CN115361232A - Safety protection system of electric power information network - Google Patents

Safety protection system of electric power information network Download PDF

Info

Publication number
CN115361232A
CN115361232A CN202211282164.9A CN202211282164A CN115361232A CN 115361232 A CN115361232 A CN 115361232A CN 202211282164 A CN202211282164 A CN 202211282164A CN 115361232 A CN115361232 A CN 115361232A
Authority
CN
China
Prior art keywords
network
module
internet
access
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211282164.9A
Other languages
Chinese (zh)
Inventor
万井洲
张丽
魏群
孙永梅
陈景津
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Topway Network Co ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Original Assignee
Guangdong Topway Network Co ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Topway Network Co ltd, Foshan Power Supply Bureau of Guangdong Power Grid Corp filed Critical Guangdong Topway Network Co ltd
Priority to CN202211282164.9A priority Critical patent/CN115361232A/en
Publication of CN115361232A publication Critical patent/CN115361232A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model relates to a safety protection technical field of electric power system, a safety protection system of electric power information net is provided, through deploying the production management district, management information district and internet export management district, can realize access control between each region, data transmission restriction, safety inspection, virus blocking, flow washing, functions such as network recovery, reached and established different safety protection mechanisms's purpose according to the different safety protection demands of electric power information net, thereby realized improving the security of electric power information net, and then solved current electric power information net because do not have perfect network safety guarantee system framework and lead to the technical problem that electric power information net has the potential safety hazard.

