CN113949414A - Low-voltage power line carrier communication trusted security access method - Google Patents

Low-voltage power line carrier communication trusted security access method Download PDF

Info

Publication number
CN113949414A
CN113949414A CN202111056480.XA CN202111056480A CN113949414A CN 113949414 A CN113949414 A CN 113949414A CN 202111056480 A CN202111056480 A CN 202111056480A CN 113949414 A CN113949414 A CN 113949414A
Authority
CN
China
Prior art keywords
power line
line carrier
terminal
fingerprint
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111056480.XA
Other languages
Chinese (zh)
Inventor
张正峰
施展
曾瑛
吴赞红
梁宇图
王秀竹
吕灵智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Guangdong Electric Power Communication Technology Co Ltd
Original Assignee
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Guangdong Electric Power Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd, Guangdong Electric Power Communication Technology Co Ltd filed Critical Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority to CN202111056480.XA priority Critical patent/CN113949414A/en
Publication of CN113949414A publication Critical patent/CN113949414A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • H04B3/544Setting up communications; Call and signalling arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)

Abstract

The invention discloses a low-voltage power line carrier communication credible safety access method, which comprises the steps of carrying out information analysis processing on collected physical layer communication data of a power terminal by using a PLC (programmable logic controller) device discovery and identification technology; storing the identification result into a device physical layer characteristic database, and carrying out safety identification on the power line carrier device to generate terminal device and fingerprint information; and the terminal equipment and the fingerprint information are submitted to an edge Internet of things agent through a multilayer cascade terminal, and are uploaded to a power line carrier platform by using the edge Internet of things agent. According to the invention, by establishing a safety authentication mechanism suitable for power line carrier communication, the problem of safety access when massive PLC terminals and carrier platforms are interacted is solved, illegal terminal access is prevented, and the method has important significance in promoting reasonable utilization of power line carrier communication system resources.

