CN113891313B - Communication access method for bulb tubular turbine and inspection monitoring equipment - Google Patents

Communication access method for bulb tubular turbine and inspection monitoring equipment Download PDF

Info

Publication number
CN113891313B
CN113891313B CN202111228956.3A CN202111228956A CN113891313B CN 113891313 B CN113891313 B CN 113891313B CN 202111228956 A CN202111228956 A CN 202111228956A CN 113891313 B CN113891313 B CN 113891313B
Authority
CN
China
Prior art keywords
inspection
puk
monitoring equipment
server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111228956.3A
Other languages
Chinese (zh)
Other versions
CN113891313A (en
Inventor
杨洋
何林松
张鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Huaneng Jialingjiang Hydropower Co Ltd
Original Assignee
Sichuan Huaneng Jialingjiang Hydropower Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Huaneng Jialingjiang Hydropower Co Ltd filed Critical Sichuan Huaneng Jialingjiang Hydropower Co Ltd
Priority to CN202111228956.3A priority Critical patent/CN113891313B/en
Publication of CN113891313A publication Critical patent/CN113891313A/en
Application granted granted Critical
Publication of CN113891313B publication Critical patent/CN113891313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a communication access method for a bulb tubular unit and inspection monitoring equipment, which relates to the field of communication, wherein S1 inspection monitoring equipment acquires an inspection area identifier; s2, the inspection monitoring equipment sends an authentication request message; s3, the server judges whether the server is in the inspection area, if so, an authentication response message is sent to enter S4, otherwise, the server exits and alarms, and manual error correction is requested; s4, the patrol monitoring equipment sends an authentication confirmation request message; s5, the server judges whether access is allowed or not, and if so, the transmission of the inspection data result is carried out; transmitting service data of the inspection monitoring equipment through a wireless private network, realizing identity authentication and data encryption through encryption and decryption, and realizing network isolation and message filtering by applying a network isolation module of a security access gateway to realize secure communication access of the inspection monitoring equipment; and (3) through constructing a terminal server communication access network security platform, reasonably scheduling security communication network resources, and performing security authentication, encryption and decryption on access network communication lines, equipment and other resources.

