CN111901441A - Power distribution network link establishment and anti-intrusion system - Google Patents

Power distribution network link establishment and anti-intrusion system Download PDF

Info

Publication number
CN111901441A
CN111901441A CN202010808777.6A CN202010808777A CN111901441A CN 111901441 A CN111901441 A CN 111901441A CN 202010808777 A CN202010808777 A CN 202010808777A CN 111901441 A CN111901441 A CN 111901441A
Authority
CN
China
Prior art keywords
information
communication
station
master station
counter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010808777.6A
Other languages
Chinese (zh)
Inventor
杨银平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010808777.6A priority Critical patent/CN111901441A/en
Publication of CN111901441A publication Critical patent/CN111901441A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/10Mechanical actuation by pressure on floors, floor coverings, stair treads, counters, or tills
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/19Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a power distribution network link establishment and anti-intrusion system, which comprises: the system comprises an anti-intrusion management module, a routing inspection display module and a link establishment module. The power distribution network link establishment and anti-intrusion system enhances the convenience and stability of link establishment, is configured with anti-intrusion protection on power distribution network equipment after the link is established, and displays inspection results in an all-around manner.

Description

Power distribution network link establishment and anti-intrusion system
Technical Field
The invention relates to the field of power distribution network safety, in particular to a power grid link establishment and anti-intrusion system.
Background
In order to realize the linking and anti-theft management of main station and station equipment such as transformers, overhaul tools, linking lines and other electric facilities, prevent the damage and loss of electric assets, the stability of the links and the anti-theft of the electric equipment must be ensured.
With the continuous promotion of intelligent power grid construction, many links of intelligent main stations and transformer substations have been realized unattended, so that electric power enterprises need to strengthen the process of establishing links, strengthen intelligent monitoring and timely alarm theft.
Disclosure of Invention
In order to solve the defects and shortcomings in the prior art, the invention provides a power distribution network link establishment and intrusion prevention system, which comprises: the system comprises an anti-intrusion management module, a routing inspection display module and a link establishment module; wherein.
And the anti-intrusion management module is used for managing the intrusion of the mobile terminal.
After the link is established, a tower protection is established and consists of an anti-theft bolt and a first tension sensor node of the electronic fence. The anti-theft bolt has infrared perception and can perceive that illegal personnel enter the vicinity of the tower. When the pyroelectric infrared information is transmitted to the first tension sensor node, the warning lamp is automatically lightened to send warning information. If events such as knocking, dismounting the anti-theft bolt, touching the electronic fence, pulling the electronic fence and the like occur, the alarm loudspeaker is triggered to send out a field alarm signal, and meanwhile, the alarm signal can also be transmitted to the power distribution network control center to be further processed by an operator.
The transformer protection device comprises an anti-theft bolt sensor node, a second tension sensor node, a distribution transformer parameter acquisition node and a fault current acquisition node. The distribution transformer parameter acquisition node is used for converging the sensing information of the anti-theft bolt and the electronic fence and then transmitting the sensing information to a long distance, and the fault current acquisition node transmits the acquired fault current signal to the power distribution network control center in a long distance.
And (3) preventing invasion of the surrounding, carrying out area division on the area needing anti-theft management, and then planning the sensor network in different areas. The enclosure intrusion management comprises the following four layers of protection.
The first layer of protection is to arrange an early warning area at the periphery of the enclosure, monitor the enclosure through a vibration sensor, an infrared sensor and the like, install an audible and visual alarm and warn about the behavior of entering the enclosure by mistake.
The second layer of protection is enclosure protection, namely, alarming is carried out when personnel overtake and destroy the behavior of the alarm facility. The anti-theft alarm corresponds to the camera, the laser correlation, the video monitoring and the tension fence equipment are combined for comprehensive monitoring, the anti-theft alarm switches the image of the alarm point to the main monitor for displaying, and security personnel can give an alarm in time according to the field condition.
The third layer of protection is protection in the enclosure. Once the personnel invasion information is monitored through equipment such as a pressure sensor and an underground induction cable, the anti-theft alarm displays the alarm position in a command center. And a voice recognition system and a fingerprint recognition system are also arranged at the door of the key area, and the entering and exiting conditions of the personnel in the key area are recorded.
