CN109586924A - A kind of intelligent distribution network data safe transmission method based on cloud computing - Google Patents

A kind of intelligent distribution network data safe transmission method based on cloud computing Download PDF

Info

Publication number
CN109586924A
CN109586924A CN201910000650.9A CN201910000650A CN109586924A CN 109586924 A CN109586924 A CN 109586924A CN 201910000650 A CN201910000650 A CN 201910000650A CN 109586924 A CN109586924 A CN 109586924A
Authority
CN
China
Prior art keywords
data
cloud computing
distribution network
layer
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910000650.9A
Other languages
Chinese (zh)
Inventor
王宁
吴艳莉
张龙飞
姚睿哲
柳广兴
刘云华
康宇先
宋佳敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201910000650.9A priority Critical patent/CN109586924A/en
Publication of CN109586924A publication Critical patent/CN109586924A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Abstract

The invention belongs to the crossing domains of smart grid, information security and cloud computing technology, are related to a kind of intelligent distribution network data safe transmission method based on cloud computing.Intelligent distribution network cloud platform includes distribution terminal layer, cloud computing infrastructure layer, cloud computing platform layer and electric power enterprise application layer, introduces the cloud computing technologies such as HDFS, MapReduce and Hbase to guarantee intelligent distribution network system to the quick storage and processing of electric power data.For the communication security for guaranteeing power dispatching data, and then guarantee the safe and stable operation of distribution network system, intelligent distribution network data transmission security module is equipped between distribution terminal layer and cloud computing infrastructure layer, AES encryption technology is relied on to guarantee the confidentiality of power distribution network transmission data, relies on md5 authentication technology to ensure the integrality of data transmission.The features such as present invention is with high security, data-handling efficiency is high further improves the safety of distribution network data transmission and the computing capability of data.

