Unlock instant, AI-driven research and patent intelligence for your innovation.

An encryption method based on device id and time in dnp system

An encryption method and equipment technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as lack of communication security, and achieve the effect of high-security communication.

Inactive Publication Date: 2019-04-09
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Another object of the present invention is to overcome the shortcomings and deficiencies of the lack of communication security in the existing distributed network, and provide a kind of encryption method based on device ID and time in the DNP system. Problems of secure communication and real-time update of secret keys in network devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method based on device id and time in dnp system
  • An encryption method based on device id and time in dnp system
  • An encryption method based on device id and time in dnp system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Such as figure 1 As shown, this embodiment is an encryption method based on device ID and time in the DNP system. The method has a unique device ID number inside the system for each device on the distributed control system, and sends and receives both devices according to the communication. The sequence of ID numbers can uniquely determine a byte sequence 1 in the non-linear substitution table. The time value inside each device system will generate a random sequence at the same time. By performing HMAC digital signature on the time number with a random sequence, another byte sequence 2 is obtained. Byte sequence 1 and byte sequence 2 are respectively related to the communication sequence and time, and a new encryption key is obtained by bitwise XORing byte sequence 1 and byte sequence 2.

[0032] Such as figure 2 As shown, a device ID conversion table based on the encryption method based on device ID and time in the DNP system, the device ID number is freely set by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method based on equipment ID and time in a DNP system. The method is characterized by comprising the following steps: setting an unique equipment ID number in the system for each piece of equipment on a distributed control system; uniquely determining a byte sequence 1 in a nonlinear substitution table according to the ID numbers and sending / receiving order of the data of equipment of both parties; a receiving end of a sending part saving a numerical value in the system when the system is running, wherein the numerical value increases along with the increment of the time; meanwhile, generating a random sequence after the numerical value is configured at a communication receiving party; performing HMAC digital signature on the time digital through the adoption of the random sequence to obtain another byte sequence 1; obtaining a new encryption key through the byte sequence 1 and the byte sequence 2 in bitwise XOR. The key in the invention contains the ID information of each of the sending party and the receiving party, and contains the time numerical value of the receiving party at the same time; the symmetric key can be updated in real time when the time numerical value change achieves a certain degree.

Description

technical field [0001] The invention relates to the field of distributed network (DNP3.0) data encryption, in particular to an encryption method based on device ID and time in the DNP system. Background technique [0002] In the era of industrialization 3.0, the integration of informatization and industrialization is further deepened. The power line is the lifeblood of the power grid operation. It is quite fragile while transmitting electric energy. Any damage from external forces may cause large-scale power outages or even the collapse of the power grid, which will bring great harm to the social economy and the lives of the people. At the same time, with the continuous improvement of the automation degree of power equipment, the remote monitoring of power equipment has gradually shown a popular trend. The remote communication system plays an irreplaceable role in the monitoring, operation control and safety protection of the normal operation of remote power equipment, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L9/0872H04L63/0435
Inventor 胥布工帅邈
Owner SOUTH CHINA UNIV OF TECH