CN117614699A - Long-distance power grid equipment communication system - Google Patents

Long-distance power grid equipment communication system Download PDF

Info

Publication number
CN117614699A
CN117614699A CN202311600738.7A CN202311600738A CN117614699A CN 117614699 A CN117614699 A CN 117614699A CN 202311600738 A CN202311600738 A CN 202311600738A CN 117614699 A CN117614699 A CN 117614699A
Authority
CN
China
Prior art keywords
list
dictionary
data
encryption
post
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311600738.7A
Other languages
Chinese (zh)
Other versions
CN117614699B (en
Inventor
刘骏扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Nanrui Zhongtian Electric Power Electronics Co ltd
Original Assignee
Anhui Nanrui Zhongtian Electric Power Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Nanrui Zhongtian Electric Power Electronics Co ltd filed Critical Anhui Nanrui Zhongtian Electric Power Electronics Co ltd
Priority to CN202311600738.7A priority Critical patent/CN117614699B/en
Publication of CN117614699A publication Critical patent/CN117614699A/en
Application granted granted Critical
Publication of CN117614699B publication Critical patent/CN117614699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0006Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
    • H04L1/0007Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length
    • H04L1/0008Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length by supplementing frame payload, e.g. with padding bits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/24Testing correct operation
    • H04L1/245Testing correct operation by using the properties of transmission codes
    • H04L1/246Testing correct operation by using the properties of transmission codes two-level transmission codes, e.g. binary
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses a long-distance power grid equipment communication system, which relates to the technical field of safety communication, wherein a power grid equipment data acquisition module is arranged to acquire and generate regional communication data, a safety encryption module constructs an encryption object for long-distance transmission, and based on 16 groups of 4-bit binary, 4-bit binary is correspondingly filled in the encryption object and a mapping is built between the encryption object and a number 0 or 1, the regional communication data converted into binary finds out the corresponding replacement element based on the constructed encryption object.

