CN107819574A - A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies - Google Patents

A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies Download PDF

Info

Publication number
CN107819574A
CN107819574A CN201711106979.0A CN201711106979A CN107819574A CN 107819574 A CN107819574 A CN 107819574A CN 201711106979 A CN201711106979 A CN 201711106979A CN 107819574 A CN107819574 A CN 107819574A
Authority
CN
China
Prior art keywords
lora
random number
algorithms
close
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711106979.0A
Other languages
Chinese (zh)
Inventor
张景超
郭志红
宋宁希
夏传鲲
刘娜
王峥
梅林常
牛迎水
臧志成
杜剑
李鑫路
黄清江
李志敏
刘风昌
王蕴伟
刘思青
闫元本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Smartchip Microelectronics Technology Co Ltd
Hebi Power Supply Co of State Grid Henan Electric Power Co Ltd
Original Assignee
Beijing Smartchip Microelectronics Technology Co Ltd
Hebi Power Supply Co of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Smartchip Microelectronics Technology Co Ltd, Hebi Power Supply Co of State Grid Henan Electric Power Co Ltd filed Critical Beijing Smartchip Microelectronics Technology Co Ltd
Priority to CN201711106979.0A priority Critical patent/CN107819574A/en
Publication of CN107819574A publication Critical patent/CN107819574A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • H02J13/0075
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/155Ground-based stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/126Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The present invention relates to the technical field of grid power leakage failure, specially a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, including terminal device, LoRa gateways, LoRa servers and the application server being sequentially connected;Terminal device can produce terminal random number, and terminal random number is sent into application server by session establishment request message;Using terminal random number and using random number, utility cession key and network session key are correspondingly generated with reference to original application session key and primitive network session key;Application server can be produced using random number, and terminal device will be sent to using random number by session establishment received message;Using random number and terminal random number is applied, utility cession key and network session key are correspondingly generated with reference to original application session key and primitive network session key.The present invention can be directed to the physical attacks means such as side-channel attack, upset attack and targetedly be protected, and ensure the physical security of key information storage.

