measured tangles particle() the Bell state measurement is done respectively, four measured kind possible state isWith, the different conditions measured every time can indicate with 2 classical bit informations, stateWith warp The expression of allusion quotation bit 01, stateIt is indicated with classical bit 11, stateIt is indicated with classical bit 00, stateWith classics Bit 10 indicates, is measured the classical information of rear available 224 bits;
Step 124: being arranged using the metrical information of 224 obtained bits as definite value content according to the definite value based on channel self checking Message format is packaged into a TCP message and is sent to electric power monitoring system;Wherein, data length field is 28 bytes, data Length L low byte is 0x1C, and data length L high byte is 0x00;
Step 125: electric power monitoring system is parsed to message is received, if the 3rd of the TCP message data portion received the A byte is equal to 0x01, then shows that this message is relay protection constant value setting command;It is set according to the definite value based on channel self checking Message format is set, electric power monitoring system parses the data information of 224 bits from the message received, is single with two bits 224 bits are divided into 112 pairs in sequence by position, and every centering includes two bits;If receiveNumerical value to bit is 00, then to not measured the saved in electric power monitoring systemIt is a to tangle particleExecute corresponding Unitary transformation,;If receiveIt is 01 to the numerical value of bit, then it is not measured to what is saved in electric power monitoring system TheIt is a to tangle particleExecute corresponding Unitary transformation,;If receiveNumerical value to bit is 10, then to not measured the saved in electric power monitoring systemIt is a to tangle particleExecute corresponding Unitary transformation,;If receiveIt is 11 to the numerical value of bit, then it is not measured to what is saved in electric power monitoring system TheIt is a to tangle particleExecute corresponding Unitary transformation,;And to transformed each particle according to basic vectorWithIt measures, measurement result isIndicate that corresponding bits are 0;Measurement result isIndicate that corresponding bits are 1;Most Data are arranged in the definite value of available 14 bytes eventually, wherein most latter two byte is fixed value checking sequence, are indicated with Q;
Step 126: 16 definite value schools are calculated based on CRC algorithm as verification object with the data of preceding 12 bytes of acquisition Sequence H is tested, H is compared with Q;If identical, electric power monitoring system will send content shown in successfully confirmation message format It is packaged into a TCP message and is sent to engineer station, indicate that definite value is sent successfully, execute step 127;If it is different, definite value passes Send out wrong, electric power monitoring system, which will send out content shown in wrong confirmation message format and be packaged into a TCP message, is sent to work Cheng Shizhan indicates that definite value sends error, repeats step 121;
Step 127: engineer station sends definite value and solidifies message, is passed through by electric power monitoring system to the definite value solidification message received Existing electric power monitoring system function comes into operation to the definite value of setting.
CN201610930604.5A 2016-10-31 2016-10-31 Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking Expired - Fee Related CN106452751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610930604.5A CN106452751B (en) 2016-10-31 2016-10-31 Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610930604.5A CN106452751B (en) 2016-10-31 2016-10-31 Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking

Publications (2)

Publication Number Publication Date
CN106452751A CN106452751A (en) 2017-02-22
CN106452751B true CN106452751B (en) 2019-03-26

Family

ID=58178250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610930604.5A Expired - Fee Related CN106452751B (en) 2016-10-31 2016-10-31 Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking

Country Status (1)

Country Link
CN (1) CN106452751B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108270788B (en) * 2018-01-23 2020-11-10 河南理工大学 Method for constructing virtual private network based on quantum invisible state
CN111817792A (en) * 2019-04-10 2020-10-23 全球能源互联网研究院有限公司 Quantum remote state transfer system adaptive to power protection service
CN111817791B (en) * 2019-04-10 2022-04-29 全球能源互联网研究院有限公司 Quantum remote state transfer device for improving communication safety of power system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477809A (en) * 2003-07-11 2004-02-25 清华大学 Quantum state classical sequence rearrangement encrypition method in quantum key distribution
CN102833809A (en) * 2012-08-03 2012-12-19 东南大学 Information transmission method for wireless quantum communication network
CN104502799A (en) * 2014-12-16 2015-04-08 河南理工大学 Automatic recognition method for short-circuit fault location of mine high voltage distribution network based on quantum communication
CN104618031A (en) * 2015-02-12 2015-05-13 四川师范大学 Unknown arbitrary two-particle bidirectional controlled quantum teleportation method
CN105633921A (en) * 2016-01-19 2016-06-01 河南理工大学 Quantum communication based relay protection constant value setting method of 35kV power supply system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477809A (en) * 2003-07-11 2004-02-25 清华大学 Quantum state classical sequence rearrangement encrypition method in quantum key distribution
CN102833809A (en) * 2012-08-03 2012-12-19 东南大学 Information transmission method for wireless quantum communication network
CN104502799A (en) * 2014-12-16 2015-04-08 河南理工大学 Automatic recognition method for short-circuit fault location of mine high voltage distribution network based on quantum communication
CN104618031A (en) * 2015-02-12 2015-05-13 四川师范大学 Unknown arbitrary two-particle bidirectional controlled quantum teleportation method
CN105633921A (en) * 2016-01-19 2016-06-01 河南理工大学 Quantum communication based relay protection constant value setting method of 35kV power supply system

Also Published As

Publication number Publication date
CN106452751A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US11662760B2 (en) Wireless communication systems and methods for intelligent electronic devices
CN107710716B (en) Communication device for implementing selective encryption in software defined networks
AU2013309013B2 (en) Network access management via a secondary communication channel
EP2721801B1 (en) Security measures for the smart grid
US8756411B2 (en) Application layer security proxy for automation and control system networks
CN106452751B (en) Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking
Youssef et al. IEC 61850: Technology standards and cyber-threats
Liu et al. Design of a cosimulation platform with hardware-in-the-loop for cyber-attacks on cyber-physical power systems
CN110138092A (en) Transformer substation sequence control system and method with regulation main website Security Checking function
Pathan Securing cyber-physical systems
CN110213233A (en) Defend the emulation platform and method for building up of power grid distributed denial of service attack
Jain et al. SCADA security: a review and enhancement for DNP3 based systems
Wen et al. Wide-area Ethernet network configuration for system protection messaging
CN105633921B (en) 35kV electric power system relay protection constant value methods to set up based on quantum communications
CN108683449A (en) A kind of collaborative transmission method of the power private network based on big-dipper satellite short message
Wei et al. Data-centric threats and their impacts to real-time communications in smart grid
Kemmeugne et al. Resilience enhancement of pilot protection in power systems
Zhang et al. OPNET based simulation modeling and analysis of DoS attack for digital substation
CN110995562B (en) Distributed wind power plant wireless networking system
CN211629930U (en) Earth leakage circuit breaker protection device based on ad hoc network area measurement module
Mao et al. Mitigating tcp congestion: A coordinated cyber and physical approach
Hasan et al. Software‐Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT)
Ng et al. SEABASS: Symmetric-keychain encryption and authentication for building automation systems
Al-Suwaidan et al. A communication framework for an ad-hoc microgrid for disaster response
Musaddiq et al. Performance evaluation of IEC 61850 under wireless communication networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190326

Termination date: 20201031

CF01 Termination of patent right due to non-payment of annual fee