Description

A kind of intelligent distribution network data safe transmission method based on cloud computing
Technical field
The invention belongs to the crossing domains of smart grid, information security and cloud computing technology, more particularly to one kind to be based on cloud The intelligent distribution network data safe transmission method of calculating.
Background technique
With the rapid development of information technology in recent years, traditional power grid is gradually replaced smart grid.It compares In traditional power grid, smart grid has significantly in various aspects such as efficiency of energy utilization, reliability, economy and electrical power services Improve.As the important component of smart grid, emerging intelligent distribution network is the important pivot for connecting user terminal and the end that generates electricity Knob.It need to be handled in intelligent power distribution net side due to the introducing of a large amount of distribution terminals such as smart home, electric car, intelligent electric meter The exponential explosion of power dispatching data increases.Therefore, how to the storages of the data of magnanimity and to be calculated as power distribution network intelligence It is difficult to the wide gap gone beyond.Cloud storage technology and cloud computing technology are developed by leaps and bounds, so that intelligent distribution network possesses storage and calculates The ability of mass data is possibly realized.While the storage and computing capability that distribution automation system is substantially improved, avoid The overlapping investment of smart grid distribution side, has pushed the fast development and stable operation of smart grid.
However, the defect that the distribution automation system based on active computer network is intrinsic because of its network security system, Vulnerable to external network attack.Further, since distribution automation is in starting stage, power distribution automation system at county level in China System is, because not having fiber optic communication condition, to use public network based on the existing Distribution Network Communication network rebuilding mostly Communication mode (GPRS/CDMA etc.), and existing distribution network data uses the plaintext transmission mode without any encryption, attacks The person of hitting only needs to invade or using the terminal device in any one station power distribution automation system, can be realized to main website or target The data acquisition of FTU is even remotely controlled.Ministry of State Security confirms that attacker can be by distribution automation by simulation challenge trial The information attack of RTU/FTU in system influences the safe and stable operation of power distribution network, even results in the large-area power-cuts of power grid.
Attacker needs to rely on common network using the transmission service in the cloud computing and cloud storage of power distribution network, with TCP/IP Agreement is completed to transmit this characteristic, is conceived to the intrinsic dangerous feature of Handshake Protocol in ICP/IP protocol, realizes to power distribution network Network attack.Attacker is by detecting in ICP/IP protocol with the encrypted message of plaintext transmission, data password and important control System order, distorts source IP address section, achievees the purpose that eavesdropping, interference even forge source traffic, threaten conversational services.In addition, Attacker is to transmit data by detecting based on this characteristic is verified to sequence number using the transmission reliability in ICP/IP protocol Sequence number, realize and the sequence number of the ICP/IP protocol of destination host cheated, complete transmission and deception of the false data to it, And then achieve the purpose that cause power distribution network safety accident.
It is the problem of country pays special attention to whether Electric Power Communication Data safety.But so far, based on the intelligence of cloud computing The data transmission security problem of power distribution network is still unresolved.It is therefore proposed that a kind of intelligent distribution network data safety based on cloud computing The problem of Transmission system is current urgent need to resolve.
Summary of the invention
Goal of the invention of the invention is to propose one for the safety problem of intelligent distribution network cloud computing platform data transmission Intelligent distribution network data safe transmission method of the kind based on cloud computing, to guarantee the peace of data transmission in power distribution network cloud computing platform Quan Xing.
In order to solve technical matters as described above, the present invention uses technical solution as described below:
A kind of intelligent distribution network data safe transmission method based on cloud computing, mainly include intelligent distribution network cloud platform and Intelligent distribution network data transmission security module;
The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure layer, cloud computing Podium level and electric power enterprise application layer;The distribution terminal layer is mainly made of FTU, DTU, TTU and intelligent electric meter, is data Main source;The cloud computing infrastructure layer, is made of cluster type server, and to cluster virtualization processing, shielding is hard Part difference forms unified standard, conducive to the management of cluster;The cloud computing platform layer is mainly by distributed memory system HDFS, distributed computing framework MapReduce and data management system Hbase composition;With column storage management mode management Data needed for cloud computing platform;Data needed for redundant storage system saves cloud computing platform in a distributed manner guarantee intelligent distribution network The operation of cloud platform;Data are calculated using distributed computing framework, ensure data processing in intelligent distribution network;The electric power enterprise Industry application layer is made of application software on cloud, to realize the electric power of forecast assessment, power scheduling and the network optimization and state-detection Data application.
The intelligent distribution network data transmission security module includes encrypting module and authentication module, with MD5_WITH_ AES communication security techniques are added AES encryption module and ensure power grid number between distribution terminal layer and cloud computing infrastructure layer According to the confidentiality of transmission, the integrality that md5 authentication module ensures electric network data transmission is added.
The encrypting module and authentication module realize that specific step is as follows:
Step 1: distribution terminal layer TLD generates eap-message digest MAC: with MD5 algorithm that the message D of signature to be encrypted is raw At digital signature block MAC;
Step 2: TLD encrypted transmission message D: using AES encryption algorithm for encryption message D, generates ciphertext C;
Step 3: digital signature block MAC and ciphertext C (MAC | | C) are sent to cloud computing infrastructure by public network by TLD Layer CCIL;
Step 4: CCIL is decrypted the ciphertext C received with AES decipherment algorithm, obtains plaintext D1
Step 5: CCIL is with MD5 algorithm according to plaintext D1Generate eap-message digest MAC1
Step 6: the eap-message digest MAC that will be generated in step 51The digital signature MAC received with CCIL in step 3 It compares, verify, if eap-message digest MAC1It is identical with digital signaling block MAC, then data transmission success;If not identical, Data are attacked, and the data attacked are abandoned, and retransmit former data.
Beneficial effects of the present invention are as follows:
(1) convenient and fast dynamic expansion performance: each by integrated software platform, hardware class, operating system, network type etc. The different soft and hardware equipment of kind, so that cloud computing platform has very strong calculating and storage extended capability;
(2) virtualization technology and service, powerful data calculating and storage capacity: flat using the cloud computing of virtualization technology Platform can maximally utilise the idle calculation resources in intelligent distribution network, and multiple mutually independent tasks can either exist The single equipment with powerful computing function carries out computational service, and single task can also be split into several height and appointed Business, carries out computational service respectively on multiple devices;
(3) cloud computing technology is added in intelligent distribution system, solves the problems, such as that smart grid is unable to large scale deployment, And the platform an of low-power consumption and low cost is provided, improve the utilization rate of resource;
(4) a kind of solution based on encryption and authentication is proposed, to solve to deposit in system proposed by the present invention Key safety problem, the safety of data transmission in effective guarantee intelligent distribution network.
Detailed description of the invention
Fig. 1 is system architecture diagram of the invention;
Fig. 2 is data transmission security specific implementation flow chart of the invention.
Specific embodiment
Below in conjunction with attached drawing and technical solution, a specific embodiment of the invention is further illustrated.
Fig. 1 is system architecture diagram of the invention, mainly includes that intelligent distribution network cloud platform and intelligent power distribution network data transmit Two parts of security module;The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure Layer, cloud computing platform layer and electric power enterprise application layer;The distribution terminal layer is mainly by FTU, DTU, TTU, intelligent electric meter etc. Device composition;The cloud computing infrastructure layer, is made of cheap server cluster;The cloud computing platform layer is main It is made of distributed memory system HDFS, distributed computing framework MapReduce and data management system Hbase;The electricity Power enterprise application layer, is mainly made of application software on cloud;The energy power distribution network data transmission security module, including two moulds Block: one is encrypting module, the other is authentication module.
The encrypting module uses the AES encryption algorithm with 128bits for an input block, because various in AES Operation is the implementation operation as unit of position, so setting the input quantity of single Plaintext block as z=z0z1z2…z126z127, wherein zi ∈GF(28), the state value of 0≤i≤127, each round is state, and key length is denoted as Nk, block length is denoted as Nb, encryption round Number scale is Nr.AES encryption is completed by 5 different transformation: round key generates Round (byte state [4, N according to key Kb], word(K)w[Nb*(Nr+ 1)]), preceding 9 wheel byte substitution is SubBytes (zi), preceding 9 wheel row displacement is ShiftRows (state), it is AddRoundKey (state, w [r* that preceding 9 wheel column, which are mixed into MixColumns (state) and preceding 9 wheel InvAddRoundKey, Nb,(r+1)*Nb-1]);The 10th round transformation in ciphering process is slightly different, and the 10th wheel round key is generated as FinalRound (byte state[4,Nb],word w[Nb*(Nr+1)]), the 10th wheel byte substitution is SubBytes (state), and the 10th wheel row moves Bit map is ShiftRows (state), and the 10th wheel InvAddRoundKey is transformed to AddRoundKey (state, w [r*Nb,(r+1)* Nb-1])。
The authentication module uses MD5 algorithm, xmd5∈{0,1}128, then xmd5=FunMD5(D, A, B, C, E, IV, 64), Wherein IV is the preliminary examination variable generated according to key K, and D is the plaintext of input, and A, B, C, E are a circulation finite field operations group G, Rank is the number 64 of circulation.B in each roundi, Ci, EiFor last round of finite field operations group G (Ai-1, Bi-1, Ci-1) value, 2≤i ≤64;A in each roundiFor last round of Fun (Ai-1, f (Bi-1, Ci-1), Mi, Ki) value, wherein MiFor changing for every wheel Plaintext block In generation, is as a result, KiFor pre- offset vector.
Fig. 2 is data transmission security specific implementation flow chart of the invention, and concrete operations are as follows:
Step 1: the message D of signature to be encrypted is generated digital signature block MAC with MD5 algorithm by distribution terminal layer TLD; Detailed process is as follows for the MD5 algorithm: being segmented first to distribution terminal layer data by 512bit, finally the portion less than 512bit Point, addition one 1 and d 0 is deducted after the 64bit of end, 448bit is gathered into, then this 64bit is added in end, is allowed to also become One section of 512bit shares N sections, a paragraph of 512bit is grouped as every time 16 segments of 32bit, is packed into array: M=M [0], [1] M ..., M [15] carry out four-wheel encryption, and every wheel recycles 16 times, every time respectively to an array location progress, totally 64 It is secondary.
Step 2: TLD uses AES encryption algorithm for encryption message D;The aes algorithm, if AES encryption function is E, then C =E (K, D), wherein D is in plain text that K is key, and C is ciphertext, and AES is symmetric encipherment algorithm, and encrypting with the key of decryption is phase With, key is that TLD and CCIL negotiates to generate.
Step 3: digital signature block and ciphertext (MAC | | C) are sent to cloud computing infrastructure layer by public network by TLD CCIL, public network communication mode can be GPRS, CDMA etc..
Step 4: CCIL is decrypted the ciphertext blocks received with AES decipherment algorithm, obtains plaintext D1, described AES decipherment algorithm is the inverse operation of AES encryption algorithm, if AES decryption function is D, then D1=D (K, C), wherein C is ciphertext, K For key, D1For in plain text, that is to say, that inputted using ciphertext C and key K as the parameter of decryption function, then decryption function can be defeated Plaintext D out1
Step 5: CCIL uses MD5 algorithm by D1Generate eap-message digest MAC1;One in the MD5 algorithm and step 1 It causes.
Step 6: the eap-message digest MAC that will be generated in step 51It is compared with the digital signature MAC received, school It tests, if eap-message digest is identical with digital signaling block, data transmission success;If not identical, data are attacked.It should abandon The data attacked retransmit former data.
The invention is simple and feasible, has not only been able to satisfy the processing of magnanimity electric power data, but also can ensure the complete of power distribution network electric power data Whole property and confidentiality are beneficial to the development and construction of smart grid.