Description

Safety protection system of electric power information network
Technical Field
The application relates to the technical field of safety protection of electric power systems, in particular to a safety protection system of an electric power information network.
Background
The power industry is the basic industry of national economy and is one of the most important infrastructures for national economy development and people's life. In recent years, the information-oriented construction of electric power has achieved remarkable achievement, and the information-oriented construction has already reached a certain scale.
Electric power companies have widely advocated the use of information systems such as office automation systems, financial management systems, power marketing management systems, production management systems, and the like. As the dependence degree of the operation management of the power company on the network and the information system is continuously improved, the security of the network and the information system becomes more and more important.
In recent years, security threats have shown a trend of "many, fast, high". "much" means that the number of security events is large, "fast" means that the spreading speed of security threat intrusion is fast, the attack occurrence time after discovering a bug is fast, the latest worm virus can spread to the global scope within a few minutes, and attack behaviors or tools aiming at the bug appear several hours after a new bug is published; "high" means that the security threat is higher and higher, and most of the current threats are developed from a network layer to an application layer, including intrusion, worm, P2P abuse and the like. Therefore, the existing information systems of electric power companies are mainly faced with two problems: the method comprises the following steps that firstly, illegal invasion from the outside to an information system of a power-saving company, and deliberate damage, theft and information tampering behaviors to the information system are carried out; and secondly, the legal, authorized and normal access of employees in the power company to various service systems running in the network. Because a large number of users exist in the existing power company information network, the security management of various accounts, the centralized maintenance and operation and maintenance management of server resources are very important for guaranteeing the security of the power information network.
Aiming at the problem that the existing power information network has potential safety hazards due to the fact that a complete network safety guarantee system architecture does not exist, an effective solution is not provided at present.
Disclosure of Invention
The main purpose of the present application is to provide a safety protection system for an electric power information network, which can solve the technical problem that the electric power information network in the prior art has potential safety hazards due to the fact that no perfect network safety guarantee system architecture exists.
The application provides a safety protection system of electric power information net includes: the system comprises a production management area, a management information area and an internet export management area, wherein data transmitted in a network channel are protected between the production management area and the management information area and between the management information area and the internet export management area through a network channel isolation technology, the production management area and the management information area are respectively connected with a comprehensive data network through a firewall, and the internet export management area is connected with a service data network through a communication gateway.
Furthermore, the production management area comprises an intelligent analysis application module, a power transmission equipment state acquisition module, a power transformation equipment state acquisition module and an emergency management service module, and the intelligent analysis application module, the power transmission equipment state acquisition module, the power transformation equipment state acquisition module and the emergency management service module establish communication through a network channel.
Further, the management information area comprises an IDC data center module, an internal office network module and an external internet module, and the IDC data center module, the internal office network module and the external internet module are communicated through a network channel.
Furthermore, the management information area further comprises a backbone integrated service data network and the internet, the IDC data center module is safely isolated from the backbone integrated service data network through two first firewalls, the internal office network module is safely isolated from the backbone integrated service data network through two second firewalls, and the external internet module is safely isolated from the internet through two third firewalls.
Furthermore, the internet exit management area comprises an internet exit module, a DMZ network module, a mobile office access network module and a comprehensive data network access network module, and the internet exit module, the DMZ network module, the mobile office access network module and the comprehensive data network access network module establish communication through network channels.
Further, the internet exit module comprises a fourth firewall, a secure socket layer and a virtual private network, and the fourth firewall, the secure socket layer and the virtual private network establish communication through a network channel.
Furthermore, the network channel isolation technology comprises terminal access security isolation, network domain security isolation and external network equipment access security isolation, wherein the terminal access security isolation authenticates the access terminal by acquiring terminal identity authentication information to determine the validity of the access terminal; the network domain safety isolation is realized by authenticating and authorizing the service flow slice; the access security isolation of the external network equipment is realized by setting a security access area, so that the security interaction of service flow slices is guaranteed.
Compared with the prior art, the application provides a safety protection system of an electric power information network, by deploying a production management area, a management information area and an internet export management area, functions of access control, data transmission limitation, safety detection, virus blocking, flow cleaning, network recovery and the like among all areas can be realized, and the purpose of establishing different safety protection mechanisms according to different safety protection requirements of the electric power information network is achieved, so that the safety of the electric power information network is improved, and the technical problem that the electric power information network has potential safety hazards due to the fact that the conventional electric power information network does not have a perfect network safety protection system architecture is solved.
Drawings
FIG. 1 is a schematic structural diagram of a safety protection system of an electrical information network according to the present application;
FIG. 2 is a schematic structural diagram of a production management area of a safety protection system of an electrical information network according to the present application;
FIG. 3 is a schematic structural diagram of a management information area of a safety protection system of an electrical information network according to the present application;
fig. 4 is a schematic structural diagram of an internet exit management area of the security protection system of the power information network according to the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; they may be mechanically coupled, directly coupled, or indirectly coupled through intervening agents, both internally and/or in any other manner known to those skilled in the art. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the present invention, unless otherwise expressly stated or limited, "above" or "below" a first feature means that the first and second features are in direct contact, or that the first and second features are not in direct contact but are in contact with each other via another feature therebetween. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature includes the first feature being directly under and obliquely below the second feature, or simply meaning that the first feature is at a lesser elevation than the second feature.
Referring to fig. 1, a safety protection system for an electrical information network includes: the system comprises a production management area, a management information area and an internet export management area, wherein data transmitted in a network channel are protected between the production management area and the management information area and between the management information area and the internet export management area through a network channel isolation technology, the production management area and the management information area are respectively connected with a comprehensive data network through a firewall, and the internet export management area is connected with a service data network through a communication gateway. Specifically, multi-dimensional safety protection is provided for data transmission of the network channel, the problem of data leakage of the service in the transmission process of the network channel and the safety problems of access safety and operation of various electric power services are effectively solved, and the operation stability of the electric power information network is improved.
