CN109586924A - A kind of intelligent distribution network data safe transmission method based on cloud computing - Google Patents
A kind of intelligent distribution network data safe transmission method based on cloud computing Download PDFInfo
- Publication number
- CN109586924A CN109586924A CN201910000650.9A CN201910000650A CN109586924A CN 109586924 A CN109586924 A CN 109586924A CN 201910000650 A CN201910000650 A CN 201910000650A CN 109586924 A CN109586924 A CN 109586924A
- Authority
- CN
- China
- Prior art keywords
- data
- cloud computing
- distribution network
- layer
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Abstract
The invention belongs to the crossing domains of smart grid, information security and cloud computing technology, are related to a kind of intelligent distribution network data safe transmission method based on cloud computing.Intelligent distribution network cloud platform includes distribution terminal layer, cloud computing infrastructure layer, cloud computing platform layer and electric power enterprise application layer, introduces the cloud computing technologies such as HDFS, MapReduce and Hbase to guarantee intelligent distribution network system to the quick storage and processing of electric power data.For the communication security for guaranteeing power dispatching data, and then guarantee the safe and stable operation of distribution network system, intelligent distribution network data transmission security module is equipped between distribution terminal layer and cloud computing infrastructure layer, AES encryption technology is relied on to guarantee the confidentiality of power distribution network transmission data, relies on md5 authentication technology to ensure the integrality of data transmission.The features such as present invention is with high security, data-handling efficiency is high further improves the safety of distribution network data transmission and the computing capability of data.
Description
Technical field
The invention belongs to the crossing domains of smart grid, information security and cloud computing technology, more particularly to one kind to be based on cloud
The intelligent distribution network data safe transmission method of calculating.
Background technique
With the rapid development of information technology in recent years, traditional power grid is gradually replaced smart grid.It compares
In traditional power grid, smart grid has significantly in various aspects such as efficiency of energy utilization, reliability, economy and electrical power services
Improve.As the important component of smart grid, emerging intelligent distribution network is the important pivot for connecting user terminal and the end that generates electricity
Knob.It need to be handled in intelligent power distribution net side due to the introducing of a large amount of distribution terminals such as smart home, electric car, intelligent electric meter
The exponential explosion of power dispatching data increases.Therefore, how to the storages of the data of magnanimity and to be calculated as power distribution network intelligence
It is difficult to the wide gap gone beyond.Cloud storage technology and cloud computing technology are developed by leaps and bounds, so that intelligent distribution network possesses storage and calculates
The ability of mass data is possibly realized.While the storage and computing capability that distribution automation system is substantially improved, avoid
The overlapping investment of smart grid distribution side, has pushed the fast development and stable operation of smart grid.
However, the defect that the distribution automation system based on active computer network is intrinsic because of its network security system,
Vulnerable to external network attack.Further, since distribution automation is in starting stage, power distribution automation system at county level in China
System is, because not having fiber optic communication condition, to use public network based on the existing Distribution Network Communication network rebuilding mostly
Communication mode (GPRS/CDMA etc.), and existing distribution network data uses the plaintext transmission mode without any encryption, attacks
The person of hitting only needs to invade or using the terminal device in any one station power distribution automation system, can be realized to main website or target
The data acquisition of FTU is even remotely controlled.Ministry of State Security confirms that attacker can be by distribution automation by simulation challenge trial
The information attack of RTU/FTU in system influences the safe and stable operation of power distribution network, even results in the large-area power-cuts of power grid.
Attacker needs to rely on common network using the transmission service in the cloud computing and cloud storage of power distribution network, with TCP/IP
Agreement is completed to transmit this characteristic, is conceived to the intrinsic dangerous feature of Handshake Protocol in ICP/IP protocol, realizes to power distribution network
Network attack.Attacker is by detecting in ICP/IP protocol with the encrypted message of plaintext transmission, data password and important control
System order, distorts source IP address section, achievees the purpose that eavesdropping, interference even forge source traffic, threaten conversational services.In addition,
Attacker is to transmit data by detecting based on this characteristic is verified to sequence number using the transmission reliability in ICP/IP protocol
Sequence number, realize and the sequence number of the ICP/IP protocol of destination host cheated, complete transmission and deception of the false data to it,
And then achieve the purpose that cause power distribution network safety accident.