Description

A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies
Technical field
The present invention relates to the technical field of grid power leakage failure, and in particular to one kind is based on the close SM1 algorithms of state and LoRa skills The rural power grids leak current fault system of art.
Background technology
Rural low voltage network electrical leakage problems are the persistent ailments of rural power grids, are not only related to the power supply reliability problem of rural power grids, The person and property safety of numerous urban residents is more concerned, there is great practical significance to the corporate image of grid company.
The reason for causing rural area electrical leakage problems, is a lot, ageing equipment be present, cable aging insulating properties declines, aerial bare line ratio Example is high, tree line distance, tree room apart from the problems such as.Existing earth leakage protective device is based on local electric leakage information and carries out trip protection, therefore Barrier lacks effective fault location means after occurring.
By technology of Internet of things to the voltage at the public distribution low-voltage end of rural power grids, electric current, residual current, each air switch shape The information such as state, the voltage of each user, electric current, residual current are gathered in real time, can be achieved to Rural Low-Voltage Power Network electricity condition, especially That leakage current etc. is monitored in real time, can according to the quick failure judgement point of information and coverage of acquisition, in combination with Intelligent switch control function, fault incidence can be reduced, greatly shorten fault handling time, it is reliable to improve rural power grids electricity consumption Property.
The Internet of Things access technology of State Grid Corporation of China is based on GPRS at present, but its power consumption is larger, security is low, stream It is high to measure unit cost, and GPRS technologies have come into the stage of progressively logout.The communication requirement of rural power grids electric leakage detection and control terminal It is characterized as that traffic rate is low, the frequency is low for communication, wide coverage, cost input are few, such communication requirement is especially suitable for low-power consumption Wan technology(LPWA).Low-power consumption wan technology main flow is NB-IOT and LoRa technologies at present.NB-IOT awards to be deployed in The public technology of Internet of things of frequency range is weighed, its application deployment is restricted by operator, and current each operator is just in first stage of construction, agriculture Village area not yet covers.LoRa technologies are deployed in unauthorized frequency range, and industrial chain is ripe, are adapted to enterprise self-determining deployment, therefore This items selection LoRa technologies solve the problems, such as the communication access of rural power grids detection and control terminal.
Safety is the basal needs of any radio communication, and LoRa security feature is realized in LoRa MAC layers.Such as Fig. 3 institutes Show, LoRa physical chip designing technique is rested in u s company's Semtech hands, its Standard MAC layer agreement recommended LoRaWAN is used as security algorithm using AES (Advanced Encryption Standard), it is seen that its physical layer and link layer Security can not all realize autonomous controllable target.Therefore our safety approach to LoRaWAN carry out national secret algorithm replacement, To strengthen its information security controllability.And LoRa ends are in unserviced open public place, it is easy to by attacker Steal data.
The content of the invention
The invention discloses a kind of rural power grids leak current fault system based on the close LoRa algorithms of state, attacked for side channel Hit, upset the physical attacks such as attack, fault attacks means and carried out targetedly protection Design, it is ensured that key information is deposited The physical security of storage.
A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including according to LoRa terminal devices, LoRa gateways, LoRa servers and the application server of secondary connection;
The LoRa terminal devices, terminal random number can be produced, and it is by session establishment request message that the terminal is random Number is sent to application server by the LoRa gateways and the LoRa servers;Using the terminal random number and come from The application random number of application server, utility cession key is generated with reference to original application session key;Using terminal random number and Come from the application random number of application server, network session key is generated with reference to primitive network session key;The application meeting Talk about key and data can be encrypted for the close SM1 algorithms of network session key combination state and integrity protection.
Further, the utility cession key, for combining the close SM1 algorithms of state in LoRa mac frame structure Payload data are encrypted.
Further, the network session key, for the message integrity algorithms with reference to the close SM1 of state to the Payload Ciphertext and MAC header after data encryption carry out integrity protection.
Further, the Payload data are encrypted using the cipher block chaining pattern of the close SM1 algorithms of state.
Further, the LoRa terminal devices pass sequentially through LoRa trunk modules, LoRa gateways, LoRa servers with it is described Application server is connected.
A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including according to LoRa terminal devices, LoRa gateways, LoRa servers and the application server of secondary connection;
It the application server, can produce using random number, and random number is applied by described by session establishment received message The LoRa terminal devices are sent to by the LoRa servers and the LoRa gateways;Using the application random number and come From in the terminal random number of the LoRa terminal devices, utility cession key is generated with reference to original application session key;Using should With random number and the terminal random number for coming from the LoRa terminal devices, BlueDrama is generated with reference to primitive network session key Key;The utility cession key and network session key combination state close SM1 algorithms data can be encrypted with it is complete Whole property protection.
Had the beneficial effect that caused by the present invention:
1st, the present invention disperses respectively using two primary key original application session keys and with reference to primitive network session key Utility cession key and network session key, enhance security isolation intensity.
