LU504593B1 - Method for deploying longitudinal encryption and authentication device in electrical power system - Google Patents
Method for deploying longitudinal encryption and authentication device in electrical power system Download PDFInfo
- Publication number
- LU504593B1 LU504593B1 LU504593A LU504593A LU504593B1 LU 504593 B1 LU504593 B1 LU 504593B1 LU 504593 A LU504593 A LU 504593A LU 504593 A LU504593 A LU 504593A LU 504593 B1 LU504593 B1 LU 504593B1
- Authority
- LU
- Luxembourg
- Prior art keywords
- authentication device
- longitudinal encryption
- encryption
- longitudinal
- deploying
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000003745 diagnosis Methods 0.000 claims description 3
- 238000005259 measurement Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 15
- 238000007726 management method Methods 0.000 description 10
- 238000004519 manufacturing process Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000005728 strengthening Methods 0.000 description 2
- 238000013316 zoning Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Abstract
The invention relates to a method for deploying longitudinal encryption and authentication device in electrical power system, and the method includes the following steps: removing a firewall and adjusting an original network; configuring a first longitudinal encryption and authentication device; accessing the first longitudinal encryption and authentication device between a remote terminal unit and a router; modifying and improving the strategy of the first longitudinal encryption and authentication device; accessing a second longitudinal encryption and authentication device between a power management unit and the router; and installing a third longitudinal encryption and authentication device in the plant. According to the invention, the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data and encrypt, so as to ensure the relative security of the power grid.
Description
Method for deploying longitudinal encryption and authentication device in electrical power system
The invention relates to the technical field of electrical power dispatching automation, in particular to a method for deploying longitudinal encryption and authentication device in electrical power system.
Background technology
Smart grid dispatching control system has a large number of data transmission service scenarios. With the technical progress and service development of power grid, the functions of smart grid dispatching control system are becoming increasingly powerful, and all kinds of applications show the characteristics of complexity and diversification in data communication, specifically, a large amount of data transmission, diverse data acquisition methods, high real-time data interaction, and high safety and reliability requirements for data communication.
In order to meet the needs of power grid development, it is urgent to study the data transmission technology of smart grid dispatching control system.
At present, the EMS system of power grid dispatching is protected by firewall; the longitudinal encryption gateway has the security filtering function of firewall, thus it can be used to replace the firewall.
In the electrical power system network, the local network of each level of power dispatching company is usually divided into four different areas based on the different types of data services, namely, control area, production area, production management area and management information area; the four areas are named from work area to V area in turn. The control area, production area and production management area have service exchange and transmission with each other, while the management information area basically has no service exchange with the other three areas. Based on this feature, the deployment of safety protection equipment and facilities in power secondary system is usually based on the principle of "layering and zoning, boundary strengthening" and the strategy of "horizontal isolation and longitudinal protection"; the deployment stipulates that the data communication between longitudinal I/II areas (i.e., control area and production area) should be protected by longitudinal encryption equipment, LU504593
In order to solve the problem of power grid dispatching safety protection, the invention provides a method for deploying longitudinal encryption and authentication device in electrical power system.
The invention provides a method for deploying longitudinal encryption and authentication device in electrical power system, and the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers; the method comprises the following steps:
S101, configuring a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange, and powering-on;
S102, accessing the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device;
S103, modifying and improving the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered,
S104, accessing a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router;
S105, installing a third longitudinal encryption and authentication device in the plant.
Wherein, before the first longitudinal encryption and authentication device is powered on, the strategy is configured as full release; the network cable is disconnected during power-on.
Wherein, in S104, if the service operation is not recovered for a long time (30s), the network is disconnected, the real-time exchange is reconnected to the router, and then diagnosis is made.
Wherein, the full release rule in the strategy of the first longitudinal encryption and authentication device is deleted, and then the affected situation of the services is obtained and checked until all services are normal.
Wherein, the link strategy of the second longitudinal encryption and authentication device is configured with reference to the first longitudinal encryption and authentication device; in S105, before the second longitudinal encryption and authentication device is accessed, a heartbeat line is connected first, and then network cables corresponding to other network ports are connected 994595
After the second longitudinal encryption and authentication device is accessed, exchange between master device and standby device is conducted, the network cable of the first longitudinal encryption and authentication device is unplugged, and the second longitudinal encryption and authentication device operates as a master equipment to recover service operation.
Wherein, the real-time exchange is a remote terminal unit (RTU exchange); the non-real-time exchange is a phasor measurement unit (PMU exchange).
Wherein, in step 6, the third longitudinal encryption and authentication device is installed at the front end of the router in the plant.
Wherein, in step 6, the third longitudinal encryption and authentication device is installed at the back end of the router in the plant.
The invention has the beneficial effects that the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers. The power private network includes two major network systems: power dispatching data network and power data communication network.
Wherein, the power dispatching data network consists of routers, exchanges, longitudinal encryption and authentication devices and other equipment. The longitudinal encryption and authentication device is deployed in a single-link port of the exchange to encrypt all service data collected by the exchange, the encrypted data are forwarded to the interconnection port of the router, and then the router forwards the data to the power private network through the designated route, thus realizing the confidentiality and integrity protection of data transmission; besides, the longitudinal encryption device also realizes the conversion function of the application layer communication protocols (IEC-104, DL476-92, etc.) of power private network, so as to realize point-to-point selective protection. According to the requirements of private network management of power system, longitudinal encryption equipment must be deployed in the central station and all substations under its jurisdiction, and corresponding encryption tunnels should be established according to the dispatching relationship in this jurisdiction, so as to realize the encryption transmission of the whole communication link data; usually, each longitudinal encryption device is deployed as a mesh network. By deploying the longitudinal encryption and authentication devices, the application program in the smart grid dispatching. 504593 control system can realize horizontal cross-regional transmission, and support the data interaction between dispatching centers at all levels, thus meeting the requirements of the smart grid dispatching control system to share data in a wide area in multi-level dispatching control centers, and preventing hackers from invading and improving the security performance.
Description of attached drawings
Fig. 1 is a flowchart of a method for deploying longitudinal encryption and authentication device in electrical power system according to Example 1 of the invention;
Fig. 2 is a schematic diagram of a specific example of the deployment of longitudinal encryption and authentication device in electrical power system of the invention;
Fig. 3 is a schematic diagram of the deployment of the longitudinal encryption and authentication device in electrical power system according to Example 1 of the invention;
Fig. 4 is a schematic diagram of the deployment of the longitudinal encryption and authentication device in electrical power system according to Example 2 of the invention.
Specific embodiments
In the following description, numerous details are set forth to facilitate a thorough understanding of this specification. However, this specification can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotion without violating the connotation of this specification, so this specification is not limited by the specific examples disclosed below.
Terms used in one or more example (s) of this specification are for the purpose of describing specific examples only and is not intended to limit one or more example (s) of this specification. The singular forms "a" and "the" used in one or more example (s) of this specification and the appended claims are also intended to include the plural forms, unless the context clearly indicates other meaning. It should also be understood that the terms "and/or" used in one or more example (s) of this specification refer to and include any or all possible combinations of one or more associated listed item (s).
It should be understood that although the terms first, second, etc. may be used to describe various information in one or more example (s) of this specification, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more 204593 example (s) of this specification, first can also be called second, and similarly, second can also be called first. Depending on the context, the word "if" as used herein can be interpreted as "in case that" or "when" or "in response to a determination". 5 In the electrical power system network, the local network of each level of power dispatching company is usually divided into four different areas based on the different types of data services, namely, control area, production area, production management area and management information area; the four areas are named from work area to V area in turn. The control area, production area and production management area have service exchange and transmission with each other, while the management information area basically has no service exchange with the other three areas. Based on this feature, the deployment of safety protection equipment and facilities in power secondary system is usually based on the principle of "layering and zoning, boundary strengthening" and the strategy of "horizontal isolation and longitudinal protection"; the deployment stipulates that the data communication between longitudinal I/II areas (i.e., control area and production area) should be protected by longitudinal encryption equipment.
Longitudinal encryption, as the name implies, generally means that the superior power dispatching center is connected with the subordinate power dispatching center, and then the longitudinal encryption and authentication device creates a vpn tunnel to transmit real-time and non-real-time service data; once the service data are encrypted (there are two commonly used algorithms at present, rsa and sm2), hackers cannot crack the message even if they get it, because the encryption and decryption public keys and the private keys at both ends of the tunnel are in one-to-one correspondence, thus ensuring the relative security of the power grid. Therefore, the actual physical object corresponding to longitudinal encryption is the longitudinal encryption and authentication device, and the longitudinal encryption and authentication device is generally used in power plants, photovoltaic power plants and wind farms.
In the description of the invention, a method for deploying longitudinal encryption and authentication device in electrical power system is provided. The power grid dispatching system is protected by firewall; the longitudinal encryption gateway has the security filtering function of firewall, thus the firewall shall be closed first before deployment and then replaced by the longitudinal encryption and authentication device. 0506593
Fig. 1 shows a flow chart of a method for deploying longitudinal encryption and authentication device in electrical power system according to examples of this specification, and the method includes: 101, configuring a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange, and powering-on; 102, accessing the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device; 103, modifying and improving the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered; 104, accessing a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router; 105, installing a third longitudinal encryption and authentication device in the plant.
Specifically:
The first longitudinal encryption and authentication device needs to be configured offline, and the strategy should be set as full release first; the first longitudinal encryption and authentication device configured offline is powered on, with the network cable not connected at this time; the first longitudinal encryption and authentication device is accessed between the
RTU exchange and the real-time router, and the connection between the PMU exchange and the non-real-time router is disconnected, so as to ensure that the data pass through the first longitudinal encryption and authentication device.
The recovery situation of the network service (generally, the recovery time is 30s) is observed. If the network service is not recovered for a long time, the first longitudinal encryption and authentication device is disconnected from the network, the RTU exchange is reconnected to the router, and then diagnosis is made. If the network service is recovered, the operation of the service is observed for a period of time, and then the following steps are conducted after it is stable.
All the passed links are checked in the first longitudinal encryption and authentication device, and the strategy of the first longitudinal encryption and authentication device is modified and improved according to the link conditions; the full release rule in the strategy of the first 504593 longitudinal encryption and authentication device is deleted, the services are observed and then subjected to checking and debugging until all services are normal.
The configuration of the first longitudinal encryption and authentication device is imported into the second longitudinal encryption and authentication device; the second longitudinal encryption and authentication device is installed and powered on, then the heartbeat line is connected first, and then the network cables corresponding to other network ports are connected; the ethO port network cable of the first longitudinal encryption and authentication device is unplugged (connected back after 5s), at this time, the master equipment and standby equipment are exchanged, and Gigabit B will operate as the master equipment.
Exchange between master equipment and standby equipment may cause interruption of some services, so the recovery and operation of the services need to be observed after the exchange master equipment and standby equipment. If the services are not recovered for a long time after exchange (generally 30s), the second longitudinal encryption and authentication device is disconnected from the network, and then the reasons are checked; if the the services are recovered, more exchange operations are made to ensure absolute normality.
The invention will be described in detail with reference to the attached drawings:
Referring to Fig. 2, it is a schematic diagram of deployment of longitudinal encryption and authentication device in electrical power system in the main station (i.e., the superior power plant) of the invention.
In some specific examples of the invention, two communication gateways are first provided in the main station, and then an exchange is respectively accessed (one is a real-time exchange, and the other is a non-real-time exchange), and a longitudinal encryption and authentication device is deployed between the exchange and the router to replace the security protection function of the original firewall. The data signal is sent to the exchange through the communication gateway, and the signal of the exchange is encrypted by the longitudinal encryption and authentication device and transmitted to the power plant dispatching data network through the router.
Example 1:
Referring to Fig. 3, it is a schematic diagram of deployment of longitudinal encryption and authentication device in electrical power system in the plant (i.e., the subordinate power plant) 5 504593 the invention.
In some specific examples of the invention, data are sent from the power plant dispatching network, sent by the router to the longitudinal encryption and authentication device for decryption, and then output to the communication gateway in the plant through the exchange to finish receiving the information of superior power plant.
When there is no device in the network, the forwarding paths of receiving and sending messages are inconsistent because the exchange is enabled. In this case, if the standard packet filtering firewall is placed between the router and the exchange, all messages will be discarded, specifically, the request message and the response message sent by the communication gateway cannot reach the same firewall, so they will be discarded as illegal communication. Based on the principle of address borrowing, the longitudinal encryption and authentication device establishes a main tunnel with the remote node device to solve the above problems; the longitudinal encryption and authentication device can support multiple VLANs. Multi-service communication 1s ensured, with less devices used to be convenient for centralized management.
Example 2:
Referring to Fig. 4, it is a schematic diagram of another deployment of longitudinal encryption and authentication device in electrical power system in the plant (i.e., the subordinate power plant) of the invention.
In some specific examples of the invention, the network environment of the dispatching data network in the main station remains unchanged, as shown in Figure 2. However, in the dispatching data network in the plant, there is no router but only one exchange and two communication gateways, and the longitudinal encryption and authentication device in the plant is deployed between the exchange and the communication gateway. The layout method is flexible and can be applied to various complex environments.
It should be noted that for the sake of simple description, all the aforementioned method examples are expressed as a series of action combinations, but those skilled in the art should know that examples of this specification are not limited by the sequence of described actions, because some steps may be performed in other sequences or simultaneously according to examples of this specification. Besides, those skilled in the art should also know that the examples described in the specification are all preferred examples, and the actions and modules 204593 involved are not necessarily necessary for the examples in this specification.
In the above examples, the description of each example has its own emphasis. For the parts not detailed in one example, please refer to the relevant descriptions of other examples.
The preferred examples of this specification disclosed above are only used to help explain this specification. Alternative examples do not describe all the details in detail, and also do not limit the invention to the specific examples described. Obviously, many modifications and changes can be made according to the contents of the examples in this specification. These examples are selected and described in detail in this specification in order to better explain the principles and practical applications of the examples in this specification, so that those skilled in the art can better understand and make use of this specification. This specification 1s limited only by the claims and their full scope and equivalents.
Claims (10)
1. A method for deploying longitudinal encryption and authentication device in electrical power system comprises the following steps: controlling the robot to configure a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange; controlling the robot to access the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device; controlling the robot to modify and improve the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered; controlling the robot to access a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router; controlling the robot to install a third longitudinal encryption and authentication device in the plant; wherein, the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers.
2. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the strategy of the first longitudinal encryption and authentication device is configured as release before powering-up.
3. The method for deploying longitudinal encryption and authentication devices in power system according to claim 1, wherein the link strategy of the second longitudinal encryption and authentication device is configured with reference to the first longitudinal encryption and authentication device.
4. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein if the service operation is not recovered after a set time, the network is disconnected, the real-time exchange is reconnected to the router, and then diagnosis is made.
5. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 4, wherein the full release rule in the strategy of the first longitudinal encryption and authentication device is deleted, and then the affected situation of the 504593 services is obtained and checked until all services are normal.
6. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein before the second longitudinal encryption and authentication device is accessed, a heartbeat line is connected, and network cables corresponding to other network ports are connected.
7. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 6, wherein after the second longitudinal encryption and authentication device is accessed, the network cable of the first longitudinal encryption and authentication device is unplugged, and the second longitudinal encryption and authentication device operates as a master equipment to recover service operation.
8. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the real-time exchange is a remote terminal unit; the non-real-time exchange is a phasor measurement unit.
9. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at the front end of the router in the plant.
10. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at the back end of the router in the plant.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310382600.8A CN116545654A (en) | 2023-04-11 | 2023-04-11 | Deployment method of longitudinal encryption authentication device in power system |
Publications (1)
Publication Number | Publication Date |
---|---|
LU504593B1 true LU504593B1 (en) | 2024-01-09 |
Family
ID=87449705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
LU504593A LU504593B1 (en) | 2023-04-11 | 2023-06-27 | Method for deploying longitudinal encryption and authentication device in electrical power system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116545654A (en) |
LU (1) | LU504593B1 (en) |
-
2023
- 2023-04-11 CN CN202310382600.8A patent/CN116545654A/en active Pending
- 2023-06-27 LU LU504593A patent/LU504593B1/en active
Also Published As
Publication number | Publication date |
---|---|
CN116545654A (en) | 2023-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rehmani et al. | Software defined networks-based smart grid communication: A comprehensive survey | |
Sauter et al. | End-to-end communication architecture for smart grids | |
Sidhu et al. | Modelling and simulation for performance evaluation of IEC61850-based substation communication systems | |
EP2557646B1 (en) | Configuration of an IEC 61850 teleprotection IED for inter-substation communication | |
US11057269B2 (en) | System and method for configuring IED process bus network switches from substation topology specification | |
Sidhu et al. | Implementation issues with IEC 61850 based substation automation systems | |
CN103026664A (en) | Determining vlan-ids for a switched-based communication network of a process control system | |
US9929993B2 (en) | Method for transmitting messages in an energy automation network, energy automation component and substation | |
Zhou et al. | Efficient application of GPRS and CDMA networks in SCADA system | |
CN102904759B (en) | Reinforced EOC (Ethernet over Coax) terminal management system and method for broadcast television network | |
CN103812752A (en) | Resource sharing method among virtual local area networks (vlans) in power communication network | |
CN102523171A (en) | Network system based on double call centers | |
LU504593B1 (en) | Method for deploying longitudinal encryption and authentication device in electrical power system | |
CN108566325A (en) | Ciphering type ring exchanger system | |
Apostolov | To GOOSE or not to GOOSE?-that is the question | |
CN104601371A (en) | Substation communication method | |
Zhang et al. | A security mechanism for software-defined networking based communications in vehicle-to-grid | |
Tan et al. | Testing IEC 61850 based multi-vendor substation automation systems for interoperability | |
CN116455564A (en) | Quantum encryption-based power distribution automation protection method and system | |
CN103888335A (en) | Transformer station information network interconnection method | |
Cabral et al. | SDN Advantages for Ethernet-Based Control | |
CN2884710Y (en) | Exchanging distance net bridge appliance with virtual net function for providing multiple interfaces | |
CN217957094U (en) | Remote centralized control network networking structure of cascade hydropower station | |
CN101436986A (en) | Method for implementing communication route based on ELCP protocol | |
CN115361152A (en) | Encryption system and encryption method for seamless access to existing network |