CN107819574A - A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies - Google Patents
A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies Download PDFInfo
- Publication number
- CN107819574A CN107819574A CN201711106979.0A CN201711106979A CN107819574A CN 107819574 A CN107819574 A CN 107819574A CN 201711106979 A CN201711106979 A CN 201711106979A CN 107819574 A CN107819574 A CN 107819574A
- Authority
- CN
- China
- Prior art keywords
- lora
- random number
- algorithms
- close
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 title claims abstract description 104
- 238000005516 engineering process Methods 0.000 title claims abstract description 22
- 238000004891 communication Methods 0.000 description 8
- 238000001514 detection method Methods 0.000 description 5
- 238000010276 construction Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000002955 isolation Methods 0.000 description 3
- 230000032683 aging Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000003321 amplification Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H02J13/0075—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/126—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Abstract
The present invention relates to the technical field of grid power leakage failure, specially a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, including terminal device, LoRa gateways, LoRa servers and the application server being sequentially connected;Terminal device can produce terminal random number, and terminal random number is sent into application server by session establishment request message;Using terminal random number and using random number, utility cession key and network session key are correspondingly generated with reference to original application session key and primitive network session key;Application server can be produced using random number, and terminal device will be sent to using random number by session establishment received message;Using random number and terminal random number is applied, utility cession key and network session key are correspondingly generated with reference to original application session key and primitive network session key.The present invention can be directed to the physical attacks means such as side-channel attack, upset attack and targetedly be protected, and ensure the physical security of key information storage.
Description
Technical field
The present invention relates to the technical field of grid power leakage failure, and in particular to one kind is based on the close SM1 algorithms of state and LoRa skills
The rural power grids leak current fault system of art.
Background technology
Rural low voltage network electrical leakage problems are the persistent ailments of rural power grids, are not only related to the power supply reliability problem of rural power grids,
The person and property safety of numerous urban residents is more concerned, there is great practical significance to the corporate image of grid company.
The reason for causing rural area electrical leakage problems, is a lot, ageing equipment be present, cable aging insulating properties declines, aerial bare line ratio
Example is high, tree line distance, tree room apart from the problems such as.Existing earth leakage protective device is based on local electric leakage information and carries out trip protection, therefore
Barrier lacks effective fault location means after occurring.
By technology of Internet of things to the voltage at the public distribution low-voltage end of rural power grids, electric current, residual current, each air switch shape
The information such as state, the voltage of each user, electric current, residual current are gathered in real time, can be achieved to Rural Low-Voltage Power Network electricity condition, especially
That leakage current etc. is monitored in real time, can according to the quick failure judgement point of information and coverage of acquisition, in combination with
Intelligent switch control function, fault incidence can be reduced, greatly shorten fault handling time, it is reliable to improve rural power grids electricity consumption
Property.
The Internet of Things access technology of State Grid Corporation of China is based on GPRS at present, but its power consumption is larger, security is low, stream
It is high to measure unit cost, and GPRS technologies have come into the stage of progressively logout.The communication requirement of rural power grids electric leakage detection and control terminal
It is characterized as that traffic rate is low, the frequency is low for communication, wide coverage, cost input are few, such communication requirement is especially suitable for low-power consumption
Wan technology(LPWA).Low-power consumption wan technology main flow is NB-IOT and LoRa technologies at present.NB-IOT awards to be deployed in
The public technology of Internet of things of frequency range is weighed, its application deployment is restricted by operator, and current each operator is just in first stage of construction, agriculture
Village area not yet covers.LoRa technologies are deployed in unauthorized frequency range, and industrial chain is ripe, are adapted to enterprise self-determining deployment, therefore
This items selection LoRa technologies solve the problems, such as the communication access of rural power grids detection and control terminal.
Safety is the basal needs of any radio communication, and LoRa security feature is realized in LoRa MAC layers.Such as Fig. 3 institutes
Show, LoRa physical chip designing technique is rested in u s company's Semtech hands, its Standard MAC layer agreement recommended
LoRaWAN is used as security algorithm using AES (Advanced Encryption Standard), it is seen that its physical layer and link layer
Security can not all realize autonomous controllable target.Therefore our safety approach to LoRaWAN carry out national secret algorithm replacement,
To strengthen its information security controllability.And LoRa ends are in unserviced open public place, it is easy to by attacker
Steal data.