Claims (2)

1. a kind of intelligent distribution network data safe transmission method based on cloud computing, which is characterized in that mainly include intelligent power distribution Net cloud platform and intelligent distribution network data transmission security module;
The intelligent distribution network cloud platform, including 4 levels: distribution terminal layer, cloud computing infrastructure layer, cloud computing platform Layer and electric power enterprise application layer;The distribution terminal layer is mainly made of FTU, DTU, TTU and intelligent electric meter, is the master of data Want source;The cloud computing infrastructure layer, is made of cluster type server, to cluster virtualization processing;The cloud meter Podium level is calculated mainly by distributed memory system HDFS, distributed computing framework MapReduce and data management system Hbase group At;Data needed for managing cloud computing platform with column storage management mode;Redundant storage system saves cloud computing in a distributed manner Data needed for platform;Data are calculated using distributed computing framework;The electric power enterprise application layer, by application software group on cloud At to realize the electric power data application of forecast assessment, power scheduling and the network optimization and state-detection;
The intelligent distribution network data transmission security module includes encrypting module and authentication module, is led to MD5_WITH_AES Believe safe practice, between distribution terminal layer and cloud computing infrastructure layer, AES encryption module is added and ensures electric network data transmission Confidentiality, be added md5 authentication module ensure electric network data transmission integrality.
2. a kind of intelligent distribution network data safe transmission method based on cloud computing according to claim 1, feature exist In the encrypting module and authentication module realize that specific step is as follows:
Step 1: distribution terminal layer TLD generates eap-message digest MAC: the message D of signature to be encrypted being generated number with MD5 algorithm Word signaling block MAC;
Step 2: TLD encrypted transmission message D: using AES encryption algorithm for encryption message D, generates ciphertext C;
Step 3: digital signature block MAC and ciphertext C is sent to cloud computing infrastructure layer CCIL by public network by TLD;
Step 4: CCIL is decrypted the ciphertext C received with AES decipherment algorithm, obtains plaintext D1
Step 5: CCIL is with MD5 algorithm according to plaintext D1Generate eap-message digest MAC1
Step 6: the eap-message digest MAC that will be generated in step 51The digital signature MAC received with CCIL in step 3 is carried out pair Than, verification, if eap-message digest MAC1It is identical with digital signaling block MAC, then data transmission success;If not identical, data quilt Attack abandons the data attacked, and retransmits former data.
CN201910000650.9A 2019-01-02 2019-01-02 A kind of intelligent distribution network data safe transmission method based on cloud computing Withdrawn CN109586924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910000650.9A CN109586924A (en) 2019-01-02 2019-01-02 A kind of intelligent distribution network data safe transmission method based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910000650.9A CN109586924A (en) 2019-01-02 2019-01-02 A kind of intelligent distribution network data safe transmission method based on cloud computing

Publications (1)

Publication Number Publication Date
CN109586924A true CN109586924A (en) 2019-04-05

Family

ID=65915364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910000650.9A Withdrawn CN109586924A (en) 2019-01-02 2019-01-02 A kind of intelligent distribution network data safe transmission method based on cloud computing

Country Status (1)

Country Link
CN (1) CN109586924A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365804A (en) * 2019-08-29 2019-10-22 国网重庆市电力公司电力科学研究院 A kind of distribution terminal cloud detection system
CN111245958A (en) * 2020-03-09 2020-06-05 中国能源建设集团陕西省电力设计院有限公司 Unified cloud computing system for ubiquitous power Internet of things
CN112636933A (en) * 2020-11-30 2021-04-09 国网山东省电力公司惠民县供电公司 Electric power direct current power supply control system
CN112995130A (en) * 2021-02-01 2021-06-18 胡文旭 Electric power thing networking data transmission system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516117A (en) * 2015-12-02 2016-04-20 南方电网科学研究院有限责任公司 Cloud computing based power data security storage method
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application
CN106056322A (en) * 2016-07-30 2016-10-26 国网河北省电力公司衡水供电分公司 Smart grid scheduling system based on cloud computing
CN106557820A (en) * 2016-11-24 2017-04-05 天津市普迅电力信息技术有限公司 A kind of power transformation O&M standard operation mobile terminal platform
CN107025409A (en) * 2017-06-27 2017-08-08 中经汇通电子商务有限公司 A kind of data safety storaging platform
CN107945052A (en) * 2017-11-30 2018-04-20 国网江苏省电力公司扬州供电公司 A kind of distribution power automation terminal information overall process automatically accesses method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516117A (en) * 2015-12-02 2016-04-20 南方电网科学研究院有限责任公司 Cloud computing based power data security storage method
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application
CN106056322A (en) * 2016-07-30 2016-10-26 国网河北省电力公司衡水供电分公司 Smart grid scheduling system based on cloud computing
CN106557820A (en) * 2016-11-24 2017-04-05 天津市普迅电力信息技术有限公司 A kind of power transformation O&M standard operation mobile terminal platform
CN107025409A (en) * 2017-06-27 2017-08-08 中经汇通电子商务有限公司 A kind of data safety storaging platform
CN107945052A (en) * 2017-11-30 2018-04-20 国网江苏省电力公司扬州供电公司 A kind of distribution power automation terminal information overall process automatically accesses method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
叶新: "智能变电站通信网络传输系统的安全性研究", 《中国硕士学位论文全文数据库信息科技辑》 *
宋亚奇: "云平台下电力设备监测大数据存储优化与并行处理技术研究", 《中国博士学位论文全文数据库信息科技辑》 *
赵腾等: "智能配电网大数据应用技术与前景分析", 《电网技术》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365804A (en) * 2019-08-29 2019-10-22 国网重庆市电力公司电力科学研究院 A kind of distribution terminal cloud detection system
CN111245958A (en) * 2020-03-09 2020-06-05 中国能源建设集团陕西省电力设计院有限公司 Unified cloud computing system for ubiquitous power Internet of things
CN112636933A (en) * 2020-11-30 2021-04-09 国网山东省电力公司惠民县供电公司 Electric power direct current power supply control system
CN112636933B (en) * 2020-11-30 2023-07-25 国网山东省电力公司惠民县供电公司 Electric power direct current power supply control system
CN112995130A (en) * 2021-02-01 2021-06-18 胡文旭 Electric power thing networking data transmission system
CN112995130B (en) * 2021-02-01 2022-04-22 山西风行测控股份有限公司 Electric power thing networking data transmission system

Similar Documents

Publication Publication Date Title
CN102983965B (en) Transformer station's quantum communications model, quantum key distribution center and model implementation method
He et al. An enhanced public key infrastructure to secure smart grid wireless communication networks
CN109586924A (en) A kind of intelligent distribution network data safe transmission method based on cloud computing
CN110336774A (en) Hybrid Encryption decryption method, equipment and system
CN110267270A (en) A kind of substation's inner sensor terminal access Border Gateway authentication intelligence contract
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN111988328A (en) Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station
Jain et al. SCADA security: a review and enhancement for DNP3 based systems
CN111770060A (en) Data transmission method for power internet of things and power internet of things
Sani et al. A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet
CN109194701A (en) A kind of data processing method and device
Hussain et al. A security mechanism for IEEE C37. 118.2 PMU communication
CN109040120A (en) A kind of SV message encryption and decryption method based on IEC61850 standard
CN106341256B (en) V2G system based on software defined network and safety communication method thereof
CN112039654A (en) Electric meter data security acquisition method for resisting man-in-the-middle attack
Li et al. Enterprise private cloud file encryption system based on tripartite secret key protocol
Chen et al. Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments
Patil et al. A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network.
Lv et al. A highly reliable lightweight distribution network communication encryption scheme
Wang et al. PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments
Yang et al. Authentication technology in industrial control system based on identity password
Piao et al. Power data collection terminal protection based on sm9
You et al. A Lightweight Authentication Scheme in Electric Internet of Things
Li et al. Research on the fusion architecture and application mode of quantum cryptography and classic cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190405