Description

Long-distance power grid equipment communication system
Technical Field
The invention relates to the technical field of safety communication, in particular to a long-distance power grid equipment communication system.
Background
Long-distance power grid equipment communication has important significance and effect in a power system. The remote communication and data transmission between the power grid equipment can be realized, so that the safety, reliability and efficiency of the power system are improved, and the real-time monitoring and control can be realized through the communication of the long-distance power grid equipment. Through remote communication, the remote control center can monitor the state and operating parameters of each key device, such as a generator, a transformer, a switch device and the like, in real time. The method is favorable for timely finding potential faults and problems, and taking corresponding measures for intervention and repair so as to ensure the normal operation of the power grid;
the current long-distance power grid equipment communication system is applied to a transformer substation and a remote control center, the transformer substation collects data of power grid equipment, the data are transmitted to the remote control center in a long distance, the remote control center is used for controlling the power grid equipment, encryption is carried out on the data in a key mode in the process that the transformer substation transmits the data to the remote control center in a long distance, the key is dynamically updated by the remote control center and transmitted to the transformer substation, in such a mode, the risk of stealing the data by leakage exists in the transmission process of the key, the data of the long-distance transmission encrypted by the key are common in display form, if the data are stolen by a third party, the third party can easily judge what the encryption mode is, and further the data are broken in an encryption mode, so that the communication of the long-distance power grid equipment is not safe any more;
in order to solve the above problems, the present invention proposes a solution.
Disclosure of Invention
The invention aims to provide a long-distance power grid equipment communication system, which aims to solve the problems that in the prior art, in the process of carrying out long-distance communication on power grid equipment data, a key used for encryption is dynamically updated by a remote control center and is transmitted to a transformer substation, in such a way, the key is in risk of being stolen in the process of transmission, and the long-distance transmitted power grid equipment data encrypted by the key is common in display form, if the data is stolen by a third party, the third party can easily judge what the encryption mode is, and further the stolen data is cracked in an encryption mode, so that the long-distance power grid equipment communication is no longer safe.
The aim of the invention can be achieved by the following technical scheme:
a long-range power grid equipment communication system, comprising:
the power grid equipment data acquisition module acquires communication data of power grid equipment in all authorized trust data sources in an area to generate area communication data, wherein the communication data of the power grid equipment comprises equipment state and operation data, alarm and fault information of all the power grid equipment;
the system comprises a secure encryption module, a storage module and a storage module, wherein the secure encryption module is used for carrying out secure encryption on regional communication data transmitted in a long distance, the secure encryption module is used for constructing objects used for encryption, each object corresponds to a number 0 or 1 in the construction process, the objects comprise a dictionary and a list, and the list exists in the dictionary in the form of key value pairs;
and filling 16 4-bit binary numbers existing in the binary system 1111 converted from 4-bit binary 0000 into the 4-bit binary 1111 into the object, after filling, intercepting a plurality of groups of replacement character strings from the received area communication data subjected to binary conversion by taking the character length 4 as the interception length, sequentially selecting a dictionary and a list corresponding to numbers consistent with each character in the replacement character strings according to each character in the replacement character strings, finally determining elements in the selected list, taking the elements as encryption elements of the corresponding groups of replacement character strings, and splicing to obtain the final secure encryption data.
Further, the specific steps of the security encryption module constructing the object for encryption and filling 16 4-bit binary numbers into the object are as follows:
step one: converting 4-bit binary 0000 into 16 4-bit binary 1111, and marking the 16 4-bit binary numbers as P0, P1, P15 in sequence from small to large according to the sizes of the corresponding decimal numbers, wherein in the marking of the 16 4-bit binary numbers, the reference numerals are the numbers converted into decimal numbers;
step two: creating an empty first pre-dictionary A0 and a first post-dictionary A1, mapping the first pre-dictionary and the first post-dictionary with the number 0, creating an empty second pre-dictionary D0 and a second post-dictionary D1, and mapping the second pre-dictionary and the second post-dictionary with the number 1;
creating an empty first front middle list B0 and a first middle front list B1, mapping the first front middle list with the number 0, mapping the first middle front list with the number 1, creating an empty first rear middle list C0 and a first rear middle list C1, mapping the first rear middle list with the number 0, and mapping the first rear middle list with the number 1;
step three: sequentially adding 4-bit binary numbers P0 and P1 into a first front middle list B0 according to the sequence of P0, P1, and P15, and mapping the P0 and P1 with numbers 0 and 1 respectively after the addition is finished;