Description

Low-voltage power line carrier communication trusted security access method
Technical Field
The invention relates to the technical field of power line secure communication, in particular to a low-voltage power line carrier communication trusted secure access method.
Background
A large number of legal and illegal power line terminals exist in a power line carrier communication environment, pressure and examination are brought to frequency spectrum resources and safety communication of a network, on one hand, how to sense whether a signal occupying an effective frequency band is a legal signal or not and effectively identify an identity label of the legal signal, on the other hand, how to detect an illegal communication signal and identify an identity label of a counterfeit device, and the first problem to be solved urgently in the trusted and safe access communication process of the power line carrier.
The prior art mainly has the following problems:
(1) no effective protection measures are designed in the TNC framework for the authentication, confidentiality and integrity of the communication between the terminal and the server.
(2) And the complex PLC network structure and the large-scale PLC terminal access requirements cannot be met.
(3) The existing identity authentication and authority management facilities cannot meet the requirements of a large number of terminal devices on safety and practicability.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above-mentioned conventional problems.
Therefore, the invention provides a low-voltage power line carrier communication trusted security access method which can solve the problem of power line communication security.
In order to solve the technical problems, the invention provides the following technical scheme: the method comprises the steps of carrying out information analysis processing on collected physical layer communication data of the power terminal by using a PLC (programmable logic controller) equipment discovery and identification technology; storing the identification result into a device physical layer characteristic database, and carrying out safety identification on the power line carrier device to generate terminal device and fingerprint information; and the terminal equipment and the fingerprint information are submitted to an edge Internet of things agent through a multilayer cascade terminal, and are uploaded to a power line carrier platform by using the edge Internet of things agent.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the information analysis processing comprises researching the perception technology of the PLC equipment; preprocessing a carrier access signal; and researching an un-counterfeitable fingerprint generation technology of the PLC equipment.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the sensing technology of the PLC equipment comprises carrier signal power detection of a fusion time domain and a fusion frequency domain; establishing a frequency spectrum sensing framework; after signal detection is finished in carrier communication, the modulation mode of the signal is identified; and demodulating legal communication signals to extract information, and accurately judging the modulation type and the common frequency band of unknown signals.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the pre-processing of the carrier access signal comprises pre-processing the acquired power line carrier access signal by using signal frequency offset synchronization and OFDM (orthogonal frequency division multiplexing); the signal frequency deviation synchronization comprises the steps of processing through a frequency deviation estimation coarse synchronization module, carrying out frequency deviation coarse correction according to coarse frequency deviation of a received signal, carrying out frequency deviation fine synchronization by using a frequency deviation estimation fine synchronization module, and carrying out sampling rate compensation by combining with a sampling rate deviation estimation module; the OFDM comprises the steps that after frequency offset synchronization, signals are modulated by using OFDM technology, and the phase deviation compensation is realized by modulating carrier signals through mutually orthogonal subcarriers according to a corresponding modulation mode and carrying out phase estimation.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the fingerprint generation technology which can not be imitated by the PLC equipment comprises the steps of drawing processed signals into a constellation locus diagram, a time domain oscillogram and a frequency domain diagram to obtain constellation locus characteristics, time domain characteristics and frequency domain characteristics, identifying a target in dimension and time, and extracting the characteristics to form the PLC equipment fingerprint.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: access authentication of the power line carrier equipment is completed based on an identification cryptographic algorithm, and the access authentication method comprises the steps of establishing a power line carrier equipment characteristic database according to fingerprint data of the PLC equipment, and comparing the equipment fingerprint with the fingerprint database data to enter an access authentication process after the equipment fingerprint reaches an authentication system; refusing the illegal terminal equipment and releasing the safety equipment; and carrying out identity authentication on the power line carrier equipment by using an identification password technology.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the identity authentication comprises the steps of generating a password identification by using a fingerprint, and if the password identification changes, generating again; the public and private key is used for realizing identity authentication; the public key is defined as the fingerprint of the power line carrier terminal layer device, and the private key is defined as a key generation center and is obtained by decrypting the public key.
As an optimal scheme of the low-voltage power line carrier communication trusted secure access method, the method comprises the following steps: the method comprises the steps of terminal identity identification and integrity detection; the identity information of the power line carrier terminal is safely transmitted; generating multilayer cascade PLC terminal fingerprint information; identity information transmission between the multi-level terminal and the edge Internet of things agent; and the edge Internet of things agent uploads the terminal fingerprint information to a power line carrier platform and stores the PLC terminal fingerprint information into a database.