It is the problem of country pays special attention to whether Electric Power Communication Data safety.But so far, based on the intelligence of cloud computing
The data transmission security problem of power distribution network is still unresolved.It is therefore proposed that a kind of intelligent distribution network data safety based on cloud computing
The problem of Transmission system is current urgent need to resolve.
Summary of the invention
Goal of the invention of the invention is to propose one for the safety problem of intelligent distribution network cloud computing platform data transmission
Intelligent distribution network data safe transmission method of the kind based on cloud computing, to guarantee the peace of data transmission in power distribution network cloud computing platform
Quan Xing.
In order to solve technical matters as described above, the present invention uses technical solution as described below:
A kind of intelligent distribution network data safe transmission method based on cloud computing, mainly include intelligent distribution network cloud platform and
Intelligent distribution network data transmission security module;
The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure layer, cloud computing
Podium level and electric power enterprise application layer;The distribution terminal layer is mainly made of FTU, DTU, TTU and intelligent electric meter, is data
Main source;The cloud computing infrastructure layer, is made of cluster type server, and to cluster virtualization processing, shielding is hard
Part difference forms unified standard, conducive to the management of cluster;The cloud computing platform layer is mainly by distributed memory system
HDFS, distributed computing framework MapReduce and data management system Hbase composition;With column storage management mode management
Data needed for cloud computing platform;Data needed for redundant storage system saves cloud computing platform in a distributed manner guarantee intelligent distribution network
The operation of cloud platform;Data are calculated using distributed computing framework, ensure data processing in intelligent distribution network;The electric power enterprise
Industry application layer is made of application software on cloud, to realize the electric power of forecast assessment, power scheduling and the network optimization and state-detection
Data application.
The intelligent distribution network data transmission security module includes encrypting module and authentication module, with MD5_WITH_
AES communication security techniques are added AES encryption module and ensure power grid number between distribution terminal layer and cloud computing infrastructure layer
According to the confidentiality of transmission, the integrality that md5 authentication module ensures electric network data transmission is added.
The encrypting module and authentication module realize that specific step is as follows:
Step 1: distribution terminal layer TLD generates eap-message digest MAC: with MD5 algorithm that the message D of signature to be encrypted is raw
At digital signature block MAC;
Step 2: TLD encrypted transmission message D: using AES encryption algorithm for encryption message D, generates ciphertext C;
Step 3: digital signature block MAC and ciphertext C (MAC | | C) are sent to cloud computing infrastructure by public network by TLD
Layer CCIL;
Step 4: CCIL is decrypted the ciphertext C received with AES decipherment algorithm, obtains plaintext D1;
Step 5: CCIL is with MD5 algorithm according to plaintext D1Generate eap-message digest MAC1;
Step 6: the eap-message digest MAC that will be generated in step 51The digital signature MAC received with CCIL in step 3
It compares, verify, if eap-message digest MAC1It is identical with digital signaling block MAC, then data transmission success;If not identical,
Data are attacked, and the data attacked are abandoned, and retransmit former data.
Beneficial effects of the present invention are as follows:
(1) convenient and fast dynamic expansion performance: each by integrated software platform, hardware class, operating system, network type etc.
The different soft and hardware equipment of kind, so that cloud computing platform has very strong calculating and storage extended capability;
(2) virtualization technology and service, powerful data calculating and storage capacity: flat using the cloud computing of virtualization technology
Platform can maximally utilise the idle calculation resources in intelligent distribution network, and multiple mutually independent tasks can either exist
The single equipment with powerful computing function carries out computational service, and single task can also be split into several height and appointed
Business, carries out computational service respectively on multiple devices;
(3) cloud computing technology is added in intelligent distribution system, solves the problems, such as that smart grid is unable to large scale deployment,
And the platform an of low-power consumption and low cost is provided, improve the utilization rate of resource;
(4) a kind of solution based on encryption and authentication is proposed, to solve to deposit in system proposed by the present invention
Key safety problem, the safety of data transmission in effective guarantee intelligent distribution network.
Detailed description of the invention
Fig. 1 is system architecture diagram of the invention;
Fig. 2 is data transmission security specific implementation flow chart of the invention.
Specific embodiment
Below in conjunction with attached drawing and technical solution, a specific embodiment of the invention is further illustrated.
Fig. 1 is system architecture diagram of the invention, mainly includes that intelligent distribution network cloud platform and intelligent power distribution network data transmit
Two parts of security module;The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure
Layer, cloud computing platform layer and electric power enterprise application layer;The distribution terminal layer is mainly by FTU, DTU, TTU, intelligent electric meter etc.