adding 4-bit binary numbers P2 and P3 into a first middle-front list B1, and mapping the P2 and P3 with numbers 0 and 1 respectively after the addition is finished;
step four: adding the first front middle list and the first front middle lists B0 and B1 after the addition is finished and the number mapping is built into the first front dictionary A0 in the form of key value pairs, wherein the first front middle list B0 is a key, the first front middle list B1 is a value, and after the addition is finished, adding the B0 in the form of key value pairs: b1 and the number 0 establish a digital mapping;
step five: according to the first to fourth steps, 4-bit binary numbers P4, P5, P6 and P7 are respectively added into a first rear middle list C0 and a first rear middle list C1, after the addition is finished, the first rear middle list C0 and the first rear middle list C1 are also added into a first rear dictionary A1 in the form of key value pairs, and after the addition is finished, the first rear dictionary A1 has a numerical corresponding relation;
step six: creating an empty second front middle list and a second middle front list E0 and E1, which are respectively mapped with numbers 0 and 1, and creating an empty second rear middle list and a second middle rear list F1 and F2, which are respectively mapped with numbers 0 and 1;
according to the first to fifth steps, P8, P9, and P15 are correspondingly added to the empty second pre-dictionary D0 and the second post-dictionary D1, and the added second pre-dictionary and second post-dictionary have the same number correspondence.
The invention has the beneficial effects that:
the method comprises the steps of acquiring communication data of power grid equipment in all authorized trust data sources in an area by setting a power grid equipment data acquisition module to generate area communication data, constructing an encryption object for long-distance transmission, correspondingly filling 4-bit binary in the encryption object based on 16 groups of 4-bit binary, establishing mapping between the encryption object and a number 0 or 1 according to different types of encryption objects and the sequence of keys and values in dictionary, list and key value pairs, converting the encryption object and the number 0 or 1 into binary area communication data, wherein each four characters are a group of replacement character strings, and finding corresponding replacement elements based on the constructed encryption object to obtain final safe encryption data; according to the method, on one hand, the situation that a rule used for encrypting data is transmitted in a network is avoided, the situation that the encryption rule leaks due to network transmission is eliminated, and on the other hand, as 16 groups of 4-bit binary is used, characters in encrypted safety encryption data only contain numbers 0 and 1, the safety encryption data still look as unencrypted binary data, the characteristic that the safety encryption data is confused is endowed, the specific encryption mode cannot be judged based on the safety encryption data, and the safety of communication of long-distance power grid equipment is ensured.
Drawings
The invention is further described below with reference to the accompanying drawings.
FIG. 1 is a system block diagram of the present invention;
fig. 2 is a flow chart of the method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
An embodiment one, as shown in fig. 1 and 2, is a long-distance power grid equipment communication system, which includes a power grid equipment data acquisition module, a security encryption module and a remote monitoring center;
the power grid equipment data acquisition module is used for acquiring communication data of power grid equipment in all authorized trust data sources in an area to generate area communication data, and transmitting the area communication data to the security encryption module, wherein the data sources comprise a transformer substation, a power station and a power distribution station, and the communication data of the power grid equipment comprise equipment identification and address information, equipment state and operation data, control commands and operation instructions, alarm and fault information, data acquisition intervals and transmission time stamps of all power grid equipment contained in the data sources;
the equipment identification and address information of the power grid equipment comprises equipment numbers, longitude, latitude and other information of the geographic position of the equipment, and the type or category of the equipment, and is used for uniquely identifying each equipment; the equipment state and operation data comprise current data, voltage data, power data, temperature, humidity and pressure data, and are used for monitoring the equipment state and operation conditions in real time; the control command and the operation command comprise a device switch command, a parameter setting command and a preset scheduling command, which are respectively used for controlling the switch state of the device, configuring various parameters of the device and setting a preset work plan or scheduling task of the device; the alarm and fault information includes alarms and exception notifications of the device and fault notifications of the device; the data acquisition interval and the transmission time stamp comprise the time interval of equipment data acquisition and the time stamp of data transmission;
the safety encryption module is used for carrying out safety encryption on the remote-transmission power grid equipment communication data, and after receiving the regional communication data transmitted by the power grid equipment data acquisition module, the safety encryption module carries out safety encryption on the regional communication data according to a certain encryption generation rule to generate corresponding safety encryption data, and specifically comprises the following steps:
s11: binary conversion is carried out on the regional communication data, and the converted data are recalibrated into regional data;
s12: converting 4-bit binary 0000 into 16 4-bit binary 1111, and marking the 16 4-bit binary numbers as P0, P1, P15 in sequence from small to large according to the sizes of the corresponding decimal numbers, wherein in the marking of the 16 4-bit binary numbers, the reference numerals are the numbers converted into decimal numbers;
s13: generating a first pre-dictionary A0, a first post-dictionary A1, a second pre-dictionary D0 and a second post-dictionary D1 according to a certain generation rule, wherein the specific steps are as follows:
s131: creating an empty first pre-dictionary and a first post-dictionary which are respectively marked as A0 and A1, and mapping the first pre-dictionary and the first post-dictionary with the number 0, wherein the forms of the empty first pre-dictionary and the first post-dictionary in the programming field are respectively A0 = { } and A1 = { };
creating an empty second pre-dictionary and a second post-dictionary which are respectively marked as D0 and D1, and mapping the second pre-dictionary and the second post-dictionary with the number 1, wherein the forms of the empty second pre-dictionary and the second post-dictionary in the programming field are respectively D0= { } and D1= { };
s132: creating an empty first front middle list and a first front middle list, which are respectively marked as B0 and B1, and respectively carrying out digital mapping on the first front middle list, the first front middle list and subscripts in labels thereof, namely mapping the first front middle list and the digits 0, and mapping the first front middle list and the digits 1, wherein the forms of the empty first front middle list and the first front middle list in the programming field are respectively B1= [ ], B2= [ ];
s133: creating an empty first post-middle list and a first post-middle list, which are marked as C0 and C1 respectively, and performing digital mapping on the first post-middle list, the first post-middle list and subscripts in labels thereof respectively, namely mapping the first post-middle list and the number 0, and mapping the first post-middle list and the number 1, wherein the forms of the empty first post-middle list and the first post-middle list in the programming field are C0= [ ], C1= [ ];
s134: sequentially adding 4-bit binary numbers P0 and P1 into a first front middle list B0 according to the sequence of P0, P1, and P15, and mapping the P0 and P1 with numbers 0 and 1 respectively after the addition is finished;
adding 4-bit binary numbers P2 and P3 into a first middle-front list B1, and mapping the P2 and P3 with numbers 0 and 1 respectively after the addition is finished;
s135: adding the first front middle list and the first front middle lists B0 and B1 after the addition is finished and the number mapping is built into the first front dictionary A0 in the form of key value pairs, wherein the first front middle list B0 is a key, the first front middle list B1 is a value, and after the addition is finished, adding the B0 in the form of key value pairs: b1 and number 0 establish digital mapping, and the form of the added first pre-dictionary in the programming field is A0= { [0000,0001]: [0010,0011] };
the numerical correspondence existing in the first pre-dictionary is described in a0= { [0000,0001]: [0010,0011] }: first, a first front dictionary a0= { [0000,0001]: [0010,0011] } corresponds to the number 0, a key value pair [0000,0001]: [0010,0011] corresponds to the number 0, a first front middle list B0 corresponds to the number 0, a first front middle list B1 corresponds to the number 1, a character string 0000 in the first front middle list B0 corresponds to the number 0,0001 corresponds to the number 1, a character string 0010 in the first front middle list B1 corresponds to the number 0,0011 corresponds to the number 1;
s136: according to S131 to S135, 4-bit binary numbers P4 and P5, P6 and P7 are respectively added into a first rear middle list C0 and a first rear middle list C1, the first rear middle list C0 and the first rear middle list C1 are also added into a first rear dictionary A1 in the form of key value pairs after the addition is finished, the first rear dictionary has a corresponding relation in the programming field and is shown as A1= { [1000,1001]: [1010,1011] }, and the first rear dictionary A1 has a corresponding relation of numbers which exist in the first rear dictionary and is shown as A1= { [1000,1001]: [1010,1011] }:
first, a first rear dictionary a1= { [1000,1001]: [1010,1011] } corresponds to number 0, a key value pair [1000,1001]: [1010,1011] corresponds to number 1, a first rear middle list C0 corresponds to number 0, a first rear middle list C1 corresponds to number 1, a character string 1000 in the first rear middle list C0 corresponds to number 0, a character string 1001 in the first rear middle list C0 corresponds to number 1, a character string 1010 in the first rear middle list C1 corresponds to number 0, and a character string 1011 corresponds to number 1;
s137: creating an empty second front middle list and a second middle front list E0 and E1, which are respectively mapped with numbers 0 and 1, and creating an empty second rear middle list and a second middle rear list F1 and F2, which are respectively mapped with numbers 0 and 1;
according to S131 and S136, P8, P9, & gt, P15 are added to the empty second pre-dictionary D0 and the second post-dictionary D1 correspondingly, and the added second pre-dictionary and second post-dictionary are in the form of programming field respectively
D0={[0100,0101]:[0110,0111]}、D1={[1100,1101]:[1110,1111]};
At this time, the number correspondence relationship existing in the second pre-dictionary D0 is: first d0= { [0100,0101]: [0110,0111] } corresponds to number 1, key value pair [0100,0101]: [0110,0111] corresponds to number 0, second front middle list E0 corresponds to number 0, second front middle list E1 corresponds to number 1, character string 0100 corresponds to number 0, character string 0101 corresponds to number 1, character string 0110 corresponds to number 0, character string 0111 corresponds to number 1;
