Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection performance evaluation method applicable to core network of wireless power private network

A security protection and wireless private network technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as leakage of sensitive information, damage to physical protection measures, and tampering of configuration information, so as to improve security protection capabilities and be easy to implement , the effect of preventing security threats

Active Publication Date: 2017-08-18
STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +2
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Malicious attackers further exploit software system vulnerabilities, weak passwords, and improper policy configuration by destroying physical protection measures or exploiting management loopholes, resulting in illegal access to the power wireless private network management system, which in turn causes risks such as leakage of sensitive information and tampering of configuration information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection performance evaluation method applicable to core network of wireless power private network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0052] Before evaluating the security protection performance of the core network of the electric power wireless private network, firstly, according to figure 1 Build a wireless private network test environment, including terminals, several base stations (eNB530-1—eNB530-N in the figure), switches (S5700 is used in this invention), a security encryption gateway (AR2220 is used in this invention), core network (this The invention uses eSCN230), the network management server eOMC910Server, the network management client eOMC910Client, and the secure access platform (the present invention uses NARIUSAP3000-AG), wherein the terminal is connected to the base station, the base station is connected to the switch, the switch is connected to the secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection performance evaluation method applicable to a core network of a wireless power private network. The security protection performance evaluation method comprises the steps of firstly building a core network security protection performance evaluation system which comprises a terminal, multiple base stations, a switch, a secure encryption gateway, a core network, a network management server, a network management client and a secure access platform; then carrying out a data transmission security protection test of an S1 interface; carrying out a test for an HSS authorization server to refuse a service attack; carrying out a security controllability test for the core network; and carrying out a security test for the network management system of the wireless private network. By adopting the method, the security risk of the core network of the wireless power private network can be evaluated comprehensively, attack behaviors from malicious hosts to the core network of the wireless private network can be prevented efficiently, and the security robustness of the core network of the wireless power private network can be enhanced.

Description

technical field [0001] The invention relates to a safety protection performance evaluation method suitable for a core network of a private electric power wireless network, and belongs to the technical field of information safety protection evaluation of a power communication network. Background technique [0002] The main job of the LTE core network is to connect mobile terminals to external packet data networks in a packet manner. The main network elements of the core network include base stations, MME, HSS, S-GW, P-GW (PDN Gateway, PDN gateway) and PCRF (Policy and Charging Rules Function, policy and charging rule function). The base station provides an air interface connection for the terminal. The MME is equivalent to the manager of the core network and is responsible for all internal affairs (internal handover) and external affairs (cross-system interconnection). The HSS stores all service-related subscription data of users in the LTE network and provides User subscrip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/02H04W12/122
CPCH04W12/12H04W24/02Y02D30/70
Inventor 朱道华王梓莹郭雅娟许海清王小波薄斌李岩周超韦磊黄伟郭静姜海涛陈锦铭李斌王黎明
Owner STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products