The content of the invention
The invention discloses a kind of rural power grids leak current fault system based on the close LoRa algorithms of state, attacked for side channel
Hit, upset the physical attacks such as attack, fault attacks means and carried out targetedly protection Design, it is ensured that key information is deposited
The physical security of storage.
A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including according to
LoRa terminal devices, LoRa gateways, LoRa servers and the application server of secondary connection;
The LoRa terminal devices, terminal random number can be produced, and it is by session establishment request message that the terminal is random
Number is sent to application server by the LoRa gateways and the LoRa servers;Using the terminal random number and come from
The application random number of application server, utility cession key is generated with reference to original application session key;Using terminal random number and
Come from the application random number of application server, network session key is generated with reference to primitive network session key;The application meeting
Talk about key and data can be encrypted for the close SM1 algorithms of network session key combination state and integrity protection.
Further, the utility cession key, for combining the close SM1 algorithms of state in LoRa mac frame structure
Payload data are encrypted.
Further, the network session key, for the message integrity algorithms with reference to the close SM1 of state to the Payload
Ciphertext and MAC header after data encryption carry out integrity protection.
Further, the Payload data are encrypted using the cipher block chaining pattern of the close SM1 algorithms of state.
Further, the LoRa terminal devices pass sequentially through LoRa trunk modules, LoRa gateways, LoRa servers with it is described
Application server is connected.
A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including according to
LoRa terminal devices, LoRa gateways, LoRa servers and the application server of secondary connection;
It the application server, can produce using random number, and random number is applied by described by session establishment received message
The LoRa terminal devices are sent to by the LoRa servers and the LoRa gateways;Using the application random number and come
From in the terminal random number of the LoRa terminal devices, utility cession key is generated with reference to original application session key;Using should
With random number and the terminal random number for coming from the LoRa terminal devices, BlueDrama is generated with reference to primitive network session key
Key;The utility cession key and network session key combination state close SM1 algorithms data can be encrypted with it is complete
Whole property protection.
Had the beneficial effect that caused by the present invention:
1st, the present invention disperses respectively using two primary key original application session keys and with reference to primitive network session key
Utility cession key and network session key, enhance security isolation intensity.
2nd, two random numbers of the invention ensure that the disposable and randomness of utility cession key and network session key,
The utility cession key and network session key of each session establishment can all change, and can effectively prevent Replay Attack and ensure
The confidentiality of primary key.
3rd, the present invention adds LoRa trunk modules between LoRa terminals and LoRa gateways, can effectively reduce packet loss
Rate, realize effective transmission of leak current fault information.
Brief description of the drawings
Fig. 1 is the LoRa security architecture schematic diagrames of the present invention;
Fig. 2 is LoRa data frames safety protection structure schematic diagram of the present invention;
Fig. 3 is LoRa protocol stack structure schematic diagrames;
Fig. 4 is the networking plan structural representation of the embodiment of the present invention.
In figure:The electric leakages of 1- first detection and control terminal, the LoRa terminals of 2- the first, 3-LoRa gateways, 4-LoRa servers, 5- electric leakages
Observing and controlling server, the electric leakages of 6- second detection and control terminal, the LoRa terminals of 7- the 2nd, 8-LoRa trunk modules.
Embodiment
Come the further details of explanation present invention, but protection scope of the present invention with specific embodiment below in conjunction with the accompanying drawings
It is not limited to this.
As shown in figure 4, a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, the first leakage
Electrical measurement control terminal 1 passes sequentially through the first LoRa terminals 2, LoRa gateways 3, LoRa servers 4 and the phase of electric leakage observing and controlling server 5
Connection, detection and control terminal 6 passes sequentially through the 2nd LoRa terminals 7, LoRa trunk modules 8 are connected with the LoRa gateways 3 for the second electric leakage
Connect.The LoRa gateways 3 pass back to LoRa servers 4 by 3G wireless public networks, connect electric leakage observing and controlling by internal network afterwards
Server 5.Using LoRa as terminal access means, accessed by the way of star-like networking, and returned with wireless public network,
Without any wiring class construction, greatly simplify engineering construction difficulty, equipment and construction cost can be effectively reduced.