The fourth layer of protection is to install patrol buttons and plan and configure patrol routes of security personnel.
And the inspection display module is used for inspecting the image.
The station scene reappearance is realized through three-dimensional modeling of the station scene, information addition, data/state visualization and information linkage, online monitoring sensing is carried out, and power grid operation information superposition and alarm information quick positioning are carried out. Carrying out three-dimensional laser scanning on an external scene of the plant station to construct an external three-dimensional model of the plant station; for the internal construction of the plant, three-dimensional modeling is used. The method specifically comprises the following steps.
Displaying a three-dimensional scene, and performing panoramic holographic simulation of a station to provide a basic platform for application display; displaying data state information, namely dynamically displaying the data state information of the monitoring equipment in a three-dimensional scene in the form of data, an instrument panel and an indicator light by taking the three-dimensional scene as a carrier; fitting image information, namely fitting the video monitoring live-action image information with the three-dimensional scene to realize the unified display of the live-action image and the three-dimensional scene; cloud picture simulation, namely generating a simulated cloud picture based on a three-dimensional scene according to the acquired equipment temperature information, and integrally displaying the distribution condition of temperature/load; positioning a hot spot/alarm point and comprehensively displaying information, presetting the hot spot/hot zone in a three-dimensional scene, and dynamically loading equipment ledger information; locating a relevant hotspot in the application; three-dimensional interaction, namely realizing synchronous interaction between an operator and a three-dimensional scene and between the operator and field equipment through a three-dimensional interaction interface; intelligent patrol, namely referring to a manual patrol path to realize automatic patrol based on a three-dimensional scene; and history inversion, namely realizing the reproduction of a history process and reproducing the processes of accident occurrence, development and recovery based on the three-dimensional scene and history data.
The link establishing module is used for establishing a link between the mobile terminal and the base station.
Formulating an automatic communication scheme of the master station, wherein the scheme comprises communication starting time, interval and data items, and storing the communication starting time, the interval and the data items into a database on a server; inserting a new scheme or modifying a scheme, generating automatic communication tasks according to the scheme, merging according to the contents of the automatic communication tasks, sequencing the tasks according to the importance levels of the automatic communication tasks, and storing the tasks into a task table.
When a communication scheme is set, the communication tasks are sequenced according to the sequence of the task starting time, and when the starting time of the communication tasks is consistent, the communication tasks are sequenced according to the following principle.
When the communication task types are different, the manual communication task is prior to the automatic communication task; the manual communication task is started by a user at random and requires on-site examination data; if the users are all automatic communication tasks, sorting the users according to the importance level degree of the users, and dividing the users into a first-level user, a second-level user and a third-level user, wherein the users with high level are preferentially collected.
When the main thread detects that a manual communication task exists, the manual communication task is prior to all automatic tasks, the main thread checks whether idle serial ports exist in all serial ports or not in sequence, if not, the main thread waits until one idle serial port is allocated to the manual communication task, and then a new thread is dynamically established to monitor the serial ports and receive and process data.
Configuring a master station and a factory station to carry out encryption communication in an encryption mode through a created communication thread, wherein the factory station adds a random character string in advance for sending a data packet, the random character string is called an initialization vector, and the encryption mode of a linked block password mode or a Hash linked block password mode is used; two counters are shared between two communication parties of the master station and the station, one for each communication party.
Wherein, the counter is initially set to zero and should be at least 128 bits, the counter value can be used as a random string in information encryption, after each information encryption, if the linked block cipher mode is used, the counter is increased by 1; if the hash chaining block cipher mode is used, increasing the number of the encrypted data blocks; both parties know the value of the counter and the two counters are synchronized at a predetermined time.
When the master station receives the encrypted data packets, the master station is instructed to decrypt the data packets and check whether the counter value is correct, and once the master station receives the first block of the ciphertext, the master station checks whether the counter value is correct; if so, the master station continues to decrypt and update its counter; otherwise, the master station discards the whole ciphertext; the master station decrypts the first block of the ciphertext using the counter; if the 1 st bit of the decrypted plaintext is inconsistent with the ciphertext of the counter value, the counter is not synchronized or the ciphertext is damaged; if the ciphertext is tampered, discarding the whole data packet by means of an error correction mechanism, otherwise, continuously trying the rest counters by the master station until the counter checking process is successful; the master station then decrypts using the verified counter and the corresponding key contribution information, transmitting each block of generated information to the server once it is available; if the counter cannot be verified in a preset number of tests, the master station informs the station of transmission failure, and starts a counter synchronization protocol in the next part.