In a possible implementation manner, the production management area includes an intelligent analysis application module, a power transmission equipment state acquisition module, a power transformation equipment state acquisition module, and an emergency management service module, and the intelligent analysis application module, the power transmission equipment state acquisition module, the power transformation equipment state acquisition module, and the emergency management service module establish communication through a network channel. Specifically, the production management area mainly comprises an intelligent analysis application module, a power transmission equipment state acquisition module, a power transformation equipment state acquisition module and an emergency management service module, data acquisition is carried out through a comprehensive data network, and the production management area is safely isolated from the comprehensive data network through a firewall. In addition, the production management area also comprises an intrusion detection system, and the safety detection and monitoring are carried out through a probe of the intrusion detection system.
Further, referring to fig. 2, the intelligent analysis application module includes two intelligent analysis application servers, the power transmission equipment state acquisition module includes two power transmission equipment information acquisition analysis servers, the power transformation equipment state acquisition module includes a power transformation equipment information acquisition analysis server, and the emergency management service module includes an emergency management server. In addition, the intelligent analysis application module further comprises a firewall for longitudinal protection, a front-end network and an acquisition server which are arranged between the comprehensive data network and the power transmission equipment information acquisition and analysis server. The acquisition server is connected with the wireless communication base station. The wireless communication base station isolates the interactive network slices through a slice isolation technology. Specifically, the slice isolation technique includes carrier isolation and RB (Resource Based, physical Resource block) Resource reservation, where carrier isolation distinguishes resources between network slices by using air interface resources of corresponding carrier cells by the slices; and the RB resource reservation is carried out by allocating the RB resources of the carrier cell to each network slice through a resource reservation mechanism. Optionally, the RB resource reservation includes static reservation and dynamic sharing, where the resource that is statically reserved for a designated network slice and correspondingly reserved is a fixed resource, and cannot be allocated to other network slices; and dynamically sharing the resources correspondingly reserved for the specified network slice, and allocating the resources to other slices for multiplexing.
Further, the management information area includes an IDC (Internet Data Center) Data Center module, an internal office network module, and an external Internet module, and the IDC Data Center module, the internal office network module, and the external Internet module establish communication through a network channel. Specifically, referring to fig. 3, the management information area further includes a backbone integrated service data network and an internet, the IDC data center module is safely isolated from the backbone integrated service data network by two first firewalls, the internal office network module is safely isolated from the backbone integrated service data network by two second firewalls, and the external internet module is safely isolated from the internet by two third firewalls. The IDC data center module monitors intrusion of an IDC data network and scans the devices of an internal network through vulnerability scanning by using IPS (Internet Protocol Suite) devices. Specifically, the IDC data center module comprises an OA server, a personnel file server and an application server, wherein the application servers are isolated through an intrusion prevention system. The internal office network module monitors the intrusion of the local area network by using IPS equipment, scans the vulnerability of the equipment of the internal network by vulnerability scanning and checks and kills viruses of the terminal computer by an anti-virus system. The external internet module monitors invasion of the local area network by using IPS equipment, scans the vulnerability of the equipment of the internal network by vulnerability scanning and searches and kills viruses of the terminal computer by an anti-virus system.
In a possible embodiment, the internet exit management area includes an internet exit module, a DMZ (discrete zone) network module, a mobile office access network module, and an integrated data network access network module, and the internet exit module, the DMZ network module, the mobile office access network module, and the integrated data network access network module establish communication through a network channel. Specifically, the internet exit module is located at the internet network boundary, a gigabit firewall with high performance, safety, stability and easy management needs to be deployed to realize internet exit access control, two gigabit firewalls adopt a hot standby mode, IPS intrusion detection equipment needs to be utilized, monitoring and intrusion monitoring on important network ports are realized in a mirror image monitoring mode, vulnerability scanning is performed on equipment of the internet network through vulnerability scanning, and internet surfing behaviors are controlled through two internet surfing behavior management systems, including control on BT (Bit Torrent, bit stream), games and the like; the DMZ network module realizes DMZ area network access control through firewall equipment, realizes intrusion monitoring on the DMZ area network in a port mirroring mode by utilizing IPS equipment, realizes safety protection on an external website by utilizing a WEB (World Wide Web) firewall, realizes virus protection on a DMZ area server by utilizing an existing distributed anti-virus system, and scans vulnerabilities of equipment of the DMZ network through vulnerability scanning. The method comprises the steps that an access network is established for the production and operation requirements of an ultra-high voltage transmission company and network interconnection between other superior units and partners, convergence of the partner access network is achieved by utilizing an existing multi-port three-layer switch, intrusion monitoring and safety control of the access network are achieved by utilizing IPS equipment and adopting a port mirroring mode, network access control is achieved through firewall equipment, and vulnerability scanning is conducted on equipment accessed to the network through vulnerability scanning.
Further, referring to fig. 4, the internet exit module includes a fourth firewall, a secure socket layer, and a virtual private network, and the fourth firewall, the secure socket layer, and the virtual private network establish communication through a network channel. The Secure socket Layer is SSL (Secure Sockets Layer), which is a Secure protocol implemented on a transmission communication protocol (TCP/IP), and employs a public key technology. All traffic is encrypted using keys and algorithms established during the SSL handshake. This prevents certain users from eavesdropping illegally using IP packet sniffing tools. Although the packet sniffing still captures the content of the communication, it cannot decipher it. The Virtual Private Network is a Virtual Private Network (VPN), and has the functions of establishing a Private Network on a public Network, connecting an employee outside an encrypted communication with the internet locally, connecting the employee to the Virtual Private Network through the internet, and entering an intranet through the Virtual Private Network. In order to ensure data security, communication data between the virtual private network and the client is encrypted. With the virtual private network, no matter whether the user is on business outside or at home, the user can access intranet resources by using the virtual private network as long as the user can access the intranet resources by using the internet.
Furthermore, the network channel isolation technology comprises terminal access security isolation, network domain security isolation and external network equipment access security isolation, wherein the terminal access security isolation authenticates the access terminal by acquiring terminal identity authentication information to determine the legality of the access terminal; the network domain safety isolation is realized by authenticating and authorizing the service flow slice; the access security isolation of the external network equipment is realized by setting a security access area, so that the security interaction of service flow slices is guaranteed. Specifically, the risk of terminal access class is dealt with by researching access strategy control, and the access terminal is authenticated by using terminal identity authentication information, so that the terminal accessed to the network is ensured to be legal. The network domain security isolation prevents access and malicious intrusion from non-service flow slices by authenticating and authorizing the service flow slices. Specifically, isolation and access security policies of different service flow slices are researched, slices related to control services are authenticated and authorized, and access and malicious intrusion from other slices are strictly controlled. The isolation of network functions among slices is researched, and the isolation of the network functions among different slices is realized by utilizing a network isolation technology. The safety of the network function in the slice, the authentication of the network function in the slice, a safety channel and other safety interaction technologies are researched, and the network function interaction information is prevented from being hijacked and tampered.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of another identical element in a process, apparatus, article, or method comprising the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (8)