Description

Communication access method for bulb tubular turbine and inspection monitoring equipment
Technical Field
The invention relates to the field of communication, in particular to a communication access method for a bulb tubular unit and inspection monitoring equipment.
Background
The bulb tubular machine set inspection is different from other types of generator sets, inspection places are complex, places such as generator shafts, water turbine shafts and the like which are difficult to accurately position exist, meanwhile, because the machine set is special, the ordinary GSM signals of the places are very weak, and because the secondary circuit of the machine set can not be additionally provided with high-power wireless communication signals, the electric power inspection system is provided. The bulb tubular turbine unit power inspection system realizes unmanned inspection by adopting autonomous working, autonomous inspection and other working modes through inspection monitoring equipment, and compared with manual inspection, the efficiency is greatly improved, and the safety accident risk is also reduced. The inspection monitoring equipment can monitor the running state of the power equipment through real-time acquisition of visible light images and infrared thermal imaging, has the functions of equipment abnormality alarming and the like, and can intensively display all acquired data and abnormality alarming in a data monitoring center, thereby realizing unmanned on duty.
Because the characteristic of the inspection monitoring equipment, the inspected data can be transmitted in real time, and meanwhile, the public network possibly does not exist in the field where the monitoring equipment is located, therefore, in some more complex zones of the through-flow unit, the application rate of the inspection monitoring equipment is higher, but communication is often not guaranteed.
The communication mode of the ad hoc network can be applied to the scene, and the traditional ad hoc network communication is insufficient to ensure the confidentiality of transmission because the patrol data has certain confidentiality.
The terminal is used as a source and an initiator of remote access, and the security of the terminal is directly related to the security of data transmission and even the security of an internal application system. If the access terminal's own security protection policy is weak, security holes or even viruses exist, then there is a risk of being attacked by the internal application system. If the access terminal is not perfectly authenticated and authorized, unauthorized access, abuse and even destruction of network resources by the terminal are caused, and the security and reliability at the terminal side are difficult to guarantee.
Disclosure of Invention
The invention aims to solve the problems and designs a communication access method for a bulb tubular unit and inspection monitoring equipment.
The invention realizes the above purpose through the following technical scheme:
a communication access method for a bulb through-flow unit and inspection monitoring equipment, wherein the bulb through-flow unit is arranged in an inspection area and comprises the following steps:
s1, a patrol monitoring device acquires a patrol area identifier;
s2, the patrol monitoring equipment sends an authentication request message to a server;
s3, the server searches locally stored patrol area information according to the authentication request message, judges whether the position of the inspection patrol monitoring device is within the range of the patrol area, if so, sends an authentication response message to the inspection patrol monitoring device and enters S4, otherwise, exits and alarms, and requests manual error correction;
s4, the patrol monitoring equipment sends an authentication confirmation request message to the server according to the authentication response message and the patrol area identifier;
s5, the server judges whether the inspection monitoring equipment is allowed to be accessed according to the authentication response message and the authentication request message, and if so, the server sends the authentication confirmation response message to the inspection monitoring equipment, and the inspection monitoring equipment and the server transmit inspection data results.
The invention has the beneficial effects that: the wireless private network is used for transmitting the business data of the inspection monitoring equipment, the identity authentication and the data encryption are realized in an encryption and decryption mode, the network isolation module of the security access gateway is used for realizing network isolation and message filtration, the security communication access of the inspection monitoring equipment is realized, the security protection capability of information transmission is effectively improved, the security communication network resource is reasonably scheduled through the construction of the terminal server communication access network security platform, and the security authentication and encryption and decryption are carried out on the access network communication line, the equipment and other resources.
Drawings
FIG. 1 is an authentication flow chart of a communication access method for a bulb through-flow unit and a patrol monitoring device of the present invention;
fig. 2 is a data transmission flow chart of the communication access method for the bulb through-flow type unit and the inspection monitoring equipment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
In the description of the present invention, it should be understood that the directions or positional relationships indicated by the terms "upper", "lower", "inner", "outer", "left", "right", etc. are based on the directions or positional relationships shown in the drawings, or the directions or positional relationships conventionally put in place when the inventive product is used, or the directions or positional relationships conventionally understood by those skilled in the art are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific direction, be configured and operated in a specific direction, and therefore should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like, are used merely to distinguish between descriptions and should not be construed as indicating or implying relative importance.