Establishing a secure channel for two communication parties, configuring key deployment and adding the key deployment into two devices; the key may be a shared master key or a shared key for one session, which can be established from a shared key using a simple key establishment protocol; the secure channel identified by the key establishes other channels including a session secure channel, a time synchronization channel, an authenticated broadcast channel, and an authenticated emergency channel.
The master station immediately transmits the decrypted byte to the server, and when the last byte is encountered; if the information authentication code is successfully verified, the master station transmits the last byte to the server; otherwise, the master discards the last byte or sends a random byte to the server, discarding the entire message by means of an error correction mechanism.
The communication processing module supports selection, combination and sequencing of tasks; the method comprises an automatic communication task and a manual communication task, wherein the automatic communication task is that a master station completes transmission of data from a factory station to the master station according to a set period and an automatic communication scheme of the master station, and a complete temporary database is backed up on a server; the manual communication task is to read data in any time period of any line list or data station according to the starting time arbitrarily specified by a user.
When a plurality of manual communication instructions are sent, if meter reading objects designated by the sent manual communication instructions are the same factory station, collected data items are consistent, and only under the condition that communication starting time at any time is different, if the starting time of a plurality of manual communication tasks is not more than 5min apart, the tasks are combined into one task; and if the sent manual communication instruction objects are the same station, the starting time of the acquisition tasks is the same, but the acquisition data items are not completely consistent, merging the tasks according to the data items.
Preferably, the link establishing module is further configured to establish a link.
Configuring the counter synchronization protocol to be started by any party, and directly adding initial counter values of two devices; both devices may also add an initial counter value using the provided counter synchronization protocol; the master station can also use an authenticated broadcast channel to set the counter values of multiple stations to the same value using one piece of information.
If the information authentication code exists, the master station is instructed to verify the correctness of the information authentication code; if the information authentication code is correct, the master station transmits the decryption information to the server; otherwise, the master chooses to notify the plant that the information is corrupted or attempt to resynchronize the counters.
Preferably, the link establishing module is further configured to establish a link.
In the non-encryption mode, only information authentication can be carried out, and the factory station sends plaintext to the main station; in addition to the encryption mode and the non-encryption mode, the data direct transmission mode is also supported; i.e. data is transmitted without encryption and authentication.
The power distribution network link establishment and anti-intrusion system enhances the convenience and stability of link establishment, is configured with anti-intrusion protection on power distribution network equipment after the link is established, and displays inspection results in an all-around manner.
Drawings
Fig. 1 is a block diagram of a power distribution network link establishment and intrusion prevention system according to the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a system for establishing a link and preventing intrusion in a power distribution network, comprising: the system comprises an anti-intrusion management module, a routing inspection display module and a link establishment module; wherein.
And the anti-intrusion management module is used for managing the intrusion of the mobile terminal.
After the link is established, a tower protection is established and consists of an anti-theft bolt and a first tension sensor node of the electronic fence. The anti-theft bolt has infrared perception and can perceive that illegal personnel enter the vicinity of the tower. When the pyroelectric infrared information is transmitted to the first tension sensor node, the warning lamp is automatically lightened to send warning information. If events such as knocking, dismounting the anti-theft bolt, touching the electronic fence, pulling the electronic fence and the like occur, the alarm loudspeaker is triggered to send out a field alarm signal, and meanwhile, the alarm signal can also be transmitted to the power distribution network control center to be further processed by an operator.
The transformer protection device comprises an anti-theft bolt sensor node, a second tension sensor node, a distribution transformer parameter acquisition node and a fault current acquisition node. The distribution transformer parameter acquisition node is used for converging the sensing information of the anti-theft bolt and the electronic fence and then transmitting the sensing information to a long distance, and the fault current acquisition node transmits the acquired fault current signal to the power distribution network control center in a long distance.
And (3) preventing invasion of the surrounding, carrying out area division on the area needing anti-theft management, and then planning the sensor network in different areas. The enclosure intrusion management comprises the following four layers of protection.
