CN110012447A - The system and method for network security control function is realized in substation based on wireless sensor - Google Patents

The system and method for network security control function is realized in substation based on wireless sensor Download PDF

Info

Publication number
CN110012447A
CN110012447A CN201910348217.4A CN201910348217A CN110012447A CN 110012447 A CN110012447 A CN 110012447A CN 201910348217 A CN201910348217 A CN 201910348217A CN 110012447 A CN110012447 A CN 110012447A
Authority
CN
China
Prior art keywords
wireless
data
network security
wireless sensor
security control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910348217.4A
Other languages
Chinese (zh)
Inventor
崔大林
庄红山
王晓飞
于冰
张丽
倪宏坤
杨斌
尹浙洪
沈秀兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI ZEXIN ELECTRIC POWER TECHNOLOGY Co Ltd
National Network Xinjiang Electric Power Co Ltd
Original Assignee
SHANGHAI ZEXIN ELECTRIC POWER TECHNOLOGY Co Ltd
National Network Xinjiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZEXIN ELECTRIC POWER TECHNOLOGY Co Ltd, National Network Xinjiang Electric Power Co Ltd filed Critical SHANGHAI ZEXIN ELECTRIC POWER TECHNOLOGY Co Ltd
Priority to CN201910348217.4A priority Critical patent/CN110012447A/en
Publication of CN110012447A publication Critical patent/CN110012447A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The present invention relates to the system for realizing network security control function based on wireless sensor in a kind of substation, including wireless sensor and wireless data acquisition terminal, the wireless sensor and wireless data acquisition terminal are the Star Network structure of non-relay node.The invention further relates to a kind of methods for realizing network security control function based on wireless sensor in substation.Using the system and method for realizing network security control function in substation of the invention based on wireless sensor, the characteristics of wireless sensor micropower is run is fully considered, has systematically devised the control management of network security.The management for being key is that the unique encodings based on MCU are automatically generated by software, and can only be read by flashburn tools, each sensor has independent key, is not necessarily to key generator, and efficient and convenient, safety is low in cost, without additional power consumption.

Description

变电站内基于无线传感器实现网络安全控制功能的系统及 方法A system for realizing network security control function based on wireless sensor in substation and method

技术领域technical field

本发明涉及物联领域,尤其涉及变电站无线传输领域,具体是指一种变电站内基于无线传感器实现网络安全控制功能的系统及方法。The invention relates to the field of Internet of Things, in particular to the field of wireless transmission in substations, and in particular to a system and method for realizing network security control functions based on wireless sensors in substations.

背景技术Background technique

随着物联网技术的发展与广泛应用,当前变电站内基于无线微功率无线传感器网络逐渐得到应用。以压板状态监测系统为例,包含压板状态传感器、数据采集终端两部分。压板状态传感器以非电原理实时感知压板状态,数据采集终端实现压板位置传感器发送的小无线信号汇聚接收与处理,并与外部应用系统进行通信。无线传感器网络通常基于ISM频段,如433MHz,2.4GHz,这些频段无需许可证或费用,只需要遵守一定的发射功率(一般低于1W),并且不要对其它频段造成干扰即可,受到其无线通信及自身节点特征的因素影响,变电站无线传感器网络在实际的运行中面临如下三个网络安全的风险:With the development and wide application of Internet of Things technology, wireless sensor networks based on wireless micropower are gradually applied in the current substations. Taking the platen state monitoring system as an example, it includes two parts: platen state sensor and data acquisition terminal. The platen state sensor senses the platen state in real time based on the non-electrical principle, and the data acquisition terminal realizes the aggregation, reception and processing of the small wireless signals sent by the platen position sensor, and communicates with the external application system. Wireless sensor networks are usually based on ISM frequency bands, such as 433MHz, 2.4GHz. These frequency bands do not require licenses or fees, and only need to comply with a certain transmission power (generally lower than 1W), and do not cause interference to other frequency bands. Influenced by the factors of its own node characteristics and its own node characteristics, the wireless sensor network of substations faces the following three network security risks in actual operation:

1)数据传输的私密性低,容易被外部系统监听并解析,造成信息外泄。1) The privacy of data transmission is low, and it is easy to be monitored and parsed by external systems, resulting in information leakage.

2)来自于无线通信过程中的信号干扰,攻击者采用频率干扰的方法来破坏传感器节点接收信号,破坏传感器节点和采集终端之间的联系。2) From the signal interference in the process of wireless communication, the attacker uses the method of frequency interference to destroy the signal received by the sensor node and destroy the connection between the sensor node and the acquisition terminal.

3)攻击者伪造传感器节点,达到侵入采集终端的目的,并通过采集终端为中继进一步侵入变电站内部通信网络,造成严重的网络安全事故。3) The attacker forges sensor nodes to achieve the purpose of invading the acquisition terminal, and further intrudes into the internal communication network of the substation through the acquisition terminal as a relay, causing serious network security incidents.

发明内容SUMMARY OF THE INVENTION

本发明的目的是克服了上述现有技术的缺点,提供了一种满足加密性好、通信能力强、适用范围较为广泛的变电站内基于无线传感器实现网络安全控制功能的系统及方法。The purpose of the present invention is to overcome the shortcomings of the above-mentioned prior art, and to provide a system and method for realizing network security control function based on wireless sensors in substations with good encryption, strong communication capability and wide application range.