Device composition;The cloud computing infrastructure layer, is made of cheap server cluster;The cloud computing platform layer is main
It is made of distributed memory system HDFS, distributed computing framework MapReduce and data management system Hbase;The electricity
Power enterprise application layer, is mainly made of application software on cloud;The energy power distribution network data transmission security module, including two moulds
Block: one is encrypting module, the other is authentication module.
The encrypting module uses the AES encryption algorithm with 128bits for an input block, because various in AES
Operation is the implementation operation as unit of position, so setting the input quantity of single Plaintext block as z=z0z1z2…z126z127, wherein zi
∈GF(28), the state value of 0≤i≤127, each round is state, and key length is denoted as Nk, block length is denoted as Nb, encryption round
Number scale is Nr.AES encryption is completed by 5 different transformation: round key generates Round (byte state [4, N according to key Kb],
word(K)w[Nb*(Nr+ 1)]), preceding 9 wheel byte substitution is SubBytes (zi), preceding 9 wheel row displacement is ShiftRows
(state), it is AddRoundKey (state, w [r* that preceding 9 wheel column, which are mixed into MixColumns (state) and preceding 9 wheel InvAddRoundKey,
Nb,(r+1)*Nb-1]);The 10th round transformation in ciphering process is slightly different, and the 10th wheel round key is generated as FinalRound
(byte state[4,Nb],word w[Nb*(Nr+1)]), the 10th wheel byte substitution is SubBytes (state), and the 10th wheel row moves
Bit map is ShiftRows (state), and the 10th wheel InvAddRoundKey is transformed to AddRoundKey (state, w [r*Nb,(r+1)*
Nb-1])。
The authentication module uses MD5 algorithm, xmd5∈{0,1}128, then xmd5=FunMD5(D, A, B, C, E, IV, 64),
Wherein IV is the preliminary examination variable generated according to key K, and D is the plaintext of input, and A, B, C, E are a circulation finite field operations group G,
Rank is the number 64 of circulation.B in each roundi, Ci, EiFor last round of finite field operations group G (Ai-1, Bi-1, Ci-1) value, 2≤i
≤64;A in each roundiFor last round of Fun (Ai-1, f (Bi-1, Ci-1), Mi, Ki) value, wherein MiFor changing for every wheel Plaintext block
In generation, is as a result, KiFor pre- offset vector.
Fig. 2 is data transmission security specific implementation flow chart of the invention, and concrete operations are as follows:
Step 1: the message D of signature to be encrypted is generated digital signature block MAC with MD5 algorithm by distribution terminal layer TLD;
Detailed process is as follows for the MD5 algorithm: being segmented first to distribution terminal layer data by 512bit, finally the portion less than 512bit
Point, addition one 1 and d 0 is deducted after the 64bit of end, 448bit is gathered into, then this 64bit is added in end, is allowed to also become
One section of 512bit shares N sections, a paragraph of 512bit is grouped as every time 16 segments of 32bit, is packed into array: M=M
[0], [1] M ..., M [15] carry out four-wheel encryption, and every wheel recycles 16 times, every time respectively to an array location progress, totally 64
It is secondary.
Step 2: TLD uses AES encryption algorithm for encryption message D;The aes algorithm, if AES encryption function is E, then C
=E (K, D), wherein D is in plain text that K is key, and C is ciphertext, and AES is symmetric encipherment algorithm, and encrypting with the key of decryption is phase
With, key is that TLD and CCIL negotiates to generate.
Step 3: digital signature block and ciphertext (MAC | | C) are sent to cloud computing infrastructure layer by public network by TLD
CCIL, public network communication mode can be GPRS, CDMA etc..
Step 4: CCIL is decrypted the ciphertext blocks received with AES decipherment algorithm, obtains plaintext D1, described
AES decipherment algorithm is the inverse operation of AES encryption algorithm, if AES decryption function is D, then D1=D (K, C), wherein C is ciphertext, K
For key, D1For in plain text, that is to say, that inputted using ciphertext C and key K as the parameter of decryption function, then decryption function can be defeated
Plaintext D out1。
Step 5: CCIL uses MD5 algorithm by D1Generate eap-message digest MAC1;One in the MD5 algorithm and step 1
It causes.
Step 6: the eap-message digest MAC that will be generated in step 51It is compared with the digital signature MAC received, school
It tests, if eap-message digest is identical with digital signaling block, data transmission success;If not identical, data are attacked.It should abandon
The data attacked retransmit former data.
The invention is simple and feasible, has not only been able to satisfy the processing of magnanimity electric power data, but also can ensure the complete of power distribution network electric power data
Whole property and confidentiality are beneficial to the development and construction of smart grid.
Claims (2)
1. a kind of intelligent distribution network data safe transmission method based on cloud computing, which is characterized in that mainly include intelligent power distribution
Net cloud platform and intelligent distribution network data transmission security module;
The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure layer, cloud computing platform
Layer and electric power enterprise application layer;The distribution terminal layer is mainly made of FTU, DTU, TTU and intelligent electric meter, is the master of data
Want source;The cloud computing infrastructure layer, is made of cluster type server, to cluster virtualization processing;The cloud meter
Podium level is calculated mainly by distributed memory system HDFS, distributed computing framework MapReduce and data management system Hbase group
At;Data needed for managing cloud computing platform with column storage management mode;Redundant storage system saves cloud computing in a distributed manner
Data needed for platform;Data are calculated using distributed computing framework;The electric power enterprise application layer, by application software group on cloud
At to realize the electric power data application of forecast assessment, power scheduling and the network optimization and state-detection;
The intelligent distribution network data transmission security module includes encrypting module and authentication module, is led to MD5_WITH_AES
Believe safe practice, between distribution terminal layer and cloud computing infrastructure layer, AES encryption module is added and ensures electric network data transmission
Confidentiality, be added md5 authentication module ensure electric network data transmission integrality.
2. a kind of intelligent distribution network data safe transmission method based on cloud computing according to claim 1, feature exist
In the encrypting module and authentication module realize that specific step is as follows:
Step 1: distribution terminal layer TLD generates eap-message digest MAC: the message D of signature to be encrypted being generated number with MD5 algorithm
Word signaling block MAC;
Step 2: TLD encrypted transmission message D: using AES encryption algorithm for encryption message D, generates ciphertext C;
Step 3: digital signature block MAC and ciphertext C is sent to cloud computing infrastructure layer CCIL by public network by TLD;
Step 4: CCIL is decrypted the ciphertext C received with AES decipherment algorithm, obtains plaintext D1;
Step 5: CCIL is with MD5 algorithm according to plaintext D1Generate eap-message digest MAC1;
Step 6: the eap-message digest MAC that will be generated in step 51The digital signature MAC received with CCIL in step 3 is carried out pair
Than, verification, if eap-message digest MAC1It is identical with digital signaling block MAC, then data transmission success;If not identical, data quilt
Attack abandons the data attacked, and retransmits former data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910000650.9A CN109586924A (en) | 2019-01-02 | 2019-01-02 | A kind of intelligent distribution network data safe transmission method based on cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910000650.9A CN109586924A (en) | 2019-01-02 | 2019-01-02 | A kind of intelligent distribution network data safe transmission method based on cloud computing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109586924A true CN109586924A (en) | 2019-04-05 |
Family
ID=65915364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910000650.9A Withdrawn CN109586924A (en) | 2019-01-02 | 2019-01-02 | A kind of intelligent distribution network data safe transmission method based on cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109586924A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110365804A (en) * | 2019-08-29 | 2019-10-22 | 国网重庆市电力公司电力科学研究院 | A kind of distribution terminal cloud detection system |
CN111245958A (en) * | 2020-03-09 | 2020-06-05 | 中国能源建设集团陕西省电力设计院有限公司 | Unified cloud computing system for ubiquitous power Internet of things |
CN112636933A (en) * | 2020-11-30 | 2021-04-09 | 国网山东省电力公司惠民县供电公司 | Electric power direct current power supply control system |
CN112995130A (en) * | 2021-02-01 | 2021-06-18 | 胡文旭 | Electric power thing networking data transmission system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516117A (en) * | 2015-12-02 | 2016-04-20 | 南方电网科学研究院有限责任公司 | Cloud computing based power data security storage method |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