In the description of the present invention, it should also be noted that, unless explicitly specified and limited otherwise, terms such as "disposed," "connected," and the like are to be construed broadly, and for example, "connected" may be either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
The following describes specific embodiments of the present invention in detail with reference to the drawings.
A communication access method for a bulb through-flow unit and inspection monitoring equipment, wherein the bulb through-flow unit is arranged in an inspection area and comprises the following steps:
s1, the inspection monitoring equipment acquires an inspection area identifier.
S2, the routing inspection monitoring equipment sends an authentication request message to a server, wherein the authentication request message comprises an equipment identifier, an equipment type, GPS (global positioning system) position information and a routing inspection area identifier; when communication between the inspection robot and the server is interrupted, the inspection robot stores the authentication request information and the inspection result locally and carries out internal mark counting according to the sequence, after network communication is recovered, the authentication request information is uploaded according to the sequence of the internal mark counting marks, and the inspection result is uploaded after the request and encryption are finished.
S3, the server searches locally stored patrol area information according to the authentication request message, judges whether the position of the inspection patrol monitoring device is in the range of the patrol area, if so, obtains an encryption key PEK according to the device type, calculates the currently used keys PUK_UL and PUK_DL according to the patrol area identification and the PEK, uses the PUK_DL encryption test DATA DATA1 as DATA1_PUK, sends an authentication response message to the inspection patrol monitoring device and enters S4, otherwise, exits and alarms to request manual error correction;
encrypting test DATA DATA1 into DATA1_PUK using PUK_DL specifically includes:
s31, performing byte substitution on the key PEK according to the S substitution table;
s32, obtaining the product of the byte-replaced secret key and a predetermined Hadamard orthomorphic matrix, and performing exclusive OR on the product result and a round constant to obtain an expanded secret key; the method for determining the Hadamard orthometric matrix comprises the following steps: in the finite field GF (2 m ) Any four non-zero dissimilar elements a0, a1, a2, a3 e GF (2) m ) And judges whether a0, a1, a2, a3 are satisfied,and a1a2+.a0a3, a0a1+.a2a3, a0a2+.a1a3; if not, the method is carried out again in the finite field GF (2 m ) Any four non-zero dissimilar elements are taken until the four non-zero dissimilar elements taken meet the condition, and a=had (a 0, a1, a2, a 3) is determined as a finite field GF (2 m ) The fourth order Hadamard orthographic matrix, wherein m is a natural number.
S4, the routing inspection monitoring equipment sends an authentication confirmation request message to the server according to the authentication response message and the routing inspection area identifier, after receiving the authentication response message, the routing inspection monitoring equipment decrypts DATA1_PUK by using PUK_DL, constructs original DATA DATA2=equipment identifier, encrypts DATA2 by using a secret key PUK_UL to obtain DATA DATA2_PUK, sends the authentication confirmation request message to the server, and contains decrypted DATA DATA1_PUK_DE and DATA2_PUK in the authentication confirmation request message;
s5, the server judges whether the inspection monitoring equipment is allowed to be accessed according to the authentication response message and the authentication request message, and if so, the server sends the authentication confirmation response message to the inspection monitoring equipment, and the inspection monitoring equipment and the server transmit inspection data results; after receiving the authentication confirmation request message, the server reads the DATA packet in the authentication confirmation request message, matches the DATA packet with the original DATA1, decrypts the DATA2_PUK by using the PUK_UL if the DATA packet is the same as the device identifier contained in the authentication request message sent by the routing inspection monitoring device, sends an authentication confirmation response message to the routing inspection monitoring device, sets a parameter response value as accept in the response message, sets a parameter response value as reject in the response message if any decrypted DATA packet is different, and sets a parameter response value as reject in the response message, and sets a parameter server identifier as the MAC address of the current server in the message.
S6, transmitting inspection data results; during transmission, the server signs DATA DATA3 to be sent to the inspection monitoring equipment by using the MAC address to obtain signature result DATA S1, encrypts the DATA S1 by using a secret key PUK_DL to obtain S1_PUK, and sends the S1_PUK to the inspection monitoring equipment; the inspection monitoring equipment decrypts the S1_PUK by using the secret key PUK_DL to obtain S1, and the inspection monitoring equipment uses the MAC address of the current server to verify whether the S1 is correct or not; the correct inspection robot executes related operations according to the data; if not, the verification error information is sent to the server.
The technical scheme of the invention is not limited to the specific embodiment, and all technical modifications made according to the technical scheme of the invention fall within the protection scope of the invention.

Claims (5)

1. The communication access method for the bulb through-flow unit and the inspection monitoring equipment is characterized by comprising the following steps:
s1, a patrol monitoring device acquires a patrol area identifier;
s2, the patrol monitoring equipment sends an authentication request message to a server; when communication between the inspection robot and the server is interrupted, the inspection robot stores authentication request information and inspection results locally and carries out internal mark counting according to the sequence, after network communication is recovered, the authentication request information is uploaded according to the sequence of the internal mark counting marks, and the inspection results are uploaded after the request and encryption are finished;
s3, the server searches locally stored patrol area information according to the authentication request message, judges whether the position of the inspection patrol monitoring device is within the range of the patrol area, if so, sends an authentication response message to the inspection patrol monitoring device and enters S4, otherwise, exits and alarms, and requests manual error correction; obtaining an encryption key PEK according to the equipment type, calculating a currently used key PUK_UL and a currently used key PUK_DL according to the patrol area identifier and the PEK, encrypting test DATA DATA1 by using the PUK_DL as DATA1_PUK, and sending an authentication response message to the patrol monitoring equipment;
s4, the patrol monitoring equipment sends an authentication confirmation request message to the server according to the authentication response message and the patrol area identifier; encrypting test DATA DATA1 into DATA1_PUK using PUK_DL specifically includes:
s41, performing byte substitution on the key PEK according to the S substitution table;
s41, obtaining the product of the byte-replaced secret key and a predetermined Hadamard orthomorphic matrix, and performing exclusive OR on the product result and a round constant to obtain an expanded secret key;
s5, the server judges whether the inspection monitoring equipment is allowed to be accessed according to the authentication response message and the authentication request message, and if so, the server sends the authentication confirmation response message to the inspection monitoring equipment, and the inspection monitoring equipment and the server transmit inspection data results;
s6, transmitting inspection data results; during transmission, the server signs DATA DATA3 to be sent to the inspection monitoring equipment by using the MAC address to obtain signature result DATA S1, encrypts the DATA S1 by using a secret key PUK_DL to obtain S1_PUK, and sends the S1_PUK to the inspection monitoring equipment; the inspection monitoring equipment decrypts the S1_PUK by using the secret key PUK_DL to obtain S1, and the inspection monitoring equipment uses the MAC address of the current server to verify whether the S1 is correct or not; the correct inspection robot executes related operations according to the data; if not, the verification error information is sent to the server.
2. The communication access method for the bulb through-flow unit and the patrol monitoring device according to claim 1, wherein the authentication request message comprises a device identification, a device type, GPS location information, and a patrol area identification.
3. The communication access method for the bulb through-flow unit and the inspection monitoring equipment according to claim 1, wherein the determination mode of the Hadamard orthometric matrix comprises the following steps: in the finite field GF (2 m ) Any four non-zero dissimilar elements a0, a1, a2, a3 e GF (2) m ) And judges whether a0, a1, a2, a3 are satisfied,and a1a2+.a0a3, a0a1+.a2a3, a0a2+.a1a3; if not, the method is carried out again in the finite field GF (2 m ) Any four non-zero dissimilar elements are taken until the four non-zero dissimilar elements taken meet the condition, and a=had (a 0, a1, a2, a 3) is determined as a finite field GF (2 m ) The fourth order Hadamard orthographic matrix, wherein m is a natural number.
4. The communication access method for the bulb through-flow unit and the inspection monitoring device according to claim 1, wherein in S4, after the inspection monitoring device receives the authentication response message, decrypting the DATA1_puk using the puk_dl, constructing the original DATA2 = device identifier, encrypting the DATA2 using the key puk_ul, obtaining the DATA2_puk, sending an authentication confirmation request message to the server, and including the decrypted DATA1_puk_de and DATA2_puk in the authentication confirmation request message.
5. The communication access method for a bulb through-flow unit and a patrol monitoring device according to claim 1, wherein in S5, after receiving an authentication confirmation request message, the server reads a DATA packet therein, matches with original DATA1, decrypts DATA2_puk using puk_ul if the DATA packet is the same as "device identifier" included in the authentication request message sent by the patrol monitoring device, sends an authentication confirmation response message to the patrol monitoring device, sets a parameter "response type" value as "accept" in the response message, sets a parameter "response type" value as "reject" in the response message if any decrypted DATA packet is different, and sets a parameter "server identifier" as the MAC address of the current server in the message.
CN202111228956.3A 2021-10-21 2021-10-21 Communication access method for bulb tubular turbine and inspection monitoring equipment Active CN113891313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111228956.3A CN113891313B (en) 2021-10-21 2021-10-21 Communication access method for bulb tubular turbine and inspection monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111228956.3A CN113891313B (en) 2021-10-21 2021-10-21 Communication access method for bulb tubular turbine and inspection monitoring equipment

Publications (2)

Publication Number Publication Date
CN113891313A CN113891313A (en) 2022-01-04
CN113891313B true CN113891313B (en) 2024-03-19

Family

ID=79004341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111228956.3A Active CN113891313B (en) 2021-10-21 2021-10-21 Communication access method for bulb tubular turbine and inspection monitoring equipment

Country Status (1)