为了实现上述目的,本发明的变电站内基于无线传感器实现网络安全控制功能的系统及方法如下:In order to achieve the above purpose, the system and method for realizing the network security control function based on the wireless sensor in the substation of the present invention are as follows:

该变电站内基于无线传感器实现网络安全控制功能的系统,其主要特点是,所述的系统包括无线传感器和无线数据采集终端,所述的无线传感器和无线数据采集终端均为无中继节点的星型网络结构,所述的无线传感器用于传输无线信号,所述的无线数据采集终端用于接收和处理无线传感器发送的信号。The system for realizing network security control function based on wireless sensors in the substation is mainly characterized in that the system includes wireless sensors and wireless data acquisition terminals, and the wireless sensors and wireless data acquisition terminals are satellites without relay nodes. The wireless sensor is used for transmitting wireless signals, and the wireless data acquisition terminal is used for receiving and processing the signals sent by the wireless sensor.

较佳地,所述的无线传感器包括:Preferably, the wireless sensor includes:

第一微控制单元,用于对通信资源进行管理和控制;a first micro-control unit for managing and controlling communication resources;

第一无线收发模块,与所述的第一微控制单元通过串行外设接口相连接,用于对无线信号进行收发。The first wireless transceiver module is connected with the first micro-control unit through a serial peripheral interface, and is used for transmitting and receiving wireless signals.

较佳地,所述的无线数据采集终端包括:Preferably, the wireless data collection terminal includes:

第二微控制单元,用于对通信资源进行管理和控制;The second micro-control unit is used to manage and control the communication resources;

第二无线收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于对无线信号进行收发;The second wireless transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for transmitting and receiving wireless signals;

第二串口收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于通过串口收发信号。The second serial port transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for sending and receiving signals through the serial port.

较佳地,所述的第一无线收发模块包括第一无线收发发送缓冲区和第一无线收发接收缓冲区,均与所述的第一微控制单元相连接。Preferably, the first wireless transceiver module includes a first wireless transceiver sending buffer and a first wireless transceiver receiving buffer, both of which are connected to the first micro-control unit.

较佳地,所述的第二无线收发模块包括第二无线收发发送缓冲区和第二无线收发接收缓冲区,均与所述的第二微控制单元相连接。Preferably, the second wireless transceiver module includes a second wireless transceiver sending buffer and a second wireless transceiver receiving buffer, both of which are connected to the second micro-control unit.

较佳地,所述的第二串口收发模块包括第二串口收发发送缓冲区和第二串口收发接收缓冲区,均与所述的第二微控制单元相连接。Preferably, the second serial port transceiver module includes a second serial port transceiver sending buffer and a second serial port transceiver receiving buffer, both of which are connected to the second micro-control unit.

较佳地,所述的第一无线收发发送缓冲区和第一无线收发接收缓冲区最大为64字节。Preferably, the first wireless transceiver sending buffer and the first wireless transceiver receiving buffer have a maximum size of 64 bytes.

较佳地,所述的第二无线收发发送缓冲区和第二无线收发接收缓冲区最大为64字节。Preferably, the second wireless transceiver sending buffer and the second wireless transceiver receiving buffer have a maximum size of 64 bytes.

较佳地,所述的第二串口收发发送缓冲区和第二串口收发接收缓冲区最大为255字节。Preferably, the second serial port sending and receiving buffer and the second serial port sending and receiving buffer have a maximum size of 255 bytes.

该基于上述系统变电站内实现基于无线传感器的网络安全控制方法,其主要特点是,所述的方法包括以下步骤:The main feature of the wireless sensor-based network security control method in a substation based on the above-mentioned system is that the method includes the following steps:

(1)所述的无线传感器和无线数据采集终端下装编号密钥和对应的密钥清单;(1) The described wireless sensor and wireless data acquisition terminal download the serial number key and the corresponding key list;

(2)所述的无线传感器通过自动生成的密钥对收发报文中的应用数据进行加密处理;(2) The wireless sensor encrypts the application data in the sending and receiving messages through an automatically generated key;

(3)所述的无线数据采集终端根据无线传感器的节点编号得到对应的密钥,还原成实际的应用数据;(3) The wireless data acquisition terminal obtains the corresponding key according to the node number of the wireless sensor, and restores it to actual application data;

(4)所述的无线数据采集终端通过其密钥进行加密处理,所述的无线传感器进行数据解密。(4) The wireless data acquisition terminal performs encryption processing through its key, and the wireless sensor performs data decryption.

较佳地,所述的步骤(2)和步骤(4)中进行数据加密,具体为:Preferably, data encryption is performed in the described step (2) and step (4), specifically:

根据以下公式数据加密:Data is encrypted according to the following formula:

TDATA[n]=DATA[n]+PKey[k]+CRC[r];TDATA[n]=DATA[n]+PKey[k]+CRC[r];

其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, where k is the remainder of N divided by 4, and r is the remainder of N divided by 2.

较佳地,所述的步骤(3)和步骤(4)中进行数据解密,具体为:Preferably, in the described step (3) and step (4), data decryption is performed, specifically:

根据以下公式数据解密:The data is decrypted according to the following formula:

DATA[n]=TDATA[n]-PKey[k]-CRC[r];DATA[n]=TDATA[n]-PKey[k]-CRC[r];

其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, where k is the remainder of N divided by 4, and r is the remainder of N divided by 2.