The invention has the beneficial effects that: the invention provides a credible security access method for low-voltage power line carrier communication on the basis of analyzing the security access authentication technology of power line communication technology terminal equipment in a power network, solves the security access problem when massive PLC terminals and carrier platforms interact by establishing a security authentication mechanism suitable for power line carrier communication, prevents illegal terminal access, and has important significance for promoting reasonable utilization of power line carrier communication system resources.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise. Wherein:
fig. 1 is a schematic flowchart of a trusted secure access method for low-voltage power line carrier communication according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a power line carrier communication network topology of a low-voltage power line carrier communication trusted secure access method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a device discovery and identification technology of a low-voltage power line carrier communication trusted secure access method according to an embodiment of the present invention;
fig. 4 is a schematic diagram illustrating device access authentication of a low-voltage power line carrier communication trusted secure access method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an identity information security delivery mechanism of a low-voltage power line carrier communication trusted security access method according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, specific embodiments accompanied with figures are described in detail below, and it is apparent that the described embodiments are a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present invention, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Furthermore, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
The present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially in general scale for convenience of illustration, and the drawings are only exemplary and should not be construed as limiting the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
Meanwhile, in the description of the present invention, it should be noted that the terms "upper, lower, inner and outer" and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation and operate, and thus, cannot be construed as limiting the present invention. Furthermore, the terms first, second, or third are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The terms "mounted, connected and connected" in the present invention are to be understood broadly, unless otherwise explicitly specified or limited, for example: can be fixedly connected, detachably connected or integrally connected; they may be mechanically, electrically, or directly connected, or indirectly connected through intervening media, or may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
Referring to fig. 1 to 5, a first embodiment of the present invention provides a trusted secure access method for low-voltage power line carrier communication, including:
s1: and carrying out information analysis processing on the collected physical layer communication data of the power terminal by using a PLC (programmable logic controller) equipment discovery and identification technology.
S2: and storing the identification result into a device physical layer characteristic database, and carrying out safety identification on the power line carrier device to generate terminal device and fingerprint information.
S3: and the terminal equipment and the fingerprint information are submitted to the edge Internet of things agent through the multilayer cascade terminal, and are uploaded to the power line carrier platform by the edge Internet of things agent.
Referring to fig. 2, which is a topology structure diagram of a power line carrier communication network, the present embodiment researches a sensing technology of a PLC device, preprocesses a carrier access signal, and researches a fingerprint generation technology that the PLC device cannot counterfeit.
It is understood that, the openness of the power line carrier environment causes both legal and illegal terminals to coexist in the same scene, on one hand, other devices occupy the working frequency band of the legal device to affect the work of the normal device, and on the other hand, the illegal device performs active attacks such as cheating, tampering, replaying, and service denial on the legal device to destroy the normal functions of the power line communication network.
Referring to fig. 3, the sensing technique of the PLC device includes:
the method comprises the steps of integrating carrier signal power detection of a time domain and a frequency domain, wherein the time domain power detection is to perform power detection on a carrier signal in the time domain, and the frequency domain energy detection is to perform power detection after changing the time domain into the frequency domain by using Fourier transform;
establishing a spectrum sensing architecture, wherein the spectrum sensing architecture comprises a carrier communication channel detection technology and a carrier channel compression sensing technology, the carrier communication channel detection technology divides a frequency band into a plurality of sub-bands to realize spectrum sensing on a wider frequency band, and the carrier channel compression sensing technology can randomly sample and reconstruct a sparse signal at a sampling rate lower than Nyquist;
after signal detection is finished in carrier communication, the modulation mode of the signal is identified;
and demodulating legal communication signals to extract information, and accurately judging the modulation type and the common frequency band of unknown signals.
Further, the preprocessing the carrier access signal comprises:
preprocessing the acquired power line carrier access signal by using signal frequency offset synchronization and OFDM (orthogonal frequency division multiplexing);
the signal frequency deviation synchronization comprises the steps of processing through a frequency deviation estimation coarse synchronization module, carrying out frequency deviation coarse correction according to coarse frequency deviation of a received signal, carrying out frequency deviation fine synchronization by utilizing a frequency deviation estimation fine synchronization module, and carrying out sampling rate compensation by combining with a sampling rate deviation estimation module;
the OFDM comprises that after frequency deviation synchronization, the signals are modulated by orthogonal subcarriers according to a corresponding modulation mode by applying OFDM technology, and phase estimation is carried out to realize phase deviation compensation.