2nd, two random numbers of the invention ensure that the disposable and randomness of utility cession key and network session key, The utility cession key and network session key of each session establishment can all change, and can effectively prevent Replay Attack and ensure The confidentiality of primary key.
3rd, the present invention adds LoRa trunk modules between LoRa terminals and LoRa gateways, can effectively reduce packet loss Rate, realize effective transmission of leak current fault information.
Brief description of the drawings
Fig. 1 is the LoRa security architecture schematic diagrames of the present invention;
Fig. 2 is LoRa data frames safety protection structure schematic diagram of the present invention;
Fig. 3 is LoRa protocol stack structure schematic diagrames;
Fig. 4 is the networking plan structural representation of the embodiment of the present invention.
In figure:The electric leakages of 1- first detection and control terminal, the LoRa terminals of 2- the first, 3-LoRa gateways, 4-LoRa servers, 5- electric leakages Observing and controlling server, the electric leakages of 6- second detection and control terminal, the LoRa terminals of 7- the 2nd, 8-LoRa trunk modules.
Embodiment
Come the further details of explanation present invention, but protection scope of the present invention with specific embodiment below in conjunction with the accompanying drawings It is not limited to this.
As shown in figure 4, a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, the first leakage Electrical measurement control terminal 1 passes sequentially through the first LoRa terminals 2, LoRa gateways 3, LoRa servers 4 and the phase of electric leakage observing and controlling server 5 Connection, detection and control terminal 6 passes sequentially through the 2nd LoRa terminals 7, LoRa trunk modules 8 are connected with the LoRa gateways 3 for the second electric leakage Connect.The LoRa gateways 3 pass back to LoRa servers 4 by 3G wireless public networks, connect electric leakage observing and controlling by internal network afterwards Server 5.Using LoRa as terminal access means, accessed by the way of star-like networking, and returned with wireless public network, Without any wiring class construction, greatly simplify engineering construction difficulty, equipment and construction cost can be effectively reduced.
As shown in Fig. 2 place is encrypted by utility cession key in Payload data in the mac frame structure of the LoRa Reason, using the close SM1 algorithms of state;Ciphertext and MAC header after encryption carry out integrality using the close SM1 of state message integrity algorithms Protection, is encrypted using network session key.The Payload data use the password packet train of the close SM1 algorithms of state Pattern (CBC patterns) is connect to be encrypted.
In LoRaWAN, AppSKey and NwkSKey are all scattered by a primary key, and this scheme is unfavorable for Internet and application layer security isolation.As shown in figure 1, this programme is disperseed respectively using two primary keys AppKey and NwkKey Go out AppSKey and NwkSKey, enhance security isolation intensity.Its decentralized algorithm is as follows:
The generating algorithm of the utility cession key is:AppSKey = SM1_encrypt (AppKey, AppNonce | NetID | DevNonce | pad16)
The generating algorithm of the network session key is:NwkSKey = SM1_encrypt (NwkKey, AppNonce | NetID | DevNonce | pad16)
Wherein described first LoRa terminals 2 or the 2nd LoRa terminals 7, produce terminal random number DevNonce, LoRa terminal and set It is standby that the terminal random number DevNonce is sent to by the electric leakage observing and controlling server 5 by session establishment request message;Utilize The terminal random number DevNonce and application random number AppNonce for coming from the electric leakage observing and controlling server 5, is answered with reference to original With session key AppKey generation utility cession key As ppSKey;Using terminal random number DevNonce and come from the leakage The application random number AppNonce of electrical measurement control server 5, network session key is generated with reference to primitive network session key NwkKey NwkSKey;
The electric leakage observing and controlling server 5, produce and built using random number AppNonce, the electric leakage observing and controlling server 5 by session The application random number AppNonce is sent to the first LoRa terminals 2 or the 2nd LoRa terminals 7 by vertical received message;Using should With random number AppNonce and the terminal random number for coming from the first LoRa terminals 2 or the 2nd LoRa terminals 7 DevNonce, with reference to original application session key AppKey generation utility cession key As ppSKey;Using using random number The AppNonce and terminal random number DevNonce for coming from the first LoRa terminals 2 or the 2nd LoRa terminals 7, with reference to original Beginning network session key AppKey generation network session keys AppSKey.
The theoretic area coverages of LoRa are 15 to 20 kilometers, but under normal circumstances because geographical position influences and blocks The influence of thing, signal covering power do not reach theoretical value much, and bad node, Ke Yitong are covered for the signal of LoRa gateways 3 LoRa trunk modules 8 are crossed to be relayed.LoRa relayings refer to the LoRa trunk modules 8 for supporting relay function being placed in LoRa gateways Between 3 and the 2nd distant LoRa terminals 7, the amplification of LoRa trunk modules 8 and transparent transmission LoRa signals.For LoRa gateways 3, LoRa trunk modules 8 play the part of the role of terminal;For LoRa terminals, LoRa trunk modules 8 play the part of the role of LoRa gateways.
For the communication packet loss of LoRa data 3-5 kilometers within 1%, 5 to 8 kilometers of communication packet loss is left 5% after tested The right side, more than 8 kilometers node packet loss are more than 5%.For the terminal accessing-point beyond 3 kilometers, carried out using LoRa trunk modules 8 Signal relays, and can effectively improve the success rate of electric leakage monitoring terminal communication, and then effectively shortens leak current fault and averagely arrange The time removed.
It is noted that above-described embodiment is general to the illustrative and not limiting of technical solution of the present invention, art The equivalent substitution of logical technical staff or the other modifications made according to prior art, as long as not exceeding technical solution of the present invention Thinking and scope, it should be included within interest field of the presently claimed invention.