采用了本发明的变电站内基于无线传感器实现网络安全控制功能的系统及方法,充分考虑了无线传感器微功率运行的特点,系统地设计了网络安全的控制管理。在于密钥的管理是基于MCU的唯一编码由软件自动生成,并且只能由烧写工具读取,每一个传感器有独立的密钥,无需密钥生成器,快捷方便,安全,成本低廉,无额外的功耗。将对外通信的模块独立,缓存置于通信模块中,实现了数据的主动处理,有效避免内存溢出攻击。与外部通信用串口通信方案,有效杜绝以太网方式的网络通信接口安全。The system and method for realizing the network security control function based on the wireless sensor in the substation of the present invention are adopted, and the characteristics of the micro-power operation of the wireless sensor are fully considered, and the network security control management is systematically designed. The key management is based on the unique code of the MCU, which is automatically generated by the software, and can only be read by the programming tool. additional power consumption. The external communication module is independent, and the cache is placed in the communication module, which realizes the active processing of data and effectively avoids memory overflow attacks. The serial communication scheme is used for external communication, which effectively eliminates the security of the network communication interface in the Ethernet mode.

附图说明Description of drawings

图1为本发明的变电站内基于无线传感器实现网络安全控制功能的系统的无线传感器对外通信硬件结构。FIG. 1 is the external communication hardware structure of the wireless sensor of the system for realizing the network security control function based on the wireless sensor in the substation of the present invention.

图2为本发明的变电站内基于无线传感器实现网络安全控制功能的系统的无线数据采集终端对外通信硬件结构。FIG. 2 is the external communication hardware structure of the wireless data acquisition terminal of the system for realizing the network security control function based on the wireless sensor in the substation of the present invention.

具体实施方式Detailed ways

为了能够更清楚地描述本发明的技术内容,下面结合具体实施例来进行进一步的描述。In order to describe the technical content of the present invention more clearly, further description will be given below with reference to specific embodiments.

本发明的该变电站内基于无线传感器实现网络安全控制功能的系统,其中包括:The system for realizing network security control function based on wireless sensors in the substation of the present invention includes:

无线传感器和无线数据采集终端,所述的无线传感器和无线数据采集终端均为无中继节点的星型网络结构,所述的无线传感器用于传输无线信号,所述的无线数据采集终端用于接收和处理无线传感器发送的信号。A wireless sensor and a wireless data collection terminal, the wireless sensor and the wireless data collection terminal are both star network structures without relay nodes, the wireless sensor is used for transmitting wireless signals, and the wireless data collection terminal is used for Receive and process signals sent by wireless sensors.

作为本发明的优选实施方式,所述的无线传感器包括:As a preferred embodiment of the present invention, the wireless sensor includes:

第一微控制单元,用于对通信资源进行管理和控制;a first micro-control unit for managing and controlling communication resources;

第一无线收发模块,与所述的第一微控制单元通过串行外设接口相连接,用于对无线信号进行收发。The first wireless transceiver module is connected with the first micro-control unit through a serial peripheral interface, and is used for transmitting and receiving wireless signals.

作为本发明的优选实施方式,所述的无线数据采集终端包括:As a preferred embodiment of the present invention, the wireless data collection terminal includes:

第二微控制单元,用于对通信资源进行管理和控制;The second micro-control unit is used to manage and control the communication resources;

第二无线收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于对无线信号进行收发;The second wireless transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for transmitting and receiving wireless signals;

第二串口收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于通过串口收发信号。The second serial port transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for sending and receiving signals through the serial port.

作为本发明的优选实施方式,所述的第一无线收发模块包括第一无线收发发送缓冲区和第一无线收发接收缓冲区,均与所述的第一微控制单元相连接。As a preferred embodiment of the present invention, the first wireless transceiver module includes a first wireless transceiver sending buffer and a first wireless transceiver receiving buffer, both of which are connected to the first micro-control unit.

作为本发明的优选实施方式,所述的第二无线收发模块包括第二无线收发发送缓冲区和第二无线收发接收缓冲区,均与所述的第二微控制单元相连接。As a preferred embodiment of the present invention, the second wireless transceiver module includes a second wireless transceiver sending buffer and a second wireless transceiver receiving buffer, both of which are connected to the second micro-control unit.

作为本发明的优选实施方式,所述的第二串口收发模块包括第二串口收发发送缓冲区和第二串口收发接收缓冲区,均与所述的第二微控制单元相连接。As a preferred embodiment of the present invention, the second serial port transceiver module includes a second serial port transceiver sending buffer and a second serial port transceiver receiving buffer, both of which are connected to the second micro-control unit.

作为本发明的优选实施方式,所述的第一无线收发发送缓冲区和第一无线收发接收缓冲区最大为64字节。As a preferred embodiment of the present invention, the first wireless transceiver sending buffer and the first wireless transceiver receiving buffer have a maximum size of 64 bytes.

作为本发明的优选实施方式,所述的第二无线收发发送缓冲区和第二无线收发接收缓冲区最大为64字节。As a preferred embodiment of the present invention, the second wireless transceiver sending buffer and the second wireless transceiver receiving buffer have a maximum size of 64 bytes.

作为本发明的优选实施方式,所述的第二串口收发发送缓冲区和第二串口收发接收缓冲区最大为255字节。As a preferred embodiment of the present invention, the second serial port sending and receiving buffer and the second serial port sending and receiving buffer have a maximum size of 255 bytes.

本发明的该基于上述系统实现变电站内基于无线传感器的网络安全控制方法,其中包括以下步骤:The wireless sensor-based network security control method in the substation based on the above-mentioned system of the present invention includes the following steps:

(1)所述的无线传感器和无线数据采集终端下装编号密钥和对应的密钥清单;(1) The described wireless sensor and wireless data acquisition terminal download the serial number key and the corresponding key list;

(2)所述的无线传感器通过自动生成的密钥对收发报文中的应用数据进行加密处理;(2) The wireless sensor encrypts the application data in the sending and receiving messages through an automatically generated key;

(3)所述的无线数据采集终端根据无线传感器的节点编号得到对应的密钥,还原成实际的应用数据;(3) The wireless data acquisition terminal obtains the corresponding key according to the node number of the wireless sensor, and restores it to actual application data;

(4)所述的无线数据采集终端通过其密钥进行加密处理,所述的无线传感器进行数据解密。(4) The wireless data acquisition terminal performs encryption processing through its key, and the wireless sensor performs data decryption.