As shown in Fig. 2 place is encrypted by utility cession key in Payload data in the mac frame structure of the LoRa
Reason, using the close SM1 algorithms of state;Ciphertext and MAC header after encryption carry out integrality using the close SM1 of state message integrity algorithms
Protection, is encrypted using network session key.The Payload data use the password packet train of the close SM1 algorithms of state
Pattern (CBC patterns) is connect to be encrypted.
In LoRaWAN, AppSKey and NwkSKey are all scattered by a primary key, and this scheme is unfavorable for
Internet and application layer security isolation.As shown in figure 1, this programme is disperseed respectively using two primary keys AppKey and NwkKey
Go out AppSKey and NwkSKey, enhance security isolation intensity.Its decentralized algorithm is as follows:
The generating algorithm of the utility cession key is:AppSKey = SM1_encrypt (AppKey, AppNonce |
NetID | DevNonce | pad16)
The generating algorithm of the network session key is:NwkSKey = SM1_encrypt (NwkKey, AppNonce |
NetID | DevNonce | pad16)
Wherein described first LoRa terminals 2 or the 2nd LoRa terminals 7, produce terminal random number DevNonce, LoRa terminal and set
It is standby that the terminal random number DevNonce is sent to by the electric leakage observing and controlling server 5 by session establishment request message;Utilize
The terminal random number DevNonce and application random number AppNonce for coming from the electric leakage observing and controlling server 5, is answered with reference to original
With session key AppKey generation utility cession key As ppSKey;Using terminal random number DevNonce and come from the leakage
The application random number AppNonce of electrical measurement control server 5, network session key is generated with reference to primitive network session key NwkKey
NwkSKey;
The electric leakage observing and controlling server 5, produce and built using random number AppNonce, the electric leakage observing and controlling server 5 by session
The application random number AppNonce is sent to the first LoRa terminals 2 or the 2nd LoRa terminals 7 by vertical received message;Using should
With random number AppNonce and the terminal random number for coming from the first LoRa terminals 2 or the 2nd LoRa terminals 7
DevNonce, with reference to original application session key AppKey generation utility cession key As ppSKey;Using using random number
The AppNonce and terminal random number DevNonce for coming from the first LoRa terminals 2 or the 2nd LoRa terminals 7, with reference to original
Beginning network session key AppKey generation network session keys AppSKey.
The theoretic area coverages of LoRa are 15 to 20 kilometers, but under normal circumstances because geographical position influences and blocks
The influence of thing, signal covering power do not reach theoretical value much, and bad node, Ke Yitong are covered for the signal of LoRa gateways 3
LoRa trunk modules 8 are crossed to be relayed.LoRa relayings refer to the LoRa trunk modules 8 for supporting relay function being placed in LoRa gateways
Between 3 and the 2nd distant LoRa terminals 7, the amplification of LoRa trunk modules 8 and transparent transmission LoRa signals.For LoRa gateways 3,
LoRa trunk modules 8 play the part of the role of terminal;For LoRa terminals, LoRa trunk modules 8 play the part of the role of LoRa gateways.
For the communication packet loss of LoRa data 3-5 kilometers within 1%, 5 to 8 kilometers of communication packet loss is left 5% after tested
The right side, more than 8 kilometers node packet loss are more than 5%.For the terminal accessing-point beyond 3 kilometers, carried out using LoRa trunk modules 8
Signal relays, and can effectively improve the success rate of electric leakage monitoring terminal communication, and then effectively shortens leak current fault and averagely arrange
The time removed.
It is noted that above-described embodiment is general to the illustrative and not limiting of technical solution of the present invention, art
The equivalent substitution of logical technical staff or the other modifications made according to prior art, as long as not exceeding technical solution of the present invention
Thinking and scope, it should be included within interest field of the presently claimed invention.