1. A safety protection system of a power information network is characterized by comprising: the system comprises a production management area, a management information area and an internet export management area, wherein data transmitted in a network channel are protected between the production management area and the management information area and between the management information area and the internet export management area through a network channel isolation technology, the production management area and the management information area are respectively connected with a comprehensive data network through a firewall, and the internet export management area is connected with a service data network through a communication gateway.
2. The safety protection system of an electric power information network according to claim 1, wherein the production management area comprises an intelligent analysis application module, a power transmission equipment state acquisition module, a power transformation equipment state acquisition module and an emergency management service module, and the intelligent analysis application module, the power transmission equipment state acquisition module, the power transformation equipment state acquisition module and the emergency management service module establish communication through a network channel.
3. A safety protection system for an electric power information network according to claim 2, characterized in that the intelligent analysis application module comprises two intelligent analysis application servers, the transmission equipment state acquisition module comprises two transmission equipment information acquisition and analysis servers, the transformation equipment state acquisition module comprises a transformation equipment information acquisition and analysis server, and the emergency management service module comprises an emergency management server.
4. The electrical information network security system of claim 1, wherein the management information area comprises an IDC data center module, an internal office network module, and an external internet module, and wherein the IDC data center module, the internal office network module, and the external internet module establish communication through a network channel.
5. The system of claim 4, wherein the management information area further comprises a backbone integrated services data network and the Internet, the IDC data center module is securely isolated from the backbone integrated services data network by two first firewalls, the internal office network module is securely isolated from the backbone integrated services data network by two second firewalls, and the external Internet module is securely isolated from the Internet by two third firewalls.
6. The electrical information network security system of claim 1, wherein the internet exit management area comprises an internet exit module, a DMZ network module, a mobile office access network module, and an integrated data network access network module, and wherein the internet exit module, the DMZ network module, the mobile office access network module, and the integrated data network access network module establish communication therebetween via a network channel.
7. The electrical information network security system of claim 6, wherein the internet exit module comprises a fourth firewall, a secure socket layer, and a virtual private network, the fourth firewall, the secure socket layer, and the virtual private network establishing communication through a network channel.
8. The security system of the power information network according to claim 1, wherein the network channel isolation technology comprises terminal access security isolation, network domain security isolation, and extranet device access security isolation, wherein the terminal access security isolation authenticates the access terminal by obtaining terminal identity authentication information to determine the validity of the access terminal; the network domain safety isolation is realized by authenticating and authorizing the service flow slice; the access security isolation of the external network equipment is realized by setting a security access area, so that the security interaction of service flow slices is guaranteed.
CN202211282164.9A 2022-10-19 2022-10-19 Safety protection system of electric power information network Pending CN115361232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211282164.9A CN115361232A (en) 2022-10-19 2022-10-19 Safety protection system of electric power information network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211282164.9A CN115361232A (en) 2022-10-19 2022-10-19 Safety protection system of electric power information network

Publications (1)

Publication Number Publication Date
CN115361232A true CN115361232A (en) 2022-11-18

Family

ID=84008854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211282164.9A Pending CN115361232A (en) 2022-10-19 2022-10-19 Safety protection system of electric power information network

Country Status (1)

Country Link
CN (1) CN115361232A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203968148U (en) * 2014-06-24 2014-11-26 乐山师范学院 A kind of network security management system with intrusion detection
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN113055887A (en) * 2021-05-18 2021-06-29 全球能源互联网研究院有限公司 Network channel safety protection system for electric power 5G application
CN113794714A (en) * 2021-09-13 2021-12-14 西安热工研究院有限公司 Network safety system for intelligent power plant architecture
CN114302402A (en) * 2021-12-24 2022-04-08 国网福建省电力有限公司 Electric power regulation and control business safety communication method based on 5G

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203968148U (en) * 2014-06-24 2014-11-26 乐山师范学院 A kind of network security management system with intrusion detection
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN113055887A (en) * 2021-05-18 2021-06-29 全球能源互联网研究院有限公司 Network channel safety protection system for electric power 5G application
CN113794714A (en) * 2021-09-13 2021-12-14 西安热工研究院有限公司 Network safety system for intelligent power plant architecture
CN114302402A (en) * 2021-12-24 2022-04-08 国网福建省电力有限公司 Electric power regulation and control business safety communication method based on 5G

Similar Documents

Publication Publication Date Title
Gupta et al. Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks
CN109995769B (en) Multi-stage heterogeneous trans-regional full-real-time safety management and control method and system
CN110198297A (en) Data on flows monitoring method, device, electronic equipment and computer-readable medium
Inamdar et al. Security analysis of open source network access control in virtual networks
Rahman et al. Security attacks on wireless networks and their detection techniques
Aboti Studies of challenges to mitigating cyber risks in iot-based commercial aviation
CN117118703A (en) Mobile office security architecture based on Internet
Gupta et al. Zero aliasing compression
CN115361232A (en) Safety protection system of electric power information network
Waluyo et al. Mikrotik Login Security with Port-Knocking and Brute Force Firewall at PT. Time Excelindo
Faheem Multiagent-based security for the wireless LAN
Vennam et al. A Comprehensive Analysis of Fog Layer and Man in the Middle Attacks in IoT Networks
Stepanek Distributed firewalls
Amiri et al. Survey on network access control technology in MANETs
Zhao et al. Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios
Ghosh et al. Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks
Pavan et al. Survey on Security Risks in 5G Private Industrial Networks
Lee et al. A Study on Security Management Service System for Wireless Network Environment
Thandeeswaran et al. Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure
Al-Shebami et al. Wireless LAN Security
Zou et al. Research on Security Risk Analysis and Protective Measures of Power Internet of Things
Hussain et al. Exploring the Privacy Issues of Smart-Grid Infrastructure–A Network Security Perspective
Li et al. Research on Security Protection of Satellite Resource Scheduling System Based on WEB
Khan Enhancing The Privacy of Smart-Grid Infrastructure–A Network Security Perspective
Kumar et al. Review On Securing Of Wireless Mesh Network From Denial Of Services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221118