作为本发明的优选实施方式,所述的步骤(2)和步骤(4)中进行数据加密,具体为:As a preferred embodiment of the present invention, data encryption is performed in the steps (2) and (4), specifically:

根据以下公式数据加密:Data is encrypted according to the following formula:

TDATA[n]=DATA[n]+PKey[k]+CRC[r];TDATA[n]=DATA[n]+PKey[k]+CRC[r];

其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, where k is the remainder of N divided by 4, and r is the remainder of N divided by 2.

作为本发明的优选实施方式,所述的步骤(3)和步骤(4)中进行数据解密,具体为:As a preferred embodiment of the present invention, data decryption is performed in the steps (3) and (4), specifically:

根据以下公式数据解密:The data is decrypted according to the following formula:

DATA[n]=TDATA[n]-PKey[k]-CRC[r];DATA[n]=TDATA[n]-PKey[k]-CRC[r];

其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, where k is the remainder of N divided by 4, and r is the remainder of N divided by 2.

本发明的具体实施方式中,充分考虑了变电站无线传感器节点能量受限,通信能力较弱,存储空间较小等特点,并结合实际的工程部署条件、网络安全管理要求,在硬件结构设计、数据传输机制、数据传输加密、对外传输接口及协议限定等多个方面进行了网络安全设计,设计了一套从硬件架构、数据传输机制、数据传输加密、对外传输接口及协议限定开始的一整套较为完备的网络安全解决方法,实现变电站内无线传感器网络安全控制。In the specific implementation of the present invention, the characteristics of wireless sensor nodes in substations, such as limited energy, weak communication capability, and small storage space, are fully considered, and combined with actual engineering deployment conditions and network security management requirements, the hardware structure design, data The network security design has been carried out in many aspects such as transmission mechanism, data transmission encryption, external transmission interface and protocol limitation, and a set of comparative Complete network security solutions to realize wireless sensor network security control in substations.

1、对外通信模块化分离式硬件架构:1. External communication modularized separate hardware architecture:

选用MCU与通信资源各自独立的模块化分离式硬件架构,MCU独立运行,由其对通信资源进行管理和控制,通信资源缓冲区与MCU隔离,避免了溢出性攻击对MCU的渗透,与各通讯模块采用中断通知+缓存读写方式进行数据交换。The MCU and communication resources are independently modularized and separated hardware architecture. The MCU runs independently, and it manages and controls the communication resources. The communication resource buffer is isolated from the MCU, which avoids the penetration of the MCU by overflow attacks, and communicates with each other. The module adopts interrupt notification + cache read and write mode for data exchange.

无线收发数据接收和发送缓冲区位于无线收发模块中,缓冲区最大64字节。通信资源缓冲区与MCU隔离。The wireless transceiver data receiving and sending buffers are located in the wireless transceiver module, and the maximum buffer is 64 bytes. Communication resource buffers are isolated from the MCU.

串口收发数据接收和发送缓冲区位于串口收发模块中,缓冲区最大255字节,通信资源缓冲区与MCU隔离。The serial port transceiver data receiving and sending buffers are located in the serial port transceiver module, the maximum buffer is 255 bytes, and the communication resource buffer is isolated from the MCU.

无线网络覆盖范围控制:选用微功耗无线收发模块,传感器无线传输距离不超过50米,压板状态传感器与数据采集终端采用无中继节点的星型网络结构,传感器就地采集数据采集终端就地接收,有效控制无线传输的范围。Wireless network coverage control: Micro-power wireless transceiver module is selected, the wireless transmission distance of the sensor does not exceed 50 meters, the platen state sensor and the data acquisition terminal adopt a star network structure without relay nodes, and the sensor collects the data collection terminal locally. Receive, effectively control the range of wireless transmission.

2、数据传输加密解密处理:2. Data transmission encryption and decryption processing:

每一个无线传感器、无线数据采集终端在生产时根据mcu内置的生产序列号生成一个四字节的唯一性密钥,该密钥由软件模块上电运行时生成,并由软件烧录工具读取。Each wireless sensor and wireless data acquisition terminal generates a four-byte unique key according to the built-in production serial number of the MCU during production. The key is generated when the software module is powered on and is read by the software burning tool. .

先对无线收发的数据定义一种统一的收发数据格式:First, define a unified sending and receiving data format for wireless sending and receiving data:

3、数据加解密的流程如下:3. The process of data encryption and decryption is as follows:

1)在工程配置时,对无线传感器节点编号,无线数据采集终端下装其采集的无线传感器编号及对应的密钥清单,对传感器下装其归属的无线数据采集终端的密钥。1) During engineering configuration, download the wireless sensor number and the corresponding key list to the wireless sensor node number, the wireless data acquisition terminal, and download the key of the wireless data acquisition terminal to which the sensor belongs.

2)无线传感器收发报文时用自动生成的密钥对收发报文中的应用数据的进行加密处理。2) When the wireless sensor sends and receives a message, the automatically generated key is used to encrypt the application data in the sent and received message.

