Method of safety access of power distribution wireless terminal

A wireless terminal, secure access technology, applied in electrical components, transmission systems, etc., can solve the problems of unencrypted communication, plaintext data easily stolen by attackers, lack of anti-replay attack mechanism, etc., to achieve confidentiality and The effect of integrity protection

Inactive Publication Date: 2019-01-11
STATE GRID CORP OF CHINA +3
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to overcome the lack of an anti-replay attack mechanism in the prior art, which is easy to be exploited by an attacker, and the attacker can carry out a replay attack; after the gateway and the terminal complete identity authentication, no encrypted communication is performed, and the plaintext data is easily stolen The vulnerability stolen by attackers provides a method for secure access of power distribution wireless terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of safety access of power distribution wireless terminal
  • Method of safety access of power distribution wireless terminal
  • Method of safety access of power distribution wireless terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0037] The invention completes the design of a safe access method for a power distribution wireless terminal based on a domestic commercial encryption algorithm. The power distribution wireless terminal needs to be equipped with an encryption chip, which uses the SPI interface for communication. The encryption chip has a built-in domestic commercial encryption algorithm module and supports SM1 / SM2 / SM3; the security access gateway is equipped with an encryption card, which uses the PCI-E interface for communication. Cipher algorithm SM1 / SM2 / SM3 support.

[0038] The secure access interaction protocol is used for communication between the power distribution wireless terminal and the secure access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method of safety access of a power distribution wireless terminal based on a domestic commercial cryptographic algorithm. The method comprises the following steps of:1) prior to interaction of a power distribution wireless terminal and safety access data, performing two-way identity authentication and key negotiation; 2) when the power distribution wireless terminal and a safety access gateway perform normal data communication, performing message filling of the original data of the communication, and employing a domestic symmetric encryption algorithm to encrypt the original data and the filled message; and 3) after the encrypted message is received, performing decryption of the ciphertext data based on the domestic symmetric encryption algorithm to checkthe decrypted original data and the filled message. The method of safety access of the power distribution wireless terminal can achieve the purpose of anti-replay attack; attackers cannot obtain symmetrical encryption keys and cannot decrypt the ciphertext transmission data so as not to perform eavesdropping or tampering of the sensitive interaction information between the power distribution wireless terminal and a master station so as to achieve confidentiality and integrity protection of the sensitive interaction information.

Description

technical field [0001] The invention relates to a method for safely accessing a power distribution wireless terminal, and belongs to the technical field of network access. Background technique [0002] The problem of illegal terminal access in the power distribution automation system: on-site power distribution wireless terminals can be connected to the power distribution automation system through wireless networks (3G / 4G, etc.). Distribution automation systems with multiple points and wide areas face the risk of attacks from wireless terminals. If the system does not perform strong identity authentication on terminals, the possibility of illegal terminal access increases. Illegal terminals can access the company network by duplicating the SIM card, attack the wireless terminals of power distribution in the same network, and even threaten the main station system of power distribution automation. [0003] The problem that the communication data of distribution automation sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/06H04L63/08H04L63/0869H04L63/12
Inventor 韦小刚黄益彬邵志敏陈玉峰郭靓邓进
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products