Still further, the fingerprint generation technology that the PLC device is not counterfeitable includes:
drawing the processed signals into a constellation trajectory diagram, a time domain oscillogram and a frequency domain diagram to obtain constellation trajectory characteristics, time domain characteristics and frequency domain characteristics, identifying a target in dimension and time, and extracting the characteristics to form the PLC equipment fingerprint.
Referring to fig. 4, a power line carrier communication network system faces risks of worm attacks, distributed denial of service (DDoS) attacks and traditional power service information network attacks, and an attacker can illegally access a network by counterfeiting a legal operation terminal, so that access authentication of power line carrier equipment is completed based on an identification cryptographic algorithm.
The access authentication of the power line carrier equipment is completed based on the identification cryptographic algorithm, which comprises the following steps:
establishing a power line carrier equipment characteristic database according to the fingerprint data of the PLC equipment, and comparing the equipment fingerprint with the fingerprint database data to enter an access authentication process after the equipment fingerprint reaches an authentication system;
refusing the illegal terminal equipment and releasing the safety equipment;
and carrying out identity authentication on the power line carrier equipment by using an identification password technology.
The real-time mode based on the identification cryptographic technology has multiple safety protection functions, and the identity authentication comprises the following steps:
generating a password identification by using the fingerprint, and if the password identification changes, generating again;
the public and private key is used for realizing identity authentication;
the public key is defined as the fingerprint of the power line carrier terminal layer device, and the private key is defined as a key generation center and is obtained by decrypting the public key.
Preferably, an illegal terminal can be prevented from entering the power line carrier communication network through a certain access authentication measure, but a large-scale attack surface is provided for an attacker through numerous information interaction of a power line carrier terminal layer, the legal terminal is completely possibly utilized by the attacker, port scanning is carried out on the legal terminal, network attack is initiated, and serious threat is caused to the safety of the power line carrier communication network.
Referring to fig. 5, a scheme for securely transferring identity information between multiple cascaded terminals, between edge internet of things agents, and on a power line carrier platform specifically includes:
(1) power line carrier massive terminal signature technology
The PLC terminal equipment is large in quantity, the information interaction nodes are numerous, and large-scale terminal identity information is safely transmitted through a massive terminal signature method;
terminal identity recognition and integrity detection, and a signature technology can realize the identity recognition and the identity information integrity detection of the terminal;
the power line carrier terminal identity information is safely transmitted, and the transferable signature has the main advantages of minimizing the required signature amount, hiding the intermediate details of information transmission and improving the information transmission efficiency and safety.
(2) Secure transfer process of identity information
The fingerprint information is the unique identification of the PLC terminal, can be used as identification information of the identity of the PLC terminal, and is of great importance in a power line carrier communication system.
Generating fingerprint information of the multilayer cascaded PLC terminal, transmitting the fingerprint information among the cascaded terminals, and adding a signature in the transmission process to ensure confidentiality;
identity information is transmitted between the multi-level terminal and the edge Internet of things agent, the terminal uploads fingerprint information to the edge Internet of things agent, and the edge Internet of things agent records and binds the fingerprint information uploaded by the terminal, so that subsequent positioning and tracing are facilitated;
the edge Internet of things agent uploads terminal fingerprint information to a power line carrier platform, stores the PLC terminal fingerprint information into a database, and the carrier platform can detect equipment running conditions, user behaviors, network behaviors and the like by means of an intrusion detection system, an intrusion prevention system, a Web application protection system, a scanner and the like, so as to accurately position early-warning events.
Example 2
In order to better verify and explain the technical effects adopted in the method of the present invention, the embodiment selects the traditional private key transmission method and the method of the present invention to perform a comparison test, and compares the test results by means of scientific demonstration to verify the real effect of the method of the present invention.
In order to verify that the method of the present invention has higher communication security access capability compared with the conventional method, in this embodiment, the conventional private key transmission method and the method of the present invention are respectively used to test and compare the power line carrier communication capability of the simulation platform.
And (3) testing environment: (1) selecting a radio frequency communication work as 433MHz, wherein a frequency band is 400-464 MHz;
(2) the channel bandwidth is 200kHz, and the available channel is set to be 300;
(3) testing a CC1101 chip with GDO2 as its digital pin;
(4) the air transmission rate is 200kbit/s, the air transmission time is 880us, and the receiving state RX is converted into the transmitting state TX.
Table 1: data results are shown in the comparative table.
Figure BDA0003254779420000071
Referring to table 1, it can be seen that, under the same test conditions, the error value of the conventional method is larger, the communication efficiency is lower, and compared with the conventional method, the method of the present invention is significantly improved, and the real effect of the method of the present invention is verified.
It should be noted that the above-mentioned embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (8)

1. A low-voltage power line carrier communication credible security access method is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
carrying out information analysis processing on the collected physical layer communication data of the power terminal by using a PLC (programmable logic controller) equipment discovery and identification technology;
storing the identification result into a device physical layer characteristic database, and carrying out safety identification on the power line carrier device to generate terminal device and fingerprint information;
and the terminal equipment and the fingerprint information are submitted to an edge Internet of things agent through a multilayer cascade terminal, and are uploaded to a power line carrier platform by using the edge Internet of things agent.
2. The low voltage power line carrier communication trusted secure access method of claim 1, wherein: the information analysis process includes the steps of,
researching a perception technology of the PLC equipment;
preprocessing a carrier access signal;
and researching an un-counterfeitable fingerprint generation technology of the PLC equipment.
3. The low voltage power line carrier communication trusted secure access method of claim 2, wherein: the perception techniques of the PLC device include,
detecting the power of a carrier signal fusing a time domain and a frequency domain;
establishing a frequency spectrum sensing framework;
after signal detection is finished in carrier communication, the modulation mode of the signal is identified;
and demodulating legal communication signals to extract information, and accurately judging the modulation type and the common frequency band of unknown signals.
4. The trusted secure access method for low-voltage power line carrier communication according to claim 2 or 3, characterized in that: the pre-processing of the carrier access signal includes,
preprocessing the acquired power line carrier access signal by using signal frequency offset synchronization and OFDM (orthogonal frequency division multiplexing);
the signal frequency deviation synchronization comprises the steps of processing through a frequency deviation estimation coarse synchronization module, carrying out frequency deviation coarse correction according to coarse frequency deviation of a received signal, carrying out frequency deviation fine synchronization by using a frequency deviation estimation fine synchronization module, and carrying out sampling rate compensation by combining with a sampling rate deviation estimation module;
the OFDM comprises the steps that after frequency offset synchronization, signals are modulated by using OFDM technology, and the phase deviation compensation is realized by modulating carrier signals through mutually orthogonal subcarriers according to a corresponding modulation mode and carrying out phase estimation.
5. The low voltage power line carrier communication trusted secure access method of claim 4, wherein: the fingerprint generation technology which can not be imitated by the PLC equipment comprises the following steps,
drawing the processed signals into a constellation trajectory diagram, a time domain oscillogram and a frequency domain diagram to obtain constellation trajectory characteristics, time domain characteristics and frequency domain characteristics, identifying a target in dimension and time, and extracting the characteristics to form the PLC equipment fingerprint.
6. The low voltage power line carrier communication trusted secure access method of claim 5, wherein: access authentication of the power line carrier equipment is completed based on an identification cryptographic algorithm, which comprises,
establishing a power line carrier equipment characteristic database according to the fingerprint data of the PLC equipment, and comparing the equipment fingerprint with the fingerprint database data to enter an access authentication process after the equipment fingerprint reaches an authentication system;
refusing the illegal terminal equipment and releasing the safety equipment;
and carrying out identity authentication on the power line carrier equipment by using an identification password technology.
7. The low voltage power line carrier communication trusted secure access method of claim 6, wherein: the identity authentication includes the steps of,
generating a password identification by using the fingerprint, and if the password identification changes, generating again;
the public and private key is used for realizing identity authentication;
the public key is defined as the fingerprint of the power line carrier terminal layer device, and the private key is defined as a key generation center and is obtained by decrypting the public key.
8. The low voltage power line carrier communication trusted secure access method of claim 7, wherein: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
terminal identity identification and integrity detection;
the identity information of the power line carrier terminal is safely transmitted;
generating multilayer cascade PLC terminal fingerprint information;
identity information transmission between the multi-level terminal and the edge Internet of things agent;
and the edge Internet of things agent uploads the terminal fingerprint information to a power line carrier platform and stores the PLC terminal fingerprint information into a database.
CN202111056480.XA 2021-09-09 2021-09-09 Low-voltage power line carrier communication trusted security access method Pending CN113949414A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111056480.XA CN113949414A (en) 2021-09-09 2021-09-09 Low-voltage power line carrier communication trusted security access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111056480.XA CN113949414A (en) 2021-09-09 2021-09-09 Low-voltage power line carrier communication trusted security access method

Publications (1)

Publication Number Publication Date
CN113949414A true CN113949414A (en) 2022-01-18

Family

ID=79328388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111056480.XA Pending CN113949414A (en) 2021-09-09 2021-09-09 Low-voltage power line carrier communication trusted security access method

Country Status (1)

Country Link
CN (1) CN113949414A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978776A (en) * 2022-07-29 2022-08-30 中诚华隆计算机技术有限公司 Credible data interaction method and device for power internet of things terminal and electronic equipment
CN116996133A (en) * 2023-09-27 2023-11-03 国网江苏省电力有限公司常州供电分公司 Identity authentication and eavesdropping positioning method for power line carrier communication equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015349A1 (en) * 2017-07-20 2019-01-24 重庆物奇科技有限公司 Low-voltage power line broadband carrier communication method
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112468490A (en) * 2020-11-25 2021-03-09 国网辽宁省电力有限公司信息通信分公司 Authentication method for power grid terminal layer equipment access
CN112887338A (en) * 2021-03-18 2021-06-01 南瑞集团有限公司 Identity authentication method and system based on IBC identification password
CN112910861A (en) * 2021-01-19 2021-06-04 浙江大学 Group authentication and segmented authentication-based authentication method for terminal equipment of power internet of things

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015349A1 (en) * 2017-07-20 2019-01-24 重庆物奇科技有限公司 Low-voltage power line broadband carrier communication method
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112468490A (en) * 2020-11-25 2021-03-09 国网辽宁省电力有限公司信息通信分公司 Authentication method for power grid terminal layer equipment access
CN112910861A (en) * 2021-01-19 2021-06-04 浙江大学 Group authentication and segmented authentication-based authentication method for terminal equipment of power internet of things
CN112887338A (en) * 2021-03-18 2021-06-01 南瑞集团有限公司 Identity authentication method and system based on IBC identification password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴金宇等: "泛在电力物联网可信安全接入方案", 《计算机与现代化》, no. 4, 15 April 2020 (2020-04-15), pages 1 - 4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978776A (en) * 2022-07-29 2022-08-30 中诚华隆计算机技术有限公司 Credible data interaction method and device for power internet of things terminal and electronic equipment
CN116996133A (en) * 2023-09-27 2023-11-03 国网江苏省电力有限公司常州供电分公司 Identity authentication and eavesdropping positioning method for power line carrier communication equipment
CN116996133B (en) * 2023-09-27 2023-12-05 国网江苏省电力有限公司常州供电分公司 Identity authentication and eavesdropping positioning method for power line carrier communication equipment

Similar Documents

Publication Publication Date Title
CN115189927B (en) Zero trust-based power network safety protection method
CN113949414A (en) Low-voltage power line carrier communication trusted security access method
CN114302402A (en) Electric power regulation and control business safety communication method based on 5G
KR101375813B1 (en) Active security sensing device and method for intrusion detection and audit of digital substation
CN108173871A (en) Based on radio-frequency fingerprint and biological fingerprint wireless network access authentication system and method
CN104869111B (en) A kind of trusted end-user access authentication system and method
CN113824705B (en) Safety reinforcement method for Modbus TCP (transmission control protocol)
CN111797431A (en) Encrypted data anomaly detection method and system based on symmetric key system
CN114268429A (en) Terminal-specific encrypted communication access device
CN113630421A (en) Method for preventing data migration of web system based on asymmetric encryption algorithm
CN113987525A (en) System data protection method based on block cipher algorithm
CN111711603A (en) Identity authentication system based on terminal equipment of Internet of things
Khandait et al. Who is trying to compromise your SSH server? An analysis of authentication logs and detection of bruteforce attacks
Chen Network security protection technology under the background of computing big data
CN115665737A (en) Internet of things terminal authentication method based on zero trust architecture
CN112996001A (en) Physical layer secure communication method based on radio frequency fingerprint image scrambling
Lu et al. A timestamp-based covert data transmission method in Industrial Control System
Savukynas Internet of Things information system security for smart devices identification and authentication
CN117155649B (en) System and method for security protection of third party system accessing JAVA gateway
KR102257607B1 (en) The way to control ONE-WAY-RING/TWO-WAY-RING NETWORK adapted to hybrid quantum communication channel and its system
CN118101292A (en) Identity authentication method and system suitable for electric power Internet of things
CN112637837B (en) Lightweight passive cross-layer authentication method in smart grid
Shen et al. Physical Layer Identification for Wireless Local Access in the Smart Grid
CN112954678B (en) Wireless signal fingerprint construction method and system for power wireless private network terminal
CN115955363B (en) Communication terminal based on desktop fusion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination