Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pre-sharing-based secure data transmission method for electric load management system

A technology for managing systems and power loads, applied in the field of information security, to achieve strong security, enhance security mechanisms, and reduce monitoring risks

Active Publication Date: 2011-06-29
CHINA ELECTRIC POWER RES INST +1
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption speed of the stream cipher algorithm is faster than that of the block cipher algorithm, but it faces two problems of constructing a well-random characteristic key stream generator and synchronizing the key stream of both parties.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pre-sharing-based secure data transmission method for electric load management system
  • Pre-sharing-based secure data transmission method for electric load management system
  • Pre-sharing-based secure data transmission method for electric load management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention improves the identity authentication and integrity verification mechanism in the data transmission process of the master-slave station of the power load management system through the definition of the PW field of the link user data (application layer) in the data frame, and ensures that the sending and receiving parties of the power load management system Identity legitimacy and message integrity, and on this basis, a pre-shared power load management system master-slave station communication key negotiation method is proposed, which realizes the packet encryption of important control commands, and improves the key The security of message transmission in a complex network environment.

[0025] 1. Identity authentication and integrity verification mechanism

[0026] attached figure 1 It is the data frame format of the extended power load management system. The data frame of the original power load management system consists of a fixed-length messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a pre-sharing-based secure data transmission method for an electric load management system, which is significant to a power load management system to resist various security threats in wireless communication environments and open Internet environments. The confidentiality, integrity and availability of transmission data of the system can be ensured through perfection of the transmission protocol identity authentication and the integrity checking mechanism of the power load management system, and encryption of important control instructions. The method has significant meaning and demonstration effects to the formulation of secure data transmission schemes for other power application systems.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for securely transmitting data in a power load management system based on pre-sharing. Background technique [0002] The power load management system is oriented to the wireless communication network and the open Internet environment. The application data transmitted between the master and slave stations of the system has the security risk of being eavesdropped, tampered and forged by attackers. The data transmission protocol of the power load management system defines the frame format, data encoding and transmission rules for data transmission between the master station and the terminal in the power load management system, but the protocol itself lacks identity authentication, data integrity and important command encryption mechanisms. [0003] The data transmission protocol of the power load management system identifies the communication entity through t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/06H04L29/06H04L1/00
Inventor 高昆仑宋小芹李凌赵保华周亮
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products