5G network slice-based power Internet-of-Things security management method and system

A power Internet of Things and network slicing technology, applied in the field of power Internet of Things network security, can solve problems such as power system paralysis, power outages, tampering with configuration parameters, etc., and achieve the effect of safe and reliable authentication

Pending Publication Date: 2021-04-06
广东电力通信科技有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The birth of 5G has led to the rapid development of vertical industry applications, but at the same time, the security of 5G networks has also become an important issue. Previous network security protection technologies have been difficult to meet the needs of 5G, so it is necessary to focus on 5G network security. Customize a brand-new network security protection system based on its characteristics. 5G network slicing is to divide virtual network resources on a unified physical facility, so as to provide different network requirements for different services, and the security required by different network slicing The protection requirements are also different, so customizing specific security servi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G network slice-based power Internet-of-Things security management method and system
  • 5G network slice-based power Internet-of-Things security management method and system
  • 5G network slice-based power Internet-of-Things security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The main application scenario of the present invention is distribution automation. The distribution automation terminal equipment is based on computer science and communication engineering technology. The entire distribution network is monitored to isolate faults in time, and at the same time, the terminal equipment that controls the distribution network can timely check the faults in the distribution network and optimize the allocation of resources in the distribution network, so that the power grid benefit to the highest.

[0035] refer to Figure 1~2 , which is the first embodiment of the present invention, this embodiment provides a 5G network slicing-based power Internet of Things security management method, including:

[0036] S1: 5G operators perform identity and authority authentication based on the authentication request sent by the distribution automation terminal.

[0037] It should be noted that: distribution automation terminals include:

[0038] Based o...

Embodiment 2

[0059] In the original network slicing security management system, the present invention introduces intelligent security and custom development to make the identification of security threats more intelligent in the security protection of the slicing network, allowing power grid companies to have more independent development rights for specific security services, and at the same time Make the network slicing security management system more in line with the reality of distribution automation.

[0060] refer to Figure 3-4 , which is the second embodiment of the present invention. This embodiment is different from the first embodiment in that it provides a 5G network slicing-based power Internet of Things security management system, including: an identity and authority authentication module, an in-slice For security deployment modules, custom modules, and intelligent security modules, what needs to be explained is:

[0061] The identity and authority authentication module is use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a 5G network slice-based power Internet-of-Things security management method and system. The method comprises the steps of: enabling a 5G operator to perform identity and authority authentication based on an authentication request sent by a power distribution automation terminal; according to the identity and authority authentication result, forming a security configuration file based on the relevant parameters and security requirements of the judged slice type and based on the special security service required in the power distribution automation; arranging the security configuration file into a corresponding network slice; and training the acquired security data by using an artificial neural network algorithm, constructing a slice security model to obtain a security control strategy, and adjusting and updating the security configuration file according to the security control strategy to realize security management of the power Internet of Things. According to the invention, the identification of the security threat in the distribution automation slice network is more intelligent, the security deployment is more diversified, and the 5G authentication is safer and more reliable.

Description

technical field [0001] The present invention relates to the technical field of the electric power Internet of Things network security field, in particular to a method and system for electric power Internet of Things security management based on 5G network slicing. Background technique [0002] 5G has become the most topical information technology hotspot in this era, and it is a powerful driving force for the entire modern society. The birth of 5G has led to the rapid development of vertical industry applications, but at the same time, the security of 5G networks has also become an important issue. Previous network security protection technologies have been difficult to meet the needs of 5G, so it is necessary to focus on 5G network security. Customize a brand-new network security protection system based on its characteristics. 5G network slicing is to divide virtual network resources on a unified physical facility, so as to provide different network requirements for differe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/30H04L29/08G16Y10/35G16Y30/10H04L29/06H04L12/24
CPCH04W4/30H04L67/12G16Y10/35G16Y30/10H04L63/0861H04L63/0876H04L63/1416H04L41/0803
Inventor 李海涛吴振田温景新江映燕连柯郭立玮潘亮尹震超潘城
Owner 广东电力通信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products