数据加密的算法如下:The data encryption algorithm is as follows:

TDATA[n]=DATA[n]+PKey[k]+CRC[r];TDATA[n]=DATA[n]+PKey[k]+CRC[r];

TDATA[n]为应用数据加密后的第n个字节位置上的值;TDATA[n] is the value at the nth byte position after applying data encryption;

DATA[n]为应用数据第n个字节位置上的值;DATA[n] is the value at the nth byte position of the application data;

PKey[k]为密钥的第k个字节位置上的值;PKey[k] is the value at the kth byte position of the key;

k=N除以4的余数;k = remainder of N divided by 4;

r=N除以2的余数;r=N is divided by the remainder of 2;

CRC[r]为2字节的校验码。CRC[r] is a 2-byte check code.

3)无线数据采集终端收到无线传感器发送的报文后,根据传感器的节点编号找到对应的密钥,然后进行还原成实际的应用数据,数据的解密算法如下:3) After the wireless data acquisition terminal receives the message sent by the wireless sensor, it finds the corresponding key according to the node number of the sensor, and then restores it to the actual application data. The decryption algorithm of the data is as follows:

DATA[n]=TDATA[n]-PKey[k]-CRC[r]DATA[n]=TDATA[n]-PKey[k]-CRC[r]

4)无线数据采集终端在发送数据时用自己的密钥进行加密处理,无线传感器使用无线数据采集终端的进行数据解密。加解密算法同上。4) The wireless data collection terminal uses its own key for encryption processing when sending data, and the wireless sensor uses the wireless data collection terminal to decrypt the data. The encryption and decryption algorithm is the same as above.

4、无线数据采集终端防复制性攻击控制:为防止无线传感器发送的信号被监听后以高频率复制发送对无线数据采集终端进行高频数据攻击,无线传感器发送的数据带发送计数,无线数据采集终端只处理比缓存的发送计数大的数据,否则将直接丢弃。4. Anti-replication attack control of wireless data acquisition terminal: In order to prevent the signal sent by the wireless sensor from being monitored and sent to the wireless data acquisition terminal with high frequency copying and high-frequency data attack, the data sent by the wireless sensor is sent with counts, and the wireless data collection The terminal only processes data larger than the buffered send count, otherwise it will be discarded directly.

5、无线数据采集终端有线数据输出端口的安全控制:采集终端对外传输采用RS485串口通讯,选用MODBUS通讯协议(RTU),采集终端不主动对外发送数据,采用外部系统发起读请求,采集终端回复的数据交互模式。以下是采集终端支持的功能情况清单:5. Security control of the wired data output port of the wireless data acquisition terminal: the external transmission of the acquisition terminal adopts RS485 serial communication, and the MODBUS communication protocol (RTU) is selected. The acquisition terminal does not actively send data to the outside world. Data interaction mode. The following is a list of functions supported by the collection terminal:

传感器一般安装于变电站控制室内,变电站非电力公司人员不能进入,尽量讲无线网络覆盖范围控制在变电站内,可以避免无线信号被外部人员恶意监听。The sensor is generally installed in the control room of the substation, and the personnel of the substation other than the power company cannot enter. Try to control the wireless network coverage within the substation, which can prevent the wireless signal from being maliciously monitored by outsiders.

使用串口通讯是一种较为常见的网络安全控制手段。以太网的TCP/IP通讯协议是公开标准,绝大部分的网络攻击基于以太网TCP/IP协议来实现,通过RS485串口通讯,就能有效避免以太网的网络安全威胁。MODBUS是一种通用的工业上的数据交换协议,它是一种服务端控制的协议,服务端可以很好的控制数据的读取范围和读取内容,可以有效控制对外信息输出的范围。Using serial communication is a relatively common network security control method. The TCP/IP communication protocol of Ethernet is an open standard. Most network attacks are implemented based on the Ethernet TCP/IP protocol. Through RS485 serial communication, the network security threat of Ethernet can be effectively avoided. MODBUS is a general industrial data exchange protocol. It is a server-controlled protocol. The server can control the reading range and content of data well, and can effectively control the range of external information output.

本技术方案总的工作流程如下:The overall workflow of this technical solution is as follows:

(1)各个无线传感器用烧写器写入运行软件可执行文件;(1) Each wireless sensor uses the programmer to write the executable file of the running software;

(2)各个无线传感器上电,自动运行程序,根据MCU生产序列号自动生成四字节唯一密钥(比如:00460028),该密钥为唯一编码,所有无线传感器都不相同;(2) Each wireless sensor is powered on, automatically runs the program, and automatically generates a four-byte unique key (for example: 00460028) according to the MCU production serial number. This key is a unique code, and all wireless sensors are different;

(3)程序烧写器读取各个无线传感器运行内存种4字节密钥;(3) The program writer reads the 4-byte key in the running memory of each wireless sensor;

(4)无线数据采集终端用软件写入运行软件可执行文件;(4) The wireless data acquisition terminal uses software to write and run the software executable file;

(5)数据采集终端上电,自动运行程序,根据MCU生产序列号自动生成四字节唯一密钥(如:003B0068),该密钥为唯一编码;(5) The data acquisition terminal is powered on, automatically runs the program, and automatically generates a four-byte unique key (eg: 003B0068) according to the MCU production serial number, which is a unique code;

(6)烧写器对各个无线传感器下装其归属的无线数据采集终端的密钥及其节点编号,节点编号从1开始排序,节点编号在所属无线数据采集终端范围内唯一,无线传感器在发送报文时带该编号;(6) The programmer downloads the key and node number of the wireless data acquisition terminal to which it belongs to each wireless sensor. The node number is sorted from 1, and the node number is unique within the range of the wireless data acquisition terminal to which it belongs. The wireless sensor is sending This number is included in the message;