Claims (6)
1. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including successively
LoRa terminal devices, LoRa gateways, LoRa servers and the application server of connection;
The LoRa terminal devices, terminal random number can be produced, and it is by session establishment request message that the terminal is random
Number is sent to application server by the LoRa gateways and the LoRa servers;Using terminal random number and come from application
The application random number of server, utility cession key is generated with reference to original application session key;Using the terminal random number and
Come from the application random number of application server, network session key is generated with reference to primitive network session key;The application meeting
Talk about key and data can be encrypted for the close SM1 algorithms of network session key combination state and integrity protection.
2. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 1,
Characterized in that, the utility cession key, for combining the close SM1 algorithms of state to the Payload numbers in LoRa mac frame structure
According to being encrypted.
3. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 2,
Characterized in that, the network session key, for the message integrity algorithms with reference to the close SM1 of state to the Payload data
Ciphertext and MAC header after encryption carry out integrity protection.
4. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 2,
Characterized in that, the Payload data are encrypted using the cipher block chaining pattern of the close SM1 algorithms of state.
5. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies according to claim 1,
Characterized in that, the LoRa terminal devices pass sequentially through LoRa trunk modules, LoRa gateways, LoRa servers and the application
Server is connected.
6. a kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies, it is characterised in that including successively
LoRa terminal devices, LoRa gateways, LoRa servers and the application server of connection;
It the application server, can produce using random number, and random number is applied by described by session establishment received message
The LoRa terminal devices are sent to by the LoRa servers and the LoRa gateways;Using the application random number and come
From in the terminal random number of the LoRa terminal devices, utility cession key is generated with reference to original application session key;Using should
With random number and the terminal random number for coming from the LoRa terminal devices, BlueDrama is generated with reference to primitive network session key
Key;The utility cession key and network session key combination state close SM1 algorithms data can be encrypted with it is complete
Whole property protection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711106979.0A CN107819574A (en) | 2017-11-10 | 2017-11-10 | A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711106979.0A CN107819574A (en) | 2017-11-10 | 2017-11-10 | A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107819574A true CN107819574A (en) | 2018-03-20 |
Family
ID=61609232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711106979.0A Pending CN107819574A (en) | 2017-11-10 | 2017-11-10 | A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107819574A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109413644A (en) * | 2018-12-06 | 2019-03-01 | 广州邦讯信息系统有限公司 | LoRa encryption certification communication means, storage medium and electric terminal |
CN112953923A (en) * | 2021-02-03 | 2021-06-11 | 广州技象科技有限公司 | Safe network access method and device based on secret key updating |
CN113473456A (en) * | 2021-05-14 | 2021-10-01 | 中国科学院声学研究所南海研究站 | Million-level Internet of things terminal security access method and system based on domestic passwords |
CN115856423A (en) * | 2023-03-01 | 2023-03-28 | 青岛高科通信股份有限公司 | Electronic electric energy meter transformation device and meter reading system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160345265A1 (en) * | 2015-05-20 | 2016-11-24 | Senaya, Inc. | Low power wide area network |
CN106571846A (en) * | 2016-10-17 | 2017-04-19 | 国动物联网技术(上海)有限公司 | LoRa data transmission module and data encryption method |
CN106658433A (en) * | 2016-12-27 | 2017-05-10 | 陈君华 | Method for realizing digital cluster interphone based on LoRa technology and interphone |
CN107135503A (en) * | 2017-07-07 | 2017-09-05 | 深圳市信锐网科技术有限公司 | A kind of intelligent energy consumption management method and system |
CN107222931A (en) * | 2017-07-10 | 2017-09-29 | 深圳市信锐网科技术有限公司 | A kind of LoRa communication means and system |