This is done because: on one hand, the communication distance of the wireless sensor network is greatly influenced by the environment, and the influence of distance factors can be reduced through regional division; another aspect is to obtain device location information more quickly to locate an abnormal device quickly.
The first layer of protection is to arrange an early warning area at the periphery of the enclosure, monitor the enclosure through a vibration sensor, an infrared sensor and the like, install an audible and visual alarm and warn about the behavior of entering the enclosure by mistake.
The second layer of protection is enclosure protection, namely, alarming is carried out when personnel overtake and destroy the behavior of the alarm facility. The anti-theft alarm corresponds to the camera, the laser correlation, the video monitoring and the tension fence equipment are combined for comprehensive monitoring, the anti-theft alarm switches the image of the alarm point to the main monitor for displaying, and security personnel can give an alarm in time according to the field condition.
The third layer of protection is protection in the enclosure. Once the personnel invasion information is monitored through equipment such as a pressure sensor and an underground induction cable, the anti-theft alarm displays the alarm position in a command center. And a voice recognition system and a fingerprint recognition system are also arranged at the door of the key area, and the entering and exiting conditions of the personnel in the key area are recorded.
The fourth layer of protection is to install patrol buttons and plan and configure patrol routes of security personnel.
And the inspection display module is used for inspecting the image.
The station scene reappearance is realized through three-dimensional modeling of the station scene, information addition, data/state visualization and information linkage, online monitoring sensing is carried out, and power grid operation information superposition and alarm information quick positioning are carried out. Carrying out three-dimensional laser scanning on an external scene of the plant station to construct an external three-dimensional model of the plant station; for the internal construction of the plant, three-dimensional modeling is used. The method specifically comprises the following steps.
Displaying a three-dimensional scene, and performing panoramic holographic simulation of a station to provide a basic platform for application display; displaying data state information, namely dynamically displaying the data state information of the monitoring equipment in a three-dimensional scene in the form of data, an instrument panel and an indicator light by taking the three-dimensional scene as a carrier; fitting image information, namely fitting the video monitoring live-action image information with the three-dimensional scene to realize the unified display of the live-action image and the three-dimensional scene; cloud picture simulation, namely generating a simulated cloud picture based on a three-dimensional scene according to the acquired equipment temperature information, and integrally displaying the distribution condition of temperature/load; positioning a hot spot/alarm point and comprehensively displaying information, presetting the hot spot/hot zone in a three-dimensional scene, and dynamically loading equipment ledger information; locating a relevant hotspot in the application; three-dimensional interaction, namely realizing synchronous interaction between an operator and a three-dimensional scene and between the operator and field equipment through a three-dimensional interaction interface; intelligent patrol, namely referring to a manual patrol path to realize automatic patrol based on a three-dimensional scene; and history inversion, namely realizing the reproduction of a history process and reproducing the processes of accident occurrence, development and recovery based on the three-dimensional scene and history data.
The link establishing module is used for establishing a link between the mobile terminal and the base station.
Formulating an automatic communication scheme of the master station, wherein the scheme comprises communication starting time, interval and data items, and storing the communication starting time, the interval and the data items into a database on a server; inserting a new scheme or modifying a scheme, generating automatic communication tasks according to the scheme, merging according to the contents of the automatic communication tasks, sequencing the tasks according to the importance levels of the automatic communication tasks, and storing the tasks into a task table.
When a communication scheme is set, the communication tasks are sequenced according to the sequence of the task starting time, and when the starting time of the communication tasks is consistent, the communication tasks are sequenced according to the following principle.
When the communication task types are different, the manual communication task is prior to the automatic communication task; the manual communication task is started by a user at random and requires on-site examination data; if the users are all automatic communication tasks, sorting the users according to the importance level degree of the users, and dividing the users into a first-level user, a second-level user and a third-level user, wherein the users with high level are preferentially collected.
When the main thread detects that a manual communication task exists, the manual communication task is prior to all automatic tasks, the main thread checks whether idle serial ports exist in all serial ports or not in sequence, if not, the main thread waits until one idle serial port is allocated to the manual communication task, and then a new thread is dynamically established to monitor the serial ports and receive and process data.