(7)烧写器对无线数据采集终端下装其采集的所有无线传感器编号及对应的密钥清单;(7) The writer downloads all the wireless sensor numbers and the corresponding key list collected by the wireless data collection terminal;

(8)无线传感器使用自己的密钥对发送的报文进行加密;(8) The wireless sensor encrypts the sent message with its own key;

(9)无线数据采集终端的无线传输模块收到报文后向MCU发送请求处理中断;(9) After the wireless transmission module of the wireless data acquisition terminal receives the message, it sends a request to the MCU to process an interrupt;

(10)无线数据采集终端MCU读取缓冲区内报文数据,根据报文中的节点编号找到对应的密钥进行解密;(10) The wireless data acquisition terminal MCU reads the message data in the buffer, and finds the corresponding key to decrypt according to the node number in the message;

(11)无线数据采集终端解析数据中的发送计数,与缓存的该无线传感器上一次发送计数进行比较,只处理比缓存的发送计数大的报文;(11) The wireless data collection terminal parses the sending count in the data, compares it with the last sending count of the wireless sensor in the cache, and only processes packets larger than the cached sending count;

(12)无线数据采集终端发送报文前使用自己的密钥对发送的报文进行加密;(12) The wireless data acquisition terminal uses its own key to encrypt the sent message before sending the message;

(13)无线传感器的无线传输模块收到报文后向MCU发送请求处理中断;(13) After the wireless transmission module of the wireless sensor receives the message, it sends a request to the MCU to process an interrupt;

(14)无线传感器MCU读取缓冲区内报文数据,用预置的无线数据采集终端密钥解密,然后进行数据处理;(14) The wireless sensor MCU reads the message data in the buffer, decrypts it with the preset wireless data acquisition terminal key, and then performs data processing;

(15)外部系统向无线数据采集终端通过RS485串口发送数据读取请求报文(MODBUS协议03或01报文);(15) The external system sends a data read request message (MODBUS protocol 03 or 01 message) to the wireless data acquisition terminal through the RS485 serial port;

(16)数据采集终端串口模块收到报文后向MCU发送请求处理中断;(16) After receiving the message, the serial port module of the data acquisition terminal sends a request to the MCU to process an interrupt;

(17)数据采集终端MCU读取串口模块中的缓存数据进行报文过滤处理,仅处理MODBUS协议03或报文;(17) The data acquisition terminal MCU reads the buffered data in the serial port module to filter the message, and only processes the MODBUS protocol 03 or message;

(18)数据采集终端MCU根据读取内容请求,组织回复报文写入串口模块缓冲区,并调用串口模块发送接口发送数据。(18) The data acquisition terminal MCU organizes the reply message into the serial port module buffer according to the read content request, and calls the serial port module to send the interface to send data.

采用了本发明的变电站内基于无线传感器实现网络安全控制功能的系统及方法,充分考虑了无线传感器微功率运行的特点,系统地设计了网络安全的控制管理。在于密钥的管理是基于MCU的唯一编码由软件自动生成,并且只能由烧写工具读取,每一个传感器有独立的密钥,无需密钥生成器,快捷方便,安全,成本低廉,无额外的功耗。将对外通信的模块独立,缓存置于通信模块中,实现了数据的主动处理,有效避免内存溢出攻击。与外部通信用串口通信方案,有效杜绝以太网方式的网络通信接口安全。The system and method for realizing the network security control function based on the wireless sensor in the substation of the present invention are adopted, and the characteristics of the micro-power operation of the wireless sensor are fully considered, and the network security control management is systematically designed. The key management is based on the unique code of the MCU, which is automatically generated by the software, and can only be read by the programming tool. additional power consumption. The external communication module is independent, and the cache is placed in the communication module, which realizes the active processing of data and effectively avoids memory overflow attacks. The serial communication scheme is used for external communication, which effectively eliminates the security of the network communication interface in the Ethernet mode.

在此说明书中,本发明已参照其特定的实施例作了描述。但是,很显然仍可以作出各种修改和变换而不背离本发明的精神和范围。因此,说明书和附图应被认为是说明性的而非限制性的。In this specification, the invention has been described with reference to specific embodiments thereof. However, it will be evident that various modifications and changes can still be made without departing from the spirit and scope of the invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.

Claims (12)

1.一种变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的系统包括无线传感器和无线数据采集终端,所述的无线传感器和无线数据采集终端均为无中继节点的星型网络结构,所述的无线传感器用于传输无线信号,所述的无线数据采集终端用于接收和处理无线传感器发送的信号。1. a system for realizing network security control function based on wireless sensor in a substation, is characterized in that, described system comprises wireless sensor and wireless data acquisition terminal, and described wireless sensor and wireless data acquisition terminal are both no relay nodes The star network structure, the wireless sensor is used to transmit wireless signals, and the wireless data acquisition terminal is used to receive and process the signals sent by the wireless sensor. 2.根据权利要求1所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的无线传感器包括:2. The system for realizing network security control function based on wireless sensors in a substation according to claim 1, wherein the wireless sensors comprise: 第一微控制单元,用于对通信资源进行管理和控制;a first micro-control unit for managing and controlling communication resources; 第一无线收发模块,与所述的第一微控制单元通过串行外设接口相连接,用于对无线信号进行收发。The first wireless transceiver module is connected with the first micro-control unit through a serial peripheral interface, and is used for transmitting and receiving wireless signals. 3.根据权利要求1所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的无线数据采集终端包括:3. The system for realizing network security control function based on wireless sensors in a substation according to claim 1, wherein the wireless data acquisition terminal comprises: 第二微控制单元,用于对通信资源进行管理和控制;The second micro-control unit is used to manage and control the communication resources; 第二无线收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于对无线信号进行收发;The second wireless transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for transmitting and receiving wireless signals; 第二串口收发模块,与所述的第二微控制单元通过串行外设接口相连接,用于通过串口收发信号。The second serial port transceiver module is connected with the second micro-control unit through the serial peripheral interface, and is used for sending and receiving signals through the serial port. 4.根据权利要求2所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第一无线收发模块包括第一无线收发发送缓冲区和第一无线收发接收缓冲区,均与所述的第一微控制单元相连接。4 . The system for realizing network security control function based on wireless sensors in a substation according to claim 2 , wherein the first wireless transceiver module comprises a first wireless transceiver sending buffer zone and a first wireless transceiver receiving buffer zone. 5 . , which are all connected with the first micro-control unit. 5.根据权利要求3所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第二无线收发模块包括第二无线收发发送缓冲区和第二无线收发接收缓冲区,均与所述的第二微控制单元相连接。5 . The system for realizing network security control function based on wireless sensors in a substation according to claim 3 , wherein the second wireless transceiver module comprises a second wireless transceiver sending buffer and a second wireless transceiver receiving buffer. 6 . , all connected with the second micro-control unit. 6.根据权利要求3所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第二串口收发模块包括第二串口收发发送缓冲区和第二串口收发接收缓冲区,均与所述的第二微控制单元相连接。6. The system for realizing network security control function based on wireless sensors in a substation according to claim 3, wherein the second serial port transceiver module comprises a second serial port transceiver sending buffer and a second serial port transceiver receiving buffer , all connected with the second micro-control unit. 7.根据权利要求4所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第一无线收发发送缓冲区和第一无线收发接收缓冲区最大为64字节。7 . The system for realizing network security control function based on wireless sensors in a substation according to claim 4 , wherein the first wireless transceiver sending buffer and the first wireless transceiver receiving buffer have a maximum size of 64 bytes. 8 . 8.根据权利要求5所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第二无线收发发送缓冲区和第二无线收发接收缓冲区最大为64字节。8 . The system for implementing network security control functions based on wireless sensors in a substation according to claim 5 , wherein the second wireless transceiver sending buffer and the second wireless transceiver receiving buffer have a maximum size of 64 bytes. 9 . 9.根据权利要求5所述的变电站内基于无线传感器实现网络安全控制功能的系统,其特征在于,所述的第二串口收发发送缓冲区和第二串口收发接收缓冲区最大为255字节。9 . The system for realizing network security control function based on wireless sensors in a substation according to claim 5 , wherein the second serial port sending and receiving buffer and the second serial sending and receiving buffer are up to 255 bytes. 10 . 10.一种基于权利要求1所述的系统实现变电站内基于无线传感器的网络安全控制方法,其特征在于,所述的方法包括以下步骤:10. A wireless sensor-based network security control method in a substation based on the system according to claim 1, wherein the method comprises the following steps: (1)所述的无线传感器和无线数据采集终端下装编号密钥和对应的密钥清单;(1) The described wireless sensor and wireless data acquisition terminal download the serial number key and the corresponding key list; (2)所述的无线传感器通过自动生成的密钥对收发报文中的应用数据进行加密处理;(2) The wireless sensor encrypts the application data in the sending and receiving messages through an automatically generated key; (3)所述的无线数据采集终端根据无线传感器的节点编号得到对应的密钥,还原成实际的应用数据;(3) The wireless data acquisition terminal obtains the corresponding key according to the node number of the wireless sensor, and restores it to actual application data; (4)所述的无线数据采集终端通过其密钥进行加密处理,所述的无线传感器进行数据解密。(4) The wireless data acquisition terminal performs encryption processing through its key, and the wireless sensor performs data decryption. 11.根据权利要求10所述的实现变电站内基于无线传感器的网络安全控制方法,其特征在于,所述的步骤(2)和步骤(4)中进行数据加密,具体为:11. The wireless sensor-based network security control method in a substation according to claim 10, wherein data encryption is performed in the step (2) and step (4), specifically: 根据以下公式数据加密:The data is encrypted according to the following formula: TDATA[n]=DATA[n]+PKey[k]+CRC[r];TDATA[n]=DATA[n]+PKey[k]+CRC[r]; 其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数,CRC[r]为校验码。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, k is the remainder of N divided by 4, r is the remainder of N divided by 2, and CRC[r] is the check code. 12.根据权利要求10所述的实现变电站内基于无线传感器的网络安全控制方法,其特征在于,所述的步骤(3)和步骤(4)中进行数据解密,具体为:12. The method for realizing the network security control method based on wireless sensors in a substation according to claim 10, wherein the data decryption is performed in the step (3) and the step (4), specifically: 根据以下公式数据解密:The data is decrypted according to the following formula: DATA[n]=TDATA[n]-PKey[k]-CRC[r];DATA[n]=TDATA[n]-PKey[k]-CRC[r]; 其中,TDATA[n]为应用数据加密后的第n个字节位置上的值,DATA[n]为应用数据第n个字节位置上的值,PKey[k]为密钥的第k个字节位置上的值,k为N除以4的余数,r为N除以2的余数,CRC[r]为校验码。Among them, TDATA[n] is the value at the nth byte position of the application data encryption, DATA[n] is the value at the nth byte position of the application data, and PKey[k] is the kth byte of the key The value at the byte position, k is the remainder of N divided by 4, r is the remainder of N divided by 2, and CRC[r] is the check code.
CN201910348217.4A 2019-04-28 2019-04-28 The system and method for network security control function is realized in substation based on wireless sensor Pending CN110012447A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910348217.4A CN110012447A (en) 2019-04-28 2019-04-28 The system and method for network security control function is realized in substation based on wireless sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910348217.4A CN110012447A (en) 2019-04-28 2019-04-28 The system and method for network security control function is realized in substation based on wireless sensor

Publications (1)

Publication Number Publication Date
CN110012447A true CN110012447A (en) 2019-07-12

Family

ID=67174711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910348217.4A Pending CN110012447A (en) 2019-04-28 2019-04-28 The system and method for network security control function is realized in substation based on wireless sensor

Country Status (1)

Country Link
CN (1) CN110012447A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553362A (en) * 2021-09-17 2021-10-26 国网浙江省电力有限公司 Carbon energy consumption monitoring method, device and storage medium based on consensus mechanism

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595880A (en) * 2003-09-11 2005-03-16 华为技术有限公司 Method of information integrity protection in multicast/broadcast
JP2012026225A (en) * 2010-07-27 2012-02-09 Panasonic Electric Works Co Ltd Electric lock system
CN103001944A (en) * 2012-09-27 2013-03-27 深圳市友讯达科技发展有限公司 Method for protecting programs in micro-power wireless information acquisition system
CN103298157A (en) * 2013-06-19 2013-09-11 中国地质大学(武汉) A wireless Internet of things data security intelligent transmission system
US20150071139A1 (en) * 2013-09-10 2015-03-12 John A. Nix Power Management and Security for Wireless Modules in "Machine-to-Machine" Communications
CN105120452A (en) * 2015-06-30 2015-12-02 小米科技有限责任公司 Information transmission method, device and system
WO2015193968A1 (en) * 2014-06-17 2015-12-23 三菱電機株式会社 Communication apparatus, wireless multi-hop network system, and frame counter setting method
CN105915347A (en) * 2016-04-19 2016-08-31 梅照付 Control method for power electric wireless transmission device
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595880A (en) * 2003-09-11 2005-03-16 华为技术有限公司 Method of information integrity protection in multicast/broadcast
JP2012026225A (en) * 2010-07-27 2012-02-09 Panasonic Electric Works Co Ltd Electric lock system
CN103001944A (en) * 2012-09-27 2013-03-27 深圳市友讯达科技发展有限公司 Method for protecting programs in micro-power wireless information acquisition system
CN103298157A (en) * 2013-06-19 2013-09-11 中国地质大学(武汉) A wireless Internet of things data security intelligent transmission system
US20150071139A1 (en) * 2013-09-10 2015-03-12 John A. Nix Power Management and Security for Wireless Modules in "Machine-to-Machine" Communications
WO2015193968A1 (en) * 2014-06-17 2015-12-23 三菱電機株式会社 Communication apparatus, wireless multi-hop network system, and frame counter setting method
CN105120452A (en) * 2015-06-30 2015-12-02 小米科技有限责任公司 Information transmission method, device and system
CN105915347A (en) * 2016-04-19 2016-08-31 梅照付 Control method for power electric wireless transmission device
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553362A (en) * 2021-09-17 2021-10-26 国网浙江省电力有限公司 Carbon energy consumption monitoring method, device and storage medium based on consensus mechanism

Similar Documents

Publication Publication Date Title
Majdalawieh et al. DNPSec: Distributed network protocol version 3 (DNP3) security framework
CN111786956B (en) System and method for safely accessing intranet network based on message middleware communication
Wen et al. Application of dynamic variable cipher security certificate in internet of things
CN110430014B (en) Hardware encryption gateway and encryption method for field bus channel encryption
CN102761864B (en) Data transmission method, system and device
US10536848B2 (en) Anti-takeover systems and methods for network attached peripherals
CN114071698B (en) A self-organizing network data sending and receiving method and device with dynamic parameter configuration and status awareness
CN205389215U (en) PLC data acquisition and encryption and decryption system based on two net gapes
CN110557244B (en) Application data unit encryption method in water conservancy industrial control system
EP2560319B1 (en) Method, apparatus and system for data encryption transmission in m2m
CN113014599A (en) Method, equipment and system for safely keeping alive
CN104994061A (en) Intelligent transformer station process layer switch MMS safety communication device and method
Chen et al. WiFi-Based Home IoT Communication System.
Ilchev et al. Internet-of-Things communication protocol for low-cost devices in heterogeneous wireless networks
CN103139018A (en) Network card condition monitoring and transmission control protocol (TCP) communication method in dispatching and transformer substation integrated system
CN109982281A (en) A kind of communication system and method based on LoRaWAN
Franco et al. A review on current and old SCADA networks applied to water distribution systems
CN117857226B (en) Safety communication method and system based on industrial Internet multilateral platform
US20150035681A1 (en) Point-to-Multipoint Polling in a Monitoring System for an Electric Power Distribution System
CN110278184A (en) A kind of isolation of network security and data exchange oil field Network of Power application system
CN102724133A (en) Method and device for transmitting internet protocol (IP) message
CN110012447A (en) The system and method for network security control function is realized in substation based on wireless sensor
CN112737932B (en) DPDK-based high-performance IPSCE gateway
CN110278068A (en) LoRa communication encryption system and its implementation based on chaos sequence
CN209462613U (en) The system for supporting to realize the network security control in substation based on wireless sensor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190712