the number correspondence relationship existing in the second post dictionary D1 is: first d1= { [1100,1101]: [1110,1111] } corresponds to number 1, key value pair [1100,1101]: [1110,1111] corresponds to number 1, second after-middle list F1 corresponds to number 0, second after-middle list F2 corresponds to number 1, character string 1100 in the second after-middle list corresponds to number 0, character string 1101 corresponds to number 1, character string 1110 in the second after-middle list corresponds to number 0, character string 1111 corresponds to number 1;
s14: according to the sequence from left to right, the first four characters in the regional binary data are intercepted, the first four characters are used as a group of replacement character strings, and the characters in the replacement character strings are marked as G0, G1, G2 and G3 in sequence from left to right;
s15: and carrying out digit 0 and 1 judgment on the elements according to the sequence of G0, G1, G2 and G3 to obtain corresponding elements, taking the elements as encryption elements of the group of replacement character strings, wherein the judgment rules are as follows:
the character G0 determines the range of the dictionary: the character G0 is 0, and the selected range is determined to be in the first pre-dictionary A0 and the first post-dictionary A1, and the character G0 is 1, and the selected range is determined to be in the second pre-dictionary D0 and the second post-dictionary D1;
the character G1 is selected to be a specific dictionary based on the judgment of the character G0, the character G2 is selected to be a key or a value in the dictionary based on the selection of the specific dictionary, and the character G3 is selected to be a specific element in the list after the selection of the key value pair;
for example, if the first four characters are 0110, g0=0, g1=1, g2=1, g3=0, the above decision rule determines that the selected range is in the first front dictionary A0 and the first rear dictionary A1, the character g1=1 determines that the specific dictionary is the first rear dictionary a1= { [1000,1001]: [1010,1011] }, the character g2=1 determines that the value of the key pair in the first rear dictionary A1 is determined, the value of the key pair in the first rear dictionary A1 is selected [1010,1011], and the character G3 determines that the element is 1010 on the basis of the value of the key pair is selected [1010,1011 ].
S16: according to S14, taking 4 characters as intercepting lengths, sequentially intercepting the characters of the regional system data to obtain h groups of replacing character strings, according to S15, sequentially obtaining the encryption elements of each replacing character string, and according to intercepting sequence, splicing the encryption elements of the h groups of replacing character strings to obtain the safe encryption data of the regional system data, wherein the fact that if the intercepting is finished, the rest characters are larger than 0 and smaller than 4 characters, the rest characters are not transformed and are fed to the tail of the safe encryption data of the regional system data;
the security encryption module is used for transmitting the security encryption data of the regional system data to a remote monitoring center;
the remote monitoring center receives and restores and stores the monitoring data of the power grid equipment, the remote monitoring center receives the safety encryption data of the regional system data transmitted by the safety encryption module, and then constructs a first front dictionary and a first rear dictionary, a second front dictionary and a second rear dictionary which are the same as the safety encryption data according to the steps S12 and S13, a first front middle list and a first middle front list, a first rear middle list and a first middle rear list, a second front middle list and a second middle front list, a second rear middle list and a second middle rear list which contain the same data, the safety encryption data of the regional system data are restored according to the sequence from left to right after the construction is completed, the regional system data are stored, the restoring process is to sequentially cut four characters of the safety encryption data from left to right, the four characters are taken as character strings to be restored, and the corresponding data, the key values and the key values of the selected objects are pointed out from the constructed dictionary and the list;
the second embodiment differs from the first embodiment in that the positions where 16 4-bit binary numbers are stored in the created first front dictionary and first rear dictionary, second front dictionary and second rear dictionary, first front middle list and first middle front list, first rear middle list and first middle rear list, second front middle list and second middle front list, second rear middle list and second middle rear list can be set by an administrator of the remote monitoring center;
after the setting of the manager of the remote monitoring center is completed, the remote monitoring center stores one copy in the manager;
in the third embodiment, when the encryption rule needs to be avoided from being transmitted in the network as much as possible, the first embodiment is used to ensure that the encryption rule cannot be transmitted in the network and ensure the security of the encryption rule; under the condition that the encryption rules are required to be ensured to be changeable, the second embodiment is used, so that the safety of the encryption rules can be ensured;
in the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely illustrative and explanatory of the invention, as various modifications and additions may be made to the particular embodiments described, or in a similar manner, by those skilled in the art, without departing from the scope of the invention or exceeding the scope of the invention as defined in the claims.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.

Claims (9)

1. A long-range power grid equipment communication system, comprising:
the power grid equipment data acquisition module acquires communication data of power grid equipment in all authorized trust data sources in an area to generate area communication data, wherein the communication data of the power grid equipment comprises equipment state and operation data, alarm and fault information of all the power grid equipment;
the system comprises a secure encryption module, a storage module and a storage module, wherein the secure encryption module is used for carrying out secure encryption on regional communication data transmitted in a long distance, the secure encryption module is used for constructing objects used for encryption, each object corresponds to a number 0 or 1 in the construction process, the objects comprise a dictionary and a list, and the list exists in the dictionary in the form of key value pairs;
and filling 16 4-bit binary numbers existing in the binary system 1111 converted from 4-bit binary 0000 into the 4-bit binary 1111 into the object, after filling, intercepting a plurality of groups of replacement character strings from the received area communication data subjected to binary conversion by taking the character length 4 as the interception length, sequentially selecting a dictionary and a list corresponding to numbers consistent with each character in the replacement character strings according to each character in the replacement character strings, finally determining elements in the selected list, taking the elements as encryption elements of the corresponding groups of replacement character strings, and splicing to obtain the final secure encryption data.
2. A long distance power grid equipment communication system according to claim 1, wherein the data sources comprise substations, power stations and power distribution stations.
3. The long-distance power grid equipment communication system of claim 1, wherein the equipment status and operational data comprises current data, voltage data, power data, temperature, humidity and pressure data, and the alarm and fault information comprises equipment alarms and abnormal notifications and equipment fault notifications.
4. The long-distance power grid equipment communication system according to claim 1, wherein the specific steps of the security encryption module constructing an object for encryption and filling 16 4-bit binary numbers into the object are as follows:
step one: converting 4-bit binary 0000 into 16 4-bit binary 1111, and marking the 16 4-bit binary numbers as P0, P1, P15 in sequence from small to large according to the sizes of the corresponding decimal numbers, wherein in the marking of the 16 4-bit binary numbers, the reference numerals are the numbers converted into decimal numbers;
step two: creating an empty first pre-dictionary A0 and a first post-dictionary A1, mapping the first pre-dictionary and the first post-dictionary with the number 0, creating an empty second pre-dictionary D0 and a second post-dictionary D1, and mapping the second pre-dictionary and the second post-dictionary with the number 1;
creating an empty first front middle list B0 and a first middle front list B1, mapping the first front middle list with the number 0, mapping the first middle front list with the number 1, creating an empty first rear middle list C0 and a first rear middle list C1, mapping the first rear middle list with the number 0, and mapping the first rear middle list with the number 1;
step three: sequentially adding 4-bit binary numbers P0 and P1 into a first front middle list B0 according to the sequence of P0, P1, and P15, and mapping the P0 and P1 with numbers 0 and 1 respectively after the addition is finished;
adding 4-bit binary numbers P2 and P3 into a first middle-front list B1, and mapping the P2 and P3 with numbers 0 and 1 respectively after the addition is finished;
step four: adding the first front middle list and the first front middle lists B0 and B1 after the addition is finished and the number mapping is built into the first front dictionary A0 in the form of key value pairs, wherein the first front middle list B0 is a key, the first front middle list B1 is a value, and after the addition is finished, adding the B0 in the form of key value pairs: b1 and the number 0 establish a digital mapping;
step five: according to the first to fourth steps, 4-bit binary numbers P4, P5, P6 and P7 are respectively added into a first rear middle list C0 and a first rear middle list C1, after the addition is finished, the first rear middle list C0 and the first rear middle list C1 are also added into a first rear dictionary A1 in the form of key value pairs, and after the addition is finished, the first rear dictionary A1 has a numerical corresponding relation;
step six: creating an empty second front middle list and a second middle front list E0 and E1, which are respectively mapped with numbers 0 and 1, and creating an empty second rear middle list and a second middle rear list F1 and F2, which are respectively mapped with numbers 0 and 1;
according to the first to fifth steps, P8, P9, and P15 are correspondingly added to the empty second pre-dictionary D0 and the second post-dictionary D1, and the added second pre-dictionary and second post-dictionary have the same number correspondence.
5. The long-distance power grid equipment communication system according to claim 4, wherein the secure encryption module obtains final secure encrypted data, specifically as follows:
s31: according to the sequence from left to right, the first four characters in the regional binary data are intercepted, the first four characters are used as a group of replacement character strings, and the characters in the replacement character strings are marked as G0, G1, G2 and G3 in sequence from left to right;
s32: and carrying out digit 0 and 1 judgment on the elements according to the sequence of G0, G1, G2 and G3 to obtain corresponding elements, taking the elements as encryption elements of the group of replacement character strings, wherein the judgment rules are as follows:
the character G0 determines the range of the dictionary: the character G0 is 0, and the selected range is determined to be in the first pre-dictionary A0 and the first post-dictionary A1, and the character G0 is 1, and the selected range is determined to be in the second pre-dictionary D0 and the second post-dictionary D1;
the character G1 is selected to be a specific dictionary based on the judgment of the character G0, the character G2 is selected to be a key or a value in the dictionary based on the selection of the specific dictionary, and the character G3 is selected to be a specific element in the list after the selection of the key value pair;
s33: according to S31 to S32, taking 4 characters as intercepting lengths, sequentially intercepting the characters of the regional system data to obtain h groups of replacing character strings, sequentially obtaining the encryption elements of each replacing character string according to S15, and splicing the encryption elements of the h groups of replacing character strings according to intercepting sequence to obtain the safe encryption data of the regional system data, wherein the fact that if the intercepting result is that the rest characters are larger than 0 and smaller than 4 characters, the rest characters are not transformed and are fed into the tail of the safe encryption data of the regional system data.
6. The system according to claim 1, further comprising a remote monitoring center, wherein the remote monitoring center receives the transmitted security encryption data, and in the same manner as in the first to sixth steps, the remote monitoring center re-constructs the first front dictionary and the first rear dictionary, the second front dictionary and the second rear dictionary, the first front middle list and the first middle front list, the first rear middle list and the first middle rear list, the second front middle list and the second front middle list, the second rear middle list and the second middle rear list, wherein the remote monitoring center contains the same data, and after the construction, the security encryption data is restored based on the security encryption data to obtain the area system data before encryption thereof in the order from left to right, and the area system data before encryption is stored.
7. The communication system of long-distance power grid equipment according to claim 1, wherein the remote monitoring center sequentially cuts out four characters of the security encryption data from left to right in the process of restoring the security encryption data, restores the security encryption data by taking the four characters as character strings to be restored, and indicates data corresponding to objects selected from the constructed dictionary and list for a group of character strings to be restored.
8. The system of claim 4, wherein the locations of the 16 4-bit binary numbers stored in the created first pre-dictionary and first post-dictionary, second pre-dictionary and second post-dictionary, first pre-mid-list and first mid-pre-list, first post-mid-list and first mid-post-list, second pre-mid-list and second pre-mid-list, second post-mid-list and second mid-post-list are settable by an administrator at the remote monitoring center.
9. A long-distance network device communication system according to claim 1, wherein the network device communication data further comprises device identification and address information, control commands and operation instructions, data acquisition intervals and transmission time stamps of all network devices.
CN202311600738.7A 2023-11-28 2023-11-28 Long-distance power grid equipment communication system Active CN117614699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311600738.7A CN117614699B (en) 2023-11-28 2023-11-28 Long-distance power grid equipment communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311600738.7A CN117614699B (en) 2023-11-28 2023-11-28 Long-distance power grid equipment communication system

Publications (2)

Publication Number Publication Date
CN117614699A true CN117614699A (en) 2024-02-27
CN117614699B CN117614699B (en) 2024-04-30

Family

ID=89952932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311600738.7A Active CN117614699B (en) 2023-11-28 2023-11-28 Long-distance power grid equipment communication system

Country Status (1)

Country Link
CN (1) CN117614699B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016131554A1 (en) * 2015-02-17 2016-08-25 Parstream Gmbh Method and apparatus for adaptive data compression
CN107040366A (en) * 2017-06-07 2017-08-11 上海哎媲媲网络技术有限公司 A kind of data ciphering method for carrying effective business information transmission and regular length
CN116760546A (en) * 2023-08-18 2023-09-15 湖南省通信建设有限公司 Modularized password service method based on cloud environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016131554A1 (en) * 2015-02-17 2016-08-25 Parstream Gmbh Method and apparatus for adaptive data compression
CN107040366A (en) * 2017-06-07 2017-08-11 上海哎媲媲网络技术有限公司 A kind of data ciphering method for carrying effective business information transmission and regular length
CN116760546A (en) * 2023-08-18 2023-09-15 湖南省通信建设有限公司 Modularized password service method based on cloud environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李自清;: "基于网络的数据库敏感数据加密模型研究", 计算机测量与控制, no. 05, 25 May 2017 (2017-05-25) *

Also Published As

Publication number Publication date
CN117614699B (en) 2024-04-30

Similar Documents

Publication Publication Date Title
CN106059067B (en) A kind of remote monitoring system of electric power system
AU2011202886B2 (en) A self-healing power grid and method thereof
CN107167704B (en) Power distribution network fault diagnosis system and method based on CIM model
CN104486075B (en) A kind of verification method of intelligent substation ICD model file digital signature
CN103871004A (en) Power distribution network failure cause analyzing method based on expert system and D-S evidence theory
CN108566436B (en) Distributed power equipment information acquisition system and method based on block chain
CN104008442A (en) Power distribution network visual platform construction method based on SG-CIM
NZ573482A (en) A method of configuring intelligent electronic devices to facilitate standardized communication messages among a plurality of ieds within a network
CN106408207A (en) Modeling method and system for secondary virtual loop of intelligent substation
CN101640436A (en) Reduction and generation method of action report of protection device at scheduling port
CN104201774A (en) Method for integrating status monitoring system of primary and secondary power equipment
CN107995051A (en) Secondary equipment of intelligent converting station visualized O&M module information interactive system and method
CN106373032B (en) The high-incidence region discrimination method of Distribution Network Failure based on big data
CN113704780A (en) Model-driven-based power distribution network user side information adaptive encryption method
CN109509239A (en) Exempt from the site protective device secondary circuit configuration file generation method of SCD configuration
CN117614699B (en) Long-distance power grid equipment communication system
CN105959418B (en) A kind of vehicle assistance system based on safety
CN113722883B (en) Intelligent substation secondary circuit fault positioning method
CN117240630B (en) Power equipment safety evaluation device and safety evaluation method
CN108768995B (en) Substation self-adaptive master station access method
CN104391872B (en) PMS systems and anti-error system line chart logical consistency method of calibration
CN112907157A (en) Power grid risk visualization method and system based on meteorological early warning
CN111917597B (en) Broadband service monitoring method and equipment
CN104617663A (en) Method and device for configuring attributes of three-remote signals in distribution network automation system
CN113259122B (en) Full-scene network security intelligent decision handling method based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant