Unlock instant, AI-driven research and patent intelligence for your innovation.

A fingerprint construction method for power terminals based on power consumption and emi

A power terminal and construction method technology, applied in character and pattern recognition, data processing applications, instruments, etc., can solve problems such as pseudo-terminal upgrades, malicious user configuration changes, and inability to defend against pseudo-terminals

Active Publication Date: 2021-07-06
ZHEJIANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) False terminal security threats. Attackers use false identities to tamper with and release false information between the main station of distribution automation work and the distribution intelligent terminal to make the terminal unable to work normally, or hijack the terminal and distribution automation. Clear text communication data between master stations to obtain private data
[0004] 2) Physical security threats: including man-made damage and damage caused by natural disasters, attackers can directly operate unprotected or insufficiently protected terminals, obtain user privacy data, and maliciously change user configurations
Although this software upgrade method can timely defend against software attacks such as viruses and Trojan horses, it still cannot effectively defend against fake terminals because the device is not authenticated during the software installation process.
[0007] 2) Hardware security, since power terminal hardware upgrade is a costly and slow process
And in the process of upgrading the hardware, it is often impossible to effectively identify the pseudo-terminal, and the pseudo-terminal will also be upgraded with the upgrade of the terminal.
[0008] Therefore, the above two security strategies cannot effectively defend against attacks using pseudo-terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fingerprint construction method for power terminals based on power consumption and emi
  • A fingerprint construction method for power terminals based on power consumption and emi
  • A fingerprint construction method for power terminals based on power consumption and emi

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0032] A specific embodiment of a power terminal construction method based on power consumption and EMI signals, comprising the following steps:

[0033] 1. Collect data

[0034] Collect EMI signals and power consumption data of 100 power terminals;

[0035] 2. Data preprocessing

[0036] Eliminate the significant mutation signal in the collected EMI signal data, and divide the signal into segments of 10s;

[0037] 3. Extract features to construct fingerprints

[0038] Extract features from the EMI signal and power consumption data respectively, firstly do a short-time Fourier transform on the EMI signal (such as figure 1 shown), and then use the PCA algorithm to reduce the dimensionality of its eigenvectors as the eigenvectors of the EMI signal; then select sensitive points and stable points for the power consumption data (such as figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power terminal fingerprint construction method based on power consumption and EMI. The method utilizes power consumption and EMI signals to construct the fingerprint of the power terminal, including the following steps: 1) collecting the power and EMI data of the power terminal; 2) analyzing and processing the data; 3) extracting the key features of the sample and normalizing them to obtain eigenvector; 4) using the eigenvector to train the classifier to obtain the terminal fingerprint. The present invention can authenticate the power terminal equipment according to whether the fingerprint generated by the EMI data and the characteristics of power consumption matches the fingerprint of the equipment. This method can effectively deal with the current pseudo-terminal attack without adding additional hardware.

Description

technical field [0001] The invention belongs to the field of power grid security, and in particular relates to a power terminal fingerprint construction method based on power consumption and EMI. Background technique [0002] The normal operation of various industries cannot be separated from the power grid. However, with the acceleration of the informatization process, the emergence of the smart grid brings convenience to the operation department and users, but also brings certain hidden dangers. Although the network security attacks represented by the "Stuxnet" and "Black Energy" viruses have not yet caused major losses to our country, they have sounded the alarm for the security work of my country's industrial control. As the data collection terminal and the underlying control unit of the power grid, the smart grid terminal occupies a pivotal position in the smart grid. Once it is maliciously attacked and controlled, it will cause unreliable data, power outages for individ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q50/06G06K9/62
CPCG06Q50/06G06F18/214
Inventor 冀晓宇徐文渊迟悦晗
Owner ZHEJIANG UNIV