Method for realizing encrypted authentication of distribution automation remote control command

A technology of power distribution automation and remote control commands, applied in the field of electrical engineering, to prevent network attacks, enhance key security, and avoid remote control failures

Active Publication Date: 2013-06-26
CEEC HUNAN ELECTRIC POWER DESIGN INST
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the public network is a public network shared by various industries and users such as electric power and banking, it brings certain security risks to the distribution automation system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing encrypted authentication of distribution automation remote control command
  • Method for realizing encrypted authentication of distribution automation remote control command
  • Method for realizing encrypted authentication of distribution automation remote control command

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] refer to figure 1 — Figure 4 , the method to realize the encryption and authentication of distribution automation remote control commands consists of the following steps: (1) Digitally sign the remote control message and generate a key pair by the master station; (2) The master station stores the private key and issues the public key to the power distribution (3) The power distribution terminal stores the public key; (4) The master station uses the private key to sign; (5) The power distribution terminal uses the public key to verify the signature; (6) The power distribution terminal sends an action signal to the switch.

[0016] The digital signature process of the distribution network master station is as follows: the master station sends a link start message, the power distribution terminal replies with a link start confirmation message, and the master station issues a public key file (ECC method) according to the encryption method used by the power distribution ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing encrypted authentication of a distribution automation remote control command. The method comprises the following steps of: (1) digitally signing a remote control message, and generating a key pair by a main station; (2) storing a private key by the main station and issuing a public key to a power distribution terminal; (3) storing the public key by the power distribution terminal; (4) signing by using the private key by the main station; (5) verifying the signature by using the public key by the power distribution terminal; and (6) sending out an actuating signal from the distribution terminal to a switch. The method comprises that: the main station generates the key pair periodically or randomly through manual triggering by using an asymmetric cryptographic algorithm, stores the private key locally, and sends the public key to the power distribution terminal through a public network; the power distribution terminal stores the received public key locally; the main station when sending the remote control command to the power distribution terminal firstly generates a signature for the remote control message by using the private key, and then attaches the signature at the tail end of the remote control message; and the terminal when receiving the remote control command verifies the signature on the remote control message by using the public key, then carries out the switching action after the successful signature verification, and refuses the action if the signature verification is failed. The method for realizing encrypted authentication of the distribution automation remote control command has strong practicability, and enhances reliability and safety of the remote control.

Description

technical field [0001] The invention belongs to the technical field of electrical engineering, and specifically refers to a method for realizing encryption and authentication of remote control commands of power distribution automation. Background technique [0002] The distribution automation system has a large number of terminals and a wide distribution range. It is difficult to access them all through power fiber optic technology. Public network technologies (such as TD-SCDMA, GPRS, and CDMA) are widely used. Since the public network is a public network shared by various industries and users such as electric power and banking, it brings certain security risks to the distribution automation system. For this reason, the State Grid Corporation issued the State Grid Tiao [2011] No. 168 document "Notice on Strengthening the Safety Protection of Distribution Network Automation System" and "Supplementary Regulations on Safety Protection of Medium and Low Voltage Distribution Netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 漆铭均洪文国孙志云其他发明人请求不公开姓名
Owner CEEC HUNAN ELECTRIC POWER DESIGN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products