Claims (6)

1. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including successively LoRa terminal devices, LoRa gateways, LoRa servers and the application server of connection;
The LoRa terminal devices, terminal random number can be produced, and it is by session establishment request message that the terminal is random Number is sent to application server by the LoRa gateways and the LoRa servers;Using terminal random number and come from application The application random number of server, utility cession key is generated with reference to original application session key;Using the terminal random number and Come from the application random number of application server, network session key is generated with reference to primitive network session key;The application meeting Talk about key and data can be encrypted for the close SM1 algorithms of network session key combination state and integrity protection.
2. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 1, Characterized in that, the utility cession key, for combining the close SM1 algorithms of state to the Payload numbers in LoRa mac frame structure According to being encrypted.
3. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 2, Characterized in that, the network session key, for the message integrity algorithms with reference to the close SM1 of state to the Payload data Ciphertext and MAC header after encryption carry out integrity protection.
4. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 2, Characterized in that, the Payload data are encrypted using the cipher block chaining pattern of the close SM1 algorithms of state.
5. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 1, Characterized in that, the LoRa terminal devices pass sequentially through LoRa trunk modules, LoRa gateways, LoRa servers and the application Server is connected.
6. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including successively LoRa terminal devices, LoRa gateways, LoRa servers and the application server of connection;
It the application server, can produce using random number, and random number is applied by described by session establishment received message The LoRa terminal devices are sent to by the LoRa servers and the LoRa gateways;Using the application random number and come From in the terminal random number of the LoRa terminal devices, utility cession key is generated with reference to original application session key;Using should With random number and the terminal random number for coming from the LoRa terminal devices, BlueDrama is generated with reference to primitive network session key Key;The utility cession key and network session key combination state close SM1 algorithms data can be encrypted with it is complete Whole property protection.
CN201711106979.0A 2017-11-10 2017-11-10 A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies Pending CN107819574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711106979.0A CN107819574A (en) 2017-11-10 2017-11-10 A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711106979.0A CN107819574A (en) 2017-11-10 2017-11-10 A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies

Publications (1)

Publication Number Publication Date
CN107819574A true CN107819574A (en) 2018-03-20

Family

ID=61609232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711106979.0A Pending CN107819574A (en) 2017-11-10 2017-11-10 A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies

Country Status (1)

Country Link
CN (1) CN107819574A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109413644A (en) * 2018-12-06 2019-03-01 广州邦讯信息系统有限公司 LoRa encryption certification communication means, storage medium and electric terminal
CN112953923A (en) * 2021-02-03 2021-06-11 广州技象科技有限公司 Safe network access method and device based on secret key updating
CN113473456A (en) * 2021-05-14 2021-10-01 中国科学院声学研究所南海研究站 Million-level Internet of things terminal security access method and system based on domestic passwords
CN115856423A (en) * 2023-03-01 2023-03-28 青岛高科通信股份有限公司 Electronic electric energy meter transformation device and meter reading system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160345265A1 (en) * 2015-05-20 2016-11-24 Senaya, Inc. Low power wide area network
CN106571846A (en) * 2016-10-17 2017-04-19 国动物联网技术(上海)有限公司 LoRa data transmission module and data encryption method
CN106658433A (en) * 2016-12-27 2017-05-10 陈君华 Method for realizing digital cluster interphone based on LoRa technology and interphone
CN107135503A (en) * 2017-07-07 2017-09-05 深圳市信锐网科技术有限公司 A kind of intelligent energy consumption management method and system
CN107222931A (en) * 2017-07-10 2017-09-29 深圳市信锐网科技术有限公司 A kind of LoRa communication means and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160345265A1 (en) * 2015-05-20 2016-11-24 Senaya, Inc. Low power wide area network
CN106571846A (en) * 2016-10-17 2017-04-19 国动物联网技术(上海)有限公司 LoRa data transmission module and data encryption method
CN106658433A (en) * 2016-12-27 2017-05-10 陈君华 Method for realizing digital cluster interphone based on LoRa technology and interphone
CN107135503A (en) * 2017-07-07 2017-09-05 深圳市信锐网科技术有限公司 A kind of intelligent energy consumption management method and system
CN107222931A (en) * 2017-07-10 2017-09-29 深圳市信锐网科技术有限公司 A kind of LoRa communication means and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PROF. ENZO MINGOZZI, PROF. FRANCESCO MARCELLONI: "Enabling relay-based communication in LoRa networks for the Internet of Things:design,implementation and experimental evaluation", 《CORSO DI LAUREA MAGISTRALE IN COMPUTER ENGINEERING》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109413644A (en) * 2018-12-06 2019-03-01 广州邦讯信息系统有限公司 LoRa encryption certification communication means, storage medium and electric terminal
CN109413644B (en) * 2018-12-06 2024-03-19 广州邦讯信息系统有限公司 LoRa encryption authentication communication method, storage medium and electronic terminal
CN112953923A (en) * 2021-02-03 2021-06-11 广州技象科技有限公司 Safe network access method and device based on secret key updating
CN113473456A (en) * 2021-05-14 2021-10-01 中国科学院声学研究所南海研究站 Million-level Internet of things terminal security access method and system based on domestic passwords
CN113473456B (en) * 2021-05-14 2023-03-14 中国科学院声学研究所南海研究站 Million-level Internet of things terminal security access method and system based on domestic passwords
CN115856423A (en) * 2023-03-01 2023-03-28 青岛高科通信股份有限公司 Electronic electric energy meter transformation device and meter reading system
CN115856423B (en) * 2023-03-01 2023-07-07 青岛高科通信股份有限公司 Electronic electric energy meter transformation device and meter reading system

Similar Documents

Publication Publication Date Title
Rawat et al. Cyber security for smart grid systems: Status, challenges and perspectives
CN107819574A (en) A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies
Chen et al. Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed
Quincozes et al. A survey on intrusion detection and prevention systems in digital substations
CA2844221C (en) Wireless communication systems and methods for intelligent electronic devices
Liu et al. A dynamic secret-based encryption scheme for smart grid wireless communication
Tan et al. New challenges in the design of microgrid systems: Communication networks, cyberattacks, and resilience
CN106789015B (en) Intelligent power distribution network communication safety system
Iyer Cyber security for smart grid, cryptography, and privacy
CN107483444A (en) A kind of intelligent grid information transmission security protector and safety protecting method
US20120144187A1 (en) Application Layer Security Proxy for Automation and Control System Networks
Darwish et al. Experimental and theoretical modeling of DNP3 attacks in smart grids
Zhou et al. Efficient application of GPRS and CDMA networks in SCADA system
Procopiou et al. Current and future threats framework in smart grid domain
CN108092969A (en) The system and method for Intelligent Mobile Robot acquisition image access electric power Intranet
CN111988328A (en) Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station
Kharchouf et al. On the implementation and security analysis of routable-GOOSE messages based on IEC 61850 standard
Naedele et al. Network security for substation automation systems
Wei et al. Data-centric threats and their impacts to real-time communications in smart grid
Ravikumar et al. Cps testbed architectures for wampac using industrial substation and control center platforms and attack-defense evaluation
KR101093504B1 (en) Remote area monitoring control system using mobile communication technology and control method thereof
Swain et al. Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
CN106452751A (en) A mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check
Jafary et al. Security solutions for smart grid feeder automation data communication
Gajanan et al. Cyber-Attacks on Smart Grid System: A Review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180320