CN106056322A (en) * | 2016-07-30 | 2016-10-26 | 国网河北省电力公司衡水供电分公司 | Smart grid scheduling system based on cloud computing |
CN106557820A (en) * | 2016-11-24 | 2017-04-05 | 天津市普迅电力信息技术有限公司 | A kind of power transformation O&M standard operation mobile terminal platform |
CN107025409A (en) * | 2017-06-27 | 2017-08-08 | 中经汇通电子商务有限公司 | A kind of data safety storaging platform |
CN107945052A (en) * | 2017-11-30 | 2018-04-20 | 国网江苏省电力公司扬州供电公司 | A kind of distribution power automation terminal information overall process automatically accesses method |
-
2019
- 2019-01-02 CN CN201910000650.9A patent/CN109586924A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516117A (en) * | 2015-12-02 | 2016-04-20 | 南方电网科学研究院有限责任公司 | Cloud computing based power data security storage method |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
CN106056322A (en) * | 2016-07-30 | 2016-10-26 | 国网河北省电力公司衡水供电分公司 | Smart grid scheduling system based on cloud computing |
CN106557820A (en) * | 2016-11-24 | 2017-04-05 | 天津市普迅电力信息技术有限公司 | A kind of power transformation O&M standard operation mobile terminal platform |
CN107025409A (en) * | 2017-06-27 | 2017-08-08 | 中经汇通电子商务有限公司 | A kind of data safety storaging platform |
CN107945052A (en) * | 2017-11-30 | 2018-04-20 | 国网江苏省电力公司扬州供电公司 | A kind of distribution power automation terminal information overall process automatically accesses method |
Non-Patent Citations (3)
Title |
---|
叶新: "智能变电站通信网络传输系统的安全性研究", 《中国硕士学位论文全文数据库信息科技辑》 * |
宋亚奇: "云平台下电力设备监测大数据存储优化与并行处理技术研究", 《中国博士学位论文全文数据库信息科技辑》 * |
赵腾等: "智能配电网大数据应用技术与前景分析", 《电网技术》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110365804A (en) * | 2019-08-29 | 2019-10-22 | 国网重庆市电力公司电力科学研究院 | A kind of distribution terminal cloud detection system |
CN111245958A (en) * | 2020-03-09 | 2020-06-05 | 中国能源建设集团陕西省电力设计院有限公司 | Unified cloud computing system for ubiquitous power Internet of things |
CN112636933A (en) * | 2020-11-30 | 2021-04-09 | 国网山东省电力公司惠民县供电公司 | Electric power direct current power supply control system |
CN112636933B (en) * | 2020-11-30 | 2023-07-25 | 国网山东省电力公司惠民县供电公司 | Electric power direct current power supply control system |
CN112995130A (en) * | 2021-02-01 | 2021-06-18 | 胡文旭 | Electric power thing networking data transmission system |
CN112995130B (en) * | 2021-02-01 | 2022-04-22 | 山西风行测控股份有限公司 | Electric power thing networking data transmission system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102983965B (en) | Transformer station's quantum communications model, quantum key distribution center and model implementation method | |
He et al. | An enhanced public key infrastructure to secure smart grid wireless communication networks | |
CN109586924A (en) | A kind of intelligent distribution network data safe transmission method based on cloud computing | |
CN110336774A (en) | Hybrid Encryption decryption method, equipment and system | |
CN110267270A (en) | A kind of substation's inner sensor terminal access Border Gateway authentication intelligence contract | |
CN110912877B (en) | Data transmitting and receiving method and device based on IEC61850 model in transformer substation | |
CN113542428B (en) | Vehicle data uploading method and device, vehicle, system and storage medium | |
CN111988328A (en) | Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station | |
Jain et al. | SCADA security: a review and enhancement for DNP3 based systems | |
CN111770060A (en) | Data transmission method for power internet of things and power internet of things | |
Sani et al. | A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet | |
CN109194701A (en) | A kind of data processing method and device | |
Hussain et al. | A security mechanism for IEEE C37. 118.2 PMU communication | |
CN109040120A (en) | A kind of SV message encryption and decryption method based on IEC61850 standard | |
CN106341256B (en) | V2G system based on software defined network and safety communication method thereof | |
CN112039654A (en) | Electric meter data security acquisition method for resisting man-in-the-middle attack | |
Li et al. | Enterprise private cloud file encryption system based on tripartite secret key protocol | |
Chen et al. | Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments | |
Patil et al. | A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network. | |
Lv et al. | A highly reliable lightweight distribution network communication encryption scheme | |
Wang et al. | PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments | |
Yang et al. | Authentication technology in industrial control system based on identity password | |
Piao et al. | Power data collection terminal protection based on sm9 | |
You et al. | A Lightweight Authentication Scheme in Electric Internet of Things | |
Li et al. | Research on the fusion architecture and application mode of quantum cryptography and classic cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190405 |