-
2017
- 2017-11-10 CN CN201711106979.0A patent/CN107819574A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160345265A1 (en) * | 2015-05-20 | 2016-11-24 | Senaya, Inc. | Low power wide area network |
CN106571846A (en) * | 2016-10-17 | 2017-04-19 | 国动物联网技术(上海)有限公司 | LoRa data transmission module and data encryption method |
CN106658433A (en) * | 2016-12-27 | 2017-05-10 | 陈君华 | Method for realizing digital cluster interphone based on LoRa technology and interphone |
CN107135503A (en) * | 2017-07-07 | 2017-09-05 | 深圳市信锐网科技术有限公司 | A kind of intelligent energy consumption management method and system |
CN107222931A (en) * | 2017-07-10 | 2017-09-29 | 深圳市信锐网科技术有限公司 | A kind of LoRa communication means and system |
Non-Patent Citations (1)
Title |
---|
PROF. ENZO MINGOZZI, PROF. FRANCESCO MARCELLONI: "Enabling relay-based communication in LoRa networks for the Internet of Things:design,implementation and experimental evaluation", 《CORSO DI LAUREA MAGISTRALE IN COMPUTER ENGINEERING》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109413644A (en) * | 2018-12-06 | 2019-03-01 | 广州邦讯信息系统有限公司 | LoRa encryption certification communication means, storage medium and electric terminal |
CN109413644B (en) * | 2018-12-06 | 2024-03-19 | 广州邦讯信息系统有限公司 | LoRa encryption authentication communication method, storage medium and electronic terminal |
CN112953923A (en) * | 2021-02-03 | 2021-06-11 | 广州技象科技有限公司 | Safe network access method and device based on secret key updating |
CN113473456A (en) * | 2021-05-14 | 2021-10-01 | 中国科学院声学研究所南海研究站 | Million-level Internet of things terminal security access method and system based on domestic passwords |
CN113473456B (en) * | 2021-05-14 | 2023-03-14 | 中国科学院声学研究所南海研究站 | Million-level Internet of things terminal security access method and system based on domestic passwords |
CN115856423A (en) * | 2023-03-01 | 2023-03-28 | 青岛高科通信股份有限公司 | Electronic electric energy meter transformation device and meter reading system |
CN115856423B (en) * | 2023-03-01 | 2023-07-07 | 青岛高科通信股份有限公司 | Electronic electric energy meter transformation device and meter reading system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rawat et al. | Cyber security for smart grid systems: Status, challenges and perspectives | |
CN107819574A (en) | A kind of rural power grids leak current fault system based on the close SM1 algorithms of state and LoRa technologies | |
Chen et al. | Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed | |
Quincozes et al. | A survey on intrusion detection and prevention systems in digital substations | |
CA2844221C (en) | Wireless communication systems and methods for intelligent electronic devices | |
Liu et al. | A dynamic secret-based encryption scheme for smart grid wireless communication | |
Tan et al. | New challenges in the design of microgrid systems: Communication networks, cyberattacks, and resilience | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
Iyer | Cyber security for smart grid, cryptography, and privacy | |
CN107483444A (en) | A kind of intelligent grid information transmission security protector and safety protecting method | |
US20120144187A1 (en) | Application Layer Security Proxy for Automation and Control System Networks | |
Darwish et al. | Experimental and theoretical modeling of DNP3 attacks in smart grids | |
Zhou et al. | Efficient application of GPRS and CDMA networks in SCADA system | |
Procopiou et al. | Current and future threats framework in smart grid domain | |
CN108092969A (en) | The system and method for Intelligent Mobile Robot acquisition image access electric power Intranet | |
CN111988328A (en) | Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station | |
Kharchouf et al. | On the implementation and security analysis of routable-GOOSE messages based on IEC 61850 standard | |
Naedele et al. | Network security for substation automation systems | |
Wei et al. | Data-centric threats and their impacts to real-time communications in smart grid | |
Ravikumar et al. | Cps testbed architectures for wampac using industrial substation and control center platforms and attack-defense evaluation | |
KR101093504B1 (en) | Remote area monitoring control system using mobile communication technology and control method thereof | |
Swain et al. | Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network | |
CN106452751A (en) | A mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check | |
Jafary et al. | Security solutions for smart grid feeder automation data communication | |
Gajanan et al. | Cyber-Attacks on Smart Grid System: A Review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180320 |