Country Link
CN (1) CN113891313B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142957A (en) * 2010-09-17 2011-08-03 华为技术有限公司 Data encryption method and device, and communication facility with data encryption function
CN105657660A (en) * 2016-02-04 2016-06-08 中国联合网络通信集团有限公司 Access method of base station routing inspection terminal, routing inspection terminal, server and base station
CN105743637A (en) * 2016-03-30 2016-07-06 国网山东省电力公司荣成市供电公司 Intelligent substation inspection system
CN106897778A (en) * 2017-02-24 2017-06-27 佛山市顺德区港华燃气有限公司 The NFC intelligent inspection systems and its method for inspecting of a kind of LNG filling stations
CN110996318A (en) * 2019-12-23 2020-04-10 广西电网有限责任公司电力科学研究院 Safety communication access system of intelligent inspection robot of transformer substation
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111610398A (en) * 2020-06-01 2020-09-01 国家电网有限公司 Transformer substation reactive equipment inspection temperature measurement system and method
CN112102516A (en) * 2020-09-22 2020-12-18 国网山东省电力公司电力科学研究院 Intelligent robot inspection system for transformer substation and access operation method thereof
CN112187741A (en) * 2020-09-14 2021-01-05 杭州安恒信息技术股份有限公司 Login authentication method and device based on operation and maintenance audit system and electronic device
CN112318484A (en) * 2020-12-15 2021-02-05 苏州光格设备有限公司 Task scheduling method for track inspection robot

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142957A (en) * 2010-09-17 2011-08-03 华为技术有限公司 Data encryption method and device, and communication facility with data encryption function
CN105657660A (en) * 2016-02-04 2016-06-08 中国联合网络通信集团有限公司 Access method of base station routing inspection terminal, routing inspection terminal, server and base station
CN105743637A (en) * 2016-03-30 2016-07-06 国网山东省电力公司荣成市供电公司 Intelligent substation inspection system
CN106897778A (en) * 2017-02-24 2017-06-27 佛山市顺德区港华燃气有限公司 The NFC intelligent inspection systems and its method for inspecting of a kind of LNG filling stations
CN110996318A (en) * 2019-12-23 2020-04-10 广西电网有限责任公司电力科学研究院 Safety communication access system of intelligent inspection robot of transformer substation
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111610398A (en) * 2020-06-01 2020-09-01 国家电网有限公司 Transformer substation reactive equipment inspection temperature measurement system and method
CN112187741A (en) * 2020-09-14 2021-01-05 杭州安恒信息技术股份有限公司 Login authentication method and device based on operation and maintenance audit system and electronic device
CN112102516A (en) * 2020-09-22 2020-12-18 国网山东省电力公司电力科学研究院 Intelligent robot inspection system for transformer substation and access operation method thereof
CN112318484A (en) * 2020-12-15 2021-02-05 苏州光格设备有限公司 Task scheduling method for track inspection robot

Also Published As

Publication number Publication date
CN113891313A (en) 2022-01-04

Similar Documents

Publication Publication Date Title
KR101673310B1 (en) Method For Controlling Vehicle Security Access Based On Certificate
CN110572418B (en) Vehicle identity authentication method and device, computer equipment and storage medium
CN102204305B (en) Home node-b apparatus and security protocols
CN107846395A (en) Vehicle-mounted networking
US20200162434A1 (en) Secure and encrypted heartbeat protocol
CN110958142A (en) Device maintenance method, maintenance device, storage medium, and computer program product
EP1760945A2 (en) Wireless LAN security system and method
CN102857912A (en) Method for secure channelization by using internal key center (IKC)
CN107104948A (en) unmanned aerial vehicle data transmission method and unmanned aerial vehicle data transmission system
JP2012227672A (en) Inter-vehicle/road-to-vehicle communication system
Aziz et al. SecureAIS-securing pairwise vessels communications
KR20160026729A (en) Communication system, communication device, vehicle and communication method
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
Pirker et al. Global and secured uav authentication system based on hardware-security
CN111698263A (en) Beidou satellite navigation data transmission method and system
CN101938741A (en) Method, system and device for mutual authentication
CN112311746B (en) Data sharing method and device and computer storage medium
WO2009022858A2 (en) Method for enhancing lbs security and protecting privacy in wimax network
CN107852327A (en) Communication equipment, communication means and program
CN103460669B (en) For method and the communicator of the cryptoguard of field equipment data communication
CN113891313B (en) Communication access method for bulb tubular turbine and inspection monitoring equipment
Malandrino et al. A-VIP: Anonymous verification and inference of positions in vehicular networks
CN117119012A (en) Urban lifeline data processing method and equipment
CN116915480A (en) Electric power internet of things safety management method and system
CN109636948A (en) Data processing method and device based on onboard system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant