Transformer substation quantum communication model, quantum secret key distribution center and model achieving method

A quantum key distribution and quantum key distribution technology, applied in key distribution, can solve data encryption security risks and other issues, achieve the effect of unconditional key transmission, improve security and reliability, and prevent network monitoring

Active Publication Date: 2013-03-20
CHINA ELECTRIC POWER RES INST +2
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security risks of data encryption in the cu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transformer substation quantum communication model, quantum secret key distribution center and model achieving method
  • Transformer substation quantum communication model, quantum secret key distribution center and model achieving method
  • Transformer substation quantum communication model, quantum secret key distribution center and model achieving method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0088] Example 1

[0089] like image 3 As shown, it is a schematic diagram of scenario 1: the communication key distribution between the intelligent electronic device and the controller (protection or monitoring unit) in the substation.

[0090] Step 1. The secondary quantum key distribution center periodically sends the updated key KD to the intelligent electronic device and the controller at the same time through the classical channel 1 ;

[0091] Step 2. When an intelligent electronic device and the controller want to communicate, use the key KD between them 1 Hash values ​​are calculated on the communication content to ensure message integrity, authentication, and anti-replay attacks.

Example Embodiment

[0092] Example 2

[0093] like Figure 4 As shown, it is a schematic diagram of scenario 2: broadcast messages between different intelligent electronic devices in a substation.

[0094] Step 1. The secondary quantum key distribution center regularly distributes broadcast keys to all intelligent electronic devices through classical channels;

[0095] Step 2. During the lifetime of the key, the broadcast between intelligent electronic devices uses the key to calculate the hash value to ensure message integrity, identity authentication and anti-replay attack;

[0096] In the above two scenarios, SHA256 is used to calculate the hashed message verification code.

Example Embodiment

[0097] Example 3

[0098] like Figure 5 As shown, it is a schematic diagram of scenario 3: key distribution for communication between a substation and a remote control center.

[0099] Step 1. When the remote monitoring system and the control system in the substation need to communicate, apply for a key to the sub-key distribution center;

[0100] Step 2. Generate the bare code by the QKD optical device by the first-level quantum key distribution center and the second-level key distribution center where the substation is located;

[0101] Step 3. The first-level quantum key distribution center and the second-level key distribution center where the substation is located perform processes such as base alignment, error correction, and confidentiality amplification through the key extraction module to generate a security key and submit it to the key control module;

[0102] Step 4. The first-level quantum key distribution center and the second-level key distribution center wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a transformer substation quantum communication model, a quantum secret key distribution center based on the model and a model achieving method. The communication model is a quantum secret key distribution system and comprises a quantum secret key distribution (QKD) optical device, a secret key obtaining module and a secret key control module. The secret key control module, the secret key obtaining module and the QKD optical device are connected in sequence. The quantum secret key distribution center comprises two levels. A primary quantum secret key distribution center (QKDC) is configured in a control center, and a second QKDC is configured at the controller end of a transformer substation. By defining a password suite compatible with secret key distribution protocol and designing a secret key distribution method, the safety and the efficiency of secret key distribution are improved, safe transmission of data is strengthened, and stability and safety of a power system network in operation are guaranteed.

Description

technical field [0001] The invention relates to the technical field of power system security communication, in particular to a substation quantum communication model, a model-based quantum key distribution center and a model implementation method. Background technique [0002] Due to the wider application of computer and communication network technology in the power system, the negative impact caused by the openness of the information and communication system has also begun to spread to the power system. With the increasing prevalence of hackers and viruses on the public network, domestic and foreign power The system communication network has also been repeatedly attacked by external malicious attacks; at the same time, the market-oriented reform of the power industry has greatly increased the number of internal users with potential attack capabilities, and the threat of internal attacks cannot be ignored. Therefore, how to effectively ensure the security of the power dispat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 周静卢立峰张睿汭雷煜卿卢锟
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products