Configuring a master station and a factory station to carry out encryption communication in an encryption mode through a created communication thread, wherein the factory station adds a random character string in advance for sending a data packet, the random character string is called an initialization vector, and the encryption mode of a linked block password mode or a Hash linked block password mode is used; two counters are shared between two communication parties of the master station and the station, one for each communication party.
Wherein, the counter is initially set to zero and should be at least 128 bits, the counter value can be used as a random string in information encryption, after each information encryption, if the linked block cipher mode is used, the counter is increased by 1; if the hash chaining block cipher mode is used, increasing the number of the encrypted data blocks; both parties know the value of the counter and the two counters are synchronized at a predetermined time.
When the master station receives the encrypted data packets, the master station is instructed to decrypt the data packets and check whether the counter value is correct, and once the master station receives the first block of the ciphertext, the master station checks whether the counter value is correct; if so, the master station continues to decrypt and update its counter; otherwise, the master station discards the whole ciphertext; the master station decrypts the first block of the ciphertext using the counter; if the 1 st bit of the decrypted plaintext is inconsistent with the ciphertext of the counter value, the counter is not synchronized or the ciphertext is damaged; if the ciphertext is tampered, discarding the whole data packet by means of an error correction mechanism, otherwise, continuously trying the rest counters by the master station until the counter checking process is successful; the master station then decrypts using the verified counter and the corresponding key contribution information, transmitting each block of generated information to the server once it is available; if the counter cannot be verified in a preset number of tests, the master station informs the station of transmission failure, and starts a counter synchronization protocol in the next part.
Establishing a secure channel for two communication parties, configuring key deployment and adding the key deployment into two devices; the key may be a shared master key or a shared key for one session, which can be established from a shared key using a simple key establishment protocol; the secure channel identified by the key establishes other channels including a session secure channel, a time synchronization channel, an authenticated broadcast channel, and an authenticated emergency channel.
The master station immediately transmits the decrypted byte to the server, and when the last byte is encountered; if the information authentication code is successfully verified, the master station transmits the last byte to the server; otherwise, the master discards the last byte or sends a random byte to the server, discarding the entire message by means of an error correction mechanism.
The communication processing module supports selection, combination and sequencing of tasks; the method comprises an automatic communication task and a manual communication task, wherein the automatic communication task is that a master station completes transmission of data from a factory station to the master station according to a set period and an automatic communication scheme of the master station, and a complete temporary database is backed up on a server; the manual communication task is to read data in any time period of any line list or data station according to the starting time arbitrarily specified by a user.
When a plurality of manual communication instructions are sent, if meter reading objects designated by the sent manual communication instructions are the same factory station, collected data items are consistent, and only under the condition that communication starting time at any time is different, if the starting time of a plurality of manual communication tasks is not more than 5min apart, the tasks are combined into one task; and if the sent manual communication instruction objects are the same station, the starting time of the acquisition tasks is the same, but the acquisition data items are not completely consistent, merging the tasks according to the data items.
Preferably, the link establishing module is further configured to establish a link.
Configuring the counter synchronization protocol to be started by any party, and directly adding initial counter values of two devices; both devices may also add an initial counter value using the provided counter synchronization protocol; the master station can also use an authenticated broadcast channel to set the counter values of multiple stations to the same value using one piece of information.
If the information authentication code exists, the master station is instructed to verify the correctness of the information authentication code; if the information authentication code is correct, the master station transmits the decryption information to the server; otherwise, the master chooses to notify the plant that the information is corrupted or attempt to resynchronize the counters.
Preferably, the link establishing module is further configured to establish a link.
In the non-encryption mode, only information authentication can be carried out, and the factory station sends plaintext to the main station; in addition to the encryption mode and the non-encryption mode, the data direct transmission mode is also supported; i.e. data is transmitted without encryption and authentication.
The automatic communication of each master station is preset, the automatic communication task can automatically send a communication request to a server at intervals of a fixed time, the server receives the request and detects the resource use condition, whether an available serial port exists is checked, if yes, the serial port is distributed to the automatic communication task, a new thread is dynamically created to monitor the serial port, and data are received and processed; and if no idle serial port exists, waiting until the serial port is released and allocated to the automatic communication task.
The device connection processing module also detects a task table on the server, checks whether an executed task exists, transmits a communication task and related information to the communication service program if the executed task exists, modifies a mark of the task, detects and allocates communication resources, and allocates the resources according to the busy and idle states of the required resources.
The communication service program creates a communication thread for each received automatic communication or manual communication task, and every five threads use the distributed serial ports and corresponding resources to complete the content specified by the corresponding communication task; and transmitting the data returned by the factory station to the server and storing the data in the temporary database.
The error correction mechanism may be CRC cyclic redundancy error correction.
The anti-intrusion management module, the patrol display module and the link establishment module realize module functions through corresponding processes and threads, the modules are connected with each other through logic or electricity, and the specific functions of the modules can be realized by a physical processor executing program codes stored in a memory.
The power distribution network link establishment and anti-intrusion system enhances the convenience and stability of link establishment, is configured with anti-intrusion protection on power distribution network equipment after the link is established, and displays inspection results in an all-around manner.
The embodiments of the present invention have been described in detail with reference to the drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (3)

1. A power distribution network link establishment and intrusion prevention system is characterized by comprising: the system comprises an anti-intrusion management module, a routing inspection display module and a link establishment module; wherein the content of the first and second substances,
the anti-intrusion management module is used for:
after a link is established, establishing tower protection, wherein the tower protection consists of an anti-theft bolt and a first tension sensor node of an electronic fence; the anti-theft bolt has infrared perception and can perceive that illegal personnel enters the vicinity of the tower; when the pyroelectric infrared information is transmitted to the first tension sensor node, the warning lamp is automatically lightened to send warning information; if events such as knocking, detaching the anti-theft bolt, touching the electronic fence, pulling the electronic fence and the like occur, the alarm horn is triggered to send out a field alarm signal, and meanwhile, the alarm signal is also transmitted to the power distribution network control center to be further processed by an operator;
the transformer protection comprises an anti-theft bolt sensor node, a second tension sensor node, a distribution transformer parameter acquisition node and a fault current acquisition node; the distribution transformer parameter acquisition node is used for converging the sensing information of the anti-theft bolt and the electronic fence and then transmitting the sensing information to a long distance, and the fault current acquisition node transmits the acquired fault current signal to the power distribution network control center in a long distance;
the method comprises the following steps of (1) preventing invasion of a surrounding, carrying out region division on a region needing anti-theft management, and then planning a sensor network in different regions; the enclosure intrusion management comprises the following four layers of protection:
the first layer of protection is to arrange an early warning area at the periphery of the enclosure, monitor the enclosure through a vibration sensor, an infrared sensor and the like, install an audible and visual alarm and warn about the behavior of entering the enclosure by mistake.
The second layer of protection is enclosure protection, namely alarming when personnel overthrow and damage the behavior of the alarm facility; the anti-theft alarm corresponds to the camera, the laser correlation, the video monitoring and the tension fence equipment are combined for comprehensive monitoring, the anti-theft alarm switches the image of the alarm point to the display of the main monitor, and security personnel can give an alarm in time according to the field condition;
the third layer of protection is protection in the enclosure; once the personnel invasion information is monitored by equipment such as a pressure sensor, an underground induction cable and the like, the anti-theft alarm displays an alarm position in a command center; a voice recognition system and a fingerprint recognition system are also arranged at the door of the key area, and the entering and exiting conditions of the personnel in the key area are recorded;
the fourth layer of protection is to install patrol buttons and plan and configure patrol routes of security personnel;
the patrol inspection display module is used for:
the method comprises the steps of realizing station scene reappearance through station scene three-dimensional modeling, information addition, data/state visualization and information linkage, monitoring and sensing on line, and performing power grid operation information superposition and alarm information quick positioning; carrying out three-dimensional laser scanning on an external scene of the plant station to construct an external three-dimensional model of the plant station; for the internal construction of the plant, three-dimensional modeling is used; the method specifically comprises the following steps:
displaying a three-dimensional scene, and performing panoramic holographic simulation of a station to provide a basic platform for application display; displaying data state information, namely dynamically displaying the data state information of the monitoring equipment in a three-dimensional scene in the form of data, an instrument panel and an indicator light by taking the three-dimensional scene as a carrier; fitting image information, namely fitting the video monitoring live-action image information with the three-dimensional scene to realize the unified display of the live-action image and the three-dimensional scene; cloud picture simulation, namely generating a simulated cloud picture based on a three-dimensional scene according to the acquired equipment temperature information, and integrally displaying the distribution condition of temperature/load; positioning a hot spot/alarm point and comprehensively displaying information, presetting the hot spot/hot zone in a three-dimensional scene, and dynamically loading equipment ledger information; locating a relevant hotspot in the application; three-dimensional interaction, namely realizing synchronous interaction between an operator and a three-dimensional scene and between the operator and field equipment through a three-dimensional interaction interface; intelligent patrol, namely referring to a manual patrol path to realize automatic patrol based on a three-dimensional scene; historical inversion, namely realizing the reappearance of a historical process and reproducing the processes of accident occurrence, development and recovery based on a three-dimensional scene and historical data;
the link establishing module is configured to:
formulating an automatic communication scheme of the master station, wherein the scheme comprises communication starting time, interval and data items, and storing the communication starting time, the interval and the data items into a database on a server; inserting a new scheme or a modified scheme, generating an automatic communication task according to the scheme, merging according to the content of the automatic communication task, sequencing the tasks according to the importance level of the automatic communication task, and storing the tasks into a task table;
when a communication scheme is set, sequencing communication tasks according to the sequence of task starting time, and when the starting time of the communication tasks is consistent, sequencing according to the following principle;
when the communication task types are different, the manual communication task is prior to the automatic communication task; the manual communication task is started by a user at random and requires on-site examination data; if the users are all automatic communication tasks, sorting the users according to the importance level degree of the users, and dividing the users into a first-level user, a second-level user and a third-level user, wherein the users with high level are preferentially collected;
when the main thread detects that a manual communication task exists, the manual communication task is prior to all automatic tasks, the main thread checks whether idle serial ports exist in all serial ports or not in sequence, if not, the main thread waits until one idle serial port is allocated to the manual communication task, and then a new thread is dynamically established to monitor the serial ports and receive and process data;
configuring a master station and a factory station to carry out encryption communication in an encryption mode through a created communication thread, wherein the factory station adds a random character string in advance for sending a data packet, the random character string is called an initialization vector, and the encryption mode of a linked block password mode or a Hash linked block password mode is used; two shared counters are used between two communication parties of a master station and a plant station, and one counter is used for each communication party;
wherein, the counter is initially set to zero and should be at least 128 bits, the counter value can be used as a random string in information encryption, after each information encryption, if the linked block cipher mode is used, the counter is increased by 1; if the hash chaining block cipher mode is used, increasing the number of the encrypted data blocks; both communicating parties know the value of the counter and the two counters are synchronized at a predetermined time;
when the master station receives the encrypted data packets, the master station is instructed to decrypt the data packets and check whether the counter value is correct, and once the master station receives the first block of the ciphertext, the master station checks whether the counter value is correct; if so, the master station continues to decrypt and update its counter; otherwise, the master station discards the whole ciphertext; the master station decrypts the first block of the ciphertext using the counter; if the 1 st bit of the decrypted plaintext is inconsistent with the ciphertext of the counter value, the counter is not synchronized or the ciphertext is damaged; if the ciphertext is tampered, discarding the whole data packet by means of an error correction mechanism, otherwise, continuously trying the rest counters by the master station until the counter checking process is successful; the master station then decrypts using the verified counter and the corresponding key contribution information, transmitting each block of generated information to the server once it is available; if the counter cannot be verified in the preset number of tests, the master station informs the station of transmission failure and starts a counter synchronization protocol in the next part;
establishing a secure channel for two communication parties, configuring key deployment and adding the key deployment into two devices; the key may be a shared master key or a shared key for one session, which can be established from a shared key using a simple key establishment protocol; establishing other channels including a session security channel, a time synchronization channel, an authentication broadcast channel and an authentication emergency channel by using the security channel identified by the key;
the master station immediately transmits the decrypted byte to the server, and when the last byte is encountered; if the information authentication code is successfully verified, the master station transmits the last byte to the server; otherwise, the master station discards the last byte or sends a random byte to the server, and discards the whole information by means of an error correction mechanism;
the communication processing module supports selection, combination and sequencing of tasks; the method comprises an automatic communication task and a manual communication task, wherein the automatic communication task is that a master station completes transmission of data from a factory station to the master station according to a set period and an automatic communication scheme of the master station, and a complete temporary database is backed up on a server; the manual communication task is to read data in any time period of any line list or data station according to the starting time arbitrarily specified by a user;
when a plurality of manual communication instructions are sent, if meter reading objects designated by the sent manual communication instructions are the same factory station, collected data items are consistent, and only under the condition that communication starting time at any time is different, if the starting time of a plurality of manual communication tasks is not more than 5min apart, the tasks are combined into one task; and if the sent manual communication instruction objects are the same station, the starting time of the acquisition tasks is the same, but the acquisition data items are not completely consistent, merging the tasks according to the data items.
2. The system of claim 1, wherein the link establishment module is further configured to:
configuring the counter synchronization protocol to be started by any party, and directly adding initial counter values of two devices; both devices may also add an initial counter value using the provided counter synchronization protocol; the master station can also use an authentication broadcast channel to set the counter values of a plurality of stations to be the same value by using one piece of information;
if the information authentication code exists, the master station is instructed to verify the correctness of the information authentication code; if the information authentication code is correct, the master station transmits the decryption information to the server; otherwise, the master chooses to notify the plant that the information is corrupted or attempt to resynchronize the counters.
3. The system of claim 1, wherein the link establishment module is further configured to:
in the non-encryption mode, only information authentication can be carried out, and the factory station sends plaintext to the main station; in addition to the encryption mode and the non-encryption mode, the data direct transmission mode is also supported; i.e. data is transmitted without encryption and authentication.
CN202010808777.6A 2020-08-12 2020-08-12 Power distribution network link establishment and anti-intrusion system Withdrawn CN111901441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010808777.6A CN111901441A (en) 2020-08-12 2020-08-12 Power distribution network link establishment and anti-intrusion system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010808777.6A CN111901441A (en) 2020-08-12 2020-08-12 Power distribution network link establishment and anti-intrusion system

Publications (1)

Publication Number Publication Date
CN111901441A true CN111901441A (en) 2020-11-06

Family

ID=73229260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010808777.6A Withdrawn CN111901441A (en) 2020-08-12 2020-08-12 Power distribution network link establishment and anti-intrusion system

Country Status (1)

Country Link
CN (1) CN111901441A (en)

Similar Documents

Publication Publication Date Title
US8972730B2 (en) System and method of using a signed GUID
CN112398860A (en) Safety control method and device
EP3920503B1 (en) Resource request method, device and storage medium
CN103168458B (en) For the method and apparatus of the key management of anti-manipulation
CN108306896B (en) Substation state monitoring system and method with data protection function
CN112328271B (en) Vehicle-mounted equipment software upgrading method and system
CN110675150A (en) Federation chain-based compliance management and supervision method and device
CN110225038B (en) Method, device and system for industrial information security
CN111901442B (en) Power station communication monitoring system
CN112087301A (en) Gas meter safety certification system based on state cryptographic algorithm
CN111901441A (en) Power distribution network link establishment and anti-intrusion system
CN114827200B (en) Intelligent automobile basic map data safety protection assembly
CN113315778B (en) Double-encryption information security transmission method applied to hidden danger positioning
CN108270601B (en) Mobile terminal, alarm information acquisition method and device and alarm information sending method and device
CN107492157A (en) Base station iron tower inspection platform
CN115361273A (en) Block chain-based electric power operation and maintenance safety supervision and emergency management and control system and method
CN115600189A (en) Commercial password application security evaluation system
CN112953976B (en) Access method and device of network equipment
CN110912915B (en) Communication safety early warning system based on data acquisition
CN113794563A (en) Communication network security control method and system
CN111935287B (en) Security protection processing system is connected to electric wire netting equipment
CN111883277A (en) Nuclear power station safety credible state monitoring system based on physical disconnection
CN111490971A (en) General hospital information infrastructure safety operation and maintenance and auditing method
CN114244553B (en) Rail transit operation information safety release method and device
CN112543193B (en) Remote transmission method for synchronous acquisition of action message data of relay protection device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201106