CN116545654A - Deployment method of longitudinal encryption authentication device in power system - Google Patents

Deployment method of longitudinal encryption authentication device in power system Download PDF

Info

Publication number
CN116545654A
CN116545654A CN202310382600.8A CN202310382600A CN116545654A CN 116545654 A CN116545654 A CN 116545654A CN 202310382600 A CN202310382600 A CN 202310382600A CN 116545654 A CN116545654 A CN 116545654A
Authority
CN
China
Prior art keywords
authentication device
longitudinal encryption
encryption authentication
longitudinal
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310382600.8A
Other languages
Chinese (zh)
Inventor
马龙
王浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Ningxia Energy Co ltd
Yanchi County Zhongying Chuangneng New Energy Co ltd
Original Assignee
Huaneng Ningxia Energy Co ltd
Yanchi County Zhongying Chuangneng New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Ningxia Energy Co ltd, Yanchi County Zhongying Chuangneng New Energy Co ltd filed Critical Huaneng Ningxia Energy Co ltd
Priority to CN202310382600.8A priority Critical patent/CN116545654A/en
Priority to LU504593A priority patent/LU504593B1/en
Publication of CN116545654A publication Critical patent/CN116545654A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to a deployment method of a longitudinal encryption authentication device in a power system, which comprises the following steps: removing a firewall, adjusting the original network, and ensuring that the service can normally run on the adjusted network; configuring a first longitudinal encryption authentication device, and powering on; the first longitudinal encryption authentication device is connected between the remote terminal unit and the router, and meanwhile, the connection between the power management unit and the router is disconnected, so that data is ensured to pass through the first longitudinal encryption authentication device side; after the real-time data transmission service is recovered, modifying and perfecting the strategy of the first longitudinal encryption authentication device; the second longitudinal encryption authentication device is connected between the power management unit and the router; and a third longitudinal encryption authentication device is additionally arranged on the station side. The invention creates the virtual private network tunnel transmission service data through the longitudinal encryption authentication device, and the service data is encrypted to ensure the relative safety of the power network.

Description

Deployment method of longitudinal encryption authentication device in power system
Technical Field
The invention relates to the technical field of power dispatching automation, in particular to a deployment method of a longitudinal encryption authentication device in a power system.
Background
The intelligent power grid dispatching control system has a business scene of a large amount of data transmission. With the technical progress and business development of the power grid, the intelligent power grid dispatching control system has increasingly powerful functions, various applications have the characteristics of complexity and diversity in the aspect of data communication, and the intelligent power grid dispatching control system mainly has increasingly high requirements on safety, reliability and the like of data communication in the aspects of large transmission data volume, various data acquisition modes, high data interaction instantaneity and the like. To meet the development requirements of the power grid, research on data transmission technology of a smart power grid dispatching control system is urgent.
The EMS system of the current power grid total call is protected through a firewall, and the longitudinal encryption gateway completely has the security filtering function of the firewall, so that the longitudinal encryption gateway can be used for replacing the firewall.
In the power system network, the local network of each power dispatching company is generally divided into 4 different areas based on different data service types, namely a control area, a production management area and a management information area, which are named from a work area to a V area in sequence. The control large area, the production large area and the production management large area have business exchange and transmission mutually, and the management information large area has no business exchange with the other three large areas basically. Based on the characteristics, the deployment of safety protection equipment facilities of the electric secondary system is generally based on the principle of layering and partitioning and strengthening boundaries, and takes transverse isolation and longitudinal protection as strategies, and the safety protection is carried out by adopting longitudinal dense equipment in data communication between longitudinal I/II areas (namely a control area and a production area).
Disclosure of Invention
The invention provides a deployment method of a longitudinal encryption authentication device in a power system, which aims to solve the problem of power grid dispatching safety protection.
In order to achieve the purpose of the invention, a deployment method of a longitudinal encryption authentication device in a power system is provided, wherein a Virtual Private Network (VPN) tunnel is established through the longitudinal encryption authentication device to transmit service data, and the service data is connected with an upper power dispatching center and a lower power dispatching center; the method comprises the following steps:
s101, a first longitudinal encryption authentication device is configured at a master station side and used for powering up operation at a real-time switch side;
s102, accessing a first longitudinal encryption authentication device between a real-time switch and a real-time router to ensure that data passes through the first longitudinal encryption authentication device;
s103, after the real-time data transmission service is recovered, modifying and perfecting the strategy of the first longitudinal encryption authentication device;
s104, accessing a second longitudinal encryption authentication device between the non-real-time switch and the non-real-time router;
s105, a third longitudinal encryption authentication device is additionally arranged on the station side.
Before the first longitudinal encryption authentication device is powered on, all strategies are configured and released; and disconnecting the network cable during power-on operation.
If the service operation is not recovered for a long time (30S) in S104, the network is disconnected, the real-time switch is directly connected to the router again, and then diagnosis is performed.
And the deletion strategy of the first longitudinal encryption authentication device is fully opened, and then the affected condition of the service is observed for investigation until all the services are normal.
The link policy of the second longitudinal encryption authentication device is configured with reference to the first longitudinal encryption authentication device, and in S105, before the second longitudinal encryption authentication device is accessed, a jumper wire should be connected first, and then a network cable corresponding to another network port should be connected. After the second longitudinal encryption authentication device is accessed, performing master-slave switching, pulling out the network cable of the first longitudinal encryption authentication device, and operating the second longitudinal encryption authentication device as a master device to ensure service operation recovery.
Wherein the real-time switch is a remote terminal unit (RTU switch); the non-real time switch is a phasor measurement unit (PMU switch).
In the sixth step, the third longitudinal encryption authentication device is installed at the front end of the station side router.
In the sixth step, the third longitudinal encryption authentication device is installed at the rear end of the station side router.
The invention has the beneficial effects that: the invention establishes a Virtual Private Network (VPN) tunnel to transmit service data through the longitudinal encryption authentication device, and connects with the upper and lower electric power dispatching centers. The power special network comprises two large network systems, namely a power dispatching data network and a power data communication network. The power dispatching data network consists of a router, a switch, a longitudinal encryption authentication device and other devices. The longitudinal encryption authentication device is arranged at a one-way port of the switch, encrypts all service data acquired by the switch, transmits the encrypted data to a router interconnection port, and transmits the data to the power special network through a designated route, so that confidentiality and integrity protection of data transmission are realized. According to the requirement of special network management of the electric power system, the longitudinally secret equipment is required to be deployed at a central station and each substation under the jurisdiction, a corresponding encryption tunnel is established according to the scheduling relation of the jurisdiction, so that the encryption transmission of the whole communication link data is realized, and generally, the network structure for deploying the longitudinally secret device is a net-shaped double network. By arranging the longitudinal encryption authentication device, the application program in the intelligent power grid dispatching control system can realize transverse cross-region transmission, simultaneously support data interaction between dispatching centers at all levels, meet the requirement of sharing the intelligent power grid dispatching control system in a data wide area range of the multi-level dispatching centers, prevent hacker invasion and improve safety performance.
Drawings
FIG. 1 is a flowchart of a method for deploying a longitudinal encryption authentication device in a power system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a specific embodiment of a deployment of a longitudinal encryption authentication device in a power system according to the present invention;
FIG. 3 is a schematic diagram of a deployment of a longitudinal encryption authentication device in a power system according to an embodiment of the present invention;
fig. 4 is a schematic diagram of deployment of a longitudinal encryption authentication device in a second power system according to the embodiment of the invention.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many other forms than described herein and similarly generalized by those skilled in the art to whom this disclosure pertains without departing from the spirit of the disclosure and, therefore, this disclosure is not limited by the specific implementations disclosed below.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of this specification to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In the power system network, the local network of each power dispatching company is generally divided into 4 different areas based on different data service types, namely a control area, a production management area and a management information area, which are named from a work area to a V area in sequence. The control large area, the production large area and the production management large area have business exchange and transmission mutually, and the management information large area has no business exchange with the other three large areas basically. Based on the characteristics, the deployment of safety protection equipment facilities of the electric secondary system is generally based on the principle of layering partition and strengthening boundary, and adopts the strategy of transverse isolation and longitudinal protection, and the method comprises the following steps of
The data communication between the I/II area (namely the control area and the production area) adopts longitudinally dense equipment for safety protection.
Longitudinal encryption, as the name implies, generally refers to that an upper power dispatching center is connected with a lower power dispatching center, and then a longitudinal encryption authentication device is used for creating a vpn tunnel to transmit real-time and non-real-time service data, because once the service data is encrypted (two algorithms commonly used at present, rsa and sm 2) a hacker cannot crack even if the hacker obtains a message, because encryption and decryption public keys and private keys at two ends of the tunnel are in one-to-one correspondence, so that the relative safety of a power network is ensured. Therefore, the physical object corresponding to the longitudinal encryption is the longitudinal encryption authentication device, which is generally used on the power plant side, the photovoltaic power station side and the wind power plant side.
In the description of the invention, a method for deploying a longitudinal encryption authentication device in a power system is provided. The network modulation system is protected by the firewall, and the longitudinal encryption gateway completely has the security filtering function of the firewall, so the firewall is required to be closed firstly in deployment, and the longitudinal encryption authentication device is used for replacing the firewall.
Fig. 1 shows a flowchart of a method for deploying a longitudinal encryption authentication device in a power system according to an embodiment of the present disclosure, the method including:
101, configuring a first longitudinal encryption authentication device at a main station side for powering up operation at a real-time switch side;
102, accessing the first longitudinal encryption authentication device between the real-time switch and the real-time router, and ensuring that data passes through the first longitudinal encryption authentication device;
103, after the real-time data transmission service is recovered, modifying and perfecting the strategy of the first longitudinal encryption authentication device;
104, accessing the second longitudinal encryption authentication device between the non-real-time switch and the non-real-time router;
and 105, adding a third longitudinal encryption authentication device on the station side.
Specific:
then, a first longitudinal encryption authentication device is required to be configured offline, and the strategies are released; a first longitudinal encryption authentication device configured offline is powered on and operated, and a network cable is not required to be connected at the moment; and the first longitudinal encryption authentication device is connected between the RTU switch and the real-time router, and meanwhile, the connection between the PMU switch and the non-real-time router is disconnected, so that data is ensured to pass through the first longitudinal encryption authentication device.
And (3) observing whether the network service is recovered (the recovery time is generally 30 seconds), if the network service is not recovered for a long time, disconnecting the first longitudinal encryption authentication device from the network, directly connecting the RTU switch to the router again, and diagnosing. If the service is recovered, observing the running condition of the service for a period of time, and carrying out the following steps after stabilizing.
Checking all the passed links in the first longitudinal encryption authentication device, and modifying and perfecting the strategy of the first longitudinal encryption authentication device according to the condition of the links; and deleting the rule fully released in the strategy of the first longitudinal encryption authentication device, observing the service, and checking and debugging until all the services are normal.
Importing the configuration of the first longitudinal encryption authentication device into another second longitudinal encryption authentication device; the second longitudinal encryption authentication device is powered on, and then is connected with a jumper wire firstly and then connected with network wires corresponding to other network ports; the eth0 port network cable of the first longitudinal encryption authentication device is unplugged (after about 5 seconds, the device is connected back), and at the moment, the master-slave switching is performed, and the gigabit B operates as a master device.
The primary-backup switching may cause a part of service interruption, and service recovery and operation conditions are observed after the primary-backup switching. If the service is not recovered for a long time (generally 30 seconds) after the switching, disconnecting the second longitudinal encryption authentication device from the network, and then checking the reason; if the switching is normal, the switching operation is performed for more times, so that the situation of no loss is ensured.
The invention is described in detail below with reference to the attached drawings of the specification:
referring to fig. 2, a schematic diagram of a deployment situation in which a longitudinal encryption authentication device in an electric power system is deployed in a master station side (i.e., an upper-level power plant) is shown.
In some embodiments of the present invention, two communication gateways are first provided at the master station side, and then one of the two communication gateways is connected to a real-time switch, and the other one is a non-real-time switch, and a longitudinal encryption authentication device is deployed between the switch and a router to replace the security protection function of the original firewall. The data signals are sent to the exchanger through the communication gateway, the signals of the exchanger are encrypted through the longitudinal encryption authentication device, and the signals are transmitted to the power plant dispatching data network through the router.
Embodiment one:
referring to fig. 3, a schematic diagram of a deployment situation of a longitudinal encryption authentication device deployed on a plant side (i.e., a lower-level power plant) in a power system according to the present invention is shown.
In some embodiments of the present invention, data is sent from a power plant dispatch network, sent to a longitudinal encryption authentication device by a router for decryption, and then output to a communication gateway at a plant station side via a switch, so as to complete the reception of information of a superior power plant.
When no device is added in the network, the switch is started, so that the message forwarding paths of the receiving and transmitting are inconsistent. In this case, the standard packet filtering firewall is disposed between the router and the switch to discard all messages, and the request message and the response message sent by the communication gateway cannot reach the same firewall, so that illegal communication is discarded. The longitudinal encryption authentication device and the remote node device simultaneously establish a main tunnel based on the address borrowing principle so as to solve the problems, and meanwhile, the device can support multiple VLANs. The device solves the need of ensuring multi-service communication, has small use quantity and is convenient for centralized management.
Embodiment two:
referring to fig. 4, a schematic diagram of another deployment scenario in which a longitudinal encryption authentication device is deployed on a plant side (i.e., a lower-level power plant) in the power system of the present invention is shown.
In some embodiments of the present invention, the network environment of the data network is scheduled at the master station side, as shown in the deployment of fig. 2. The station side dispatching data network is not provided with a router, only one exchanger and two communication gateways are provided, and the station side longitudinal encryption authentication device is arranged between the exchanger and the communication gateways. The arrangement method is flexible and can be applied to various complex environments.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the embodiments are not limited by the order of actions described, as some steps may be performed in other order or simultaneously according to the embodiments of the present disclosure. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all required for the embodiments described in the specification.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are merely used to help clarify the present specification. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of the embodiments. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This specification is to be limited only by the claims and the full scope and equivalents thereof.

Claims (10)

1. A method for deploying a longitudinal encryption authentication device in an electric power system, the method comprising:
the control robot is provided with a first longitudinal encryption authentication device at the main station side and is used at the real-time switch side;
the control robot accesses the first longitudinal encryption authentication device between the real-time switch and the real-time router so that data passes through the first longitudinal encryption authentication device;
after the real-time data transmission service is recovered, the control robot modifies and perfects the strategy of the first longitudinal encryption authentication device;
the control robot accesses the second longitudinal encryption authentication device between the non-real-time switch and the non-real-time router;
the control robot is additionally provided with a third longitudinal encryption authentication device at the station side;
the longitudinal encryption authentication device is configured to create a virtual private network tunnel transmission service data and is connected with an upper power dispatching center and a lower power dispatching center.
2. The method of claim 1, wherein the first longitudinal encryption authentication device configures the policy to be released prior to power-up operation.
3. The method for deploying longitudinal encryption authentication devices in a power system according to claim 1, wherein the link policy of the second longitudinal encryption authentication device is configured with reference to the first longitudinal encryption authentication device.
4. The deployment method of the longitudinal encryption authentication device in the electric power system according to claim 1, wherein if the service operation is not resumed beyond a set time, the network is disconnected, and the real-time switch is reconnected to the router and diagnosed.
5. The deployment method of longitudinal encryption authentication devices in a power system according to claim 4, wherein the policy of the first longitudinal encryption authentication device is deleted to a fully open rule, and then the affected condition of the service is acquired and examined until all services are normal.
6. The deployment method of the longitudinal encryption authentication device in the electric power system according to claim 1, wherein before the second longitudinal encryption authentication device is accessed, a jumper wire is connected, and network cables corresponding to other network ports are connected.
7. The deployment method of the longitudinal encryption authentication device in the electric power system according to claim 6, wherein after the second longitudinal encryption authentication device is accessed, the network cable of the first longitudinal encryption authentication device is removed, and the second longitudinal encryption authentication device is operated as a master device, so that the service operation is resumed.
8. The method for deploying a longitudinal encryption authentication device in a power system according to claim 1, wherein the real-time switch is a remote terminal unit; the non-real time switch is a phasor measurement unit.
9. The method for deploying longitudinal encryption and authentication devices in a power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at a front end of a station-side router.
10. The method for deploying longitudinal encryption and authentication devices in a power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at a rear end of a station-side router.
CN202310382600.8A 2023-04-11 2023-04-11 Deployment method of longitudinal encryption authentication device in power system Pending CN116545654A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202310382600.8A CN116545654A (en) 2023-04-11 2023-04-11 Deployment method of longitudinal encryption authentication device in power system
LU504593A LU504593B1 (en) 2023-04-11 2023-06-27 Method for deploying longitudinal encryption and authentication device in electrical power system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310382600.8A CN116545654A (en) 2023-04-11 2023-04-11 Deployment method of longitudinal encryption authentication device in power system

Publications (1)

Publication Number Publication Date
CN116545654A true CN116545654A (en) 2023-08-04

Family

ID=87449705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310382600.8A Pending CN116545654A (en) 2023-04-11 2023-04-11 Deployment method of longitudinal encryption authentication device in power system

Country Status (2)

Country Link
CN (1) CN116545654A (en)
LU (1) LU504593B1 (en)

Also Published As

Publication number Publication date
LU504593B1 (en) 2024-01-09

Similar Documents

Publication Publication Date Title
Rehmani et al. Software defined networks-based smart grid communication: A comprehensive survey
Sidhu et al. Modelling and simulation for performance evaluation of IEC61850-based substation communication systems
CN104335531B (en) PVLAN is realized in large-scale distributed virtual switch
Zhou et al. Efficient application of GPRS and CDMA networks in SCADA system
Sidhu et al. Implementation issues with IEC 61850 based substation automation systems
RU2526836C1 (en) Utility communication method and apparatus therefor
Rajkumar et al. Cyber attacks on protective relays in digital substations and impact analysis
Kumar et al. Microgrid communications—Protocols and standards
CN105610555B (en) A kind of practical system-level redundancy communication network framework
CN108566325A (en) Ciphering type ring exchanger system
CN116545654A (en) Deployment method of longitudinal encryption authentication device in power system
CN107295701A (en) A kind of self-organized network communication device and communication system
US6483811B1 (en) System and method for emulating a distributed network
Metchkarski et al. Information and communication technologies potential for future power systems control
Gourisetti et al. A cyber secure communication architecture for multi-site hardware_in_the_loop Co_simulation of DER control
Cisco Campus Infrastructure Considerations
CN113824718A (en) Quantum network access security middleware platform and construction method thereof
CN113285941A (en) Enterprise extranet system and network request processing method
CN207075098U (en) A kind of self-organized network communication device and communication system
Yang et al. A communication system architecture for regional control of power distribution networks
Yu et al. Integrated Design and Simulation of Communication Network for Space TT&C Station
CN109150527A (en) A kind of switched telephone network quantum cryptography system and encryption communication method
Coppel et al. Practical considerations for ethernet networking within substations
CN115361152A (en) Encryption system and encryption method for seamless access to existing network
JP5776978B2 (en) Network relay system and network relay system automatic setting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination